Privacy-preserving security of IoT networks: A comparative analysis of methods and applications
December 2025
The Internet of Things (IoT) connects devices to enhance efficiency, productivity, and quality of life. However, deploying IoT networks introduces critical privacy and security challenges, including...
Share article
Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments
December 2025
The kind of cyber threat prevalent and most dangerous to networked systems is the Distributed Denial of Service (DDoS), especially with expanded connection of Internet of Things (IoT) devices. This...
Share article
Cyber intrusion detection using ensemble of deep learning with prediction scoring based optimized feature sets for IOT networks
December 2025
Detecting intrusions in Internet of Things (IoT) networks is critical for maintaining cybersecurity. Traditional Intrusion Detection Systems (IDS) often face challenges in identifying unknown attacks...
Share article
Leveraging blockchain for robust and transparent E-voting systems
December 2025
Voting is considered one of the most critical actions for proper decision-making in governmental entities, boards of directors, and the financial sector. Many researchers proposed E-voting systems where...
Share article
Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain
December 2025
•Security challenges in RFID, edge computing and blockchain enabled supply chains are analysed, focusing on authentication.•A lightweight mutual authentication protocol is proposed for RFID-based supply...
Share article
An explainable ensemble-based intrusion detection system for software-defined vehicle ad-hoc networks
December 2025
Intrusion Detection Systems (IDS) are widely employed to detect and mitigate external network security events. Vehicle ad-hoc Networks (VANETs) continue to evolve, especially with developments related...
Share article
Multimodal deep neural network for UAV GPS jamming attack detection
December 2025
Despite the progress in Unmanned Aerial Vehicles, various issues remain related to their cybersecurity. One of these issues is GPS jamming attacks. GPS jamming attacks can cause UAVs to lose control...
Share article
A novel approach based on XGBoost classifier and Bayesian optimization for credit card fraud detection
December 2025
Nowadays, detecting fraudulent transactions has become increasingly important due to the rise of online businesses and the increasing use of sophisticated techniques by fraudsters to make fraudulent...
Share article
Security analysis of the open banking account and transaction API protocol
December 2025
The Second Payment Services Directive (PSD2) of the European Union aims to create a consumer-friendly financial market by mandating secure and standardised data sharing between banking operators and...
Share article
Leveraging federated learning for DoS attack detection in IoT networks based on ensemble feature selection and deep learning models
December 2025
The Internet of Things (IoT) seamlessly integrates into daily life, enhancing decision-making and simplifying everyday tasks across various domains, including organizations, healthcare, the military,...
Share article
Survey of deep learning approaches for securing industrial control systems: A comparative analysis
December 2025
•Comprehensive analysis of deep learning approaches for anomaly detection in ICS.•Insightful Decision-Making Visualizations.•Foundational Security Measures in ICS....
Share article
CNN Based Deep Learning Modeling with Explainability Analysis for Detecting Fraudulent Blockchain Transactions
December 2025
In the era of growing cryptocurrency adoption, Blockchain has emerged as a leading player in the digital payment landscape. However, this widespread popularity also brings forth various security challenges,...
Share article
Secure and efficient drug supply chain management system: Leveraging polymorphic encryption, blockchain, and cloud storage integration
December 2025
The counterfeit medication infiltration within global supply chains poses a major public health threat. To address this, a collaborative effort among governments, regulators, and pharmaceutical companies...
Share article
An ensemble learning framework for enhanced anomaly and failure detection in IoT systems
December 2025
The rapid proliferation of Internet of Things (IoT) devices has revolutionized modern connectivity but also introduced significant cybersecurity challenges due to heterogeneous architectures, resource...
Share article
Public-Key replacement attacks on lightweight authentication schemes for resource-constrained scenarios
December 2025
•Present public-key replacement attacks on two very recent CLAS schemes.•Discuss the reasons of the attacks and suggest related improvements....
Share article
Autonomous identity-based threat segmentation for zero trust architecture
December 2025
Zero Trust Architecture (ZTA) fundamentally redefine network security by adopting a "trust nothing, verify everything" approach requiring identity verification for all access. However, conventional...
Share article
Identifying Influential Nodes in Complex Networks Based on ASP Theory and Centrality Criteria
Available online 27 June 2025
From social and technological to biological, complex networks are found in a lot of domains. Inherently, such systems possess dynamic and intricate characteristics. One of the core problems in network...
Share article
Explainable AI and Machine Learning for Robust Cybersecurity in Smart Cities
Available online 15 June 2025
An emerging application of such new technologies is in urban development, with cities increasingly utilizing them to address social, environmental, and urban issues. IoT has paved the way for Smart...
Share article
Intelligent phishing website detection: A CNN-SVM approach with nature-inspired hyperparameter tuning
Available online 28 May 2025
Phishing attacks represent a growing threat to online users and software developers, necessitating the development of advanced detection strategies. This study proposes a hybrid framework that integrates...
Share article
AI-Based Cybersecurity Frameworks for 7G-Enabled Virtual Therapy Platforms
Available online 28 April 2025
The modern technology network plays an important role. Artificial intelligence to provide a higher solution for network security. As 7G networks emerge, virtual therapy platforms have begun to take...
Share article
Leveraging Dynamic Embeddings and Reinforcement Learning with Bayesian Networks for Ransomware Resiliences
Available online 27 April 2025
Ransomware has emerged as a formidable cybersecurity menace, targeting organizations and individuals with devastating consequences. This research paper delves into the multifaceted domain of ransomware...
Share article
Design of Distributed Denial-of-Service Attack Mechanism for IoT-Driven Data Fusion System
Available online 8 April 2025
In the current era, informatics systems technology is advancing at a rapid pace, and as a result, the Internet of Things (IoT) has become increasingly important to daily life in many ways. Multi-sensor...
Share article
Blockchain-Integrated Image Steganography using xDoG Edge Detection for Authentication
Available online 2 April 2025
The fusion of image steganography with blockchain technology have brought about novel prospects for safe and decentralized authentication systems in recent years. In this paper, we propose a blockchain-based...
Share article
Advancements in secure quantum communication and robust key distribution techniques for cybersecurity applications
Available online 14 March 2025
Quantum communication is a rapidly evolving field that leverages quantum physics to enable secure and efficient information exchange. A cornerstone of quantum cryptography is Quantum Key Distribution...
Share article
An application for predicting phishing attacks: A case of implementing a support vector machine learning model
2024
The imminent threat that phishing websites poses is a major concern for internet users worldwide. These fraudulent websites are crafted by cyber attackers to appear trustworthy and deceive vulnerable...
Share article