Papers by title
5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning
A Blockchain-Based System for Dynamic Redundancy in IoT Communications
A Lightweight Hybrid Signcryption Scheme for Smart Devices
A Novel Biometric-Based Multi-Factor Authentication Protocol for EV Charging Infrastructures
A Novel Framework for Attack Detection and Localization in Smart Cities
A Novel Key Management Framework for Secure and Scalable Decentralized Identity Systems
A Secure Contact Tracing Method Using Blockchain for Criminal Investigation
A Token-Level Adversarial Example Attack Method for Machine Learning Based Malicious URL Detectors
A Zero-Trust Framework Based on Machine Learning for Industrial Internet of Things
Adversarial Attack Vectors Against Near-Real-Time AI xApps in the Open RAN
Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework
Building Resilient AI: A Solution to Data and Model Poisoning Prevention
CDCEF: A Cloud-Based Data Volatility & CSP Reliance Eradication Framework
Comparative Analysis of Intrusion Detection Schemes in Internet of Things(IoT) Based Applications
Comprehensive Security of SDN Controllers in NFVI-BASED 5G Network
Contextualized AI for Cyber Defense: An Automated Survey Using LLMs
Critical Behavior Sequence Monitoring for Early Malware Detection
Cybersecurity Revolution via Large Language Models and Explainable AI
Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement
Dilithium-Based Verifiable Timed Signature Scheme
Discoverable Hidden Patterns in Water Quality Through AI, LLMs, and Transparent Remote Sensing
ECG-PPS: Privacy Preserving Disease Diagnosis and Monitoring System for Real-Time ECG Signals
Empirical Analysis of Anomaly Detection Systems for Internet of Things
EncPDS: Encrypted Personal Data Stores via Key-Aggregate ID-Based Proxy Re-Encryption
Enhancing AI-Generated Image Detection With a Novel Approach and Comparative Analysis
Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT Networks
EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit
Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking
FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake Faces
Human-AI Collaboration and Cyber Security Training: Learning Analytics Opportunities and Challenges
Incident Response Adaptive Metrics Framework
IRIS-SAFE: Privacy-Preserving Biometric Authentication
Leveraging BERT and AraBERT With Bi-LSTM and Attention for Cross-Lingual Sentiment Analysis
Lightweight Blockchain Prototype for Food Supply Chain Management
Microsegmented Cloud Network Architecture Using Open-Source Tools for a Zero Trust Foundation
Performance Evaluation of Quantum-Secure Symmetric Key Agreement
Prompt Engineering Adversarial Attack Against Image Captioning Models
Recommendation System Model Ownership Verification via Non-Influential Watermarking
Secure Communication for MUM-T: a Blockchain and Lightweight Cryptography Framework
Security Inspection and Enhancement of a Modern Multi-Factor Authentication Protocol
Security Situation Awareness Platform
Simulation of Pre-Ransomware Attacks on Active Directory
SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems
Spatial Prediction of UAV Position Using Deep Learning
Taxonomy of User-Centric Errors Leading to Cyber Attacks in LoRaWAN
The Bell-LaPadula (BLP) Enterprise Security Architecture Model Vs Inference Attacks
The Recent Trends in Ransomware Detection and Behaviour Analysis
Towards Weaknesses and Attack Patterns Prediction for IoT Devices
Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach