All Stories

  1. Implicit spatio-temporal based hybrid recommendation model to discover malicious wireless access points
  2. A Review on Quantum Computing and Security
  3. Optimizing Medical Healthcare Services Using Big Data Analytics
  4. ECC-reliant secure authentication protocol for cloud server and smart devices in IoT
  5. A Graph-Based Model for Discovering Host-Based Hook Attacks
  6. Secure and novel authentication model for protecting data centers in fog environment
  7. An Effective Emotion Recognition Method Using Facial and Speech Features
  8. Diagnosis of infertility from adenomyosis and endometriosis through entroxon based intelligent water drop back propagation neural networks
  9. Convolutional Neural Network-Based Approach to Detect COVID-19 from Chest X-Ray Images
  10. A misdirected route avoidance using random waypoint mobility model in wireless sensor network
  11. Smartphone Based Botnet Detection using Behavioral Analysis
  12. PAM: process authentication mechanism for protecting system services against malicious code attacks
  13. A Security Scheme for Discovering Battery Draining Attacks in Android Smartphone
  14. A collaborative policy-based security scheme to enforce resource access controlling mechanism
  15. Improving Robustness of Digital Video Watermarking Scheme through Random Frame Selection Algorithm
  16. Optimizing Detection of Malware Attacks through Graph-Based Approach
  17. DYNAMIC STRATEGY FOR BOTNET DETECTION USING BBA
  18. Optimization of rootkit revealing system resources – A game theoretic approach
  19. Behavior based authentication mechanism to prevent malicious code attacks in windows
  20. A verification strategy for web services composition using enhanced stacked automata model
  21. An Effective Method for Protecting Native API Hook Attacks in User-mode
  22. Demanding Requirement of Security for Wireless Mobile Devices: A Survey
  23. Enhancing Malware Detection Accuracy through Graph Based Model
  24. A Survey on host-based Botnet identification
  25. Automatic Generation of P2P Botnet Network Attack Graph
  26. P2P Botnet detection: Combined host- and network-level analysis
  27. Reducing web crawler overhead using mobile crawler
  28. A Security Model for Mobile Agent in Grid Environment