Compliance and feedback based model to measure cloud trustworthiness for hosting digital twins
August 19, 2024
Journal of Cloud Computing - Volume 13, Article Number: 132
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks
August 01, 2024
International Journal of Information Security - Volume 23, Issue 4, Pages 2531-2545
Verifiable Privacy-Preserving Image Retrieval in Multi-Owner Multi-User Settings
April 01, 2024
IEEE Transactions on Emerging Topics in Computational Intelligence - Volume 8, Issue 2
Secure semantic search using deep learning in a blockchain-assisted multi-user setting
January 30, 2024
Journal of Cloud Computing - Volume 13, Issue 1, Article Number: 29
Security Assessment and Evaluation of VPNs: A Comprehensive Survey
July 13, 2023
ACM Computing Surveys - Volume 55, Issue 13s
PCSS: Privacy Preserving Communication Scheme for SDN Enabled Smart Homes
September 15, 2022
IEEE Sensors - Volume 22, Issue 18, Pages 17677-17690
ENCVIDC: an innovative approach for encoded video content classification
June 21, 2022
Neural Computing and Applications - Pages 1-18
A deep learning assisted personalized deception system for countering web application attacks
June 01, 2022
Journal of Information Security and Applications - Volume 67, Article Number 103169
A framework to predict early news popularity using deep temporal propagation patterns
June 01, 2022
Expert Systems with Applications - Volume 195, Article Number 116496
Water Is a Viable Data Storage Medium: A Security and Privacy Viewpoint
March 05, 2022
Electronics - Volume 11(5), Article Number 818
Forensic analysis of image deletion applications
February 16, 2022
Multimedia Tools and Applications - Pages 1-28
An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling
February 01, 2022
Journal of Network and Computer Applications - Volume 198, Article Number 103270
Enriching Conventional Ensemble Learner with Deep Contextual Semantics to Detect Fake News in Urdu
January 01, 2022
ACM Transactions on Asian and Low-Resource Language Information Processing - Volume 21, Issue 1, Article Number 6, Pages 1-19
Applications of artificial intelligence in COVID-19 pandemic: A comprehensive review
December 15, 2021
Expert Systems with Applications - Volume 185, Article Number 115695
CACS: A Context-Aware and Anonymous Communication Framework for an Enterprise Network using SDN
December 02, 2021
IEEE Internet of Things Journal - Volume: 9, Issue: 14, Page(s): 11725 - 11736, 15 July 2022
Textual analysis of traitor-based dataset through semi supervised machine learning
December 01, 2021
Future Generation Computer Systems - Volume 125, Pages 652-660
A survey on Common Criteria (CC) evaluating schemes for security assessment of IT products
October 26, 2021
PeerJ Computer Science - Volume 7, Article Number e701
Hand-based Multibiometric Systems: State-of-the-Art and Future Challenges
October 07, 2021
PeerJ Computer Science - Volume 7, Article Number e707
Blockchain-Based Public Key Infrastructure: A Transparent Digital Certification Mechanism for Secure Communication
September 15, 2021
IEEE Network - Volume:35, Issue:5, Page:220-225
Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks
July 13, 2021
ACM Computing Surveys - Volume 54, Issue 6, Article Number 121
ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes
June 06, 2021
IEEE Internet of Things Journal - Volume 8, Issue 12, Pages 9622-9633
User-Oriented Virtual Mobile Network Resource Management for Vehicle Communications
June 01, 2021
IEEE Transactions on Intelligent Transportation Systems - Volume 22, Issue 6, Pages 3521-3532
An Edge Computing Node Deployment Method Based on Improved k-Means Clustering Algorithm for Smart Manufacturing
June 01, 2021
IEEE Systems Journal - Volume 15, Issue 2, Pages 2230-2240
Context-oriented trust computation model for industrial Internet of Things
June 01, 2021
Computers & Electrical Engineering - Volume 92, Article Number 107123
Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons
May 15, 2021
ACM Computing Surveys - Volume 54, Issue 3, Article Number 57
Mitigating service-oriented attacks using context-based trust for smart cities in IoT networks
May 01, 2021
Journal of Systems Architecture - Volume:115, Article Number: 102028
