Metaheuristic-driven neural architecture search for deep learning-based side-channel analysis
2026
Deep Learning (DL) has proven highly effective in Side-Channel Analysis (SCA), especially against secure devices like smart cards. However, designing efficient DL models remains time-consuming and often...
A multi-receiver and multi-message anonymous ID-based hybrid signcryption scheme for secure data transmission
2026
The signcryption scheme ensures data confidentiality and authenticity, thereby securing message transmission, while the traditional approach provides no protection for recipient identity information....
Defending Federated Learning Against Adversarial Attacks: A Systematic Literature Review
Available online 28 March 2026
•The first systematic literature review (SLR) focusing exclusively on adversarial threats and defence in Federated Learning (FL) published between 2023 and 2025.•A novel, four-dimensional classification...
When Semantic Plausibility Becomes a Liability:LLM-based Phishing Detection from an Adversarial Asymmetry Perspective
Available online 20 March 2026
With the rise of generative AI, a new generation of intelligent phishing has emerged, where attackers leverage Large Language Models (LLMs) to craft websites with high semantic plausibility, posing...
Android App Repackaging Detection: A Comprehensive Survey
Available online 9 January 2026
The Android operating system, dominating over 85% of the mobile market through open-source flexibility, suffers from intrinsic vulnerabilities. The APK(Android Package Kit) parsability and Smali code...
Authentication, access control and scalability models in Internet of Things Security–A review
December 2025
The Internet of Things (IoT) leads to the next phase of human interaction with technology. With the help of the IoT, physical objects can be given the ability to generate, receive, and seamlessly trade...
Survey of techniques to detect common weaknesses in program binaries
December 2025
Software vulnerabilities resulting from coding weaknesses and poor development practices are common. Attackers can exploit these vulnerabilities and impact the security and privacy of end-users. Most...
Securing IoT devices with fast and energy efficient implementation of PRIDE and PRESENT ciphers
December 2025
The rise of low-power, cost-efficient internet-connected devices has led to a need for lightweight cryptography. The lightweight block cipher PRIDE, designed by Martin R. Albrecht, is one of the most...
An improved three factor authentication protocol for wireless body area networks
December 2025
Wireless Body Area Networks (WBAN) is a concrete solution for the healthcare system, and it is paramount to ensure the sensed data by the WBAN sensors is secure against vulnerable threats and inaccessible...
A novel approach for handling missing data to enhance network intrusion detection system
December 2025
Managing missing data is a critical challenge in Intrusion Detection System (IDS) datasets, significantly affecting the performance of deep learning models. To address this issue, we introduce DeepLearning_Based_MissingData_Imputation...
A survey on scalable consensus algorithms for blockchain technology
December 2025
The process of reaching an agreement on a value within a distributed network, known as a consensus problem, is a defining feature of blockchain. This consensus problem can be seen in various applications...
Securing industry 4.0: Assessing cybersecurity challenges and proposing strategies for manufacturing management
December 2025
Industry 4.0 represents the foundation of the fourth industrial revolution, characterised by the integration of innovative technology into the manufacturing process. This integration enhances automation,...
Federated learning-based intrusion detection system for the internet of things using unsupervised and supervised deep learning models
December 2025
The adoption of the Internet of Things (IoT) in our technology-driven society is hindered by security and data privacy challenges. To address these issues, Artificial Intelligence (AI) techniques such...
EMAKAS: An efficient three-factor mutual authentication and key-agreement scheme for IoT environment
December 2025
The adoption of IoT in healthcare revolutionizes remote patient monitoring and healthcare efficiency. Yet, it brings notable security and privacy challenges, particularly in resource-constrained environment....
Bankruptcy forecasting in enterprises and its security using hybrid deep learning models
December 2025
In current scenario when economic and risk management sectors need accurate predictions of enterprise bankruptcy, it is very importance issue to research in the field of security of enterprise bankruptcy....
An effective steganographic technique for hiding the image data using the LSB technique
December 2025
Steganography is the art and science of writing secret messages so that neither the sender nor the intended recipient knows there is a hidden message. Data hiding is the art of hiding data for various...
Neural secret key enabled secure cloud storage with efficient packet checker algorithm
December 2025
Cloud computing technology is utilized for the commercial purpose of implementing virtualization for the storage of data, which is then controlled and made accessible to users via remote servers. With...
A comprehensive investigation into robust malware detection with explainable AI
December 2025
In today’s digital world, malware poses a serious threat to security and privacy by stealing sensitive data and disrupting computer systems. Traditional signature-based detection methods have become...
Automatic intrusion detection model with secure data storage on cloud using adaptive cyclic shift transposition with enhanced ANFIS classifier
December 2025
Cloud computing has emerged as a pivotal technology in the computer electronics industry, offering users significant computing power and ample storage space. Security threats pose significant challenges...
Addressing cybersecurity challenges in robotics: A comprehensive overview
December 2025
As robotics technology becomes increasingly integrated into various sectors, ensuring the cybersecurity of robotic systems is paramount. This article provides an in-depth exploration of the cybersecurity...
Towards superior android ransomware detection: An ensemble machine learning perspective
December 2025
Ransomware remains a pervasive threat to Android devices, with its ability to encrypt critical data and demand ransoms causing significant disruptions to users and organizations alike. This research...
Enhancing cybersecurity resilience through advanced red-teaming exercises and MITRE ATT&CK framework integration: A paradigm shift in cybersecurity assessment
December 2025
As cybersecurity threats evolve alarmingly, conventional defense strategies are becoming increasingly ineffective. In response to this urgent challenge, our study presents a transformative approach...
Comparison of mitigating DDoS attacks in software defined networking and IoT platforms
December 2025
The Software-Defined Networking (SDN) paradigm redefines the term "network" by enabling network managers to programmatically initialize, control, alter, and govern network behavior. Network engineers...
A survey on intrusion detection system in IoT networks
December 2025
As the Internet of Things (IoT) expands, the security of IoT networks has becoming more critical. Intrusion Detection Systems (IDS) are essential for protecting these networks against malicious activities....
Earthworm optimization algorithm based cascade LSTM-GRU model for android malware detection
December 2025
The rise in mobile malware risks brought on by the explosion of Android smartphones required more efficient detection techniques. Inspired by a cascade of Long Short-Term Memory (LSTM) and Gated Recurrent...