All Stories

  1. An empirical evaluation of link quality utilization in ETX routing for VANETs
  2. A new approach for detecting process injection attacks using memory analysis
  3. Utilizing the Blockchain Technology for Higher Education in the Era of Pandemics: A Systematic Review
  4. Advanced security testing using a cyber‐attack forecasting model: A case study of financial institutions
  5. Systematic Review of E-commerce Security Issues and Customer Satisfaction Impact
  6. Data Fusion and the Impact of Group Mobility on Load Distribution on MRHOF and OF0
  7. Software Design and Experimental Evaluation of a Reduced AES for IoT Applications
  8. A systematic review of detection and prevention techniques of SQL injection attacks
  9. A Scoring System for Information Security Governance Framework Using Deep Learning Algorithms: A Case Study on the Banking Sector
  10. The impact of varying sinks on load distribution in IoT routing under static and mobile scenarios
  11. The status of information security systems in banking sector from social engineering perspective
  12. A new architecture for voice interconnection using packet switched network
  13. Email Fraud Attack Detection Using Hybrid Machine Learning Approach
  14. Authentication techniques in smart grid: a systematic review
  15. Recent Development in Smart Grid Authentication Approaches: A Systematic Literature Review
  16. A Novel Simplified AES Algorithm for Lightweight Real-Time Applications: Testing and Discussion
  17. Comparative Randomness Analysis of DES Variants
  18. Software randomness analysis and evaluation of lightweight ciphers: the prospective for IoT security
  19. Randomness Analysis of DES Ciphers Produced with Various Dynamic Arrangements
  20. A Group Leader Location Hiding Technique for VANETs
  21. A fingerprint featured data encryption algorithm
  22. Routing and the Impact of Group Mobility Model in VANETs
  23. Investigating Vincenti Engineering Principles in Support to the Auditing of Measurement Processes in Agile Organizations
  24. Secure and Efficient Cloud Computing Framework
  25. Comparative Study on Sybil Attack Detection Schemes
  26. A Secure Cloud Computing Model based on Data Classification
  27. Performance comparison of end-to-end and on-the-spot traffic-aware techniques
  28. Performance evaluation of a new end-to-end traffic-aware routing in MANETs
  29. Bandwidth-efficient routing protocol for mobile ad hoc networks
  30. Performance Study of End-to-End Traffic-Aware Routing
  31. JNIT