1 | -- | 17 | Guoyan Li, Yihui Shang, Yi Liu, Xiangru Zhou. A Network Traffic Prediction Model Based on Graph Neural Network in Software-Defined Networking |
1 | -- | 20 | Mpho Ngoepe, Mfanasibili Ngwenya. Personal Data and the Assemblage Security in Consumer Internet of Things |
1 | -- | 20 | Faiza Benmenzer, Rachid Beghdad. Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments |
1 | -- | 17 | Sergey Sakulin, Alexander Alfimtsev, Konstantin Kvitchenko, Leonid Dobkacz, Yuri Kalgin, Igor I. Lychkov. Network Anomalies Detection Approach Based on Weighted Voting |
1 | -- | 26 | Faruk Arslan, Kallol Kumar Bagchi, Godwin J. Udo. What Drives Information Disclosure in Social Networking Sites: An Empirical Research Within the European Context |
1 | -- | 21 | Ankit Rajeshkumar Kharwar, Devendra V. Thakor. An Ensemble Approach for Feature Selection and Classification in Intrusion Detection Using Extra-Tree Algorithm |
1 | -- | 23 | Prathiba Ashok, Suyash Vardhan Srivathshav, E. Ramkumar, P. Rajkamal, V. S. Kanchana Bhaaskaran. Lightweight VLSI Architectures for Image Encryption Applications |
1 | -- | 18 | Bahubali Akiwate, Latha Parthiban. Efficient DNA Cryptographic Framework for Secured Data Encryption Based on Chaotic Sequences |
1 | -- | 18 | Abdallah Soualmi, Adel Alti, Lamri Laouamer. An Imperceptible Watermarking Scheme for Medical Image Tamper Detection |
1 | -- | 26 | M. D. J. S. Goonetillake, Rangana Jayashanka, S. V. Rathnayaka. Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics |
1 | -- | 19 | Divyashikha Sethia, Raj Sahu. Efficient ECC-Based CP-ABE Scheme With Constant-Sized Key and Scalable User Revocation |
1 | -- | 14 | Gururaj H. L., Prithwijit Mitra, Soumyadip Koner, Sauvik Bal, Francesco Flammini, Janhavi V., Ravi Kumar V.. Prediction of Phishing Websites Using AI Techniques |
1 | -- | 17 | Kapil Kant Kamal, Monit Kapoor, Padmaja Joshi. Secure and Flexible Key Protected Identity Framework for Mobile Devices |
1 | -- | 27 | Kamel Ahsene Djaballah, Kamel Boukhalfa, Mohamed Amine Guelmaoui, Amir Saidani, Yassine Ramdane. A Proposal Phishing Attack Detection System on Twitter |
1 | -- | 22 | R. Balakrishnan Unny, Nityesh Bhatt. A Meta-Analysis of Privacy: Ethical and Security Aspects of Facial Recognition Systems |
1 | -- | 20 | R. E. Vinodhini, P. Malathi. Hiding Information in the DNA Sequence Using DNA Steganographic Algorithms with Double-Layered Security |
1 | -- | 18 | El Arbi Abdellaoui Alaoui, Mohamed-Lamine Messai, Anand Nayyar. Using Machine Learning in WSNs for Performance Prediction MAC Layer |
1 | -- | 21 | Rajamandrapu Srinivas, N. Mayur. Image Compression and Encryption Based on Integer Wavelet Transform and Hybrid Hyperchaotic System |
1 | -- | 22 | Siyu Wang, Nafei Zhu, Jingsha He, Da Teng, Yue Yang. Privacy Disclosure in the Real World: An Experimental Study |
1 | -- | 16 | Hicham Grari, Khalid Zine-Dine, Ahmed Azouaoui, Siham Lamzabi. Deep Learning-Based Cryptanalysis of a Simplified AES Cipher |
1 | -- | 12 | Alexander Paramonov, Evgeny Tonkikh, Ammar Muthanna, Ibrahim A. Elgendy, Andrey Koucheryavy. Fractals for Internet of Things Network Structure Planning |
1 | -- | 24 | Xin Liu, Bin Zhang. An Efficient Accountable Oblivious Transfer With Access Control Scheme in the Public Cloud |
1 | -- | 20 | Liangshun Wu, Hengjin Cai, Han Li. Achieving Reconciliation Between Privacy Preservation and Auditability in Zero-Trust Cloud Storage Using Intel SGX |
1 | -- | 24 | Dipali K. Shende, Yogesh Angal, S. C. Patil. An Iterative CrowWhale-Based Optimization Model for Energy-Aware Multicast Routing in IoT |
1 | -- | 16 | Moez Farokhnia Hamedani, Ali Dehghan 0004. Impact of Protection Level on Vertically-Differentiated Two-Sided Software Platforms |
1 | -- | 20 | Danish Ahamad, Md Mobin Akhtar, Shabi Alam Hameed, Mahmoud Mohammad Mahmoud Al Qerom. Provably Secure Authentication Approach for Data Security in Cloud Using Hashing, Encryption, and Chebyshev-Based Authentication |
1 | -- | 20 | Meenu Jain, Manisha Jailia. Blockchain-Based Data Sharing Approach Considering Educational Data |
1 | -- | 24 | Kakali Chatterjee. A Secure Three Factor-Based Authentication Scheme for Telecare Medicine Information Systems With Privacy Preservation |
1 | -- | 20 | Ping Zhao, Zhijie Fan, Zhiwei Cao, Xin Li. Intrusion Detection Model Using Temporal Convolutional Network Blend Into Attention Mechanism |
1 | -- | 38 | Boubakeur Annane, Adel Alti. Proxy-3S: A New Security Policies-Based Proxy for Efficient Distributed Virtual Machines Management in Mobile |
1 | -- | 44 | Bharath M. R., K. A. Radhakrishna Rao. Improved Feature-Level Fusion-Based Biometric System for Genuine and Imposter Identification |
1 | -- | 27 | Ritinder Kaur, Neha Gupta. CFS-MHA: A Two-Stage Network Intrusion Detection Framework |
1 | -- | 19 | Erkan Çetintas, Ikram Dastan. Examination of Privacy and Security Perceptions of Social Media and Online Shopping Users: A Comparison Between Turkey and the USA |
1 | -- | 32 | Nitin O. Mathur, Chengcheng Li, Bilal Gonen, Kijung Lee. Application of Representation Learning-Based Chronological Modeling for Network Intrusion Detection |
1 | -- | 16 | Anderson Aparecido Alves da Silva, Leonardo Santos Silva, Erica Leandro Bezerra, Adilson Eduardo Guelfi, Claudia de Armas, Marcelo Teixeira de Azevedo, Sergio Takeo Kofuji. A Proposal to Distinguish DDoS Traffic in Flash Crowd Environments |
1 | -- | 28 | Mini Zeng, Feng Zhu 0010, Sandra Carpenter. Dynamic Warnings: An Eye Gaze-Based Approach |
1 | -- | 15 | Rohit Sinha, Rittika Sur, Ruchi Sharma, Avinash K. Shrivastava. Anomaly Detection Using System Logs: A Deep Learning Approach |
1 | -- | 14 | Yonglei Liu, Kun Hao, Weilong Zhang, Lin Gao, Li Wang. A Multi-User Shared Mobile Payment Protocol in the Context of Smart Homes |
1 | -- | 20 | Sahana Lokesh R., H. R. Ranganatha. An Enhanced Data Anonymization Approach for Privacy Preserving Data Publishing in Cloud Computing Based on Genetic Chimp Optimization |
1 | -- | 20 | Abhaya Kumar Sahoo, Srishti Raj, Chittaranjan Pradhan, Bhabani Shankar Prasad Mishra, Rabindra Kumar Barik, Ankit Vidyarthi. Perturbation-Based Fuzzified K-Mode Clustering Method for Privacy Preserving Recommender System |
1 | -- | 18 | Adnan Gutub. Watermarking Images via Counting-Based Secret Sharing for Lightweight Semi-Complete Authentication |
1 | -- | 17 | Chaudhari D. A., Dipalee A. Chaudhari, Umamaheswari E., E. Umamaheswari. Adaptive Deep Rider LSTM-Enabled Objective Functions for RPL Routing in IoT Applications |
