


default search action
Security and Privacy, Volume 7
Volume 7, Number 1, January/February 2024
Survey articles
- Archan Dhadhania, Jitendra Bhatia

, Rachana Mehta
, Sudeep Tanwar
, Ravi Sharma, Amit Verma:
Unleashing the power of SDN and GNN for network anomaly detection: State-of-the-art, challenges, and future directions. - Yassine Mekdad

, Ahmet Aris, Abbas Acar
, Mauro Conti
, Riccardo Lazzeretti, Abdeslam El Fergougui, A. Selcuk Uluagac:
A comprehensive security and performance assessment of UAV authentication schemes.
Research articles
- Ankita Mishra

, Mohammad S. Obaidat, Dheerendra Mishra
:
Privacy preserving content distribution framework for multidistributor DRM systems. - Mohammed Rauf Ali Khan

:
Understanding impacts of a ransomware on medical and health facilities by utilizing LockBit as a case study. - Indu Kumari, Pranav Kumar Singh

, Shivram N. Gowtham, Sukumar Nandi, Uttam Ghosh, Danda B. Rawat:
RFPM: A RSU-aided framework for pseudonym management to preserve location privacy in IoV. - B. S. Sharmila

, Rohini Nagapadma:
P-DNN: Parallel DNN based IDS framework for the detection of IoT vulnerabilities. - Zeinab Zoghi

, Gürsel Serpen:
UNSW-NB15 computer security dataset: Analysis through visualization. - Dominik Schrahe

, Thomas Städter
:
Privacy preserving vaccinating- and testing-pass for the European Union. - Martijn Dekker, Lampis Alevizos

:
A threat-intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision-making. - Shyam Saurabh

, Kishore Sinha
:
Optimal key pre-distribution schemes from affine resolvable and partially affine resolvable designs. - Ravi Kumar, Samayveer Singh

, Deepti Singh, Mohit Kumar, Sukhpal Singh Gill
:
A robust and secure user authentication scheme based on multifactor and multi-gateway in IoT enabled sensor networks. - Md. Azharul Islam, Sanjay Madria

:
Attribute-based encryption scheme for secure data sharing in cloud with fine-grained revocation. - Subhas Barman

, Samiran Chattopadhyay, Debasis Samanta:
Toward design a secure protocol for updating remotely stored credentials of a crypto-biometric framework for multi-server environment. - Shweta Sankhwar

, Rupali Ahuja
, Tanya Choubey, Priyanshi Jain, Tanusha Jain, Muskan Verma:
Cybercrime in India: An analysis of crime against women in ever expanding digital space. - Xiaole Su, Yuanchao Hu

, Wei Liu, Zhipeng Jiang, Chan Qiu, Jie Xiong, Ju Sun:
A blockchain-based smart contract model for secured energy trading management in smart microgrids.
Volume 7, Number 2, March/April 2024
Survey papers
- Parikshith Nayaka Sheetakallu Krishnaiah

, Dayanand Lal Narayan, Kartick Sutradhar
:
A survey on secure metadata of agile software development process using blockchain technology. - Hela Makina

, Asma Ben Letaifa, Abderrezak Rachedi
:
Survey on security and privacy in Internet of Things-based eHealth applications: Challenges, architectures, and future directions. - Abhishek Bisht

, Ashok Kumar Das
, Debasis Giri
:
Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey.
Research articles
- Harshil Sanghvi, Rushir Bhavsar

, Vini Hundlani, Lata Gohil
, Tarjni Vyas, Anuja Nair
, Shivani Desai, Nilesh Kumar Jadav, Sudeep Tanwar
, Ravi Sharma, Nagendar Yamsani:
MetaHate: AI-based hate speech detection for secured online gaming in metaverse using blockchain. - Mohammed Riyadh Abdmeziem

, Hiba Akli
, Rima Zourane:
Nodes selection review for federated learning in the blockchain-based internet of things. - Himanshu Vadher, Pal Patel

, Anuja Nair
, Tarjni Vyas, Shivani Desai, Lata Gohil
, Sudeep Tanwar
, Deepak Garg, Anupam Singh:
EEG-based biometric authentication system using convolutional neural network for military applications. - Sandeep Sharma, Prachi Ahlawat

, Kavita Khanna:
DeepMDFC: A deep learning based android malware detection and family classification method. - Deepa Rani

, Rajeev Kumar, Naveen Chauhan:
A secure framework for IoT-based healthcare using blockchain and IPFS. - Vankamamidi Srinivasa Naresh

, Sivaranjani Reddi:
An identity-based secure VANET communication system. - Heba A. Hassan

, Ezz El-Din Hemdan
, Walid El-Shafai
, Mona Shokair
, Fathi E. Abd El-Samie
:
Detection of attacks on software defined networks using machine learning techniques and imbalanced data handling methods. - Umesh Bodkhe, Sudeep Tanwar

:
V2XCom: Lightweight and secure message dissemination scheme for Internet of vehicles. - Vijay Karnatak, Amit Kumar Mishra

, Neha Tripathi
, Mohammad Wazid
, Jaskaran Singh, Ashok Kumar Das
:
A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications. - Alay Patel

, Devam Patel, Riya Kakkar, Parita Rajiv Oza, Smita Agrawal
, Sudeep Tanwar
, Ravi Sharma, Nagendar Yamsani:
Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities. - N. Joychandra Singh, Nazrul Hoque

, Kh Robindro Singh, Dhruba K. Bhattacharyya:
Botnet-based IoT network traffic analysis using deep learning. - Sangeeta Gupta

, Premkumar Chithaluru
, May El Barachi
, Manoj Kumar
:
Secure data access using blockchain technology through IoT cloud and fabric environment. - Mubeen Javed, Muhammad Arslan Akram

, Adnan Noor Mian, Saru Kumari
:
On the security of a novel privacy-preserving authentication scheme for V2G networks. - Grishan Pradhan

, Babu R. Dawadi
, Abiral Chaulagain, Anish Lal Joshi, Prajal Govinda Vaidya:
Chaos and DNA coding technique for image cryptography. - Upendra Verma

, Mayank Sohani:
An efficient lightweight authentication scheme for dew-assisted IoT networks. - Pawan Kumar

, Sukhdip Singh:
Enhancing android application security: A novel approach using DroidXGB for malware detection based on permission analysis. - Anusha Vangala, Ashok Kumar Das

, Neeraj Kumar
, Pandi Vijayakumar, Marimuthu Karuppiah
, Youngho Park:
Designing access control security protocol for Industry 4.0 using Blockchain-as-a-Service.
Volume 7, Number 3, May/June 2024
Research articles
- Habib Esmaeelzadeh Rostam

, Homayun Motameni, Rasul Enayatifar:
Privacy-preserving in the smart healthcare system using steganography and chaotic functions based on DNA. - Jegadeesan Subramani, Maria Azees, Arun Sekar Rajasekaran

, Jaime Lloret
:
Physically secure and privacy-preserving blockchain enabled authentication scheme for internet of drones. - Zhongming Huang

, Feng Wang, Chin-Chen Chang
, Xiuqiang Chen:
A new authentication scheme for dynamic charging system of electric vehicles in fog environment. - Harini Bilakanti, Sreevani Pasam, Varshini Palakollu, Sairam Utukuru

:
Anomaly detection in IoT environment using machine learning. - Ruiqi Li, Fupeng Li, Peng Xu, Shuiting Du, Bingling Gu

:
Location privacy protection of nodes in the perception layer of the Internet of things based on Radio Frequency Identification location aware algorithm. - Kunal Demla, Ashima Anand

:
MieWC: Medical image encryption using wavelet transform and multiple chaotic maps. - P. P. Hema

, Anchare V. Babu
:
Full-duplex jamming for physical layer security improvement in NOMA-enabled overlay cognitive radio networks. - V. V. L. Divakar Allavarpu, Vankamamidi Srinivasa Naresh

, A. Krishna Mohan:
Privacy-preserving credit risk analysis based on homomorphic encryption aware logistic regression in the cloud. - Keiichiro Oishi

, Yuichi Sei
, J. Andrew, Yasuyuki Tahara, Akihiko Ohsuga:
Algorithm to satisfy l-diversity by combining dummy records and grouping. - Osamah Ibrahim Khalaf

