229 | -- | 261 | Yuvraj Singh Malhi, Virendra Singh Shekhawat. Two-level machine learning driven intrusion detection model for IoT environments |
262 | -- | 292 | Justice Odoom, Xiaofang Huang, Richlove Samuel Soglo. JPBlock: augmenting security of current journal and paper publication processes using blockchain and smart contract |
293 | -- | 319 | Ranjeet Kumar Ranjan, Amit Singh. A comparative study of deep transfer learning models for malware classification using image datasets |
320 | -- | 335 | N. D. Patel, B. M. Mehtre, Rajeev Wankar. Artificial neural network-based intrusion detection system using multi-objective genetic algorithm |
336 | -- | 359 | Swapnil Sutar, Vikas Tiwari, Ajeet Singh. Implementation of a secret sharing-based masking scheme against side-channel attack for ultra-lightweight ciphers in IoT |
360 | -- | 382 | S. P. Ramya, Rajagopal Eswari. A shallow-based neural network model for fake news detection in social networks |
383 | -- | 398 | U. Nandhini, S. V. N. Santhosh Kumar. A comprehensive survey on fuzzy-based intelligent intrusion detection system for internet of things |
399 | -- | 413 | Shadi Rasheed Masadeh, Hamza Abbass Al-Sewadi, Mohammed Abbas Fadhil Al-Husainy. A message encryption scheme inspired by Sudoku puzzle |
414 | -- | 435 | Zareen Tasneem, Maria Afnan, Md. Arman Hossain, Md. Mahbubur Rahman, Samrat Kumar Dey. Performance evaluation of various deep convolutional neural network models through classification of malware |
436 | -- | 456 | Kheira Lakel, Fatima Bendella. A bio-inspired algorithm for enhancing DNA cryptography |