Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls
August 30, 2024
IET Information Security - Volume 2024, Article ID 6565102, 19 pages
Compliance and feedback based model to measure cloud trustworthiness for hosting digital twins
August 19, 2024
Journal of Cloud Computing - Volume 13, Article Number: 132
Security Assessment and Evaluation of VPNs: A Comprehensive Survey
July 13, 2023
ACM Computing Surveys - Volume 55, Issue 13s
Circumventing Google Play vetting policies: a stealthy cyberattack that uses incremental updates to breach privacy
January 28, 2023
Journal of Ambient Intelligence and Humanized Computing - Pages 1-10
PCSS: Privacy Preserving Communication Scheme for SDN Enabled Smart Homes
September 15, 2022
IEEE Sensors - Volume 22, Issue 18, Pages 17677-17690
HLSBD2: a quantum secure hybrid level source based data deduplication for the cloud
May 17, 2022
Journal of Ambient Intelligence and Humanized Computing - Pages 1-14
CACS: A Context-Aware and Anonymous Communication Framework for an Enterprise Network using SDN
December 02, 2021
IEEE Internet of Things Journal - Volume: 9, Issue: 14, Page(s): 11725 - 11736, 15 July 2022
Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons
May 15, 2021
ACM Computing Surveys - Volume 54, Issue 3, Article Number 57
AdS : An Adaptive Spectrum Sensing Technique for Survivability under Jamming Attack in Cognitive Radio Networks
April 15, 2021
Computer Communications - Volume 172, Pages 25-34
Evaluating the Harmonized Digital Forensic Investigation Process based on Call Detail Records
June 01, 2020
IEEEP New Horizons - Volume No.102, Issue 1, Pages 35-40
Auto-MeDiSine: an auto-tunable medical decision support engine using an automated class outlier detection method and AutoMLP
April 01, 2020
Neural Computing and Applications - Volume:32, Issue:7, Page:2621-2633
On the efficiency of software implementations of lightweight block ciphers from the perspective of programming languages
March 01, 2020
Future Generation Computer Systems - Volume:104, Page:43-59
Smarter World, Bigger Threats: Understanding the Internet of Things
January 28, 2020
Smarter World, Bigger Threats: Understanding the Internet of Things - Pages 1-146, Publisher: Abbott Press
Fog computing in internet of things: Practical applications and future directions
September 13, 2019
Peer-to-Peer Networking and Applications - Volume 12, pages 1236–1262
AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis
August 19, 2019
Mobile Networks and Applications - Pages 1-13
Accelerated Dynamic MRI Using Kernel-Based Low Rank Constraint
July 05, 2019
Journal of Medical Systems - Volume 43, Pages 1-11
Framework for Calculating Return on Security Investment (ROSI) for Security Oriented Organizations
June 01, 2019
Future Generation Computer Systems - Volume 95, Pages 754-763
Forensic Analysis of Tor Browser: A Case Study for Privacy and Anonymity on the Web
May 01, 2019
Forensic Science International - Volume 299, Pages 59-73
Auto-MeDiSine: An Auto-Tunable Medical Decision Support Engine using an automated Class Outlier Detection method and AutoMLP
April 08, 2019
Neural Computing and Applications - Pages 1–13
A Framework to Estimate the Nutritional Value of Food in Real Time Using Deep Learning Techniques
December 27, 2018
IEEE Access - Volume 7, Pages 2643-2652
AndroKit: A Toolkit for Forensics Analysis of Web Browsers on Android Platform
October 09, 2018
Future Generation Computer Systems - Volume 94, Pages 781-794
Exploring Nested Ensemble Learners using Over-production and Choose Approach for Churn Prediction in Telecom Industry
August 18, 2018
Neural Computing and Applications - Neural Computing and Applications
An Evolutionary Routing Game for Energy Balance in Wireless Sensor Networks
June 19, 2018
Computer Networks - Volume: 138, Pages: 31-43
Defence Against PUE Attacks in Ad hoc Cognitive Radio Networks: A Mean Field Game Approach
May 29, 2018
Telecommunication Systems - Volume: 70 Issue: 1 Pages: 123-140 Published: JAN 2019
Gateway independent user-side wi-fi Evil Twin Attack detection using virtual wireless clients
May 01, 2018
Computers and Security - Volume 74, Pages 41-54
Forensic Investigation to detect forgeries in ASF Files of Contemporary IP Cameras
April 26, 2018
The Journal of Supercomputing - Page 1–22
Algebraic Side Channel Attack on Trivium and Grain Ciphers
October 25, 2017
IEEE Access - Volume 5, Pages 23958-23968
Evolutionary Non-Cooperative Spectrum Sharing Game: Long Term Coexistence for Collocated Cognitive Radio Networks
October 01, 2016
Wireless Communications and Mobile Computing - Volume 16, Issue 15, Pages 2166-2178
High Capacity Multi-Layer Framework for Highly Robust Textual Steganography
September 01, 2016
SCIENCE INTERNATIONAL - SCIENCE INTERNATIONAL Volume 28(5) Pages 4451-4457, 2016
Coexistence in heterogeneous spectrum through distributed correlated equilibrium in cognitive radio networks
April 07, 2016
Computer Networks - Volume 98, Pages 109-122
Towards trustworthy collaboration in spectrum sensing for ad hoc cognitive radio networks
April 01, 2016
Wireless Networks - WIRELESS NETWORKS Volume: 22 Issue: 3 Pages: 781-797, April 2016