All Stories

  1. how can Blockchain improve security in Internet of Vehicles
  2. Blockchain-Based Data Breach Detection: Approaches, Challenges, and Future Directions
  3. Privacy-First Paradigm for Dynamic Consent Management Systems: Empowering Data Subjects through Decentralized Data Controllers and Privacy-Preserving Techniques
  4. Enhancing Data Protection in Dynamic Consent Management Systems: Formalizing Privacy and Security Definitions with Differential Privacy, Decentralization, and Zero-Knowledge Proofs
  5. Data Provenance in Healthcare: Approaches, Challenges, and Future Directions
  6. Automated Leukemia Screening and Sub-types Classification Using Deep Learning
  7. A Conceptual Model of Factors Influencing Customer Relationship Management in Global Software Development: A Client Perspective
  8. Deep-Confidentiality : An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data
  9. Authorization schemes for internet of things: requirements, weaknesses, future challenges and trends
  10. Blockchain-Based Software Effort Estimation: An Empirical Study
  11. Software Requirements Prioritization in the context of Global Software Development
  12. URL filtering using big data analytics in 5G networks
  13. A semantic rule based digital fraud detection
  14. MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus
  15. Audit Logs Management and Security - A Survey
  16. VisTAS: blockchain-based visible and trusted remote authentication system
  17. BCALS: Blockchain‐based secure log management system for cloud computing
  18. Analyzing COVID-19 Impact on the Researchers Productivity through Their Perceptions
  19. Analyzing COVID-2019 Impact on Mental Health Through Social Media Forum
  20. Blockchain-Based Software Process Improvement (BBSPI): An Approach for SMEs to Perform Process Improvement
  21. Dynamic Parameters-Based Reversible Data Transform (RDT) Algorithm in Recommendation System
  22. Exploiting Ontology Recommendation Using Text Categorization Approach
  23. A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS)
  24. A methodology for image annotation of human actions in videos
  25. Leveraging IoT and Fog Computing in Healthcare Systems
  26. Security and Privacy Issues in Fog Computing
  27. OBAC: towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed environment
  28. S-box design based on optimize LFT parameter selection: a practical approach in recommendation system domain
  29. Accurate Pixel-Wise Skin Segmentation Using Shallow Fully Convolutional Neural Network
  30. CDED-Net: Joint Segmentation of Optic Disc and Optic Cup for Glaucoma Screening
  31. Intelligent Agent-Based RBAC Model to Support Cyber Security Alliance Among Multiple Organizations in Global IT Systems
  32. Privacy-preserving model and generalization correlation attacks for 1:M data with multiple sensitive attributes
  33. Order preserving secure provenance scheme for distributed networks
  34. An effective privacy preserving mechanism for 1: M microdata with high utility
  35. Watermarking as a service (WaaS) with anonymity
  36. A Methodology to Characterize and Compute Public Perception via Social Networks
  37. Privacy Concerns in Online Social Networks: A Users’ Perspective
  38. A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks
  39. Privacy preserving data by conceptualizing smart cities using MIDR-Angelization
  40. A Fault Tolerant Approach for Malicious URL Filtering
  41. Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks
  42. Towards ontology-based multilingual URL filtering: a big data problem
  43. Secure provenance using an authenticated data structure approach
  44. Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges
  45. An Ontology-Based Approach for Detecting Drug Abuse Epidemiology
  46. Ontology for Attack Detection: Semantic-Based Approach for Genomic Data Security
  47. Privacy Preservation in Skewed Data Using Frequency Distribution and Weightage (FDW)
  48. Towards Preserving Privacy of Outsourced Genomic Data Over the Cloud
  49. τ -safety: A privacy model for sequential publication with arbitrary updates
  50. A trust management system model for cloud
  51. A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends
  52. MITIS - An Insider Threats Mitigation Framework for Information Systems
  53. Secure Logging as a Service Using Reversible Watermarking
  54. Buyer seller watermarking protocols issues and challenges – A survey
  55. Aggregated Signatures for Chaining: A Secure Provenance Scheme
  56. A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs
  57. Semantics enabled role based sentiment analysis for drug abuse on social media: A framework
  58. Towards Reliable and Energy-Efficient Incremental Cooperative Communication for Wireless Body Area Networks
  59. Android Malware Detection & Protection: A Survey
  60. Smart Cities: A Survey on Security Concerns
  61. Reactive GTS Allocation Protocol for Sporadic Events Using the IEEE 802.15.4
  62. Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop
  63. Mobile agent watermarking (MAW)
  64. CLUSMA
  65. Context-based privacy management of personal information using semantic desktop
  66. Towards an Ontology-based Risk Assessment in Collaborative Environment Using the SemanticLIFE
  67. Intelligent Multi-Domain RBAC Model