


default search action
Security and Privacy, Volume 7
Volume 7, Number 1, January/February 2024
Survey articles
- Archan Dhadhania, Jitendra Bhatia
, Rachana Mehta
, Sudeep Tanwar
, Ravi Sharma, Amit Verma:
Unleashing the power of SDN and GNN for network anomaly detection: State-of-the-art, challenges, and future directions. - Yassine Mekdad
, Ahmet Aris, Abbas Acar
, Mauro Conti
, Riccardo Lazzeretti, Abdeslam El Fergougui, A. Selcuk Uluagac:
A comprehensive security and performance assessment of UAV authentication schemes.
Research articles
- Ankita Mishra
, Mohammad S. Obaidat, Dheerendra Mishra
:
Privacy preserving content distribution framework for multidistributor DRM systems. - Mohammed Rauf Ali Khan
:
Understanding impacts of a ransomware on medical and health facilities by utilizing LockBit as a case study. - Indu Kumari, Pranav Kumar Singh
, Shivram N. Gowtham, Sukumar Nandi, Uttam Ghosh, Danda B. Rawat:
RFPM: A RSU-aided framework for pseudonym management to preserve location privacy in IoV. - B. S. Sharmila
, Rohini Nagapadma:
P-DNN: Parallel DNN based IDS framework for the detection of IoT vulnerabilities. - Zeinab Zoghi
, Gürsel Serpen:
UNSW-NB15 computer security dataset: Analysis through visualization. - Dominik Schrahe
, Thomas Städter
:
Privacy preserving vaccinating- and testing-pass for the European Union. - Martijn Dekker, Lampis Alevizos
:
A threat-intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision-making. - Shyam Saurabh
, Kishore Sinha
:
Optimal key pre-distribution schemes from affine resolvable and partially affine resolvable designs. - Ravi Kumar, Samayveer Singh
, Deepti Singh, Mohit Kumar, Sukhpal Singh Gill
:
A robust and secure user authentication scheme based on multifactor and multi-gateway in IoT enabled sensor networks. - Md. Azharul Islam, Sanjay Madria
:
Attribute-based encryption scheme for secure data sharing in cloud with fine-grained revocation. - Subhas Barman
, Samiran Chattopadhyay, Debasis Samanta:
Toward design a secure protocol for updating remotely stored credentials of a crypto-biometric framework for multi-server environment. - Shweta Sankhwar
, Rupali Ahuja
, Tanya Choubey, Priyanshi Jain, Tanusha Jain, Muskan Verma:
Cybercrime in India: An analysis of crime against women in ever expanding digital space. - Xiaole Su, Yuanchao Hu
, Wei Liu, Zhipeng Jiang, Chan Qiu, Jie Xiong, Ju Sun:
A blockchain-based smart contract model for secured energy trading management in smart microgrids.
Volume 7, Number 2, March/April 2024
Survey papers
- Parikshith Nayaka Sheetakallu Krishnaiah
, Dayanand Lal Narayan, Kartick Sutradhar
:
A survey on secure metadata of agile software development process using blockchain technology. - Hela Makina
, Asma Ben Letaifa, Abderrezak Rachedi
:
Survey on security and privacy in Internet of Things-based eHealth applications: Challenges, architectures, and future directions. - Abhishek Bisht
, Ashok Kumar Das
, Debasis Giri
:
Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey.