, Ashokkumar S. R, Sameer Algburi
, Anupallavi S, Dhanasekaran Selvaraj
, Mhd Saeed Sharif
, Wael Elmedany:
Federated learning with hybrid differential privacy for secure and reliable cross-IoT platform knowledge sharing. - Priyabrata Dash

, Monalisa Sarma, Debasis Samanta:
Privacy preserving unique identity generation from multimodal biometric data for privacy and security applications. - Ikram Ud Din

, Wajahat Ali
, Ahmad Almogren
, Iehab Al Rassan, Sherali Zeadally
:
Using smart grid infrastructure for authentication and data management in Internet of Medical Things.
Survey papers
- Isha Pali

, Ruhul Amin
, Mohammad Abdussami
:
Autonomous vehicle security: Current survey and future research challenges. - Animesh Kumar

, Sandip Dutta, Prashant Pranav
:
Analysis of SQL injection attacks in the cloud and in WEB applications.
Volume 7, Number 4, July/Augusust 2024
Research article
- Jigna J. Hathaliya, Sudeep Tanwar

:
A systematic survey on security and privacy issues of medicine supply chain: Taxonomy, framework, and research challenges. - Mohammed Ali Qasem

, Fursan Thabit
, Ozgu Can
, Ebrahim Naji
, Hoda A. Alkhzaimi, Pritam Rajendra Patil, S. B. Thorat:
Cryptography algorithms for improving the security of cloud-based internet of things. - Shahram Ghahremani

, Uyen Trang Nguyen:
Comprehensive evaluation of privacy policies using the contextual integrity framework. - Tapesh Sarsodia, Uma Rathore Bhatt

, Raksha Upadhyay
, Vijay Bhat:
Hybrid KuFaI: A novel secure key generation algorithm using fast independent component analysis for physical layer security techniques. - Sachin Kumar

, Akshit Tyagi
, Kadambri Agarwal, Saru Kumari
, Chien-Ming Chen
:
A trustworthy data collection approach from sensor nodes using trust score of mobile vehicles for smart city. - Sonam Yadav

, Vivek Dabra, Pradeep Malik, Saru Kumari
:
Flaw and amendment of Dharminder et al.'s authentication protocol for satellite communication. - Asmaa Amer Qasem

, Mona Shokair, Fathi E. Abd El-Samie:
Physical-layer security enhancement in wireless sensor networks through artificial noise optimization. - Amith Murthy, Muhammad Rizwan Asghar

, Wanqing Tu:
A lightweight Intrusion Detection for Internet of Things-based smart buildings. - Umesh Bodkhe, Sudeep Tanwar

:
Secure and lightweight message dissemination framework for internet of vehicles. - Usha Jain

:
Secure, light-weight and dynamic PUF-based mutual device authentication mechanism in industrial IoT networks.
Volume 7, Number 5, September/October 2024
Tutorial
- Raut Omprakash Jagannath, Ankit Kumar Jain

:
Browser-in-the-middle attacks: A comprehensive analysis and countermeasures.
Survey Paper
- Tamara Finogina

, Jordi Cucurull-Juan
, Núria Costa
:
Selective comparison of verifiable online voting systems. - Mohammed El-Hajj

, Taru Itäpelto
, Teklit Haftu Gebremariam:
Systematic literature review: Digital twins' role in enhancing security for Industry 4.0 applications. - Hira Rasheed

, Rafidah Md Noor, Norjihan Binti Abdul Ghani, Iftikhar Ahmad
:
Preserving location-query privacy in location-based services: A review.
Research Article
- Ashutosh Aithekar, Pratik Gupta

, Dharminder Chaudhary
:
A secure and efficient heterogeneous ID-based signcryption for unmanned aerial vehicular networking system. - Sakhi Bandyopadhyay, Subhadip Mukherjee

, Somnath Mukhopadhyay, Sunita Sarkar
:
Parallel BFS through pennant data structure with reducer hyper-object based data hiding for 3D mesh images. - Ahmed J. Kadhim

, Tayseer S. Atia:
Quantum encryption of healthcare images: Enhancing security and confidentiality in e-health systems. - Vahid Bakhtiary, Amir Masoud Rahmani

