Current Issue
July 2022, Volume 14, Number 4
An Efficient Deep Learning Approach for Network Intrusion Detection System on Software Defined Network Mhmood Radhi Hadi and Adnan Saher Mohammed, Karabuk University, Turkey |
Reputation-Based Consensus for Blockchain Technology in Smart Grid Lanqin Sang, Henry Hexmoor, Southern Illinois University, USA |
Distributed Denial of Service Attack Detection and Prevention Model for IoT based Computing Environment using Ensemble Machine Learning Approach Nicholas Oluwole Ogini1, Wilfred Adigwe2 and Noah Oghenefego Ogwara3, 1Delta State University, Nigeria, 2Delta State University of Science and Technology, Nigeria, 3Auckland University of Technology, New Zealand |
May 2022, Volume 14, Number 3
An Evaluation of Security in Blockchain-based Sharing of Student Records in Higher Education Timothy Arndt1, Angela Guercio2 and Younghun Chae2, 1Cleveland State University, USA, 2Kent State University at Stark, USA |
Detecting Malware in Portable Executable Files using Machine Learning Approach Tuan Nguyen Kim1, Ha Nguyen Hoang2 and Nguyen Tran Truong Thien1, 1Duy Tan University, Vietnam, 2University of Sciences, Hue University, Vietnam |
Blockchain Security : Enhanced Control Evaluation Approach to Protect Organizations’ Accounting Information Angel R. Otero, Florida Institute of Technology, USA |
Cyber Security of Smart Watches : A Review of the Vulnerabilities with Recommendations Presented to Protect the Wearables Aaron James Webb, Macquarie University, Australia |
Context-Aware Security Mechanism for Mobile Cloud Computing Cláudio Aroucha and Higo Felipe Pires, Federal University of Maranhão, Brazil |
March 2022, Volume 14, Number 2
An Efficient Secure Cryptography Scheme for New ML-based RPL Routing Protocol in Mobile IoT Environment Kishore Golla and S. PallamSetty, Andhra University, India |
The Effectiveness of Applying Different Strategies on Recognition and Recall Textual Password Hassan Wasfi and Richard Stone, Iowa State University, USA |
Hybridized Model for Data Security Based on Security Hash Analysis (SHA 512) and Salting Techniques Felix Aranuwa1, Ford Olubodun2 and David Akinwumi1, 1Adekunle Ajasin University, Nigeria, 2Auchi Polytechnic, Nigeria |
January 2022, Volume 14, Number 1
A Robust Cybersecurity Topic Classification Tool Elijah Pelofske1, Lorie M. Liebrock1 and Vincent Urias2, 1New Mexico Institute of Mining and Technology, USA, 2Sandia National Laboratories, New Mexico, USA |
Enablers to Boost Blockchain Adoption in EU Artemis Voulkidis1, Theodore Zahariadis1, 2, Andreas Papadakis3 and Charalambos Ipektsidis4, 1Synelixis SA, Greece, 2National and Kapodistrian University of Athens, Greece, 3School of Pedagogical and Technological Education (ASPETE), Greece, 4Intrasoft International SA, Luxembourg |
Offline Signature Recognition via Convolutional Neural Network and Multiple Classifiers Fadi Mohammad Alsuhimat and Fatma Susilawati Mohamad, Universiti Sultan Zainal Abidin, Malaysia |
A Secure DNA Cryptosystem based on Steganography and Indexing Cipher Tamer Barakat1, Nahed Mahmoud1, Ihab. A. Ali2 and Mohamed Hamdi1, 1Fayoum University, Egypt, 2Helwan University, Egypt |