Research articles
- Harshil Sanghvi, Rushir Bhavsar
, Vini Hundlani, Lata Gohil
, Tarjni Vyas, Anuja Nair
, Shivani Desai, Nilesh Kumar Jadav, Sudeep Tanwar
, Ravi Sharma, Nagendar Yamsani:
MetaHate: AI-based hate speech detection for secured online gaming in metaverse using blockchain. - Mohammed Riyadh Abdmeziem
, Hiba Akli
, Rima Zourane:
Nodes selection review for federated learning in the blockchain-based internet of things. - Himanshu Vadher, Pal Patel
, Anuja Nair
, Tarjni Vyas, Shivani Desai, Lata Gohil
, Sudeep Tanwar
, Deepak Garg, Anupam Singh:
EEG-based biometric authentication system using convolutional neural network for military applications. - Sandeep Sharma, Prachi Ahlawat
, Kavita Khanna:
DeepMDFC: A deep learning based android malware detection and family classification method. - Deepa Rani
, Rajeev Kumar, Naveen Chauhan:
A secure framework for IoT-based healthcare using blockchain and IPFS. - Vankamamidi Srinivasa Naresh
, Sivaranjani Reddi:
An identity-based secure VANET communication system. - Heba A. Hassan
, Ezz El-Din Hemdan
, Walid El-Shafai
, Mona Shokair
, Fathi E. Abd El-Samie
:
Detection of attacks on software defined networks using machine learning techniques and imbalanced data handling methods. - Umesh Bodkhe, Sudeep Tanwar
:
V2XCom: Lightweight and secure message dissemination scheme for Internet of vehicles. - Vijay Karnatak, Amit Kumar Mishra
, Neha Tripathi
, Mohammad Wazid
, Jaskaran Singh, Ashok Kumar Das
:
A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications. - Alay Patel
, Devam Patel, Riya Kakkar, Parita Rajiv Oza, Smita Agrawal
, Sudeep Tanwar
, Ravi Sharma, Nagendar Yamsani:
Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities. - N. Joychandra Singh, Nazrul Hoque
, Kh Robindro Singh, Dhruba K. Bhattacharyya:
Botnet-based IoT network traffic analysis using deep learning. - Sangeeta Gupta
, Premkumar Chithaluru
, May El Barachi
, Manoj Kumar
:
Secure data access using blockchain technology through IoT cloud and fabric environment. - Mubeen Javed, Muhammad Arslan Akram
, Adnan Noor Mian, Saru Kumari
:
On the security of a novel privacy-preserving authentication scheme for V2G networks. - Grishan Pradhan
, Babu R. Dawadi
, Abiral Chaulagain, Anish Lal Joshi, Prajal Govinda Vaidya:
Chaos and DNA coding technique for image cryptography. - Upendra Verma
, Mayank Sohani:
An efficient lightweight authentication scheme for dew-assisted IoT networks. - Pawan Kumar
, Sukhdip Singh:
Enhancing android application security: A novel approach using DroidXGB for malware detection based on permission analysis. - Anusha Vangala, Ashok Kumar Das
, Neeraj Kumar
, Pandi Vijayakumar, Marimuthu Karuppiah
, Youngho Park:
Designing access control security protocol for Industry 4.0 using Blockchain-as-a-Service.
Volume 7, Number 3, May/June 2024
Research articles
- Habib Esmaeelzadeh Rostam
, Homayun Motameni, Rasul Enayatifar:
Privacy-preserving in the smart healthcare system using steganography and chaotic functions based on DNA. - Jegadeesan Subramani, Maria Azees, Arun Sekar Rajasekaran
, Jaime Lloret
:
Physically secure and privacy-preserving blockchain enabled authentication scheme for internet of drones. - Zhongming Huang
, Feng Wang, Chin-Chen Chang
, Xiuqiang Chen:
A new authentication scheme for dynamic charging system of electric vehicles in fog environment. - Harini Bilakanti, Sreevani Pasam, Varshini Palakollu, Sairam Utukuru
:
Anomaly detection in IoT environment using machine learning. - Ruiqi Li, Fupeng Li, Peng Xu, Shuiting Du, Bingling Gu
:
Location privacy protection of nodes in the perception layer of the Internet of things based on Radio Frequency Identification location aware algorithm. - Kunal Demla, Ashima Anand
:
MieWC: Medical image encryption using wavelet transform and multiple chaotic maps. - P. P. Hema
, Anchare V. Babu
:
Full-duplex jamming for physical layer security improvement in NOMA-enabled overlay cognitive radio networks. - V. V. L. Divakar Allavarpu, Vankamamidi Srinivasa Naresh
, A. Krishna Mohan:
Privacy-preserving credit risk analysis based on homomorphic encryption aware logistic regression in the cloud. - Keiichiro Oishi
, Yuichi Sei
, J. Andrew, Yasuyuki Tahara, Akihiko Ohsuga:
Algorithm to satisfy l-diversity by combining dummy records and grouping. - Osamah Ibrahim Khalaf
, Ashokkumar S. R, Sameer Algburi
, Anupallavi S, Dhanasekaran Selvaraj
, Mhd Saeed Sharif
, Wael Elmedany:
Federated learning with hybrid differential privacy for secure and reliable cross-IoT platform knowledge sharing. - Priyabrata Dash
, Monalisa Sarma, Debasis Samanta:
Privacy preserving unique identity generation from multimodal biometric data for privacy and security applications. - Ikram Ud Din
, Wajahat Ali
, Ahmad Almogren
, Iehab Al Rassan, Sherali Zeadally
:
Using smart grid infrastructure for authentication and data management in Internet of Medical Things.
