All Stories

  1. Quantum-Resilient Cloud Forensics: A Hybrid QKD-AI Framework for Post-quantum Evidence Integrity
  2. Elasticsearch-Based Threat Hunting to Detect Privilege Escalation Using Registry Modification and Process Injection Attacks
  3. Threat hunting for adversary impact inhibiting system recovery
  4. IAPN: Framework to secure IoT-based infrastructures using Private APN
  5. Residual Network-Based Deep Learning Framework for Diabetic Retinopathy Detection
  6. Threat Hunting the Shadows: Detecting Adversary Lateral Movement With Elasticsearch
  7. Unique Taxonomy and Review of New Age Smart Home IoT Forensics Tools
  8. Proactive threat hunting to detect persistent behaviour-based advanced adversaries
  9. Building a Smart Security Framework for IoT/IIoT
  10. Evolving Threat Landscape in IoT and IIoT Environments
  11. 5G
  12. Cybercrime, Digital Terrorism, and 5G Paradigm
  13. Cyber Forensics and Investigation on Smart Devices
  14. Anatomy of Cyberattacks on Hybrid Clouds
  15. Beyond ATP
  16. India's Cybersecurity Journey
  17. Rise of the Shadows
  18. Guardians of Trust
  19. Holistic IoT Framework for Timely Detection of Cardiovascular Diseases
  20. Beyond the Realms: Navigating the Metaverse
  21. Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities
  22. Framework to perform taint analysis and security assessment of IoT devices in smart cities
  23. Forensic analysis and security assessment of IoT camera firmware for smart homes
  24. Navigating the Metaverse
  25. Sophisticated-Sinister-Stealth Attacks
  26. New Age Cyber Threat Mitigation for Cloud Computing Networks
  27. Enumerating happiness index during COVID-19 lockdowns using artificial intelligence techniques
  28. Metaverse or Metaworst with Cybersecurity Attacks
  29. Integrated approach using deep neural network and CBR for detecting severity of coronary artery disease
  30. ISF: Security Analysis and Assessment of Smart Home IoT-based Firmware
  31. A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses
  32. IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices
  33. A novel machine learning‐based framework for detecting fake Instagram profiles
  34. Property Valuation Using Linear Regression and Random Forest Algorithm
  35. Designing Intelligent Intrusion Detection System for Industry 4.0 Using Feature Learning Techniques
  36. Alternate Data Stream Attack Framework to Perform Stealth Attacks on Active Directory Hosts
  37. Comparison of IoT Communication Protocols Using Anomaly Detection with Security Assessments of Smart Devices
  38. Multinomial Naive Bayesian Classifier Framework for Systematic Analysis of Smart IoT Devices
  39. A Machine Learning-Based Framework for the Prediction of Cervical Cancer Risk in Women
  40. BTH: Behavior-Based Structured Threat Hunting Framework to Analyze and Detect Advanced Adversaries
  41. Efficient, Lightweight Cyber Intrusion Detection System for IoT Ecosystems Using MI2G Algorithm
  42. Internet of Things and Its Significance on Smart Homes/Cities
  43. Determinants of Mobile Cloud Computing Adoption by Financial Services Firms
  44. Investigate Financial Crime Patterns Using Graph Databases
  45. Machine Learning-Based Regression Framework to Predict Health Insurance Premiums
  46. ISF: IoT Firmware security analysis to secure IoT-based Smart Home Ecosystems
  47. Use of Artificial Neural Network for Forecasting Health Insurance Entitlements
  48. Correction to: Smart IoT and Machine Learning‑based Framework for Water Quality Assessment and Device Component Monitoring
  49. (Retracted) Secure framework against cyber attacks on cyber-physical robotic systems
  50. Predictive Analytics-Based Cybersecurity Framework for Cloud Infrastructure
  51. Smart water management framework for irrigation in agriculture
  52. Smart IoT and Machine Learning-based Framework for Water Quality Assessment and Device Component Monitoring
  53. Real-time Privacy Preserving Framework for Covid-19 Contact Tracing
  54. Health Insurance Claim Prediction Using Artificial Neural Networks
  55. Privacy-aware detection framework to mitigate new-age phishing attacks
  56. IAF: IoT Attack Framework and Unique Taxonomy
  57. Deep Learning Based Approach to Classify Saline Particles in Sea Water
  58. Cloud and IoT based smart architecture for desalination water treatment
  59. Big Data Analytics in Healthcare
  60. Big Data and Big Data Analytics
  61. Cybersecurity Incident Response Against Advanced Persistent Threats (APTs)
  62. Industrial Internet of Things
  63. Infrastructure Design to Secure Cloud Environments Against DDoS-Based Attacks
  64. Unique Fog Computing Taxonomy for Evaluating Cloud Services
  65. Efficient Fault Tolerance on Cloud Environments
  66. Unique Taxonomy for Evaluating Fog Computing Services
  67. Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks
  68. Novel Taxonomy to Select Fog Products and Challenges Faced in Fog Environments
  69. Penetration testing framework for smart contract Blockchain
  70. Health Insurance Claim Prediction Using Artificial Neural Networks
  71. Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems
  72. Analysing Ethical Issues of a Patient Information Systems Using the PAPA Model
  73. Digital Transformation of Diplomacy
  74. Network Security Evaluation and Threat Assessments in Enterprise Systems
  75. Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks
  76. Cyber security attacks on robotic platforms
  77. A framework for effective threat hunting
  78. A framework to define the relationship between cyber security and cloud performance
  79. Unique Fog Computing Taxonomy for Evaluating Cloud Services
  80. Solutions for Securing End User Data over the Cloud Deployed Applications
  81. Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks
  82. Unique Taxonomy for Evaluating Fog Computing Services
  83. Efficient Fault Tolerance on Cloud Environments
  84. Reducing the threat surface to minimise the impact of cyber-attacks
  85. Novel Taxonomy to Select Fog Products and Challenges Faced in Fog Environments
  86. Security challenges for cloud-based email infrastructure
  87. Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks
  88. Solutions for Securing End User Data over the Cloud Deployed Applications
  89. Cybersecurity Breaches and Issues Surrounding Online Threat Protection
  90. Online Banking Security Measures and Data Protection
  91. Review of solutions for securing end user data over cloud applications
  92. DDoS attacks, new DDoS taxonomy and mitigation solutions — A survey
  93. Designing a Framework for Cloud Service Agreement for Cloud Environments
  94. Design a Resilient Network Infrastructure Security Policy Framework
  95. Ransomware Digital Extortion: A Rising New Age Threat
  96. Three Tier Network Architecture to Mitigate DDoS Attacks on Hybrid Cloud Environments
  97. Security Algorithms for Cloud Computing
  98. Solutions for DDoS attacks on cloud