:
Blockchain integration in big data: Review, vision, and opportunities. - Haiyue Chen

, Xiangfu Zhao, Yichen Wang, Zixian Zhen:
SafeCheck: Detecting smart contract vulnerabilities based on static program analysis methods. - Amina Ahmed Nacer

, Mohammed Riyadh Abdmeziem
, Asma Aid:
Malicious clouds coalition management for business processes deployment. - Sabyasachi Samanta

, Sudipta Roy, Abhijit Sarkar
, Dipak Kumar Jana
:
Linguistic response surface methodology approach to measure the quality of nonlinear frame-pixel and bit place-based video steganography. - Ahmed Moumena

, Imane Saim Haddache:
Intelligent jamming detection-based robust principal components analysis in communication system for security and defense. - Mahendra Prasad

, Pankaj Pal
, Sachin Tripathi, Keshav P. Dahal
:
AI/ML driven intrusion detection framework for IoT enabled cold storage monitoring system. - Bjorn Oude Roelink, Mohammad El-Hajj

, Dipti Kapoor Sarmah:
Systematic review: Comparing zk-SNARK, zk-STARK, and bulletproof protocols for privacy-preserving authentication. - Suhaima Jamal, Hayden Wimmer, Iqbal H. Sarker

:
An improved transformer-based model for detecting phishing, spam and ham emails: A large language model approach. - Bhabesh Mali, Pranav Kumar Singh

, Nabajyoti Mazumdar:
SAFe-Health: Guarding federated learning-driven smart healthcare with federated defense averaging against data poisoning. - Garima Thakur, Mohammad S. Obaidat, Piyush Sharma, Sunil Prajapat

, Pankaj Kumar
:
An efficient provably secure authentication and key agreement protocol for satellite communication networks. - Radhika Lama

, Sandip Karmakar:
SiSMA-SWMS: Signature-based Secure Monitoring Approach for Smart Waste Monitoring Systems. - Sabra Ben Saad

:
A trust distributed learning (D-NWDAF) against poisoning and byzantine attacks in B5G networks. - Dheerendra Mishra

, Komal Pursharthi:
Cryptanalysis with improvement on lattice-based authenticated key exchange protocol for mobile satellite communication networks. - Minhaj Khan

, Mohd. Haroon:
Ensemble random forest and deep convolutional neural networks in detecting and classifying the multiple intrusions from near real-time cloud datasets. - Rizwan Uz Zaman Wani

, Fursan Thabit
, Ozgu Can
:
Security and privacy challenges, issues, and enhancing techniques for Internet of Medical Things: A systematic review. - Shi Jin, Yichun Wang, Zhaofeng Guo, Li Yang, Xiaosan Su

:
Short message encryption technology of Beidou communication based on SM9. - Zahraa A. Mohammed

, Khalid Ali Hussein
:
PRC6: Hybrid lightweight cipher for enhanced cloud data security in parallel environment.
Volume 7, Number 6, November/December 2024
Research Article
- Flavien Donkeng Zemo

, Sara Bakkali:
Sequential fusion-based defense strategy against sophisticated Byzantine attacks in cognitive IoT networks. - Ankur Gupta, Rajesh Gupta, Keyaba Gohil, Sudeep Tanwar

, Deepak Garg:
Blockchain-based decentralized oracle network framework for identity management in metaverse environment. - Monire Norouzi

:
A novel Bayesian optimizable ensemble bagged trees model for cryptocurrency fraud prediction approach. - Praveen Shukla

, C. Rama Krishna, Nilesh Vishwasrao Patil
:
Kafka-Shield: Kafka Streams-based distributed detection scheme for IoT traffic-based DDoS attacks. - Jigna J. Hathaliya, Sudeep Tanwar

:
Intelligent privacy-preserving data management framework for medicine supply chain system. - Srijanee Mookherji

, Vanga Odelu, Rajendra Prasath
, Ashok Kumar Das:
A secure authentication protocol for remote patient monitoring in an internet-of-medical-things environment. - Supongmen Walling

