Login / Signup
Cyber Secur. Appl.
2024
2024
2024
Keyphrases
Publications
volume 2, 2024
Wasyihun Sema Admass
,
Yirga Yayeh Munaye
,
Abebe Abeshu Diro
Cyber security: State of the art, challenges and future directions.
Cyber Secur. Appl.
2 (2024)
Pranita Binnar
,
Sunil Bhirud
,
Faruk Kazi
Security analysis of cyber physical system using digital forensic incident response.
Cyber Secur. Appl.
2 (2024)
Shahnawaz Ahmad
,
Shabana Mehfuz
Efficient time-oriented latency-based secure data encryption for cloud storage.
Cyber Secur. Appl.
2 (2024)
Habiba Sultana
,
A. H. M. Kamal
,
Tasnim Sakib Apon
,
Md. Golam Rabiul Alam
Increasing embedding capacity of stego images by exploiting edge pixels in prediction error space.
Cyber Secur. Appl.
2 (2024)
Emmanuel Song Shombot
,
Gilles Dusserre
,
Robert Bestak
,
Nasir Baba Ahmed
An application for predicting phishing attacks: A case of implementing a support vector machine learning model.
Cyber Secur. Appl.
2 (2024)
Chaitanyateja Thotadi
,
Monith Debbala
,
Subba Rao
,
Ajay Eeralla
,
Basker Palaniswamy
,
Srijanee Mookherji
,
Vanga Odelu
,
Alavalapati Goutham Reddy
E-Brightpass: A Secure way to access social networks on smartphones.
Cyber Secur. Appl.
2 (2024)
Himanshu Setia
,
Amit Chhabra
,
Sunil K. Singh
,
Sudhakar Kumar
,
Sarita Sharma
,
Varsha Arya
,
Brij B. Gupta
,
Jinsong Wu
Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments.
Cyber Secur. Appl.
2 (2024)
Aditi Nair
,
Diti Dalal
,
Ramchandra S. Mangrulkar
Colour image encryption algorithm using Rubik's cube scrambling with bitmap shuffling and frame rotation.
Cyber Secur. Appl.
2 (2024)
Saeed Banaeian Far
,
Maryam Rajabzadeh Asaar
A blockchain-based anonymous reporting system with no central authority: Architecture and protocol.
Cyber Secur. Appl.
2 (2024)
Faisal Nabi
,
Xujuan Zhou
Enhancing intrusion detection systems through dimensionality reduction: A comparative study of machine learning techniques for cyber security.
Cyber Secur. Appl.
2 (2024)
Vajratiya Vajrobol
,
Brij B. Gupta
,
Akshat Gaurav
Mutual information based logistic regression for phishing URL detection.
Cyber Secur. Appl.
2 (2024)
Tarun Vats
,
Sudhakar Kumar
,
Sunil K. Singh
,
Uday Madan
,
Mehak Preet
,
Varsha Arya
,
Ritika Bansal
,
Ammar Almomani
Navigating the landscape: Safeguarding privacy and security in the era of ambient intelligence within healthcare settings.
Cyber Secur. Appl.
2 (2024)
Mohammad Wazid
,
Amit Kumar Mishra
,
Noor Mohd
,
Ashok Kumar Das
A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact.
Cyber Secur. Appl.
2 (2024)
Nalayini Cm
,
Jeevaa Katiravan
,
Geetha S
,
Christy Eunaicy Ji
A novel dual optimized IDS to detect DDoS attack in SDN using hyper tuned RFE and deep grid network.
Cyber Secur. Appl.
2 (2024)
Muthukumar Manickam
,
Ganesh Gopal Devarajan
A three-factor mutual authentication scheme for telecare medical information system based on ECC.
Cyber Secur. Appl.
2 (2024)
Mohd Kaleem
,
Ganesh Gopal Devarajan
Energy-efficient classification strategy for detecting interference and malicious sensor nodes in wireless body area Networks.
Cyber Secur. Appl.
2 (2024)
Savo Glisic
Quantum vs post-quantum security for future networks: Survey.
Cyber Secur. Appl.
2 (2024)
Mosiur Rahaman
,
Farhin Tabassum
,
Varsha Arya
,
Ritika Bansal
Secure and sustainable food processing supply chain framework based on Hyperledger Fabric technology.
Cyber Secur. Appl.
2 (2024)
Prathibha Muraleedhara
,
Mary Subaja Christo
,
Jaya J
,
Yuvasini D
Any Bluetooth device can be hacked. Know how?
Cyber Secur. Appl.
2 (2024)
Rémi Garcia
,
Paolo Modesti
Automatic generation of security protocols attacks specifications and implementations.
