Current Issue
July 2025, Volume 17, Number 4
Smart Meter Security Issues: A Review Paper
Osama Alshannaq 1, Mohd Rizuan Baharon 1, Shekh Faisal Abdul Latip 1, Hairol Nizam Mohd Shah 1 and Áine MacDermott 2, 1 Universiti Teknikal Malaysia Melaka, Malaysia, 2 Liverpool John Moores University, United Kingdom |
Using Combination of Fuzzy Set and Gravitational Algorithm for Improving Intrusion Detection Amin Dastanpour 1 and Raja Azlina Raja Mahmood 2, 1 Kerman Institute of Higher Education, Iran, 2 University Putra Malaysia, Malaysia |
A Systematic Review of Applications in Fraud Detection Hashim Jameel Shareef Jarrar, Middle East University, Jordan |
Trust Without Exposure: Verifiable Observability with Capability-Native Webassembly at the Edge Bala Subramanyan, Verifoxx, UK |
May 2025, Volume 17, Number 3
Detecting Malicious URLs: Trends, Challenges and the Role of Browser Extensions
Homam Eltaj and Maria Ajaj, Dar Al-Hekma University, Saudi Arabia |
Access Detection System on Web Cameras and Microphones
Homam El-Taj, Amena Khoja, Basmah Alsharif, Dana Alsulami and Jumaina Abdulmajed, Dar Al-Hekma University, Saudi Arabia |
Deep Learning Solutions for Source Code Vulnerability Detection
Nin Ho Le Viet, Long Phan, Hieu Ngo Van and Tin Trinh Quang, Duy Tan University, Vietnam |
Scalability Analysis of IoT-DAG Distributed Ledgers using Preferential Attachment Topology: A Simulation Approach
Peter Kimemiah Mwangi, Stephen T. Njenga and Gabriel Ndung’u Kamau, Murang’a University of Technology, Murang’a, Kenya |
Static Testing Tools Architecture in OpenMP for Exascale Systems
Samah Alajmani, Taif University, Saudi Arabia |
A Lightweight Network Intrusion Detection System for SMEs
Homam El-Ta, Mawadah Fahhad, Reeman Abumlha, Shadan Showman and Zaina Saab, Dar Al-Hekma University, Saudi Arabia |
March 2025, Volume 17, Number 2
Enhancing Malware Detection and Analysis using Deep Learning and Explainable AI (XAI)
Samah Alajmani 1, Ebtihal Aljuaid 1, Ben Soh 2 and Raneem Y. Alyami 1, 1 Taif University, Saudi Arabia 2 La Trobe University, Australia |
Delay Testing in Integrated Circuits: Methodologies for Path Delay Fault Detection and Hardware Security
Palanichamy Manikandan, Østfold University College, Norway |
Analysing the Impact of Password Length and Complexity on the Effectiveness of Brute Force Attacks
Lama A. AlMalki 1, Samah H. Alajmani 1, Ben Soh 2 and Raneem Y. Alyami 1, 1 Taif University, Saudi Arabia 2 La Trobe University, Australia |
January 2025, Volume 17, Number 1
A Trust-Based Multipath Congestion-Aware Routing Technique to Curb Wormhole Attacks for Mobile Nodes in WSNs
Fortine Mwihaki Mata, Geoffrey Muchiri Muketha and Gabriel Ndung’u Kamau, Murang’a University of Technology, Kenya |