


default search action
Security and Privacy, Volume 9
Volume 9, Number 1, 2026
- Mohamed Aly Bouke, Omar Imhemed Alramli, Azizol Abdullah, Nur Izura Udzir, Normalia Samian, Mohamed Othman, Zurina Mohd Hanapi:

Entropy Mixing Networks: Enhancing Pseudo-Random Number Generators With Lightweight Dynamic Entropy Injection. - Liyan Yi, Adebayo Omotosho, Hamed Balogun:

Phishing URL Detection and Interpretability With Machine Learning: A Cross-Dataset Approach. - Deepa Keshavamurthy, Manoj Kumar, George Tsaramirsis, Farhad Oroumchian:

An AI -Based Framework for Secure and Transparent Banking: Integrating Adversarial Robustness, Interpretability, and Organizational Modeling. - Li Zang, Jingye Qu:

Internet of Things Intelligent Information Security Protection System Based on OP - TEE and State Secrets Algorithm. - Yuping Zhang, Zhongcheng Qiu:

Research on Design of Incentive Mechanism for Cross-Border Payment Data Sharing Based on Differential Privacy. - Surbhi Sharma, Rudresh Dwivedi:

Hyperledger Fabric-Based Biometric Identity Management and Authentication: A Performance-Centric Approach to Block Size Optimization. - Sobhan Haghi, Ghanbar Azarnia:

Intrinsic Node Resistance and Its Application in Depreciatory Adversarial Attacks. - Jing Li:

Privacy Data Management of Sparse Projection WSN Considering Autonomous Classification and Node Correlation. - Ambairam Muthu Sivakrishna, R. Mohan, Sai Keerthana Anumandla:

An Adaptive Insider Threat Detection Framework Using Causal Analysis and Liquid Neural Networks. - Ludongdong Shan:

Chaotic Image Encryption Algorithm and Neural Network for Information Security Assurance of Media Distribution. - Issue Information.

- K. Ramya, S. Anbu Karuppusamy:

Threat-Aware Mutual Authentication in Web3: A Privacy-Preserving Framework With ZKP - DID and Real-Time GNN Integration. - Xin Chen:

Security Information Encryption Control Algorithm for IoT Identity Device Authentication. - Mohammad Zahid, Taran Singh Bharati:

Leveraging Machine Learning and Deep Learning in IoT Security: A Review. - Aishwarya Vardhan, Prashant Kumar, Lalit Kumar Awasthi:

An Efficient Intrusion Detection Model Employing Improved Boruta Search Optimization Approach for IoT Applications. - Navneet Kumar, Karan Singh, Jaime Lloret:

TRUST -Loc: A Unified Framework for Trust-Based Localization in IoT Under Sybil and Beacon Spoofing Attacks. - Alka Upadhyay, Sameena Naaz, Parul Agarwal, Vinay Thakur:

DNPFL : A Federated Deep Learning Framework for Enhanced Network Intrusion Detection With Privacy Preservation. - Saif E. Nouma, Attila A. Yavuz:

Lightweight and Resilient Signatures for Cloud-Assisted Embedded IoT Systems. - Md. Alamgir Hossain, Waqas Ishtiaq, Md. Samiul Islam:

A Comparative Analysis of Ensemble-Based Machine Learning Approaches With Explainable AI for Multi-Class Intrusion Detection in Drone Networks. - Sh M. Zeeshan Javed, M. Faisal Amjad, Sajjad Ahmed Ghauri, Shahzaib Tahir, Nauman Anwar Baig:

A Hybrid Transformer- CNN Framework for Semantic Behavioral Modeling in Office Malware Detection. - Ikram Ullah, Shahzaib Arif, Fazal Abbas, Umar Hayat:

Efficient and Secure Montgomery Curve Based Substitution Box Generator With Optimal Nonlinearity. - Wei Fan:

Research on Encrypted Traffic Behavior Recognition Method by Fusing Vision Transformer and Dynamic Graph Convolution. - Emmanuel Osei Owusu, Iddrisu Danlard, Gideon Opoku, Albert Dede, Griffith Selorm Klogo, Kwame Osei Boateng, Emmanuel Kofi Akowuah:

A Systematic Review of Machine Learning and Deep Learning Techniques for DDoS Attack Mitigation in IoT and Edge Computing Systems. - Filiz Mizrak, Turhan Karakaya:

Threat-Responsive Prioritization of Cybersecurity in Aviation: A Fuzzy Decision Framework Integrating AHP , CFA , and K-Means Clustering. - Haythem Hayouni, Farah Jbali:

Lightweight Neuromorphic-Temporal Graph Framework for Proactive Defense Against Evolving Cyber Attacks. - Muhammad Umair Safdar, Asif Ali:

