All Stories

  1. Proactive threat hunting to detect persistent behaviour-based advanced adversaries
  2. Building a Smart Security Framework for IoT/IIoT
  3. Evolving Threat Landscape in IoT and IIoT Environments
  4. 5G
  5. Cybercrime, Digital Terrorism, and 5G Paradigm
  6. Cyber Forensics and Investigation on Smart Devices
  7. Anatomy of Cyberattacks on Hybrid Clouds
  8. Beyond ATP
  9. India's Cybersecurity Journey
  10. Rise of the Shadows
  11. Guardians of Trust
  12. Holistic IoT Framework for Timely Detection of Cardiovascular Diseases
  13. Beyond the Realms: Navigating the Metaverse
  14. Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities
  15. Framework to perform taint analysis and security assessment of IoT devices in smart cities
  16. Forensic analysis and security assessment of IoT camera firmware for smart homes
  17. Navigating the Metaverse
  18. Sophisticated-Sinister-Stealth Attacks
  19. New Age Cyber Threat Mitigation for Cloud Computing Networks
  20. Enumerating happiness index during COVID-19 lockdowns using artificial intelligence techniques
  21. Metaverse or Metaworst with Cybersecurity Attacks
  22. Integrated approach using deep neural network and CBR for detecting severity of coronary artery disease
  23. ISF: Security Analysis and Assessment of Smart Home IoT-based Firmware
  24. A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses
  25. IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices
  26. A novel machine learning‐based framework for detecting fake Instagram profiles
  27. Property Valuation Using Linear Regression and Random Forest Algorithm
  28. Designing Intelligent Intrusion Detection System for Industry 4.0 Using Feature Learning Techniques
  29. Alternate Data Stream Attack Framework to Perform Stealth Attacks on Active Directory Hosts
  30. Comparison of IoT Communication Protocols Using Anomaly Detection with Security Assessments of Smart Devices
  31. Multinomial Naive Bayesian Classifier Framework for Systematic Analysis of Smart IoT Devices
  32. A Machine Learning-Based Framework for the Prediction of Cervical Cancer Risk in Women
  33. BTH: Behavior-Based Structured Threat Hunting Framework to Analyze and Detect Advanced Adversaries
  34. Efficient, Lightweight Cyber Intrusion Detection System for IoT Ecosystems Using MI2G Algorithm
  35. Internet of Things and Its Significance on Smart Homes/Cities
  36. Determinants of Mobile Cloud Computing Adoption by Financial Services Firms
  37. Investigate Financial Crime Patterns Using Graph Databases
  38. Machine Learning-Based Regression Framework to Predict Health Insurance Premiums
  39. ISF: IoT Firmware security analysis to secure IoT-based Smart Home Ecosystems
  40. Use of Artificial Neural Network for Forecasting Health Insurance Entitlements
  41. Correction to: Smart IoT and Machine Learning‑based Framework for Water Quality Assessment and Device Component Monitoring
  42. (Retracted) Secure framework against cyber attacks on cyber-physical robotic systems
  43. Predictive Analytics-Based Cybersecurity Framework for Cloud Infrastructure
  44. Smart water management framework for irrigation in agriculture
  45. Smart IoT and Machine Learning-based Framework for Water Quality Assessment and Device Component Monitoring
  46. Real-time Privacy Preserving Framework for Covid-19 Contact Tracing
  47. Health Insurance Claim Prediction Using Artificial Neural Networks
  48. Privacy-aware detection framework to mitigate new-age phishing attacks
  49. IAF: IoT Attack Framework and Unique Taxonomy
  50. Deep Learning Based Approach to Classify Saline Particles in Sea Water
  51. Cloud and IoT based smart architecture for desalination water treatment
  52. Big Data Analytics in Healthcare
  53. Big Data and Big Data Analytics
  54. Cybersecurity Incident Response Against Advanced Persistent Threats (APTs)
  55. Industrial Internet of Things
  56. Infrastructure Design to Secure Cloud Environments Against DDoS-Based Attacks
  57. Unique Fog Computing Taxonomy for Evaluating Cloud Services
  58. Efficient Fault Tolerance on Cloud Environments
  59. Unique Taxonomy for Evaluating Fog Computing Services
  60. Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks
  61. Novel Taxonomy to Select Fog Products and Challenges Faced in Fog Environments
  62. Penetration testing framework for smart contract Blockchain
  63. Health Insurance Claim Prediction Using Artificial Neural Networks
  64. Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems
  65. Analysing Ethical Issues of a Patient Information Systems Using the PAPA Model
  66. Digital Transformation of Diplomacy
  67. Network Security Evaluation and Threat Assessments in Enterprise Systems
  68. Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks
  69. Cyber security attacks on robotic platforms
  70. A framework for effective threat hunting
  71. A framework to define the relationship between cyber security and cloud performance
  72. Unique Fog Computing Taxonomy for Evaluating Cloud Services
  73. Solutions for Securing End User Data over the Cloud Deployed Applications
  74. Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks
  75. Unique Taxonomy for Evaluating Fog Computing Services
  76. Efficient Fault Tolerance on Cloud Environments
  77. Reducing the threat surface to minimise the impact of cyber-attacks
  78. Novel Taxonomy to Select Fog Products and Challenges Faced in Fog Environments
  79. Security challenges for cloud-based email infrastructure
  80. Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks
  81. Solutions for Securing End User Data over the Cloud Deployed Applications
  82. Cybersecurity Breaches and Issues Surrounding Online Threat Protection
  83. Online Banking Security Measures and Data Protection
  84. Review of solutions for securing end user data over cloud applications
  85. DDoS attacks, new DDoS taxonomy and mitigation solutions — A survey
  86. Designing a Framework for Cloud Service Agreement for Cloud Environments
  87. Design a Resilient Network Infrastructure Security Policy Framework
  88. Ransomware Digital Extortion: A Rising New Age Threat
  89. Three Tier Network Architecture to Mitigate DDoS Attacks on Hybrid Cloud Environments
  90. Security Algorithms for Cloud Computing
  91. Solutions for DDoS attacks on cloud