Recent Articles

Open access

ISSN: 2772-9184

E-Brightpass: A Secure way to access social networks on smartphones

Social network providers offer a variety of entertainment services in exchange for end users’ personal information, such as their identity. The majority of users access social networking sites via their...

Share article

Efficient time-oriented latency-based secure data encryption for cloud storage

To ensure data security in the cloud, there exist several techniques proposed by various researchers. The most common method is the usage of data encryption techniques like profile, rule, and attribute-based...

Share article

Increasing embedding capacity of stego images by exploiting edge pixels in prediction error space

•An image steganography approach has been proposed for efficient data hiding on the edges of an image. We have applied edge detectors in prediction error space to increase the embedding capacity of...

Share article

Colour image encryption algorithm using Rubik’s cube scrambling with bitmap shuffling and frame rotation

The 21st century has seen a significant increase in the usage of multimedia to transfer information. Algorithms used for the encryption of plain text are not suitable for multimedia encryption. This...

Share article

Cyber security: State of the art, challenges and future directions

Cyber security has become a very critical concern that needs the attention of researchers, academicians, and organizations to confidentially ensure the protection and security of information systems....

Share article

A blockchain-based anonymous reporting system with no central authority: Architecture and protocol

•Embedding a private blockchain into a public blockchain.•Submitting reports on a public blockchain anonymously.•Using ring signature to provide anonymity.•Removing central authority.•Applying a secret...

Share article

Security analysis of cyber physical system using digital forensic incident response

There is a great demand for an efficient security tool which can secure IIoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IIoT considering...

Share article

Enhancing intrusion detection systems through dimensionality reduction: A comparative study of machine learning techniques for cyber security

•Investigates machine learning (ML) algorithms for intrusion detection.•Uses large data set of 126,000 samples from NSL-KDD for experiments.•Analyses random projection and principal component analysis's...

Share article

An application for predicting phishing attacks: A case of implementing a support vector machine learning model

The imminent threat that phishing websites poses is a major concern for internet users worldwide. These fraudulent websites are crafted by cyber attackers to appear trustworthy and deceive vulnerable...

Share article

Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments

Vehicular ad-hoc network (VANET) technology has gained prominence, especially in the context of the emerging field of VANET Cloud as an integral part of connected and autonomous vehicles. The automotive...

Share article

Automatic generation of security protocols attacks specifications and implementations

Confidence in a communication protocol’s security is a key requirement for its deployment and long-term maintenance. Checking if a vulnerability exists and is exploitable requires extensive expertise....

Share article

A three-factor mutual authentication scheme for telecare medical information system based on ECC

In critical pandemic situations, the Telecare Medical Information System (TMIS) is a technological invention that offers secure and authentic patient registration and medical services remotely. Wireless...

Share article

A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact

•We propose a secure deepfake mitigation framework using Elliptic Curve Cryptography (ECC)-based signature and encryption schemes.•The architecture of deepfake mitigation framework through general guidelines...

Share article

Any Bluetooth device can be hacked. Know how?

In today's world, Bluetooth technology is integrated into almost every device we use, from wireless headsets, mice, and keyboards to cars and smart home devices. But with the convenience of this technology...

Share article

SDN enabled role based shared secret scheme for virtual machine security in cloud environment

Cloud computing has given a new direction towards the usage of resources based on the demand without depending on the location. Even though there are many advantages with cloud computing there are challenges...

Share article

A novel dual optimized IDS to detect DDoS attack in SDN using hyper tuned RFE and deep grid network

Technological advancement is one of the factors contributing to a rise of susceptible cyberattacks. Distributed denial of service (DDoS) attack reduces the efficiency of network servers by saturating...

Share article

Quantum vs post‐quantum security for future networks: Survey

Classical cryptography (crypt) schemes (sche) have been compromised by the practical results on quantum (q) computers in recent years. Nowadays these sche ‘s can be compromised by using the Shor's methodology....

Share article

A survey on exploring the challenges and applications of wireless body area networks (WBANs)

Networks play an important role in the day-to-day life of every individual. Networks are involved in the transmission of necessary information between the sender and receiver in the channel. Wireless...

Share article

Mutual information based logistic regression for phishing URL detection

Phishing is a cybersecurity problem that hackers employ to deceive individuals and organizations. Phishing is dynamic in nature; the hackers change several tricks to deceive the victims in multiple...

Share article

Secure and sustainable food processing supply chain framework based on Hyperledger Fabric technology

Food processing supply chains are gradually facing the problem of incorporation and sustainability because of the complexity of many participants involved in the supply chain network. Customers are...

Share article

Navigating the landscape: Safeguarding privacy and security in the era of ambient intelligence within healthcare settings

Ambient intelligence technologies have the potential to transform healthcare by providing personalized, context-aware, and proactive support for patients and healthcare providers. However, the use of...

Share article

Energy-efficient classification strategy for detecting interference and malicious sensor nodes in wireless body area Networks

Wireless Body Area Networks (WBANs) play a vital role in healthcare monitoring, using wireless sensors to track physiological parameters and predict illness onset. This study proposes a novel approach...

Share article

Securing IoT Devices with Fast and Energy Efficient Implementation of PRIDE and PRESENT Ciphers

The rise of low-power, cost-efficient internet-connected devices has led to a need for lightweight cryptography. The lightweight block cipher PRIDE, designed by Martin R. Albrecht, is one of the most...

Share article

Authentication, Access Control and Scalability models in Internet of Things Security - A Review

The Internet of Things (IoT) leads to the next phase of human interaction with technology. With the help of the IoT, physical objects can be given the ability to generate, receive, and seamlessly trade...

Share article

Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review

The fast growth of the cloud computing technology has led to immense development in the public and private sectors. Cloud computing provides a high level of virtualization, massive scalability, multitenancy...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.