Image Security Enhancement Using Non-Chain Ring Algebraic Structure. - Sunayana Das, Tushar Kanta Samal, Bhabendu Kumar Mohanta, N. Nasurudeen Ahamed:

Blockchain-Driven Solutions for Healthcare Insurance Fraud Detection and Prevention. - N. Thanu Priya, V. Sheeja Kumari:

A Quantum-Resilient and Adaptive Privacy Framework With Anonymization Techniques for Secure Data Mining Operations. - Renhuai Yang:

Research on Prediction Model of Expressway Traffic Abnormal Events Based on Nonlinear Internet of Things. - Xiaoyong Liu, Xi Yang, Pei Lu, Jinsheng Yi, Xi Lu, Zhuhui Tan:

6D Hyperchaos-Driven Dynamic S-Boxes and Cross-Channel Diffusion for Secure Image Encryption. - Minal Shukla, Divya Mobarsa, Amit Sata:

Comparative Evaluation of Various Blockchain Consensus Mechanisms for Industrial IoT Applications. - Amit Sagu, Nasib Singh Gill, Preeti Gulia, Piyush Kumar Shukla, Ayman Sabry, Mohamed M. Hassan:

Scalable and Interpretable Deep Learning-Based Intrusion Detection Framework for Secure Internet of Things Networks. - Ahmed M. Saad, Sarah M. Ayyad, Mahmoud M. Saafan:

A Novel Dual-Path Feature Engineering Framework for Scalable and Accurate Intrusion Detection. - Susmita Mondal, Kajal Dogra, Sumeet Gupta, Sachin Kumar Gupta:

A Blockchain-Based OBD Architecture for Secure Data Sharing in Smart Vehicle Ecosystems. - Syed Usman Shaukat, Saad Khan, Simon Parkinson:

Event Log Correlation for Multi-Step Attack Detection. - Ghufran Ullah, Siffat Ullah Khan, Ghulam Murtaza Khan:

Motivators and Success Factors Identification in Organizational Cybersecurity Capacity Building Assistance: A Multivocal Literature Review. - Chengming Li, Jinguo Li, Mengcheng Liu, Haoxin Wang:

Entropy-Driven Personalized Privacy and Dynamic Federated Learning in IoT Systems. - Yun Fu, Qiucheng Ban, Junfeng Qian, Xiang Lu:

A Privacy Protection Method for Power User Profiles That Integrates Improved Differential Privacy and Secret Sharing. - Chukwunonso Henry Nwokoye:

A Survey of SIR -Based Differential Epidemic Models for Control and Security Against Malware Propagation in Computer Networks. - Shyam Venkatraman, Karthik Cr, Afruza Begum:

Hyperparameter Tuning Strategies for Robust Machine Learning in Android Malware Detection. - Abhishek Kumar, P. Sudam Sekhar, Debnarayan Khatua, Dilip K. Prasad, Arif Ahmed Sekh:

Enhanced Image Steganography Using Secure Random Pixel Distribution. - Liye Chen, Wanyi Wang, Jie Huang, Jiaen Lu, Rui Guo:

AI -Enhanced Lightweight Key Agreement and Secure Access for Power Wireless Sensor Networks. - Weihao Xiao:

Design and Security Verification of Network Intrusion Detection System Based on Multi-Strategy Improved WOA. - Runzhong Yu, Wu Yang, Liyuan Zhang:

PCA - XGBoost Combined With K-Anonymity and Random Forest Privacy-Protecting Clustering Algorithm. - Ran Li:

Data Financial Loan Risk Analysis and Evaluation Based on Federated Learning. - Ashfaq Ahmad Najar, Owais Mujtaba Khanday, Vanlalruata Hnamte, Manohar Naik Sugali, M. Abdul Jawad, Nazia Farooq, Mohd Rafi Lone:

LIDS: A Novel Lightweight Intrusion Detection System for DDoS Attacks. - Sahar A. El-Rahman, Ala Saleh Alluhaidan:

Blockchain-Enabled Edge- IoT Framework for Securing Smart Healthcare Management System. - Bhanu Chander, Soumya Mohan:

Simplifying Secure Communications in WBANs : Advanced Lightweight Authentication Solutions.
Volume 9, Number 2, 2026
- Zaheen Fatima, Rashid Hussain, Azhar Dilshad, Asif Ali Laghari, Muhammad Shakir:

Framework for IoT Devices Anomaly Mitigation Strategy Using Machine Learning Technique. - Utsab Saha, Tanvir Muntakim Tonoy, Hafiz Imtiaz:

DP - CDA : An Algorithm for Enhanced Privacy Preservation in Dataset Synthesis Through Randomized Mixing. - Neha Koul, Neerendra Kumar, Ram Ji, Devanand Padha:

QFTN : A Quantum-Inspired Federated Trust Negotiation Framework for Secure Data Exchange in IoRT. - Paulo Roberto da Paz Ferraz Santos, André C. Drummond, João J. C. Gondim:

