skip to main content
Volume 20242024Current Issue
Publisher:
  • John Wiley & Sons, Inc.
  • 605 Third Ave. New York, NY
  • United States
ISSN:1939-0114
EISSN:1939-0122
Reflects downloads up to 16 Oct 2024Bibliometrics
research-article
Exploring the Security Vulnerability in Frequency-Hiding Order-Preserving Encryption

Frequency-hiding order-preserving encryption (FH-OPE) has emerged as an important tool in data security, particularly in cloud computing, because of its unique ability to preserve the order of plaintexts in their corresponding ciphertexts and enable ...

review-article
An Extensive Classification of 5G Network Jamming Attacks

The paper introduces a pioneering taxonomy for 5G jamming attacks, meticulously crafted through diverse research methodologies, including literature review, case studies, incident database analysis, and network architecture assessment. This taxonomy is ...

research-article
A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features

With the advancement of image steganography, coverless image steganography has gained widespread attention due to its ability to hide information without modifying the carrier of images. However, existing coverless image steganography methods often ...

research-article
Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing

The growth of the Internet of Things (IoT) has recently impacted our daily lives in many ways. As a result, a massive volume of data are generated and need to be processed in a short period of time. Therefore, a combination of computing models such as ...

research-article
Feature-Weighted Naive Bayesian Classifier for Wireless Network Intrusion Detection

Objective. Wireless sensor networks, crucial for various applications, face growing security challenges due to the escalating complexity and diversity of attack behaviours. This paper presents an advanced intrusion detection algorithm, leveraging feature-...

research-article
Effective and Efficient Android Malware Detection and Category Classification Using the Enhanced KronoDroid Dataset

Android is the most widely used mobile operating system and responsible for handling a wide variety of data from simple messages to sensitive banking details. The explosive increase in malware targeting this platform has made it imperative to adopt ...

research-article
Securing the Transmission While Enhancing the Reliability of Communication Using Network Coding in Block-Wise Transfer of CoAP

The practical employment of network coding (NC) has shown major improvements when it comes to the transmission reliability of sender data and bandwidth utilization. Moreover, network coding has been employed recently to secure the transmission of data and ...

research-article
HMMED: A Multimodal Model with Separate Head and Payload Processing for Malicious Encrypted Traffic Detection

Malicious encrypted traffic detection is a critical component of network security management. Previous detection methods can be categorized into two classes as follows: one is to use the feature engineering method to construct traffic features for ...

research-article
Systematic Mapping Study of Blockchain Integrated Supply Chain Management

With globalization and emerging competition, there is an intense rise in using trending technologies. One of them is blockchain technology. It is incorporated in various fields, focusing on benefits such as decentralization, security, and transparency. ...

research-article
Using MSPG to Suppress Flooding in the Data-Link Layer for SDN

The media access control (MAC) address is the basis of frame forwarding in data-link layer. When MAC missing occurs in the software-defined network (SDN), the processing method is the same as that of Ethernet, which is also broadcast. The broadcast will ...

Comments