Survey papers
- Isha Pali
, Ruhul Amin
, Mohammad Abdussami
:
Autonomous vehicle security: Current survey and future research challenges. - Animesh Kumar
, Sandip Dutta, Prashant Pranav
:
Analysis of SQL injection attacks in the cloud and in WEB applications.
Volume 7, Number 4, July/Augusust 2024
Research article
- Jigna J. Hathaliya, Sudeep Tanwar
:
A systematic survey on security and privacy issues of medicine supply chain: Taxonomy, framework, and research challenges. - Mohammed Ali Qasem
, Fursan Thabit
, Ozgu Can
, Ebrahim Naji
, Hoda A. Alkhzaimi, Pritam Rajendra Patil, S. B. Thorat:
Cryptography algorithms for improving the security of cloud-based internet of things. - Shahram Ghahremani
, Uyen Trang Nguyen:
Comprehensive evaluation of privacy policies using the contextual integrity framework. - Tapesh Sarsodia, Uma Rathore Bhatt
, Raksha Upadhyay
, Vijay Bhat:
Hybrid KuFaI: A novel secure key generation algorithm using fast independent component analysis for physical layer security techniques. - Sachin Kumar
, Akshit Tyagi
, Kadambri Agarwal, Saru Kumari
, Chien-Ming Chen
:
A trustworthy data collection approach from sensor nodes using trust score of mobile vehicles for smart city. - Sonam Yadav
, Vivek Dabra, Pradeep Malik, Saru Kumari
:
Flaw and amendment of Dharminder et al.'s authentication protocol for satellite communication. - Asmaa Amer Qasem
, Mona Shokair, Fathi E. Abd El-Samie:
Physical-layer security enhancement in wireless sensor networks through artificial noise optimization. - Amith Murthy, Muhammad Rizwan Asghar
, Wanqing Tu:
A lightweight Intrusion Detection for Internet of Things-based smart buildings. - Umesh Bodkhe, Sudeep Tanwar
:
Secure and lightweight message dissemination framework for internet of vehicles. - Usha Jain
:
Secure, light-weight and dynamic PUF-based mutual device authentication mechanism in industrial IoT networks.
Volume 7, Number 5, September/October 2024
Tutorial
- Raut Omprakash Jagannath, Ankit Kumar Jain
:
Browser-in-the-middle attacks: A comprehensive analysis and countermeasures.
Survey Paper
- Tamara Finogina
, Jordi Cucurull-Juan
, Núria Costa
:
Selective comparison of verifiable online voting systems. - Mohammed El-Hajj
, Taru Itäpelto
, Teklit Haftu Gebremariam:
Systematic literature review: Digital twins' role in enhancing security for Industry 4.0 applications. - Hira Rasheed
, Rafidah Md Noor, Norjihan Binti Abdul Ghani, Iftikhar Ahmad
:
Preserving location-query privacy in location-based services: A review.
