| 1 | -- | 16 | Meharaj Begum A, Michael Arock. Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model |
| 17 | -- | 35 | Shadab Kalhoro, Farhan Bashir Shaikh, Anam Kalhoro, Junaid Ur Rehman Abbasi, Ramesh Kumar Ayyasamy. An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios |
| 37 | -- | 53 | Morteza Amirmohseni, Sadegh Dorri Nogoorani. Safety Guards for Ethereum Smart Contracts |
| 55 | -- | 77 | Mehmet Ali Yalçinkaya, Ecir Ugur Küçüksille. Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner |
| 79 | -- | 92 | Kangkan Talukdar, Debojit Boro. Slowloris Attack Detection Using Adaptive Timeout-Based Approach |
| 93 | -- | 114 | Mostafa Chegenizadeh, Mohammad Ali 0003, Javad Mohajeri, Mohammad Reza Aref. HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices |