Current Issue
September 2024, Volume 16, Number 5
Comparative Analysis of Feature Selection Techniques for LSTM Based Network Intrusion Detection Models Shahir Kottilingal, Wakeb Data, KSA |
July 2024, Volume 16, Number 4
Enhanced Algorithm for Reduction of Blackhole’s Re-Judgment Delay for Realtime Traffic in Mobile Adhoc Network Sarah Florence Massae and Joseph Chrisant Pengo, National Institute of Transport, Tanzania |
Enhancing Digital Forensics Readiness in Big Data Wireless Medical Networks: A Secure Decentralised Framework Cephas Mpungu, Carlisle George and Glenford Mapp, Middlesex University, UK |
May 2024, Volume 16, Number 3
A Systematic Risk Assessment Approach for Securing the Smart Irrigation Systems Anees Ara, Maya Emar, Renad Mahmoud, Noaf Alarifi, Leen Alghamdi and Shoug Alotaibi, Prince Sultan University, Saudi Arabia |
The Mesa Security Model 2.0: A Dynamic Framework for Mitigating Stealth Data Exfiltration Sanjeev Pratap Singh and Naveed Afzal, USA |
Decentralized Energy Trading in Smart Grids: A Blockchain-Based Framework for Efficiency and Transparency Iliass Hammouti, Adnane Addaim and Zouhair Guennoun, Mohammed V University, Morocco |
Cyberguard: Fake Profile Detection using Machine Learning M.Vijaya Lakshmi, Aishwarya Rao, Kalyani Boddulah, Ojaswi Cheekati and Varsha Vadla, G. Narayanamma Institute of Technology and Science (For Women), India |
March 2024, Volume 16, Number 2
January 2024, Volume 16, Number 1
Traffic Light Control Systems: Requirements Engineering
Ahmad Audat, Marah Yahia, Said Ghoul and Maram Bani Younes, Philadelphia University, Jordan |
Optimizing Hyperparameters for Enhanced Email Classification and Forensic Analysis with Stacked Autoencoders
Merly Thomas1 and B. B. Meshram2, 1Fr. Conceicao Rodrigues College of Engineering, India, 2Veermata Jijabai Technological Institute Mumbai, India |