All Stories

  1. Enhancing industrial software security: A vulnerability threat assessment model based on CVSS 3.1 and bayesian networks
  2. Optimizing task scheduling in fog computing: Adaptive algorithms for enhanced security and efficiency in IoT environments
  3. Refining adversarial attacks on machine-learning phishing webpage detectors through functionality-preserving HTML manipulations
  4. Assured Way to Manage Various Controls in Cloud
  5. Efficient hash function-based duplication detection algorithm for data Deduplication deduction and reduction