Robust, Secure, and Adaptive Trust-Oriented Service Selection in IoT-Based Smart Buildings
May 01, 2021
IEEE Internet of Things Journal - Volume 8, Issue 9, Pages 7497-7509
AdS : An Adaptive Spectrum Sensing Technique for Survivability under Jamming Attack in Cognitive Radio Networks
April 15, 2021
Computer Communications - Volume 172, Pages 25-34
Enterprise Integration Patterns in SDN: A Reliable, Fault-Tolerant Communication Framework
April 15, 2021
IEEE Internet of Things Journal - Volume 8, Issue 8, Pages 6359-6371
Cryptographic Framework for Role Control Remedy: A Secure Role Engineering mechanism for Single Authority Organizations
April 01, 2021
Future Generation Computer Systems - Volume 117, Pages 245-258
Guest Editorial Introduction to the Special Section on Cognitive Software Defined Networks and Applications
December 31, 2020
IEEE Transactions on Network Science and Engineering - Volume 7, Issue 4, Pages 2115 - 2116
Multi-task reading for intelligent legal services
December 01, 2020
Future Generation Computer Systems - Volume 113, Pages 218-227
IEEE Access Special Section: Security Analytics and Intelligence for Cyber Physical Systems
November 28, 2020
IEEE Access - Volume 8, Pages 208195-208198
An In-Depth Analysis of IoT Security Requirements, Challenges and their Countermeasures via Software Defined Security
October 01, 2020
IEEE Internet of Things Journal - Volume 7, Issue 10, Pages 10250-10276
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
August 11, 2020
IEEE Access - Volume 8, Pages 139903-139917
Analytical study of hardware-rooted security standards and their implementation techniques in mobile
July 01, 2020
Telecommunication Systems - Volume 74, Pages 379-403
Special issue: Cognitive Internet of Things assisted by cloud computing and big data
July 01, 2020
Future Generation Computer Systems - Volume 108, Pages 1214-1216
Efficient Attribute Based Encryption with Repeated Attributes Optimization
June 24, 2020
International Journal of Information Security - 1-14
Integrated Security, Safety, and Privacy Risk Assessment Framework for Medical Devices
June 01, 2020
IEEE Journal of Biomedical and Health Informatics - Volume: 24 , Issue: 6 , Pages 1752-1761
DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks
June 01, 2020
IEEE Systems Journal - Volume 14, Issue 2, Pages 1933 - 1944
Cognitive computing for intelligent application and service
May 01, 2020
Neural Computing & Applications - Volume 32, Pages 4315-4316
DST-HRS: A topic driven hybrid recommender system based on deep semantics
April 15, 2020
Computer Communications - Volume 156, Pages 183-191
Auto-MeDiSine: an auto-tunable medical decision support engine using an automated class outlier detection method and AutoMLP
April 01, 2020
Neural Computing and Applications - Volume:32, Issue:7, Page:2621-2633
SS7 Vulnerabilities - A Survey and Implementation of Machine Learning vs Rule Based Filtering for Detection of SS7 Network Attacks
April 01, 2020
IEEE Communications Surveys & Tutorials - Volume 22, Issue 2, Pages 1337-1371
Enriching Non-negative Matrix Factorization with Contextual Embeddings for Recommender Systems
March 07, 2020
Neurocomputing - Volume: 380, Pages: 246-258
On the efficiency of software implementations of lightweight block ciphers from the perspective of programming languages
March 01, 2020
Future Generation Computer Systems - Volume:104, Page:43-59
A name disambiguation module for intelligent robotic consultant in industrial internet of things
February 01, 2020
Mechanical Systems and Signal Processing - Volume 136, Article Number 106413
Approximate computing using frequency upscaling
November 21, 2019
IET Circuits Devices & Systems - Volume 13, Issue 7, Pages 1018-1026
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices − A Review
November 01, 2019
IEEE Communications Surveys and Tutorials - Volume 21, Issue 4, Pages 3723-3768
MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems
October 16, 2019
Journal of Medical Systems - Volume 43, Issue 11, Article Number 324
Flow Constraint Language for Coordination by Exogenous Connectors
October 04, 2019
IEEE Access - Volume 7, Pages 138341-138352
Delay Reduction Through Optimal Controller Placement to Boost Scalability in an SDDC
October 01, 2019
