All Stories

  1. Adversarial-aware federated learning with dynamic client weighting for healthcare record security
  2. Graph Attention Networks for Skin Lesion Classification with CNN-Driven Node Features
  3. Lightweight dual-watermarking framework for medical image authentication and integrity preservation
  4. A keyless multimodal-based user authentication scheme using generative adversarial networks
  5. Advancing Network Security: Developing a Deep Learning- Based Intrusion Detection System
  6. IoT Network Security Framework to Classify RPL Attacks Using Deep Learning Algorithms
  7. Intrusion detection in smart grids using artificial intelligence-based ensemble modelling
  8. Obfuscated Malware Detection and Classification in Network Traffic Leveraging Hybrid Large Language Models and Synthetic Data
  9. Decentralized Identity Management in Cloud Computing: A Blockchain‐Based Solution With Automatic Provisioning Techniques
  10. Strengthening E-mail Security: NLP and Deep Learning-Powered Phishing Detection System
  11. ANEF: Adversarial Neural Encryption Framework for Secured Consumer Electronics in Smart Cities
  12. Adaptive Federated Reinforcement Learning with Temporal Hybrid Deep Model for Consumer Internet of Vehicles Intrusion Detection
  13. Computational challenges and solutions: Prime number generation for enhanced data security
  14. FHG-PR: a hybridized fuzzy-AHP and game theory model for assessing privacy risk on social media platforms
  15. A fog-edge-enabled intrusion detection system for smart grids
  16. Transformative synergy: SSEHCET—bridging mobile edge computing and AI for enhanced eHealth security and efficiency
  17. Enhancing Secure Development in Globally Distributed Software Product Lines: A Machine Learning-Powered Framework for Cyber-Resilient Ecosystems
  18. Adversarial Malware Detection on Consumer Devices Using Optimized Image-Based Ensembles
  19. Augmenting Internet of Medical Things Security: Deep Ensemble Integration and Methodological Fusion
  20. The Impact of Remote Work on Corporate Security
  21. Implementation of African vulture optimization algorithm based on deep learning for cybersecurity intrusion detection
  22. A novel approach to predicting the stability of the smart grid utilizing MLP-ELM technique
  23. A Novel Classification Model of Date Fruit Dataset Using Deep Transfer Learning
  24. GITM: A GINI Index-Based Trust Mechanism to Mitigate and Isolate Sybil Attack in RPL-Enabled Smart Grid Advanced Metering Infrastructures
  25. Development of a Model for Spoofing Attacks in Internet of Things
  26. BTH: Behavior-Based Structured Threat Hunting Framework to Analyze and Detect Advanced Adversaries
  27. An Efficient Authentication Scheme Using Blockchain as a Certificate Authority for the Internet of Drones
  28. Efficient, Lightweight Cyber Intrusion Detection System for IoT Ecosystems Using MI2G Algorithm
  29. Explainable Malware Detection System Using Transformers-Based Transfer Learning and Multi-Model Visual Representation
  30. Android Device Malware Classification Framework Using Multistep Image Feature Extraction and Multihead Deep Neural Ensemble
  31. Face Image Analysis Using Machine Learning: A Survey on Recent Trends and Applications
  32. Securing Low-Power Blockchain-Enabled IoT Devices Against Energy Depletion Attack
  33. An Efficient Feature Selection Method for Video-Based Activity Recognition Systems
  34. An Ensembled Spatial Enhancement Method for Image Enhancement in Healthcare
  35. Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing
  36. Certificate-Based Signcryption Scheme for Securing Wireless Communication in Industrial Internet of Things
  37. DDoS Detection System: Using a Set of Classification Algorithms Controlled by Fuzzy Logic System in Apache Spark
  38. DDoS Detection System: Utilizing Gradient Boosting Algorithm and Apache Spark
  39. DDoS Attack Detection System: Utilizing Classification Algorithms with Apache Spark
  40. Data Fragmentation Scheme: Improving Database Security in Cloud Computing
  41. Improving Database Security in Cloud Computing by Fragmentation of Data