Research Article
- Ashutosh Aithekar, Pratik Gupta
, Dharminder Chaudhary
:
A secure and efficient heterogeneous ID-based signcryption for unmanned aerial vehicular networking system. - Sakhi Bandyopadhyay, Subhadip Mukherjee
, Somnath Mukhopadhyay, Sunita Sarkar
:
Parallel BFS through pennant data structure with reducer hyper-object based data hiding for 3D mesh images. - Ahmed J. Kadhim
, Tayseer S. Atia:
Quantum encryption of healthcare images: Enhancing security and confidentiality in e-health systems. - Vahid Bakhtiary, Amir Masoud Rahmani
:
Blockchain integration in big data: Review, vision, and opportunities. - Haiyue Chen
, Xiangfu Zhao, Yichen Wang, Zixian Zhen:
SafeCheck: Detecting smart contract vulnerabilities based on static program analysis methods. - Amina Ahmed Nacer
, Mohammed Riyadh Abdmeziem
, Asma Aid:
Malicious clouds coalition management for business processes deployment. - Sabyasachi Samanta
, Sudipta Roy, Abhijit Sarkar
, Dipak Kumar Jana
:
Linguistic response surface methodology approach to measure the quality of nonlinear frame-pixel and bit place-based video steganography. - Ahmed Moumena
, Imane Saim Haddache:
Intelligent jamming detection-based robust principal components analysis in communication system for security and defense. - Mahendra Prasad
, Pankaj Pal
, Sachin Tripathi, Keshav P. Dahal
:
AI/ML driven intrusion detection framework for IoT enabled cold storage monitoring system. - Bjorn Oude Roelink, Mohammad El-Hajj
, Dipti Kapoor Sarmah:
Systematic review: Comparing zk-SNARK, zk-STARK, and bulletproof protocols for privacy-preserving authentication. - Suhaima Jamal, Hayden Wimmer, Iqbal H. Sarker
:
An improved transformer-based model for detecting phishing, spam and ham emails: A large language model approach. - Bhabesh Mali, Pranav Kumar Singh
, Nabajyoti Mazumdar:
SAFe-Health: Guarding federated learning-driven smart healthcare with federated defense averaging against data poisoning. - Garima Thakur, Mohammad S. Obaidat, Piyush Sharma, Sunil Prajapat
, Pankaj Kumar
:
An efficient provably secure authentication and key agreement protocol for satellite communication networks. - Radhika Lama
, Sandip Karmakar:
SiSMA-SWMS: Signature-based Secure Monitoring Approach for Smart Waste Monitoring Systems. - Sabra Ben Saad
:
A trust distributed learning (D-NWDAF) against poisoning and byzantine attacks in B5G networks. - Dheerendra Mishra
, Komal Pursharthi:
Cryptanalysis with improvement on lattice-based authenticated key exchange protocol for mobile satellite communication networks. - Minhaj Khan
, Mohd. Haroon:
Ensemble random forest and deep convolutional neural networks in detecting and classifying the multiple intrusions from near real-time cloud datasets. - Rizwan Uz Zaman Wani
, Fursan Thabit
, Ozgu Can
:
Security and privacy challenges, issues, and enhancing techniques for Internet of Medical Things: A systematic review. - Shi Jin, Yichun Wang, Zhaofeng Guo, Li Yang, Xiaosan Su
:
Short message encryption technology of Beidou communication based on SM9. - Zahraa A. Mohammed
, Khalid Ali Hussein
:
PRC6: Hybrid lightweight cipher for enhanced cloud data security in parallel environment.