Cyber Secur. Appl.
2 (2024)
Arun Sekar Rajasekaran
,
L. Sowmiya
,
Maria Azees
,
R. Kannadasan
A survey on exploring the challenges and applications of wireless body area networks (WBANs).
Cyber Secur. Appl.
2 (2024)
H. M. Anitha
,
P. Jayarekha
,
Audithan Sivaraman
,
Ashima Mehta
,
Nalina Venkatamune
SDN enabled role based shared secret scheme for virtual machine security in cloud environment.
Cyber Secur. Appl.
2 (2024)
volume 1, 2023
Bodicherla Digvijay Sri Sai
,
Nikhil Ramisetty
,
Shivangini Prasad
,
Nenavath Srinivas Naik
A decentralised KYC based approach for microfinance using blockchain technology.
Cyber Secur. Appl.
1 (2023)
Mohd Javaid
,
Abid Haleem
,
Ravi Pratap Singh
,
Rajiv Suman
Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends.
Cyber Secur. Appl.
1 (2023)
Zhiyan Xu
,
Min Luo
,
Cong Peng
,
Qi Feng
Sanitizable signature scheme with privacy protection for electronic medical data sharing.
Cyber Secur. Appl.
1 (2023)
Anjali Singh
,
Marimuthu Karuppiah
,
Rajendra Prasad Mahapatra
Cryptanalysis on "a secure three-factor user authentication and key agreement protocol for TMIS with user anonymity ".
Cyber Secur. Appl.
1 (2023)
Siddhant Thapliyal
,
Shubham Singh
,
Mohammad Wazid
,
Devesh Pratap Singh
,
Ashok Kumar Das
Design of blockchain-enabled secure smart health monitoring system and its testbed implementation.
Cyber Secur. Appl.
1 (2023)
Jinshan Lai
,
Xiaotong Song
,
Ruijin Wang
,
Xiong Li
Edge intelligent collaborative privacy protection solution for smart medical.
Cyber Secur. Appl.
1 (2023)
S. Vijayalakshmi
,
S. Bose
,
Logeswari Govindaraj
,
Anitha Thangasamy
Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory.
Cyber Secur. Appl.
1 (2023)
Biswa Ranjan Senapati
,
Bharat S. Rawal
Quantum communication with RLP quantum resistant cryptography in industrial manufacturing.
Cyber Secur. Appl.
1 (2023)
Yi Li
,
Meiqin Tang
Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system.
Cyber Secur. Appl.
1 (2023)
Yousheng Zhou
,
Xia Li
,
Ming Wang
,
Yuanni Liu
PPT-LBS: Privacy-preserving top-k query scheme for outsourced data of location-based services.
Cyber Secur. Appl.
1 (2023)
Md Rahat Ibne Sattar
,
Md. Thowhid Bin Hossain Efty
,
Taiyaba Shadaka Rafa
,
Tusar Das
,
Md Sharif Samad
,
Abhijit Pathak
,
Mayeen Uddin Khandaker
,
Md Habib Ullah
An advanced and secure framework for conducting online examination using blockchain method.
Cyber Secur. Appl.
1 (2023)
Syed Amma Sheik
,
Amutha Prabakar Muniyandi
Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review.
Cyber Secur. Appl.
1 (2023)
Elliot Mbunge
,
Benhildah Muchemwa
,
John Batani
,
Nobuhle Mbuyisa
A review of deep learning models to detect malware in Android applications.
Cyber Secur. Appl.
1 (2023)
S. C. Rajkumar
,
L. Jegatha Deborah
,
Pandi Vijayakumar
,
Karthick K R
Secure session key pairing and a lightweight key authentication scheme for liable drone services.
Cyber Secur. Appl.
1 (2023)
Haowen Tan
An efficient IoT group association and data sharing mechanism in edge computing paradigm.
Cyber Secur. Appl.
1 (2023)
Lewis Golightly
,
Paolo Modesti
,
Rémi Garcia
,
Victor Chang
Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN.
Cyber Secur. Appl.
1 (2023)
C. Madan Kumar
,
Ruhul Amin
,
M. Brindha
Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System.
Cyber Secur. Appl.
1 (2023)
Dengzhi Liu
,
Zhimin Li
,
Dongbao Jia
Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing.
Cyber Secur. Appl.
1 (2023)
Weiwei Yan
,
Sai Ji
A secure and efficient DSSE scheme with constant storage costs in smart devices.
Cyber Secur. Appl.
1 (2023)
Palak Bagga
,
Ashok Kumar Das
,
Joel J. P. C. Rodrigues
Bilinear pairing-based access control and key agreement scheme for smart transportation.
Cyber Secur. Appl.
1 (2023)