


default search action
Security and Privacy, Volume 8
Volume 8, Number 1, January/February 2025
Opinion
- Victor R. Kebande, Richard Adeyemi Ikuesan:
Standardizing Industrial Internet of Things (IIoT) Forensic Processes.
Research Article
- Gagan Dangwal, Mohammad Wazid
, Sarah Nizam, Vinay Chamola, Ashok Kumar Das
:
Automotive Cybersecurity Scheme for Intrusion Detection in CAN-Driven Artificial Intelligence of Things. - Changrong Li
, Wei Duan, Zhenfu Li:
Deep Learning-Based Community Detection Attack: Arctic Shipping Data as a Case. - Yunus Emre Göktepe
, Yusuf Uzun
:
IDDLE: A Novel Deep Learning-Based Approach for Intrusion Detection Problem Using Feature Extraction. - Maciej Rys
, Agata Slusarek, Krzysztof Zielinski
:
Caught Off Guard: When Experts Fall for Quishing, Is Awareness Enough? - Rajendra Prasad Nayak, Sourav Kumar Bhoi, Kshira Sagar Sahoo
, Srinivas Sethi, Subasish Mohapatra, Monowar H. Bhuyan:
Unveiling Sybil Attacks Using AI-Driven Techniques in Software-Defined Vehicular Networks. - Liang Chen
, Cheng Zeng, Stilianos Vidalis, Wei Jie:
Managing Obligation Delegation: Incentive Model and Experiment. - Reza Mohammadi, Mohammad Mehdi Hosseini
, R. Bahrami:
Uncovering security vulnerabilities through multiplatform malware analysis. - Shyam R. Sihare
:
Guided and unguided approaches for quantum key distribution for secure quantum communication. - Ehtesham Safeer, Sidra Tahir, Asif Nawaz
, Mamoona Humayun
, Momina Shaheen
, Maqbool Khan
:
Advanced hybrid malware identification framework for the Internet of Medical Things, driven by deep learning. - Dhananjay Kumar Singh
, Diwakar Bhardwaj:
An EAADE: Effective Authentication Approach for Data Exchange in Vehicular Social Network for IoV.
Survey Article
- R. Shashidhara
, Renju C. Nair
, Pavan Kumar Panakalapati
:
Promise of Zero-Knowledge Proofs (ZKPs) for Blockchain Privacy and Security: Opportunities, Challenges, and Future Directions.
Research Article
- Tao Tan
, Liming Zhang, Shuaikang Liu, Lei Wang:
An Encryption Algorithm Based on Public-Key Cryptosystems for Vector Map. - Bhomik M. Gandhi, Shruti B. Vaghadia, Malaram Kumhar
, Rajesh Gupta, Nilesh Kumar Jadav, Jitendra Bhatia
, Sudeep Tanwar
, Abdulatif Alabdulatif
:
Homomorphic Encryption and Collaborative Machine Learning for Secure Healthcare Analytics. - Suryya Farhat
, Manoj Kumar, Anshul Srivastava, Shilpi Bisht
, Vinay Rishiwal
, Mano Yadav:
Enhancing E-Healthcare Data Privacy Through Efficient Dual Signature on Twisted Edwards Curves Encryption Decryption. - Jun-Won Ho
:
Game Theoretic Approach Toward Detection of Input-Driven Evasive Malware in the IoT. - Rasim M. Alguliyev, Ramiz Shikhaliyev
:
Computer Networks Cybersecurity Monitoring Based on Deep Learning Model. - Mohd Shadab, Md Saquib Jawed
, Mohammad Sajid:
Substitution Box Construction Using Transfer-Function Assisted Metaheuristic and Booster Algorithm: A Hybrid Approach. - Doina Gavrilov
:
Exploring Novel Frontiers in Online Privacy Ethics. - Mohammad Wazid
, Shivansh Nautiyal, Ashok Kumar Das
, Sachin Shetty, SK Hafizul Islam
:
A Secure Authenticated Healthcare Data Analysis Mechanism in IoMT-Enabled Healthcare. - Abdallah Alshantti
, Adil Rasheed, Frank Westad:
Privacy Re-Identification Attacks on Tabular GANs. - Mohamed Ilies Taleb
, Mustapha Benssalah:
UAV Jamming Localization Against Random Eavesdropper Positions Using Cuckoo Search Algorithm. - Nitin Rathore, Aparna Kumari, Margi Patel, Alok Chudasama, Dhyey Bhalani, Sudeep Tanwar
, Abdulatif Alabdulatif
:
Synergy of AI and Blockchain to Secure Electronic Healthcare Records. - Elham Asadi, Soodeh Hosseini
:
Modeling of Malware Propagation Under the Clustering Approach in Scale-Free Networks. - Mehdi Darbandi, Ali Ehsani
, Farzad Bahrami
, Elham Moghadamnia, Karlo Abnoosian, Bayan Omar Mohammed:
A New Feature-Based Biometric Identification System in IoT-Powered Smart Cities Using a Hybrid Optimization Algorithm. - Shipra Ravi Kumar
, Mukta Goyal:
Design of an Iterative Method for Blockchain Optimization Incorporating DeepMiner and AnoBlock. - Shuhui Su
, Yonghan Luo, Tao Li, Qi Chen, Juntao Liang:
Anti-Leakage Method of Sensitive Information of Network Documents Based on Differential Privacy Model. - Raja Sekar Jayaram
, Dinesh Balajothi, Deepu Natchirajan:
Improved Mobile Security Based on Two-Factor Authentication.