Producing Actionable Tactical Intelligence for Rule-Based Threat Hunting: Methodology and Data Model. - Dianlong Fang, Jie Wang, Wenjun Hu:

Environment-Adaptive Stealth Attack Framework for Natural Camouflage Adversarial Attacks in Remote-Sensing Image. - Austin Shouli, Ankur Barthwal, Molly Campbell, Ajay Kumar Shrestha:

Ethical AI for Young Digital Citizens: A Call to Action on Privacy Governance. - D. Dhinakaran, S. Gopalakrishnan, Edwin Raja S., J. Jeno Jasmine, M. Thiyagarajan, V. Logapriya:

A Hybrid Keyless Encryption Framework for Scalable and Privacy-Preserving IoMT Systems. - Chuang Wang, Lin Wang:

Computer Software Malicious Intrusion Detection Method Based on CN and Dynamic and Static Behavior Analysis. - Xue Duan:

Image Privacy Protection Model Based on Differential Privacy and Improved CIAGAN Algorithm. - Muhammad Usama, Muhammad Usman Hadi:

A Hybrid Encryption Framework for Secure and Real-Time Vehicular Communications. - Biswarup Yogi, Ajoy Kumar Khan:

TCASKD: A Lightweight Hybrid Cryptosystem Using Tent Map and Cellular Automata for Secure Shared-Key Derivation. - Lu Chen, Ting Zhang, Jie Zhang, De-gan Zhang, Ying-yuan Xiao:

A Secure Data Transmission Method for MEC Smart Devices Based on Oracles. - Xueqing Qin, Mengqian Jiao:

Blockchain Data Encryption Method Based on Residual Network and AES. - Geraldo Eufrazio Martins Júnior, Thales Guimaraes Marques, Wendley Souza da Silva, Joaquim Celestino Júnior:

Edge-Oriented DoS/DDoS Intrusion Detection and Supervision Platform. - Xianzhe Xu, Jinguo Li, Xinru Zheng, Delong Cui, Pengfei Li:

GCBA : Gradient Compensated Backdoor Attack Against Federated Learning. - Baisakhi Upadhyaya, Ram Chandra Barik, Amaresh Chandra Panda:

BACAS: A Blockchain-Assisted Certificateless Aggregate Signature Scheme for Industrial Wireless Sensor Networks. - Mohit Dey, Shachi Sharma:

Impact of Various Entropy Measures on Federated Hoeffding Tree-Based Learning for Intrusion Detection in IoT. - Lacchita Soni, Harish Chandra, Daya Sagar Gupta:

SmartAgri-IDQ: Quantum-Resistant Identity-Based Data Authentication Protocol for Smart Agriculture IoT. - Issue Information.

- Jie Yu, Jinguo Li, Yiling Yao:

Leakage Risk Quantification-Based Adaptive Defense Against Gradient Leakage Attacks in Federated Learning. - Amit Verma, Bhogeswar Borah:

Gray Code Driven Multi Least Significant Bit Substitution for Secure Data Hiding in 3D Mesh Objects. - Noman Ali, Yousaf Saeed, Muhammad Ibrahim, Muhammad Bilal, Muhammad Tahir, Muhammad Aslam, Edore Akpokodje, Syeda Fizzah Jilani, Meng Tang:

Real-Time Detection and Prevention of DoS Attack in Unmanned Marine Vehicles Using Machine Learning. - Li-ting Zhang, Hou-fu Zhang:

Lightweight AI Face-Swapping Detection Method Based on Multidimensional Feature Fusion. - Le Zhang, Hafizah Omar Zaki, Wei Ran:

Consumers' Privacy in Voice Assistant: A Systematic Literature Review and Research Agenda. - G. Kirubavathi Venkatesh, Jasin David Jaya Singh, S. Loganand, K. Jivesh, Ayman Altameem, Ateeq Ur Rehman, Seada Hussen, Ahmad Almogren:

Explainable Ensemble Learning for Robust Android Malware Detection. - Samuel Nartey Kofie, Ivy Min-zhang, Kai Chen, Wei Percy:

Improving Privacy and Utility in Aggregate Data: A Hybrid Approach. - Simant Kamal Dutta, Rajesh Singh, Anita Gehlot, Puneet Chandra Srivastava, Kiran Srivastava, Praveen Kumar Malik, Gunjan Gupta:

Intelligent IoT and AI -Based Framework for Remote Area Security: A Multi-Mote Approach With LoRa - GSM Integration.
Volume 9, Number 3, 2026
- Issue Information.

- Md. Asifur Rahman, Md. Mohsin Kabir, Md. Jakir Hossen, Mohammed Firoz Mridha:

WISE : A Weighted Hybrid Ensemble of CNN and Tree-Based Models for Robust IoT Intrusion Detection.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














