Abstract is missing.
- Secure and Efficient Key Management for Deduplicated Cloud Storage SystemsJay Dave, Anshul Kanodia, Raj Srivastava, Kushagra Singh, Prithvi Hegde, Hitaishi Desai. 1-6 [doi]
- Interpretable PDF Malware DetectorSneha Rajagopal, Avanthika Gaur, P. Vinod 0001. 1-6 [doi]
- Efficient Virtual Machine Provisioning Techniques in Cloud Computing: A Systematic ReviewManik Chandra Pandey, Pradeep Singh Rawat 0001. 1-11 [doi]
- A Review of DNA Cryptography: From a Data Protection PerspectiveParth Parmar, Jekil Gadhiya, Satvik Vats, Deepak Kumar Verma, Krunal Vaghela. 1-7 [doi]
- UART Port Bane or Boon: Vulnerabilities vs Significance for Digital Investigation in Ag-IoTSantoshi Rudrakar, Parag Rughani, Jeet Rami. 1-6 [doi]
- Exploring the Evolving Landscape of API Security Challenges in the Healthcare Industry: A Comprehensive ReviewAkram Al-Rumaim, Jyoti D. Pawar. 1-8 [doi]
- HTML Smuggling: Attack and MitigationKeshav Kaushik, Govind Sharma 0006, Preeti Narooka, Gunjan Chhabra, Ankit Vishnoi. 1-5 [doi]
- Zero-Click Exploits and Malware: An In-Depth Analysis and Case StudiesPrabith GS, S. Abhishek, Anjali T, Radhika Ravindran. 1-9 [doi]
- Privacy Risks of Third-Party Services on Women's Shelter WebsitesPanu Puhtila, Robin Carlsson, Sampsa Rauti. 1-6 [doi]
- Data Leaks to Third-Party Services on Medical WebsitesSampsa Rauti, Esko Vuorinen, Robin Carlsson, Panu Puhtila. 1-7 [doi]
- Image Encryption based on Chaotic Map and Fractal Sorting MatrixPuneet Kumar Pal, Dhirendra Kumar. 1-6 [doi]
- LSB Steganography Mechanism to Hide Texts Within Images Backed with Layers of EncryptionIshaan Shukla, Atharva Joshi, Shital Girme. 1-6 [doi]
- Blockchain Based Security Enabled Smart Contract for Energy ManagementAditi Sharma, Mukta Patel, Arjun Choudhary, Gajender Kumar. 1-7 [doi]
- Defending the Cloud: Understanding the Role of Explainable AI in Intrusion Detection SystemsUtsav Upadhyay, Alok Kumar, Satyabrata Roy, Umashankar Rawat, Sandeep Chaurasia. 1-9 [doi]
- Analysis of the Semantic Webs for Their Information SecurityChudinov Pavel, Babenko Ludmila. 1-4 [doi]
- Storage and Maintenance of Sensitive Data using Homomorphic EncryptionMazharul Islam, Mubasshir Ahmed, Rajesh Palit. 1-6 [doi]
- Emerging Technologies in the Fight Against Drug Counterfeiting - A Survey of Security MeasuresBagannagari Sai Teja, Baru Charita Sri, Gandam Vindya, Ch. Madhu Babu. 1-6 [doi]
- Hybrid Steganography: A Multi-Layered Framework for Hybrid Text and Image Concealment Enhanced by AES and LSB TechniquesMohon Dash Tanu, S. M. Fahim Faisal, Srabony Majumder, Mumtahinah Rahman Sristy, Rigan Paul, Muhammad Iqbal Hossain, Md. Sabbir Ahmed. 1-6 [doi]
- Exploring the Threat of Software Supply Chain Attacks on Containerized ApplicationsMotahare Mounesan, Hossein Siadati, Sima Jafarikhah. 1-8 [doi]
- A Lightweight Certificateless Signcryption Scheme based on HCC for securing Underwater Wireless Sensor Networks (UWSNs)Meenakshi Gupta, Poonam Gera, Bharavi Mishra. 1-8 [doi]
- Quantum Computing: Exploring Superposition and Entanglement for Cutting-Edge ApplicationsSahib J. Parmar, Vinitkumar R. Parmar, Jai Prakash Verma, Satyabrata Roy, Pronaya Bhattacharya. 1-6 [doi]
- A Comparative Analysis of Autonomous Ledger Systems for Enhanced Blockchain Computing ApplicationsSoumi Ghosh, Kamal Upreti, Samreen Jafri, Prakash Divakaran, Vandana Mishra Chaturvedi, Prashant Vats. 1-6 [doi]
- Digital Power Play: Unraveling the Evolution of State-Sponsored Cyber OperationsAviral Srivastava, Viral Parmar, Priyansh Sanghavi, Seema Rani. 1-6 [doi]
- Fortifying Information Security: Security Implications of Microservice and Monolithic ArchitecturesSanghamitra Nemmini, S. Abhishek, Anjali T, Sincy Raj. 1-6 [doi]
- RAFT: Evaluating Federated Learning Resilience Against ThreatsMayank Kumar, Radha Agrawal, Priyanka Singh. 1-6 [doi]
- Detection and Analysis of DDoS Attack Using a Collaborative Network Monitoring StackMuhammad Aashiq Moosa, Apurva K. Vangujar, Dnyanesh Pramod Mahajan. 1-9 [doi]
- BATFL: Battling Backdoor Attacks in Federated LearningMayank Kumar, Radha Agrawal, Priyanka Singh. 1-6 [doi]
- Unveiling Threats: A Comprehensive Taxonomy of Attacks in In-Vehicle NetworksRitu Rai, Jyoti Grover, Soumya Pandey. 1-7 [doi]
- Implementation of Communication Aid Using Zigbee Technology Based On Personal Area Network(PAN)Harshita Jha, Surinder Kaur. 1-6 [doi]
- Towards Learning Based Detection and Mitigation of DDoS Attacks in Software Defined NetworksHema Dhadhal, Paresh P. Kotak, Parvez Faruki, Atul Gonsai, Sajal Bhatia. 1-6 [doi]
- A Comparative Performance Analysis of Android Malware Classification Using Supervised and Semi-supervised Deep LearningMd Sharafat Hossain, Md Delwar Hossain, Md Mahbubur Rahman, Yuzo Taenaka, Md Saiful Islam, Youki Kadobayashi. 1-8 [doi]
- The Crucial Function that Clouds Access Security Brokers Play in Ensuring the Safety of Cloud ComputingB. S. Vidhyasagar, M. Arvindhan, Sivakumar Kalimuthu. 1-5 [doi]
- Low-Rate DDoS Attack on SDN Controller and Its ImpactVirender, Lokesh Sharma, Satyabrata Roy, Umashankar Rawat. 1-6 [doi]
- Preserving Service Availability Under DDoS Attack in Micro-Service Based Cloud InfrastructureAnmol Kumar, Mayank Agarwal. 1-8 [doi]