Volume 8, Number 2, March/April 2025
Research Article
- Hassan Mohammadi, Soodeh Hosseini
:
Mobile Botnet Attacks Detection Using Supervised Learning Algorithms. - Sudheesh K. V.
, S. Benaka Santhosha, Kiran Puttegowda, Vinayakumar Ravi
, Alanoud Al Mazroa:
A High-Security Chaotic Encryption Model for Biomedical Image Protection. - Daniel Kwame Amissah
, Winfred Yaokumah, Edward Danso Ansong, Justice Kwame Appati
:
Evaluating Dimensionality Reduction Techniques in Bitcoin Ransomware Detection: Comparative Analysis of Incremental PCA and UMAP. - Tian Li
, Qiu-Yu Zhang
, Guo-rui Wu:
Image Traceable Privacy Protection Scheme Based on Blockchain and Homomorphic Encryption. - Ahmed Hawana, Emad S. Hassan
, Walid El-Shafai, Sami A. El-Dolil:
Enhancing Malware Detection With Deep Learning Convolutional Neural Networks: Investigating the Impact of Image Size Variations. - Siranjeevi Rajamanickam, Satyanarayana Vollala
, Natarajan Ramasubramanian:
EEAPTMS: Enhanced ECC Based Authentication Protocol for Telemedical Scenario. - D. J. Joel Devadass Daniel
, Jagadeesh S
:
A Secure Data Storage Architecture for Internet of Things Using a Hybrid Whale-Based Harris Hawk Optimization Algorithm and Fuzzy-Based Secure Clustering. - Abeer Qashou, Nurhidayah Bahar, Hazura Mohamed:
Qualitative Exploration of Data Security Risks in Mobile Cloud Computing for Higher Education. - Guoliang He
:
Construction of Computer Network Security Monitoring Platform Based on Intelligent Sensor Technology. - Garima Verma
:
A Secure Blockchain-Based Health Prediction Framework Using Mantaray Optimization. - Najah K. Almazmomi
:
Advanced Persistent Threat Detection Using Optimized and Hybrid Deep Learning Approach. - Hamidreza Fereidouni
, Olga Fadeitcheva, Mehdi Zalai:
IoT and Man-in-the-Middle Attacks. - Ankur Gupta, Pranshav Patel, Krisha Darji, Fenil Ramoliya, Rajesh Gupta, Sudeep Tanwar
, Karan Khajuria, Deepak Garg:
MetaPrism: Intelligent Personalized Engagement Policy for User's Security and Privacy in Metaverse Environment. - Buchammagari Avinash Reddy, Kshira Sagar Sahoo, Monowar H. Bhuyan:
Toward Mitigation of Flow Table Modification Attacks in P4-Based SDN Data Plane. - Dulam Devee Sivaprasad
, Mohamed Sirajudeen Yoosuf:
Privacy-Centric Signature Classification for Secure Educational Certificate Authentication.
Erratum
- Correction to "Software-Defined Networks-Enabled Fog Computing for IoT-Based Healthcare: Security, Challenges, and Opportunities".
Research Article
- Hanbing Yu
, Qiju Zhang:
Toward Efficient Secure Threat Information Analysis in Cyber-Physical Systems. - Deyou Chen:
Network Intrusion Detection Technology Integrating Density Peak Clustering Algorithm and Improved Bi-Directional LSTM. - Zakir Ahmad Sheikh, Narinder Verma, Yashwant Singh, Sudeep Tanwar
, Abdulatif Alabdulatif
:
Generalizability Assessment of Learning-Based Intrusion Detection Systems for IoT Security: Perspectives of Data Diversity. - Chethana H. T.
, Trisiladevi C. Nagavi, P. Mahesha, Vinayakumar Ravi
, Alanoud Al Mazroa:
Face Recognition in Unconstrained Images Using Deep Learning Model for Forensics. - Ahmed Almuhairat, Adel Alti
, Boubakeur Annane:
Unified Central Bank Blockchain for Improving Accounting Bank Performance in Jordan. - Ashutosh Tripathi
, Kusum Kumari Bharti, Mohona Ghosh:
An Efficient Algorithm for Exploitative Monetization Scam Video Detection Over Social Media Platforms. - Pralabh Agarwal, Mohammad Wazid
, Vishal Kumar Singh, Anindya Srivastava, Arshal Raj Singh, Saksham Mittal, Ashok Kumar Das
:
BCIDS-IoT: A Binary Classification Intrusion Detection Scheme for Internet of Things Communication.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.