IEEE Systems Journal - -
Fog computing in internet of things: Practical applications and future directions
September 13, 2019
Peer-to-Peer Networking and Applications - Volume 12, pages 1236–1262
AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis
August 19, 2019
Mobile Networks and Applications - Pages 1-13
CATSWoTS: Context Aware Trustworthy Social Web of Things System
July 12, 2019
Sensors - Volume: 19, Issue: 14, Article Number: 3076,
Accelerated Dynamic MRI Using Kernel-Based Low Rank Constraint
July 05, 2019
Journal of Medical Systems - Volume 43, Pages 1-11
Trust models of internet of smart things: A survey, open issues, and future directions
July 01, 2019
Journal of Network and Computer Applications - Volume 137, Pages 93-111
Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations
June 05, 2019
IEEE Access - Volume 7,Pages 75629 - 75641
Smart e-commerce integration with recommender systems
June 01, 2019
Electronic Markets - Volume 29, Issue 2, Pages 219-220
Framework for Calculating Return on Security Investment (ROSI) for Security Oriented Organizations
June 01, 2019
Future Generation Computer Systems - Volume 95, Pages 754-763
iBike: Intelligent public bicycle services assisted by data analytics
June 01, 2019
Future Generation Computer Systems - Volume 95, Pages 187-197
Incast Mitigation in a Data Center Storage Cluster Through a Dynamic Fair-Share Buffer Policy
January 07, 2019
IEEE Access - Volume 7, Pages 10718-10733
Blockchain's adoption in IoT: The challenges, and a way forward
January 01, 2019
Journal of Network and Computer Applications - Volume 125, Pages 251-279
A Framework to Estimate the Nutritional Value of Food in Real Time Using Deep Learning Techniques
December 27, 2018
IEEE Access - Volume 7, Pages 2643-2652
CrossRec: Cross-Domain Recommendations Based on Social Big Data and Cognitive Computing
December 01, 2018
Mobile Networks and Applications - NULL
Detection of Denial of Service (DoS) Attack in Vehicular Ad hoc Networks: A Systematic Literature Review
November 22, 2018
Ad Hoc & Sensor Wireless Networks - Volume 42 Issue 1-2 Pages 35-61
Mobile Intelligence Assisted by Data Analytics and Cognitive Computing
November 08, 2018
Wireless Communications and Mobile Computing - NULL
A unified framework for automated inspection of handheld safety critical devices in production assemblies
November 01, 2018
Future Generation Computer Systems - NULL
AndroKit: A Toolkit for Forensics Analysis of Web Browsers on Android Platform
October 09, 2018
Future Generation Computer Systems - Volume 94, Pages 781-794
Edge Computing in IoT-Based Manufacturing
September 16, 2018
IEEE Communications Magazine - Volume 56, Issue 9, Pages 103-109
Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review
September 01, 2018
Multimedia Tools and Applications - Vol:77, Pages21947-21965
Information Diffusion Model Based on Social Big Data
August 01, 2018
Mobile Networks and Applications - NULL
Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art
July 02, 2018
Telematics and Informatics - Volume:35, Issue:4, Page:702-726
A Hybrid-Adaptive Neuro-Fuzzy Inference System for Multi-Objective Regression Test Suites Optimization
June 06, 2018
Neural Computing and Applications - Pages 1-15
Correlation power analysis of modes of encryption in AES and its countermeasures
June 01, 2018
Future Generation Computer Systems - NULL
Joint Geographic and Energy-aware Routing Protocol for Static and Mobile Wireless Sensor Networks
June 01, 2018
Ad Hoc & Sensor Wireless Networks - NULL
Defence Against PUE Attacks in Ad hoc Cognitive Radio Networks: A Mean Field Game Approach
May 29, 2018
Telecommunication Systems - Volume: 70 Issue: 1 Pages: 123-140 Published: JAN 2019
Antenna and Propagation Considerations for Amateur UAV Monitoring
May 18, 2018
IEEE Access - NULL
USB Storage Device Forensics for Windows 10
May 01, 2018
Journal of Forensic Sciences - Volume 63, Issue 3, Pages 657-983
Forensic Investigation to detect forgeries in ASF Files of Contemporary IP Cameras
April 26, 2018
The Journal of Supercomputing - Page 1–22
Electronic crime investigations in a virtualised environment: a forensic process and prototype for evidence collection and analysis
April 02, 2018
