Abstract is missing.
- A Blockchain Framework to Increase the Security and Verifiability of Educational CertificatesFaraz Masood, Arman Rasool Faridi. 3-17 [doi]
- A Conceptual Model to Identify Illegal Activities on the Bitcoin SystemKhaled Gubran Al-Hashedi, Pritheega Magalingam, Nurazean Maarop, Ganthan Narayana Samy, Azizah Abdul Manaf. 18-34 [doi]
- A Light-Weight Stream Ciphering Model Based on Chebyshev Chaotic Maps and One Dimensional LogisticJamal N. Hasoon, Bashar Ahmed Khalaf, Rasha Subhi Hameed, Salama A. Mostafa, Ali Hussein Fadil. 35-46 [doi]
- An Implementation of Robust User Authentication Technique for Big Data PlatformGalal A. AL-Rummana, Abdulrazzaq H. A. Al-Ahdal, G. N. Shinde. 47-61 [doi]
- Blockchain-Based Incentive Mechanism to Combat Fake NewsMunaza Farooq, Aqsa Ashraf Makhdomi, Iqra Altaf Gillani. 62-77 [doi]
- g-EoN: A Non-salient Approach Towards Encryption Using Gamma Function $\varGamma \Big (-\frac{\alpha }{\beta }\Big ) = -\frac{\beta }{\alpha }\, \varGamma \Big (\frac{\beta -\alpha }{\beta }\Big )$Abhilash Kumar Das, Nirmalya Kar. 78-94 [doi]
- Image Encryption-Compression Method Based on Playfair, OTP and DWT for Secure Image TransmissionHaidar Raad Shakir, Suhad Abbas Yassir. 95-113 [doi]
- Improving Security and Performance of Distributed IPFS-Based Web Applications with BlockchainVu Le, Ramin Moazeni, Melody Moh. 114-127 [doi]
- Internet of Things (IoT) Security Challenges and Solutions: A Systematic Literature ReviewRao Faizan Ali, Amgad Muneer, P. D. D. Dominic, Shakirah Mohd Taib, Ebrahim A. A. Ghaleb. 128-154 [doi]
- Pluggable Authentication Module Meets Identity-Based IdentificationJason Chia, Ji-Jian Chin, Sook-Chin Yip. 155-175 [doi]
- Using Knowledge Synthesis to Identify Multi-dimensional Risk Factors in IoT AssetsGerard Ward, Lech J. Janczewski. 176-197 [doi]
- Novel Maturity Model for Cybersecurity Evaluation in Industry 4.0Alexander Kreppein, Alexander Kies, Robert H. Schmitt. 198-210 [doi]
- A Review on TLS Encryption Malware Detection: TLS Features, Machine Learning Usage, and Future DirectionsKinan Keshkeh, Aman Jantan, Kamal Alieyan, Usman Mohammed Gana. 213-229 [doi]
- A Short Review: Issues and Threats Pertaining the Security of SCADA SystemsQais Saif Qassim, Norziana Jamil, Mohammed Najah Mahdi, Zaihisma Che Cob, Fiza Abdul Rahim, Lariyah Mohd Sidek. 230-247 [doi]
- An Improved Secure Router Discovery Mechanism to Prevent Fake RA Attack in Link Local IPv6 NetworkNavaneethan C. Arjuman, Selvakumar Manickam, Shankar Karuppayah. 248-276 [doi]
- Analysis of File Carving Approaches: A Literature ReviewNor Ika Shahirah Ramli, Syifak Izhar Hisham, Gran Badshah. 277-287 [doi]
- Cascade Generalization Based Functional Tree for Website Phishing DetectionAbdullateef Oluwagbemiga Balogun, Kayode S. Adewole, Amos Orenyi Bajeh, Rasheed Gbenga Jimoh. 288-306 [doi]
- Comparison of Automated Machine Learning Tools for SMS Spam Message FilteringWaddah Saeed. 307-316 [doi]
- Deep Learning Approach for Detecting Botnet Attacks in IoT Environment of Multiple and Heterogeneous SensorsAbdulkareem A. Hezam, Salama A. Mostafa, Azizul Azhar Ramli, Hairulnizam Mahdin, Bashar Ahmed Khalaf. 317-328 [doi]
- Detect & Reject for Transferability of Black-Box Adversarial Attacks Against Network Intrusion Detection SystemsIslam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees, Tayeb Kenaza. 329-339 [doi]
- Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL NetworksTaief Alaa Alamiedy, Mohammed Anbar, Bahari Belaton, Arkan Hammoodi Hasan Kabla, Baidaa Hamza Khudayer. 340-360 [doi]
- Intrusion Detection Model for Imbalanced Dataset Using SMOTE and Random Forest AlgorithmReem Alshamy, Mossa Ghurab, Suad Othman, Faisal Alshami. 361-378 [doi]
- Optimized Stacking Ensemble Model to Detect Phishing WebsitesBadiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi. 379-388 [doi]
- OSINT Explorer: A Tool Recommender Framework for OSINT SourcesAlwan Abdullah, Shams-ul-Arfeen Laghari, Ashish Jaisan, Shankar Karuppayah. 389-400 [doi]
- Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP)Abdullah Ahmed Bahashwan, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah, Mohammad A. Aladaileh. 401-416 [doi]
- Securing Software Defined Networking Using Intrusion Detection System - A ReviewNoor Al-Mi'ani, Mohammed Anbar, Yousef K. Sanjalawe, Shankar Karuppayah. 417-446 [doi]
- Using Genetic Algorithms to Optimized Stacking Ensemble Model for Phishing Websites DetectionZeyad Ghaleb Al-Mekhlafi, Badiea Abdulkarem Mohammed. 447-456 [doi]
- A Model to Detect Location Anomalies in a Cellular Network Using Travel Time and Distance CorrelationRafia Afzal, Raja Kumar Murugesan. 459-468 [doi]
- Analysing Security Concerns About the Massive Increase of Sharing Data over the Cloud During the Pandemic of Covid-19Fatina Shukur. 469-480 [doi]
- Intrusion Detection Systems in Fog Computing - A ReviewFadi Abu Zwayed, Mohammed Anbar, Yousef K. Sanjalawe, Selvakumar Manickam. 481-504 [doi]
- Review of Data Integrity Attacks and Mitigation Methods in Edge ComputingPoornima Mahadevappa, Raja Kumar Murugesan. 505-514 [doi]
- Security Issues and Challenges in SDNAli Haider Shamsan, Arman Rasool Faridi. 515-535 [doi]
- CLH: Approach for Detecting Deep Fake VideosAmrita Shivanand Hedge, M. N. Vinutha, Kona Supriya, S. Nagasundari, Prasad B. Honnavalli. 539-551 [doi]
- Consumer Information Sharing in Facebook: The Negative Role of Perceived Privacy RiskBui Thanh Khoa, Nguyen Duong Thuc Vi. 552-567 [doi]
- SQL Injection Prevention in Web Application: A ReviewJoanna Hazaline Binti Johny, Wafa Athilah Fikriah Binti Nordin, Nurrina Mizana Binti Lahapi, Yu-Beng Leau. 568-585 [doi]
- Threats on Machine Learning Technique by Data Poisoning Attack: A SurveyIbrahim M. Ahmed, Manar Younis Kashmoola. 586-600 [doi]