Current Issue
November 2024, Volume 16, Number 6
Deep Learning Approach for Detection of Phishing Attack to Strengthen Network Security Hadeer Alsubaie, Rahaf Althomali and Samah Alajmani, Taif University, Saudi Arabia |
Improving Intrusion Detection System using the Combination of Neural Network and Genetic Algorithm Amin Dastanpour1, Amirabbas Farizani1 and Raja Azlina Raja Mahmood2 1Kerman institute of higher education, Iran, 2University Putra Malaysia, Malaysia |
A Thorough Study of the Internet of Things: from Core Components to Security and Applications Jean Pierre Ntayagabiri1, Youssef Bentaleb2, Jeremie Ndikumagenge3 and Hind EL Makhtoum4 1, 3University of Burundi, Burundi, 2, 4Ibn Tofaïl University, Morocco |
Blockmedcare: Advancing Healthcare Through Blockchain Integration with AI and IOT Oliver Simonoski and Dijana Capeska Bogatinoska, University of Information Science and Technology, Macedonia |
Hybrid Deep Learning Approach for Enhanced Detection and Mitigation of DDOS Attack in SDN Networks Ahlam Alsufyani, Bashayer Alotaibi and Samah Alajmani, Taif University, Saudi Arabia |
Profitable uses of Artificial Intelligence and Machine Learning to Secure our Data Nikitha Merilena Jonnada, University of the Cumberlands, USA |
A Comprehensive Analysis of Network Scanning and Security Assessment Tool Archita1 and Ruchi Tuli2, 1Netaji Subhash University of Technology, India 2Jubail Industrial College, Kingdom of Saudi Arabia |
September 2024, Volume 16, Number 5
Comparative Analysis of Feature Selection Techniques for LSTM Based Network Intrusion Detection Models Shahir Kottilingal, Wakeb Data, KSA |
July 2024, Volume 16, Number 4
Enhanced Algorithm for Reduction of Blackhole’s Re-Judgment Delay for Realtime Traffic in Mobile Adhoc Network Sarah Florence Massae and Joseph Chrisant Pengo, National Institute of Transport, Tanzania |
Enhancing Digital Forensics Readiness in Big Data Wireless Medical Networks: A Secure Decentralised Framework Cephas Mpungu, Carlisle George and Glenford Mapp, Middlesex University, UK |
May 2024, Volume 16, Number 3
A Systematic Risk Assessment Approach for Securing the Smart Irrigation Systems Anees Ara, Maya Emar, Renad Mahmoud, Noaf Alarifi, Leen Alghamdi and Shoug Alotaibi, Prince Sultan University, Saudi Arabia |
The Mesa Security Model 2.0: A Dynamic Framework for Mitigating Stealth Data Exfiltration Sanjeev Pratap Singh and Naveed Afzal, USA |
Decentralized Energy Trading in Smart Grids: A Blockchain-Based Framework for Efficiency and Transparency Iliass Hammouti, Adnane Addaim and Zouhair Guennoun, Mohammed V University, Morocco |
Cyberguard: Fake Profile Detection using Machine Learning M.Vijaya Lakshmi, Aishwarya Rao, Kalyani Boddulah, Ojaswi Cheekati and Varsha Vadla, G. Narayanamma Institute of Technology and Science (For Women), India |
March 2024, Volume 16, Number 2
January 2024, Volume 16, Number 1
Traffic Light Control Systems: Requirements Engineering
Ahmad Audat, Marah Yahia, Said Ghoul and Maram Bani Younes, Philadelphia University, Jordan |
Optimizing Hyperparameters for Enhanced Email Classification and Forensic Analysis with Stacked Autoencoders
Merly Thomas1 and B. B. Meshram2, 1Fr. Conceicao Rodrigues College of Engineering, India, 2Veermata Jijabai Technological Institute Mumbai, India |