, Sibesh Lodh:
Network intrusion detection system for IoT security using machine learning and statistical based hybrid feature selection. - Yi Wang, Hao Yang, Yiming Zhang, Yitao Zhao, Shaoyang Yin:

Privacy-preserving security monitoring data sharing of new power system based on batch verification ring signature. - Nour Mousa, Farid Shirazi

:
A survey analysis of quantum computing adoption and the paradigm of privacy engineering. - Kausthav Pratim Kalita

, Debojit Boro, Dhruba Kumar Bhattacharyya:
Designing efficient patient-centric smart contracts for healthcare ecosystems with access control capabilities. - MSVPJ Sathvik, Hirak Mazumdar

:
Detection of malicious smart contracts by fine-tuning GPT-3. - Jan Bieniek, Mohamed Rahouti

, Kaiqi Xiong, Gabriel Ferreira Araújo:
SecureCare: A blockchain-assisted wearable body area network for secure and scalable IoT healthcare services. - Abdullah Ismetoglu, Yavuz Canbay

:
Detection of Covid-19 disease by using privacy-aware artificial intelligence system. - Xinhai Li, Yuanchao Hu

, Lingcheng Zeng, Yunzhu An
, Jinsong Yang, Xing Xiao:
Blockchain-based federated learning approaches in internet of things applications. - Arpit Raj

, Vedant Narayan, Vivek Muskan, Abhilash Sani, Pankaj Sharma, S. S. Sarma:
Modern ransomware: Evolution, methodology, attack model, prevention and mitigation using multi-tiered approach. - Biniyam Ayele Belete, Gelmecha Demissie Jobir, Ram Sewak Singh

:
Image encryption algorithm based on a memcapacitor-based hyperchaotic system and DNA coding. - Purushottam Singh

, Sandip Dutta, Prashant Pranav
:
A modified RC-4 cryptosystems to enhance security by using negative key schedule. - Magnus Sandell

:
On the trade-off between rate and reliability for secret key generation in wireless channels. - Ishu Sharma, Aditya Bhardwaj, Keshav Kaushik

:
Enhancing agricultural wireless sensor network security through integrated machine learning approaches.
Case Study
- Qawsar Gulzar

, Khurram Mustafa:
An analytical survey of cyber-physical systems in water treatment and distribution: Security challenges, intrusion detection, and future directions.
Research Article
- Johanna Herman

:
Dark patterns: EU's regulatory efforts. - Sayeda Suaiba Anwar

, Asaduzzaman
, Iqbal H. Sarker
:
A differential privacy aided DeepFed intrusion detection system for IoT applications. - Hongzhou Yue

, Zebin Song, Mengli Zhao, Lijia Yang:
Research on privacy leakage of celebrity's ID card number based on real-name authentication.
Survey Article
- Md. Ataullah

, Naveen Chauhan:
Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review.
Research Article
- Adi El-Dalahmeh

, Moawiah El-Dalahmeh, Mohammad Abdur Razzaque, Jie Li:
Cryptographic methods for secured communication in SDN-based VANETs: A performance analysis. - Balayogi G

, K. S. Kuppusamy
:
An approach for mitigating cognitive load in password management by integrating QR codes and steganography. - Sumit Kumar, Prachi Ahlawat

, Jyoti Sahni
:
IoT malware detection using static and dynamic analysis techniques: A systematic literature review. - Zhenyong Yang

, Changzhong Gao, Yong Wang, Hailong Meng, Shicong Han:
A lightweight security defense algorithm for multimodal attack blocking in industrial control networks based on momentum enhanced feature graphs.
Survey Article
- S. Rajasoundaran, Sivakumar Sabapathy Arumugam, S. Devaraju, M. Jahir Pasha

, Jaime Lloret
:
A deep experimental analysis of energy-proficient firewall policies and security practices for resource limited wireless networks.
Research Article
- K. Janani

, S. Ramamoorthy:
PIoT-fortifying IoT device identity and data access: A security framework empowered by blockchain. - Max Hashem Eiza

, Ta Vinh Thong, Qi Shi
, Yue Cao:
Secure semi-automated GDPR compliance service with restrictive fine-grained access control. - Changrong Li

, Zhenfu Li:
Trajectory tracking attack for vehicular ad-hoc networks.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














