Abstract is missing.
- Security of Emerging Technologies in Computer NetworksKannan Balasubramanian. 3-19 [doi]
- Optical Neural Networks - A Strategy for Secure Quantum ComputingK. Pradheep Kumar. 23-32 [doi]
- Guarding Against Quantum Threats: A Survey of Post-Quantum Cryptography Standardization, Techniques, and Current ImplementationsAditya Joshi, Pritam Bhalgat, Pratibha Chavan, Tejaram Chaudhari, Sumit Patil. 33-46 [doi]
- Cryptographic Distinguishers Through Deep Learning for Lightweight Block CiphersAmrita Bose, Debranjan Pal, Dipanwita Roy Chowdhury. 47-63 [doi]
- Detection and Mitigation of Email PhishingKishan Mishra, Tapadyoti Banerjee, Dipanwita Roy Chowdhury. 64-76 [doi]
- Securing Digital Forensic Data Using Neural Networks, Elephant Herd Optimization and Complex Sequence TechniquesB. Ramneshkar, Veeramuthu Venkatesh, R. Anushiadevi. 77-94 [doi]
- Design of Image Encryption Technique Using MSE ApproachC. Manikandan, A. Prince Rabinson, A. Devibala, M. Sivanesh, S. Karunyaa, A. Rajesh. 95-106 [doi]
- Low Latency Binary Edward Curve Crypto Processor for FPGA PlatformsJ. Adline Vidhya, V. R. Venkatasubramani, S. Rajaram 0001, V. Vinoth Thyagarajan, M. S. K. Manikandan. 107-118 [doi]
- Augmenting Security in Edge Devices: FPGA-Based Enhanced LEA Algorithm with S-Box and Chaotic FunctionsB. Sri Yugenther, Anila Glory H., H. Naresh Kumar, R. Sivaraman, V. S. Shankar Sriram. 119-131 [doi]
- Machine Learning Approach for Malware Detection Using Malware Memory Analysis DataS. P. Ramesh, S. Raj Anand, V. Ganesh Karthikeyan. 135-145 [doi]
- DDOS Attack Detection in Virtual Machine Using Machine Learning AlgorithmsK. Lokeshwar, M. Sumathi. 146-157 [doi]
- An Unsupervised Method for Intrusion Detection Using Novel Percentage Split ClusteringA. Joy Christy, M. J. Jeyasheela Rakkini, S. Sri Laxmi Narasimhan. 158-170 [doi]
- HATT-MLPNN: A Hybrid Approach for Cyber-Attack Detection in Industrial Control Systems Using MLPNN and Attention MechanismsS. Abinash, V. S. Shankar Sriram, Kannan Krithivasan, S. Priyanga. 171-182 [doi]
- Silent Threats: Monitoring Insider Risks in Healthcare SectorP. Lavanya, V. S. Venkata Raman, S. Srinath Gosakan, Anila Glory H., V. S. Shankar Sriram. 183-198 [doi]
- Enhanced Deep Learning for IIoT Threat Intelligence: Revealing Advanced Persistent Threat Attack PatternsM. K. Vishnu Priya, H. Anila Glory, V. S. Shankar Sriram. 201-217 [doi]
- Adaptive Data-Driven LSTM Model for Sensor Drift Detection in Water UtilitiesS. Abisheg, M. R. Gauthama Raman, Aditya P. Mathur. 218-228 [doi]
- Enhancing FGSM Attacks with Genetic Algorithms for Robust Adversarial Examples in Remote Sensing Image Classification SystemsP. Hemashree, G. Padmavathi. 229-243 [doi]
- GAN-Enhanced Multiclass Malware Classification with Deep Convolutional NetworksRishiraj Biswas, Thirumurugan Shanmugam, Rajiv Vincent, Arun Kumar Sivaraman, Janakiraman Nithiyanantham, Priya Ravindran. 244-255 [doi]
- IOT Based Locker Access System with MFA & Remote AuthenticationT. N. Prabakar, K. Vignesh, V. Balaji, M. S. Digeesh. 259-268 [doi]
- A Secure Authentication Scheme between Edge Devices Using Hypergraph Hashing Technique in Iot EnvironmentS. Ramya, Karthik Mohan, Kannan Krithivasan, Manivannan Doraipandian. 269-287 [doi]
- Enhancing Access Control and Information Sharing in Cloud IoT with an Effective Blockchain-Based Authority SystemV. Rajkumar, D. Devi, N. Khadirkumar, P. Jeevitha, T. Suganya. 288-299 [doi]
- Securing Data in MongoDB: A Framework Using EncryptionM. Karthick Roshan, M. Keerthana, M. Sivagami. 300-312 [doi]
- Handling Sensitive Medical Data - A Differential Privacy Enabled Federated Learning ApproachT. Suriya Praba, S. Reka, V. Meena, Bharath Reddy Gudibandi, Sai Surya Akella, Jaya Nikhita Gudiseva. 313-326 [doi]
- Securing Your Web Applications: The Power of Bugbite Vulnerability ScannerK. Thirunavukkarasu, Leo Raju, S. Sathishbabu, V. N. Yogeshwaran, Z. Shafeeq Ahmed. 327-339 [doi]