Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 2405323 results
Sort by: relevance publication year

Evaluation on Embedded Computer Information Network System Security Architecture

JOURNAL ARTICLE published 2026 in International Journal of Computational Systems Engineering

Authors: Jing Liang N.A.

An approach for assessing the functional vulnerabilities criticality of CPS components

JOURNAL ARTICLE published December 2025 in Cyber Security and Applications

Authors: Rasim Alguliyev | Ramiz Aliguliyev | Lyudmila Sukhostat

Securing IoT devices with fast and energy efficient implementation of PRIDE and PRESENT ciphers

JOURNAL ARTICLE published December 2025 in Cyber Security and Applications

Authors: Vijay Dahiphale | Hrishikesh Raut | Gaurav Bansod | Devendra Dahiphale

Authentication, access control and scalability models in Internet of Things Security–A review

JOURNAL ARTICLE published December 2025 in Cyber Security and Applications

Authors: M Kokila | Srinivasa Reddy K

Advancing antibiotic detection and degradation: recent innovations in graphitic carbon nitride (g-C3N4) applications

JOURNAL ARTICLE published April 2025 in Journal of Environmental Sciences

Research funded by Harbin University of Commerce (LH2022B011,YSL 037) | National Natural Science Foundation of China (42207266,32271609)

Authors: Rui Liu | Chaojun Zhang | Rijia Liu | Yuan Sun | Binqiao Ren | Yuhang Tong | Yu Tao

Android Malware Analysis using Multiple Machine Learning Algorithms

JOURNAL ARTICLE published 2025 in International Journal of Electronic Security and Digital Forensics

Authors: SHREYASH MEHROTRA | ARHIT BOSE TAGORE | Madhusudan Anand | Rahul Sahani | Ruksana Tabassum | S.P. Raja

Network Security Attack Classification: Leveraging Machine Learning Methods for Enhanced Detection and Defense.

JOURNAL ARTICLE published 2025 in International Journal of Electronic Security and Digital Forensics

Authors: Abdul Ahad Abro | Raja Sohail Ahmed Larik | Shafique Ahmed Awan | Ali Orangzeb Panhwar | Irfan Ali Kandhro

Exploring Advanced Steganography Techniques for Secure Digital Image Communication: A Comparative Analysis and Performance Evaluation

JOURNAL ARTICLE published 2025 in International Journal of Electronic Security and Digital Forensics

Authors: Akshat Verma | Adwaita Raj Modak | Johann Pinto | Nachiket Gupte | Rohit Deval | Anirudh Sharma | S.P. Raja

ANALYSIS OF CYBER DELINQUENCY AMONG ‘GENERATION Z’ IN INDIA

JOURNAL ARTICLE published 2025 in International Journal of Electronic Security and Digital Forensics

Authors: Sulakshana B. Mane | Jayant Brahmane | Anjali Kulkarni | Om Astankar Astankar | Kiran Shrimant Kakade | Poonam Nathani

A proposed framework for the detection of cyber threats using open-source intelligence tools in real-time

JOURNAL ARTICLE published 2025 in International Journal of Electronic Security and Digital Forensics

Authors: Chandresh Parekha | Ravi Sheth

Forensic Investigation and Analysis of Malware in Windows OS

JOURNAL ARTICLE published 2025 in International Journal of Electronic Security and Digital Forensics

Authors: Felix O. Etyang | Kapil Shukla | Krishna Modi | Frank Fiadufe

IoT security using deep learning algorithm: intrusion detection model using LSTM

JOURNAL ARTICLE published 2025 in International Journal of Electronic Security and Digital Forensics

Authors: J. Caroline Misbha | R. Shobana | Abitha V. K. Lija | S. Chandrakala

Feature-driven Anomalous Behaviour Detection and Incident Classification Model for ICS in Water Treatment Plants

JOURNAL ARTICLE published 2025 in International Journal of Electronic Security and Digital Forensics

Authors: Usman Butt | Samiya Khan | Vladlena Benson | Tanaka Laura Makonese | Haider Al Khateeb | Gabriela Ahmadi Assalemi

VLMDALP: Design of an efficient VARMA LSTM based Model for identification of DDoS attacks using Application-Level Packet analysis

JOURNAL ARTICLE published 2025 in International Journal of Electronic Security and Digital Forensics

Authors: Sangita Chaudhari | Meghana Solanki

Research on the Importance of Database System Security Performance Testing Technology to Computer Software Development

JOURNAL ARTICLE published 2025 in International Journal of Computational Systems Engineering

Authors: Shaohang Yi | Xiaolin Jiang | Huaqi Lu | Qiu Junlin | Li Gao

Survey on Sport Video Analysis and Event Detection

JOURNAL ARTICLE published 2025 in International Journal of Autonomous and Adaptive Communications Systems

Authors: Suhas Patel | Dipesh Kamdar

Advanced forensic analysis of Tails Operating Systems and its implication to cybercrime in Deep and Dark web

JOURNAL ARTICLE published 2025 in International Journal of Electronic Security and Digital Forensics

Authors: Animesh Kumar | Amir Shaker Mahmoud | Ngaira Mandela | Nilay Mistry

Security Vulnerability Analysis and Formal Verification of Smart Contracts: A Review

JOURNAL ARTICLE published 2025 in International Journal of Autonomous and Adaptive Communications Systems

Authors: Rajesh Bhaitia | Monika Bishnoi

Implementation of a novel technique for ordering of features algorithm in Detection of Ransomware Attack

JOURNAL ARTICLE published 2025 in International Journal of Electronic Security and Digital Forensics

Authors: Balaji M. Patil | Laxmi Bhagwat

Recursive Quantitative Analysis Modeling of Computer Art Design Interaction

JOURNAL ARTICLE published 2025 in International Journal of Computational Systems Engineering

Authors: Duan Song N.A.