Issue 1/2024
Content (33 Articles)
A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation
Arun Sekar Rajasekaran, M. Azees
Blockchain-based multi-diagnosis deep learning application for various diseases classification
Hakima Rym Rahal, Sihem Slatnia, Okba Kazar, Ezedin Barka, Saad Harous
Cyber threat assessment and management for securing healthcare ecosystems using natural language processing
Stefano Silvestri, Shareful Islam, Dmitry Amelin, Gabriele Weiler, Spyridon Papastergiou, Mario Ciampi
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)
Osama Bassam J. Rabie, Shitharth Selvarajan, Tawfiq Hasanin, Gouse Baig Mohammed, Abddulrhman M. Alshareef, Mueen Uddin
Federated transfer learning for attack detection for Internet of Medical Things
Afnan A. Alharbi
Cybersecurity challenges in IoT-based smart renewable energy
Alexandre Rekeraho, Daniel Tudor Cotfas, Petru Adrian Cotfas, Titus Constantin Bălan, Emmanuel Tuyishime, Rebecca Acheampong
A review on graph-based approaches for network security monitoring and botnet detection
Sofiane Lagraa, Martin Husák, Hamida Seba, Satyanarayana Vuppala, Radu State, Moussa Ouedraogo
SDN as a defence mechanism: a comprehensive survey
Believe Ayodele, Victor Buttigieg
Enhancing attack resilience of cyber-physical systems through state dependency graph models
Konstantinos Adamos, George Stergiopoulos, Michalis Karamousadakis, Dimitris Gritzalis
Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network
K. Dinesh, S. V. N. Santhosh Kumar
Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents
Åvald Åslaugson Sommervoll, László Erdődi, Fabio Massimo Zennaro
Estimating vulnerability metrics with word embedding and multiclass classification methods
Hakan Kekül, Burhan Ergen, Halil Arslan
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware
Silviu Viţel, Marilena Lupaşcu, Dragoş Teodor Gavriluţ, Henri Luchian
Detection of adversarial attacks based on differences in image entropy
Gwonsang Ryu, Daeseon Choi
RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment
Bhavya Dhingra, Vidhi Jain, Deepak Kumar Sharma, Koyel Datta Gupta, Deepika Kukreja
Forensic investigation of the dark web on the Tor network: pathway toward the surface web
Philgeun Jin, Namjun Kim, Sangjin Lee, Doowon Jeong
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain
Aristeidis Farao, Georgios Paparis, Sakshyam Panda, Emmanouil Panaousis, Apostolis Zarras, Christos Xenakis
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks
Fabrice Mvah, Vianney Kengne Tchendji, Clémentin Tayou Djamegni, Ahmed H. Anwar, Deepak K. Tosh, Charles Kamhoua
Synthesizing differentially private location traces including co-locations
Jun Narita, Takao Murakami, Hideitsu Hino, Masakatsu Nishigaki, Tetsushi Ohki
Security assessment and improvement of smart grid NIKE protocol
Tao Feng, Wentao Jin, Minghu Zhang, Lu Zheng
Simulation extractable versions of Groth’s zk-SNARK revisited
Oussama Amine, Karim Baghery, Zaira Pindado, Carla Ràfols
Pepal: Penalizing multimedia breaches and partial leakages
Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant
Marius Elmiger, Mouad Lemoudden, Nikolaos Pitropakis, William J. Buchanan
BASPED: Blockchain assisted searchable public key encryption over outsourced data
Partha Sarathi Chakraborty, Somanath Tripathy, Sanjeet Kumar Nayak
Improving spam email classification accuracy using ensemble techniques: a stacking approach
Muhammad Adnan, Muhammad Osama Imam, Muhammad Furqan Javed, Iqbal Murtza
Blockchain-based data integrity framework for Internet of Things
Poornima M. Chanal, Mahabaleshwar S. Kakkasageri
RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware
Md. Ahsan Ayub, Ambareen Siraj, Bobby Filar, Maanak Gupta
An integrated deep learning model for Ethereum smart contract vulnerability detection
Vikas Kumar Jain, Meenakshi Tripathi
Hate speech, toxicity detection in online social media: a recent survey of state of the art and opportunities
Anjum, Rahul Katarya
Secure outsourcing of manufacturing compliance checks
Aikaterini Triakosia, Panagiotis Rizomiliotis, Cecilia Tonelli, Fabio Federici, Valerio Senni
On private information retrieval supporting range queries
Junichiro Hayata, Jacob C. N. Schuldt, Goichiro Hanaoka, Kanta Matsuura
MLChain: a privacy-preserving model learning framework using blockchain
Vidhi Bansal, Niyati Baliyan, Mohona Ghosh
PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks
Muralidhara Rao Patruni, Abdul Gaffar Humayun