Australian Journal of Forensic Sciences - Volume 50, Issue 2, Pages 183-208
Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions
February 14, 2018
IEEE Access - Volume:6, Page:464-478
Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis
February 01, 2018
Journal of Network and Computer Applications - NULL
A complex event processing framework for an adaptive language learning system
January 10, 2018
Future Generation Computer Systems - NULL
Peer-to-Peer File Sharing Framework for Smartphones: Deployment and Evaluation on Android
November 01, 2017
Journal of Information Science and Engineering - Volume: 33, Issue: 6, Special Issue: SI, Pages:1417-1432
An Adaptive Rule-Based Approach to Resolving Real-Time VoIP Wholesale Billing Disputes
November 01, 2017
Journal of Information Science and Engineering - Volume 33, No. 6, Special Issue: SI, Pages 1433-1446
Algebraic Side Channel Attack on Trivium and Grain Ciphers
October 25, 2017
IEEE Access - Volume 5, Pages 23958-23968
A Manufacturing Big Data Solution for Active Preventive Maintenance
August 01, 2017
IEEE Transactions on Industrial Informatics - NULL
Security and privacy issues in cloud computing
June 01, 2017
Annals of Telecommunications - Volume: 72, Issue: 5-6, Pages: 233-235
Adaptive Interference Cancellation of ECG Signals
April 25, 2017
Sensors - NULL
A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks
March 01, 2017
Future Generation Computer Systems - NULL
Fuzziness based semi-supervised learning approach for intrusion detection system
February 01, 2017
Information Sciences - Volume 378, Pages 484-497
Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems
January 12, 2017
Neurocomputing - NULL
A Survey of Authentication Schemes in Telecare Medicine Information Systems
January 01, 2017
Journal of Medical Systems - Vol.41:14, Pages 1-26
A framework for cloud forensics evidence collection and analysis using security information and event management
November 10, 2016
Security and Communication Networks - NULL
Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms
October 13, 2016
Journal of Intelligent & Fuzzy Systems - NULL
Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems
October 01, 2016
Annals of Telecommunications - Volume 71, Issue 9-10, Pages 477-487
Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges
June 01, 2016
Journal of Medical Systems - Volume 40, Issue 6, Article Number 155
Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment
June 01, 2016
Journal of Medical Systems - -
Guest editorial: Secure cloud computing for mobile health services
April 02, 2016
Peer-to-Peer Networking and Applications - Volume 9, Pages 809-811
Identifying an OpenID anti-phishing scheme for cyberspace
April 01, 2016
Security and Communication Networks - NULL
Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges
March 31, 2016
IEEE Access - NULL
Distributed denial of service (DDoS) attack detection using data mining approach in cloud-assisted wireless body area networks
January 01, 2016
International Journal of Ad Hoc and Ubiquitous Computing - Volume 23, Issue 1-2, Pages 24-35, Special Issue SI
Anomaly Detection in Wireless Sensor Networks Using Immune-Based Bioinspired Mechanism
October 25, 2015
International Journal of Distributed Sensor Networks - Volume 11, Issue 10, Pages 1-17
EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network
January 01, 2015
Mobile Information Systems - NULL
A framework to address inconstant user requirements in cloud SLAs management
November 19, 2014
Cluster Computing-The Journal of Networks Software Tools and Applications - Volume 18, Issue 1, Pages 123-133
Load Balanced Routing for Lifetime Maximization in Mobile Wireless Sensor Networks
July 15, 2014
International Journal of Distributed Sensor Networks - Volume 2014, Article ID 979086, 12 pages
A Hybrid Security Mechanism for Intra-WBAN and Inter-WBAN Communications
August 21, 2013
International Journal of Distributed Sensor Networks - NULL
A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata
January 01, 2013
Journal of Network and Computer Applications - Volume 36, Issue 1, Pages 235-248
Addressing dynamic issues in information security management
March 22, 2011
Information Management & Computer Security - Volume 19, No. 1, Pages 5-24