All Stories

  1. Elasticsearch-Based Threat Hunting to Detect Privilege Escalation Using Registry Modification and Process Injection Attacks
  2. Threat hunting for adversary impact inhibiting system recovery
  3. IAPN: Framework to secure IoT-based infrastructures using Private APN
  4. Residual Network-Based Deep Learning Framework for Diabetic Retinopathy Detection
  5. Threat Hunting the Shadows: Detecting Adversary Lateral Movement With Elasticsearch
  6. Unique Taxonomy and Review of New Age Smart Home IoT Forensics Tools
  7. Proactive threat hunting to detect persistent behaviour-based advanced adversaries
  8. Building a Smart Security Framework for IoT/IIoT
  9. Evolving Threat Landscape in IoT and IIoT Environments
  10. 5G
  11. Cybercrime, Digital Terrorism, and 5G Paradigm
  12. Cyber Forensics and Investigation on Smart Devices
  13. Anatomy of Cyberattacks on Hybrid Clouds
  14. Beyond ATP
  15. India's Cybersecurity Journey
  16. Rise of the Shadows
  17. Guardians of Trust
  18. Holistic IoT Framework for Timely Detection of Cardiovascular Diseases
  19. Beyond the Realms: Navigating the Metaverse
  20. Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities
  21. Framework to perform taint analysis and security assessment of IoT devices in smart cities
  22. Forensic analysis and security assessment of IoT camera firmware for smart homes
  23. Navigating the Metaverse
  24. Sophisticated-Sinister-Stealth Attacks
  25. New Age Cyber Threat Mitigation for Cloud Computing Networks
  26. Enumerating happiness index during COVID-19 lockdowns using artificial intelligence techniques
  27. Metaverse or Metaworst with Cybersecurity Attacks
  28. Integrated approach using deep neural network and CBR for detecting severity of coronary artery disease
  29. ISF: Security Analysis and Assessment of Smart Home IoT-based Firmware
  30. A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses
  31. IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices
  32. A novel machine learning‐based framework for detecting fake Instagram profiles
  33. Property Valuation Using Linear Regression and Random Forest Algorithm
  34. Designing Intelligent Intrusion Detection System for Industry 4.0 Using Feature Learning Techniques
  35. Alternate Data Stream Attack Framework to Perform Stealth Attacks on Active Directory Hosts
  36. Comparison of IoT Communication Protocols Using Anomaly Detection with Security Assessments of Smart Devices
  37. Multinomial Naive Bayesian Classifier Framework for Systematic Analysis of Smart IoT Devices
  38. A Machine Learning-Based Framework for the Prediction of Cervical Cancer Risk in Women
  39. BTH: Behavior-Based Structured Threat Hunting Framework to Analyze and Detect Advanced Adversaries
  40. Efficient, Lightweight Cyber Intrusion Detection System for IoT Ecosystems Using MI2G Algorithm
  41. Internet of Things and Its Significance on Smart Homes/Cities
  42. Determinants of Mobile Cloud Computing Adoption by Financial Services Firms
  43. Investigate Financial Crime Patterns Using Graph Databases
  44. Machine Learning-Based Regression Framework to Predict Health Insurance Premiums
  45. ISF: IoT Firmware security analysis to secure IoT-based Smart Home Ecosystems
  46. Use of Artificial Neural Network for Forecasting Health Insurance Entitlements
  47. Correction to: Smart IoT and Machine Learning‑based Framework for Water Quality Assessment and Device Component Monitoring
  48. (Retracted) Secure framework against cyber attacks on cyber-physical robotic systems
  49. Predictive Analytics-Based Cybersecurity Framework for Cloud Infrastructure
  50. Smart water management framework for irrigation in agriculture
  51. Smart IoT and Machine Learning-based Framework for Water Quality Assessment and Device Component Monitoring
  52. Real-time Privacy Preserving Framework for Covid-19 Contact Tracing
  53. Health Insurance Claim Prediction Using Artificial Neural Networks
  54. Privacy-aware detection framework to mitigate new-age phishing attacks
  55. IAF: IoT Attack Framework and Unique Taxonomy
  56. Deep Learning Based Approach to Classify Saline Particles in Sea Water
  57. Cloud and IoT based smart architecture for desalination water treatment
  58. Big Data Analytics in Healthcare
  59. Big Data and Big Data Analytics
  60. Cybersecurity Incident Response Against Advanced Persistent Threats (APTs)
  61. Industrial Internet of Things
  62. Infrastructure Design to Secure Cloud Environments Against DDoS-Based Attacks
  63. Unique Fog Computing Taxonomy for Evaluating Cloud Services
  64. Efficient Fault Tolerance on Cloud Environments
  65. Unique Taxonomy for Evaluating Fog Computing Services
  66. Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks
  67. Novel Taxonomy to Select Fog Products and Challenges Faced in Fog Environments
  68. Penetration testing framework for smart contract Blockchain
  69. Health Insurance Claim Prediction Using Artificial Neural Networks
  70. Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems
  71. Analysing Ethical Issues of a Patient Information Systems Using the PAPA Model
  72. Digital Transformation of Diplomacy
  73. Network Security Evaluation and Threat Assessments in Enterprise Systems
  74. Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks
  75. Cyber security attacks on robotic platforms
  76. A framework for effective threat hunting
  77. A framework to define the relationship between cyber security and cloud performance
  78. Unique Fog Computing Taxonomy for Evaluating Cloud Services
  79. Solutions for Securing End User Data over the Cloud Deployed Applications
  80. Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks
  81. Unique Taxonomy for Evaluating Fog Computing Services
  82. Efficient Fault Tolerance on Cloud Environments
  83. Reducing the threat surface to minimise the impact of cyber-attacks
  84. Novel Taxonomy to Select Fog Products and Challenges Faced in Fog Environments
  85. Security challenges for cloud-based email infrastructure
  86. Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks
  87. Solutions for Securing End User Data over the Cloud Deployed Applications
  88. Cybersecurity Breaches and Issues Surrounding Online Threat Protection
  89. Online Banking Security Measures and Data Protection
  90. Review of solutions for securing end user data over cloud applications
  91. DDoS attacks, new DDoS taxonomy and mitigation solutions — A survey
  92. Designing a Framework for Cloud Service Agreement for Cloud Environments
  93. Design a Resilient Network Infrastructure Security Policy Framework
  94. Ransomware Digital Extortion: A Rising New Age Threat
  95. Three Tier Network Architecture to Mitigate DDoS Attacks on Hybrid Cloud Environments
  96. Security Algorithms for Cloud Computing
  97. Solutions for DDoS attacks on cloud