All Stories

  1. Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Techniques
  2. AI-Powered Ransomware Detection Framework
  3. Adversarial Input Detection Using Image Processing Techniques (IPT)
  4. An Empirical Study on Algorithmic Bias
  5. Shamir's Secret Sharing for Authentication without Reconstructing Password
  6. Malware Analytics: Review of Data Mining, Machine Learning and Big Data Perspectives
  7. A Comparative Evaluation of Local Feature Descriptors for DeepFakes Detection
  8. A survey of blockchain from security perspective
  9. Face Authenticity: An Overview of Face Manipulation Generation, Detection and Recognition
  10. A Framework for Analyzing Ransomware using Machine Learning
  11. Biometrics and its use: Viewpoint
  12. Authentication Basics
  13. Continuous Authentication
  14. Negative Authentication Systems
  15. Multi-Factor Authentication
  16. OPNET/Simulink Based Testbed for Disturbance Detection in the Smart Grid
  17. Artificial Immune Systems
  18. A Cyber-Security Storm MAP
  19. Password Security through Negative Filtering
  20. Immunological Computation
  21. Artificial Immune Systems and Their Applications
  22. Evolutionary Algorithms in Engineering Applications
  23. Evolutionary Algorithms — An Overview
  24. Artificial Immune Systems