1 | -- | 15 | R. Lalduhsaka, Nilutpol Bora, Ajoy Kumar Khan. Anomaly-Based Intrusion Detection Using Machine Learning: An Ensemble Approach |
1 | -- | 17 | Na Hua, Juyan Li, Kejia Zhang, Long Zhang. A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices |
1 | -- | 18 | Mohammad H. Alshayeji, Mousa Alsulaimi, Sa'ed Abed, Reem Jaffal. Network Intrusion Detection With Auto-Encoder and One-Class Support Vector Machine |
1 | -- | 10 | Herbert Maosa, Karim Ouazzane, Viktor Sowinski-Mydlarz. Real-Time Cyber Analytics Data Collection Framework |
1 | -- | 14 | Romil Rawat, Vinod Kumar Mahor, Bhagwati Garg, Shrikant Telang, Kiran Pachlasiya, Anil Kumar, Surendra Kumar Shukla, Megha Kuliha. Analyzing Newspaper Articles for Text-Related Data for Finding Vulnerable Posts Over the Internet That Are Linked to Terrorist Activities |
1 | -- | 25 | Amine Sallah, El Arbi Abdellaoui Alaoui, Said Agoujil, Anand Nayyar. Machine Learning Interpretability to Detect Fake Accounts in Instagram |
1 | -- | 20 | Chandra Sekhar Kolli, Uma Devi Tatavarthi. Hybrid Optimization and Deep Learning for Detecting Fraud Transactions in the Bank |
1 | -- | 26 | Garry L. White. Infrastructure Cyber-Attack Awareness Training: Effective or Not? |
1 | -- | 24 | Erukala Suresh Babu, B. K. N. Srinivasarao, Ilaiah Kavati, Mekala Srinivasa Rao. Verifiable Authentication and Issuance of Academic Certificates Using Permissioned Blockchain Network |
1 | -- | 21 | Mohammed Tayebi, Said El Kafhali. Credit Card Fraud Detection Based on Hyperparameters ‎Optimization Using the Differential Evolution |
1 | -- | 22 | Srijita Basu, Sandip Karmakar, Debasish Bera. Securing Cloud Virtual Machine Image Using Ethereum Blockchain |
1 | -- | 17 | Karim Ouazzane, Thekla Polykarpou, Yogesh Patel 0001, Jun Li 0013. An Integrated Machine Learning Framework for Fraud Detection: A Comparative and Comprehensive Approach |
1 | -- | 31 | Monica Malik, Khushi Gandhi, Bhawna Narwal. AMAKA: Anonymous Mutually Authenticated Key Agreement Scheme for Wireless Sensor Networks |
1 | -- | 28 | Boris Jerson Zannou, Tahirou Djara, Antoine Vianou. Cylindrical Curve for Contactless Fingerprint Template Securisation |
1 | -- | 28 | Adnan Gutub. Enhancing Cryptography of Grayscale Images via Resilience Randomization Flexibility |
1 | -- | 18 | Faheem Syeed Masoodi, Iram Abrar, Alwi M. Bamhdi. An Effective Intrusion Detection System Using Homogeneous Ensemble Techniques |
1 | -- | 19 | Sanjay Adiwal, Balaji Rajendran, Pushparaj Shetty D. A Quantitative Method for Measuring Health of Authoritative Name Servers |
1 | -- | 29 | Bibhuti Bhusana Behera, Binod Kumar Pattanayak, Rajani Kanta Mohanty. Deep Ensemble Model for Detecting Attacks in Industrial IoT |
1 | -- | 25 | Pankaj Pankaj, Bharti P. K, Brajesh kumar. A New Design of Occlusion Invariant Face Recognition Using Optimal Pattern Extraction and CNN with GRU-Based Architecture |
1 | -- | 24 | Sachikanta Dash, Sasmita Padhy, Bodhisatwa Parija, T. Rojashree, K. Abhimanyu Kumar Patro. A Simple and Fast Medical Image Encryption System Using Chaos-Based Shifting Techniques |
1 | -- | 24 | Ankush Balaram Pawar, Shashikant U. Ghumbre, Rashmi M. Jogdand. Performance Analysis and Systematic Review of Privacy Preservation-Based Authentication Models and Cryptographic-Based Data Protocols |