Volume 7, Number 6, November/December 2024
Research Article
- Flavien Donkeng Zemo
, Sara Bakkali:
Sequential fusion-based defense strategy against sophisticated Byzantine attacks in cognitive IoT networks. - Ankur Gupta, Rajesh Gupta, Keyaba Gohil, Sudeep Tanwar
, Deepak Garg:
Blockchain-based decentralized oracle network framework for identity management in metaverse environment. - Monire Norouzi
:
A novel Bayesian optimizable ensemble bagged trees model for cryptocurrency fraud prediction approach. - Praveen Shukla
, C. Rama Krishna, Nilesh Vishwasrao Patil
:
Kafka-Shield: Kafka Streams-based distributed detection scheme for IoT traffic-based DDoS attacks. - Jigna J. Hathaliya, Sudeep Tanwar
:
Intelligent privacy-preserving data management framework for medicine supply chain system. - Srijanee Mookherji
, Vanga Odelu, Rajendra Prasath
, Ashok Kumar Das:
A secure authentication protocol for remote patient monitoring in an internet-of-medical-things environment. - Supongmen Walling
, Sibesh Lodh:
Network intrusion detection system for IoT security using machine learning and statistical based hybrid feature selection. - Yi Wang, Hao Yang, Yiming Zhang, Yitao Zhao, Shaoyang Yin:
Privacy-preserving security monitoring data sharing of new power system based on batch verification ring signature. - Nour Mousa, Farid Shirazi
:
A survey analysis of quantum computing adoption and the paradigm of privacy engineering. - Kausthav Pratim Kalita
, Debojit Boro, Dhruba Kumar Bhattacharyya:
Designing efficient patient-centric smart contracts for healthcare ecosystems with access control capabilities. - MSVPJ Sathvik, Hirak Mazumdar
:
Detection of malicious smart contracts by fine-tuning GPT-3. - Jan Bieniek, Mohamed Rahouti
, Kaiqi Xiong, Gabriel Ferreira Araújo:
SecureCare: A blockchain-assisted wearable body area network for secure and scalable IoT healthcare services. - Abdullah Ismetoglu, Yavuz Canbay
:
Detection of Covid-19 disease by using privacy-aware artificial intelligence system. - Xinhai Li, Yuanchao Hu
, Lingcheng Zeng, Yunzhu An
, Jinsong Yang, Xing Xiao:
Blockchain-based federated learning approaches in internet of things applications. - Arpit Raj
, Vedant Narayan, Vivek Muskan, Abhilash Sani, Pankaj Sharma, S. S. Sarma:
Modern ransomware: Evolution, methodology, attack model, prevention and mitigation using multi-tiered approach. - Biniyam Ayele Belete, Gelmecha Demissie Jobir, Ram Sewak Singh
:
Image encryption algorithm based on a memcapacitor-based hyperchaotic system and DNA coding. - Purushottam Singh
, Sandip Dutta, Prashant Pranav
:
A modified RC-4 cryptosystems to enhance security by using negative key schedule. - Magnus Sandell
:
On the trade-off between rate and reliability for secret key generation in wireless channels. - Ishu Sharma, Aditya Bhardwaj, Keshav Kaushik
:
Enhancing agricultural wireless sensor network security through integrated machine learning approaches.
Case Study
- Qawsar Gulzar
, Khurram Mustafa:
An analytical survey of cyber-physical systems in water treatment and distribution: Security challenges, intrusion detection, and future directions.
Research Article
- Johanna Herman
:
Dark patterns: EU's regulatory efforts. - Sayeda Suaiba Anwar
, Asaduzzaman
, Iqbal H. Sarker
:
A differential privacy aided DeepFed intrusion detection system for IoT applications. - Hongzhou Yue
, Zebin Song, Mengli Zhao, Lijia Yang:
Research on privacy leakage of celebrity's ID card number based on real-name authentication.
Survey Article
- Md. Ataullah
, Naveen Chauhan:
Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review.
Research Article
- Adi El-Dalahmeh
, Moawiah El-Dalahmeh, Mohammad Abdur Razzaque, Jie Li:
Cryptographic methods for secured communication in SDN-based VANETs: A performance analysis. - Balayogi G
, K. S. Kuppusamy
:
An approach for mitigating cognitive load in password management by integrating QR codes and steganography. - Sumit Kumar, Prachi Ahlawat
, Jyoti Sahni
:
IoT malware detection using static and dynamic analysis techniques: A systematic literature review. - Zhenyong Yang
, Changzhong Gao, Yong Wang, Hailong Meng, Shicong Han:
A lightweight security defense algorithm for multimodal attack blocking in industrial control networks based on momentum enhanced feature graphs.
Survey Article
- S. Rajasoundaran, Sivakumar Sabapathy Arumugam, S. Devaraju, M. Jahir Pasha
, Jaime Lloret
:
A deep experimental analysis of energy-proficient firewall policies and security practices for resource limited wireless networks.
Research Article
- K. Janani
, S. Ramamoorthy:
PIoT-fortifying IoT device identity and data access: A security framework empowered by blockchain. - Max Hashem Eiza
, Ta Vinh Thong, Qi Shi
, Yue Cao:
Secure semi-automated GDPR compliance service with restrictive fine-grained access control. - Changrong Li
, Zhenfu Li:
Trajectory tracking attack for vehicular ad-hoc networks.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.