All Stories

  1. Investigating the Role of Genetic Polymorphism in the Exon 3 of ATG16L1 Gene in T2DM Patients: A Pilot Study
  2. A Novel AI-Based Integrated Cybersecurity Risk Assessment Framework and Resilience of National Critical Infrastructure
  3. Real-Time Detection and Multi-Class Classification of DGAs With HybridBERT
  4. DUDE: Decryption, Unpacking, Deobfuscation, and Endian Conversion Framework for Embedded Devices Firmware
  5. An Efficient and Physically Secure Privacy-Preserving Key-Agreement Protocol for Vehicular Ad-Hoc Network
  6. Security Assessment and Evaluation of VPNs: A Comprehensive Survey
  7. PCSS: Privacy Preserving Communication Scheme for SDN Enabled Smart Homes
  8. CACS: A Context-Aware and Anonymous Communication Framework for an Enterprise Network Using SDN
  9. ENCVIDC: an innovative approach for encoded video content classification
  10. A deep learning assisted personalized deception system for countering web application attacks
  11. A framework to predict early news popularity using deep temporal propagation patterns
  12. Cybersecurity Standards in the Context of Operating System
  13. Water Is a Viable Data Storage Medium: A Security and Privacy Viewpoint
  14. An Ensemble Based Deep Learning Framework to Detect and Deceive XSS and SQL Injection Attacks
  15. Applications of artificial intelligence in COVID-19 pandemic: A comprehensive review
  16. Textual analysis of traitor-based dataset through semi supervised machine learning
  17. Blockchain-Based Public Key Infrastructure: A Transparent Digital Certification Mechanism for Secure Communication
  18. Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks
  19. ALAM: Anonymous Lightweight Authentication Mechanism for SDN-Enabled Smart Homes
  20. An Edge Computing Node Deployment Method Based on Improved k-Means Clustering Algorithm for Smart Manufacturing
  21. User-Oriented Virtual Mobile Network Resource Management for Vehicle Communications
  22. Context-oriented trust computation model for industrial Internet of Things
  23. Robust, Secure, and Adaptive Trust-Oriented Service Selection in IoT-Based Smart Buildings
  24. Mitigating service-oriented attacks using context-based trust for smart cities in IoT networks
  25. Enterprise Integration Patterns in SDN: A Reliable, Fault-Tolerant Communication Framework
  26. AdS: An adaptive spectrum sensing technique for survivability under jamming attack in Cognitive Radio Networks
  27. Cryptographic Framework for Role Control Remedy: A Secure Role Engineering mechanism for Single Authority Organizations
  28. Multi-task reading for intelligent legal services
  29. An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security
  30. Guest Editorial Introduction to the Special Section on Cognitive Software Defined Networks and Applications
  31. Deceiving Eavesdroppers by Real Time Persistent Spoofing of Android Users’ Location Coordinates for Privacy Enhancement
  32. Inter Cloud Interoperability Use Cases and Gaps in Corresponding Standards
  33. Efficient attribute-based encryption with repeated attributes optimization
  34. Integrated Security, Safety, and Privacy Risk Assessment Framework for Medical Devices
  35. DST-HRS: A topic driven hybrid recommender system based on deep semantics
  36. Cognitive computing for intelligent application and service
  37. Analytical study of hardware-rooted security standards and their implementation techniques in mobile
  38. On the efficiency of software implementations of lightweight block ciphers from the perspective of programming languages
  39. Profiling Vulnerabilities Threatening Dual Persona in Android Framework
  40. Handling Insider Threat Through Supervised Machine Learning Techniques
  41. IEEE Access Special Section: Security Analytics and Intelligence for Cyber Physical Systems
  42. Incorporating Blockchain into Role Engineering: A Reference Architecture Using ISO/IEC/IEEE 42010 Notation
  43. Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
  44. SS7 Vulnerabilities—A Survey and Implementation of Machine Learning vs Rule Based Filtering for Detection of SS7 Network Attacks
  45. Context Based Trust Formation Using Direct User-Experience in the Internet of Things(IoT)
  46. A name disambiguation module for intelligent robotic consultant in industrial internet of things
  47. MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems
  48. Enriching Non-negative Matrix Factorization with Contextual Embeddings for Recommender Systems
  49. Special issue: Cognitive Internet of Things assisted by cloud computing and big data
  50. AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis
  51. CATSWoTS: Context Aware Trustworthy Social Web of Things System
  52. Accelerated Dynamic MRI Using Kernel-Based Low Rank Constraint
  53. Trust models of internet of smart things: A survey, open issues, and future directions
  54. A Deep Learning Framework to Predict Rating for Cold Start Item Using Item Metadata
  55. Security Safety and Trust Management (SSTM' 19)
  56. iBike: Intelligent public bicycle services assisted by data analytics
  57. Assessing Outcomes and Prognostic Factors for First-Line Therapy in Elderly Patients With Metastatic Renal Cell Carcinoma: Real-Life Data From a Single United Kingdom Institution
  58. Smart e-commerce integration with recommender systems
  59. Auto-MeDiSine: an auto-tunable medical decision support engine using an automated class outlier detection method and AutoMLP
  60. Interaction and damage of nucleobases of DNA and RNA caused by silicon nanoparticle and crystalline silica: First principles study
  61. Fog computing in internet of things: Practical applications and future directions
  62. A complex event processing framework for an adaptive language learning system
  63. Framework for calculating Return On Security Investment (ROSI) for security-Oriented organizations
  64. Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices—A Review
  65. A Framework to Estimate the Nutritional Value of Food in Real Time Using Deep Learning Techniques
  66. A Framework to Determine Applications’ Authenticity
  67. Absorption spectra of iodine substituted coumarin 120
  68. Blockchain's adoption in IoT: The challenges, and a way forward
  69. DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks
  70. Delay Reduction Through Optimal Controller Placement to Boost Scalability in an SDDC
  71. Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations
  72. Incast Mitigation in a Data Center Storage Cluster Through a Dynamic Fair-Share Buffer Policy
  73. Flow Constraint Language for Coordination by Exogenous Connectors
  74. Forensic Analysis of LinkedIn’s Desktop Application on Windows 10 OS
  75. Mobile Intelligence Assisted by Data Analytics and Cognitive Computing
  76. A unified framework for automated inspection of handheld safety critical devices in production assemblies
  77. AndroKit: A toolkit for forensics analysis of web browsers on android platform
  78. Edge Computing in IoT-Based Manufacturing
  79. CrossRec: Cross-Domain Recommendations Based on Social Big Data and Cognitive Computing
  80. Quantum chemical investigation on molecular structure, vibrational, photophysical and nonlinear optical properties of l-threoninium picrate: an admirable contender for nonlinear applications
  81. Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art
  82. A hybrid-adaptive neuro-fuzzy inference system for multi-objective regression test suites optimization
  83. Correlation power analysis of modes of encryption in AES and its countermeasures
  84. Ease or Privacy? A Comprehensive Analysis of Android Embedded Adware
  85. Enhancing E-Healthcare Privacy Preservation Framework through L-Diversity
  86. Defence against PUE attacks in ad hoc cognitive radio networks: a mean field game approach
  87. Forensic investigation to detect forgeries in ASF files of contemporary IP cameras
  88. Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis
  89. Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review
  90. Information Diffusion Model Based on Social Big Data
  91. Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions
  92. Antenna and Propagation Considerations for Amateur UAV Monitoring
  93. Key functions analysis of a novel nonlinear optical D-π-A bridge type (2 E )-3-(4-Methylphenyl)-1-(3-nitrophenyl) prop-2-en-1-one chalcone: An experimental and theoretical approach
  94. Feasibility analysis for deploying national healthcare information system (NHIS) for Pakistan
  95. Simulation-based evaluation of frequency upscaled operation of exact/approximate ripple carry adders
  96. A first principles study of key electronic, optical, second and third order nonlinear optical properties of 3-(4-chlorophenyl)-1-(pyridin-3-yl) prop-2-en-1-one: a novel D- $$\pi $$ ...
  97. A Manufacturing Big Data Solution for Active Preventive Maintenance
  98. USB Storage Device Forensics for Windows 10
  99. Security, Safety and Trust Management (SSTM ‘17)
  100. Internet of things (IoT) design considerations for developers and manufacturers
  101. Adaptive Interference Cancellation of ECG Signals
  102. Security and privacy issues in cloud computing
  103. Fuzziness based semi-supervised learning approach for intrusion detection system
  104. First-principles study of interaction of serine with nucleobases of DNA and RNA
  105. Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems
  106. Algebraic Side Channel Attack on Trivium and Grain Ciphers
  107. A Survey of Authentication Schemes in Telecare Medicine Information Systems
  108. Electronic crime investigations in a virtualised environment: a forensic process and prototype for evidence collection and analysis
  109. Empirical Studies of ECG Multiple Fiducial-Points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform
  110. Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms
  111. A Detection and Prevention System against collaborative attacks in Mobile Ad hoc Networks
  112. Survey on cybersecurity issues in wireless mesh networks based eHealthcare
  113. A framework for cloud forensics evidence collection and analysis using security information and event management
  114. Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment
  115. Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges
  116. Guest editorial: Secure cloud computing for mobile health services
  117. Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems
  118. Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges
  119. Distributed denial of service (DDoS) attack detection using data mining approach in cloud-assisted wireless body area networks
  120. Analyzing Packet Forwarding Schemes for Selfish Behavior in MANETs
  121. Fluorescence quenching of rhodamine 6G by 1,3,5-Trinitroperhydro-1,3,5- triazine entrapped in porous sol–gel silica
  122. Dynamic performance improvement of MMC inverter with STATCOM capability interfacing PMSG wind turbines with grid
  123. Security concerns of cloud-based healthcare systems: A perspective of moving from single-cloud to a multi-cloud infrastructure
  124. First principal studies of spectroscopic (IR and Raman, UV–visible), molecular structure, linear and nonlinear optical properties of l-arginine p-nitrobenzoate monohydrate (LANB): A new non-centrosymmetric material
  125. Feasibility analysis for incorporating/deploying SIEM for forensics evidence collection in cloud environment
  126. Data Warehousing Based Computer Forensics Investigation Framework
  127. A physico-chemical approach to study the experimental and theoretical properties of l-ornithine monohydrochloride: An organic nonlinear optical material
  128. Density functional study of spectroscopy, electronic structure, linear and nonlinear optical properties of l-proline lithium chloride and l-proline lithium bromide monohydrate: For laser applications
  129. Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks
  130. Anomaly Detection in Wireless Sensor Networks Using Immune-Based Bioinspired Mechanism
  131. Survey on Mobile User's Data Privacy Threats and Defense Mechanisms
  132. EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network
  133. A framework to address inconstant user requirements in cloud SLAs management
  134. Distributed Denial of Service (DDoS) Attack in Cloud- Assisted Wireless Body Area Networks: A Systematic Literature Review
  135. Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms
  136. Experimental and theoretical studies on bis(glycine) lithium nitrate (BGLiN): A physico-chemical approach
  137. Gefitinib for oesophageal cancer progressing after chemotherapy (COG): a phase 3, multicentre, double-blind, placebo-controlled randomised trial
  138. A Survey on Network Layer Attacks and AODV Defense in Mobile Ad Hoc Networks
  139. Identifying an OpenID anti-phishing scheme for cyberspace
  140. On the ground and excited state of glycine–glutaric acid: A new organic material
  141. Neutral-neutral reactions for the formation of C3O and C3S
  142. Analyzing Feasibility for Deploying Very Fast Decision Tree for DDoS Attack Detection in Cloud-Assisted WBAN
  143. Security Requirements Specification Framework for Cloud Users
  144. Dynamically Changing Service Level Agreements (SLAs) Management in Cloud Computing
  145. Load Balanced Routing for Lifetime Maximization in Mobile Wireless Sensor Networks
  146. Cloud Computing Risk Assessment: A Systematic Literature Review
  147. A Cloud-based Healthcare Framework for Security and Patients’ Data Privacy Using Wireless Body Area Networks
  148. Physico chemical properties of l-asparagine l-tartaric acid single crystals: A new nonlinear optical material
  149. Anticipating Dormant Functionality in Malware: A Semantics Based Approach
  150. A Multi-agent Model for Fire Detection in Coal Mines Using Wireless Sensor Networks
  151. WLAN Location Privacy: A Client Server Based Architecture
  152. Patient-reported outcomes from a phase III multicenter, randomized, double-blind, placebo-controlled trial of gefitinib versus placebo in esophageal cancer progressing after chemotherapy: Cancer Oesophagus Gefitinib (COG).
  153. A framework for preservation of cloud users’ data privacy using dynamic reconstruction of metadata
  154. Secure SMS Based Automatic Device Pairing Approach for Mobile Phones
  155. A Hybrid Security Mechanism for Intra-WBAN and Inter-WBAN Communications
  156. Effect of thickness on the structural, optical and electrical properties of thermally evaporated PbI2 thin films
  157. First principle calculation of the photophysical properties of silylated coumarins 120 and 151
  158. User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment
  159. Theoretical investigation of the ground and excited state of silylated coumarin
  160. Addressing dynamic issues in information security management
  161. Thermally assisted ECR etching of CdTe in CCl2F2/Ar discharge under different gas flow ratio
  162. A Structured Approach for Internalizing Externalities Caused by IT Security Mechanisms
  163. Option Based Evaluation: Security Evaluation of IT Products Based on Options Theory
  164. Security characterization for evaluation of software architectures using ATAM
  165. Adaptability infrastructure for bridging IT security evaluation and options theory
  166. Increasing the Performance of Crab Linux Router Simulation Package Using XEN
  167. Spectroscopic study of sulforhodamine 640-doped sol–gel silica
  168. New technique for detection and height estimation of buried metallic objects
  169. Automatic diagnosis from electrocardiograms (ECGs)
  170. The behaviour of zinc and zinc-silver alloys in the presence of some inhibitors