Recent Articles

Open access

ISSN: 2772-9184

Privacy-preserving security of IoT networks: A comparative analysis of methods and applications

The Internet of Things (IoT) connects devices to enhance efficiency, productivity, and quality of life. However, deploying IoT networks introduces critical privacy and security challenges, including...

Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments

The kind of cyber threat prevalent and most dangerous to networked systems is the Distributed Denial of Service (DDoS), especially with expanded connection of Internet of Things (IoT) devices. This...

Cyber intrusion detection using ensemble of deep learning with prediction scoring based optimized feature sets for IOT networks

Detecting intrusions in Internet of Things (IoT) networks is critical for maintaining cybersecurity. Traditional Intrusion Detection Systems (IDS) often face challenges in identifying unknown attacks...

Leveraging blockchain for robust and transparent E-voting systems

Voting is considered one of the most critical actions for proper decision-making in governmental entities, boards of directors, and the financial sector. Many researchers proposed E-voting systems where...

Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain

•Security challenges in RFID, edge computing and blockchain enabled supply chains are analysed, focusing on authentication.•A lightweight mutual authentication protocol is proposed for RFID-based supply...

An explainable ensemble-based intrusion detection system for software-defined vehicle ad-hoc networks

Intrusion Detection Systems (IDS) are widely employed to detect and mitigate external network security events. Vehicle ad-hoc Networks (VANETs) continue to evolve, especially with developments related...

Multimodal deep neural network for UAV GPS jamming attack detection

Despite the progress in Unmanned Aerial Vehicles, various issues remain related to their cybersecurity. One of these issues is GPS jamming attacks. GPS jamming attacks can cause UAVs to lose control...

A novel approach based on XGBoost classifier and Bayesian optimization for credit card fraud detection

Nowadays, detecting fraudulent transactions has become increasingly important due to the rise of online businesses and the increasing use of sophisticated techniques by fraudsters to make fraudulent...

Security analysis of the open banking account and transaction API protocol

The Second Payment Services Directive (PSD2) of the European Union aims to create a consumer-friendly financial market by mandating secure and standardised data sharing between banking operators and...

Leveraging federated learning for DoS attack detection in IoT networks based on ensemble feature selection and deep learning models

The Internet of Things (IoT) seamlessly integrates into daily life, enhancing decision-making and simplifying everyday tasks across various domains, including organizations, healthcare, the military,...

Survey of deep learning approaches for securing industrial control systems: A comparative analysis

•Comprehensive analysis of deep learning approaches for anomaly detection in ICS.•Insightful Decision-Making Visualizations.•Foundational Security Measures in ICS....

CNN Based Deep Learning Modeling with Explainability Analysis for Detecting Fraudulent Blockchain Transactions

In the era of growing cryptocurrency adoption, Blockchain has emerged as a leading player in the digital payment landscape. However, this widespread popularity also brings forth various security challenges,...

Secure and efficient drug supply chain management system: Leveraging polymorphic encryption, blockchain, and cloud storage integration

The counterfeit medication infiltration within global supply chains poses a major public health threat. To address this, a collaborative effort among governments, regulators, and pharmaceutical companies...

Explainable AI and machine learning for robust cybersecurity in smart cities

An emerging application of such new technologies is in urban development, with cities increasingly utilizing them to address social, environmental, and urban issues. IoT has paved the way for Smart...

An ensemble learning framework for enhanced anomaly and failure detection in IoT systems

The rapid proliferation of Internet of Things (IoT) devices has revolutionized modern connectivity but also introduced significant cybersecurity challenges due to heterogeneous architectures, resource...

Public-Key replacement attacks on lightweight authentication schemes for resource-constrained scenarios

•Present public-key replacement attacks on two very recent CLAS schemes.•Discuss the reasons of the attacks and suggest related improvements....

Autonomous identity-based threat segmentation for zero trust architecture

Zero Trust Architecture (ZTA) fundamentally redefine network security by adopting a "trust nothing, verify everything" approach requiring identity verification for all access. However, conventional...

Lyric-based passwords: Enhancing security and recall with AI

In the digital age, text-based passwords remain the cornerstone of user authentication. However, the balance between security and memorability remains a significant challenge. Users often face a dilemma...

Adaptive steganography based on motion vectors for H.264/AVC

In our current era, sending and receiving data securely is a significant challenge. Through data transmission, we must ensure that the data reaches the intended recipients without being compromised...

Sysmon event logs for machine learning-based malware detection

Malware poses a significant threat to modern computing environments, necessitating advanced detection techniques that can adapt to evolving attack methods. This study focuses on dynamic malware analysis...

Blockchain-integrated image steganography using xDoG edge detection for authentication

The fusion of image steganography with blockchain technology have brought about novel prospects for safe and decentralized authentication systems in recent years. In this paper, we propose a blockchain-based...

Design of distributed denial-of-service attack prevention mechanism for IoT-driven data fusion system

In the current era, informatics systems technology is advancing at a rapid pace, and as a result, the Internet of Things (IoT) has become increasingly important to daily life in many ways. Multisensor...

Advancements in secure quantum communication and robust key distribution techniques for cybersecurity applications

Quantum communication is a rapidly evolving field that leverages quantum physics to enable secure and efficient information exchange. A cornerstone of quantum cryptography is Quantum Key Distribution...

MedicalFuzzySec: A novel steganography technique using fuzzy logic to secure electronic patient data (EPD) concealment in medical images

Medical diagnostic systems generate sensitive patient information that requires optimal protection during transmission and storage. Image steganography provides a secure method for embedding secret...

PASTAD: A Context-Aware Threat Modeling Methodology for Unmanned Aerial Systems

•PASTAD is a UAS-specific threat modeling method adapted from the PASTA model.•A five-layer UAS architecture supports structured security analysis.•Threats are systematically identified and categorized...

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.