Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- review-articleJanuary 2025
Security risks and countermeasures of adversarial attacks on AI-driven applications in 6G networks: A survey
Journal of Network and Computer Applications (JNCA), Volume 232, Issue Chttps://doi.org/10.1016/j.jnca.2024.104031AbstractThe advent of sixth-generation (6G) networks is expected to start a new era in mobile networks, characterized by unprecedented high demands on dense connectivity, ultra-reliability, low latency, and high throughput. Artificial intelligence (AI) ...
Highlights- Security risks and countermeasures of adversarial attacks in essential 6G functions such as radio resource allocation and mobility management
- Security threats of AI-related core functionalities in open radio access networks (O-RAN)
- research-articleJanuary 2025
Reducing cold start delay in serverless computing using lightweight virtual machines
Journal of Network and Computer Applications (JNCA), Volume 232, Issue Chttps://doi.org/10.1016/j.jnca.2024.104030AbstractIn recent years, serverless computing has gained considerable attention in academic, professional, and business circles. Unique features such as code development flexibility and the cost-efficient pay-as-you-go pricing model have led to ...
- research-articleJanuary 2025
Exclusively in-store: Acoustic location authentication for stationary business devices
Journal of Network and Computer Applications (JNCA), Volume 232, Issue Chttps://doi.org/10.1016/j.jnca.2024.104028AbstractOver the past decade, the adoption of Internet of Things (IoT) devices has greatly revolutionized the retail and commerce industries. However, these devices are vulnerable to attacks, such as theft, which raises significant security and privacy ...
- research-articleJanuary 2025
An AKA protocol for 5G-assisted D2D communication in Out-of-Coverage scenario
Journal of Network and Computer Applications (JNCA), Volume 232, Issue Chttps://doi.org/10.1016/j.jnca.2024.104025Abstract5G-assisted Device to Device (D2D) communication can be broadly categorized into three use case scenarios: In Coverage, Relay Coverage, and Out-of Coverage. The main challenge lies in ensuring secure communication in Out-of Coverage scenarios, as ...
- research-articleJanuary 2025
SSBM: A spatially separated boxes-based multi-tab website fingerprinting model
Journal of Network and Computer Applications (JNCA), Volume 232, Issue Chttps://doi.org/10.1016/j.jnca.2024.104023AbstractIn recent years, the website fingerprinting (WF) attack against the Tor anonymity system has become a hot research issue. The state-of-the-art WF studies have shown that the detection accuracy of websites is up to more than 95%. However, they are ...
-
- research-articleJanuary 2025
PHIGrader: Evaluating the effectiveness of Manifest file components in Android malware detection using Multi Criteria Decision Making techniques
Journal of Network and Computer Applications (JNCA), Volume 232, Issue Chttps://doi.org/10.1016/j.jnca.2024.104021AbstractThe popularity of the Android operating system has itself become a reason for privacy concerns. To deal with such malware threats, researchers have proposed various detection approaches using static and dynamic features. Static analysis ...
Highlights- Evaluates the efficiency of the manifest file components to detect Android malware.
- Describes the concept of the frequency-based MCDM techniques to rank the features.
- Proposes a novel detection algorithm with ranked features and ...
- review-articleJanuary 2025
A survey on fuzz testing technologies for industrial control protocols
Journal of Network and Computer Applications (JNCA), Volume 232, Issue Chttps://doi.org/10.1016/j.jnca.2024.104020AbstractThe development of the industrial Internet of Things enables industrial control systems to become inter-networked and inter-connected, making them intelligent with high productivity. However, these systems are exposed to external environments and ...
- review-articleJanuary 2025
A survey on Ethereum pseudonymity: Techniques, challenges, and future directions
Journal of Network and Computer Applications (JNCA), Volume 232, Issue Chttps://doi.org/10.1016/j.jnca.2024.104019AbstractBlockchain technology has emerged as a transformative force in various sectors, including finance, healthcare, supply chains, and intellectual property management. Beyond Bitcoin’s role as a decentralized payment system, Ethereum represents a ...
Highlights- This survey provides a systematic analysis of privacy preservation techniques in conjunction with the state-of-the-art Deanonymization methods in Blockchain and Ethereum ecosystems.
- The paper suggests potential techniques for the ...
- research-articleJanuary 2025
Clone node detection in static wireless sensor networks: A hybrid approach
Journal of Network and Computer Applications (JNCA), Volume 232, Issue Chttps://doi.org/10.1016/j.jnca.2024.104018AbstractWireless Sensor Networks (WSNs) security is a serious concern due to the lack of hardware protection on sensor nodes. One common attack on WSNs is the cloning attack, where an adversary captures legitimate nodes, creates multiple replicas, and ...
Highlights- The article discusses the significant security concerns in Wireless Sensor Networks (WSNs) focusing on clone attacks.
- The article highlights the drawbacks of current witness node-based approaches for clone detection, diminishing their ...
- research-articleJanuary 2025
Credit risk prediction for small and micro enterprises based on federated transfer learning frozen network parameters
Journal of Network and Computer Applications (JNCA), Volume 232, Issue Chttps://doi.org/10.1016/j.jnca.2024.104009AbstractTo accelerate the convergence speed and improve the accuracy of the federated shared model, this paper proposes a Federated Transfer Learning method based on frozen network parameters. The article sets up frozen two, three, and four layers ...
- research-articleJanuary 2025
An efficient certificateless blockchain-enabled authentication scheme to secure producer mobility in named data networks
Journal of Network and Computer Applications (JNCA), Volume 232, Issue Chttps://doi.org/10.1016/j.jnca.2024.104007AbstractNamed Data Networking (NDN) aims to establish an efficient content delivery architecture. In NDN, secure and effective identity authentication schemes ensure secure communication between producers and routers. Currently, there is no feasible ...
- review-articleJanuary 2025
Evolving techniques in cyber threat hunting: A systematic review
- Arash Mahboubi,
- Khanh Luong,
- Hamed Aboutorab,
- Hang Thanh Bui,
- Geoff Jarrad,
- Mohammed Bahutair,
- Seyit Camtepe,
- Ganna Pogrebna,
- Ejaz Ahmed,
- Bazara Barry,
- Hannah Gately
Journal of Network and Computer Applications (JNCA), Volume 232, Issue Chttps://doi.org/10.1016/j.jnca.2024.104004AbstractIn the rapidly changing cybersecurity landscape, threat hunting has become a critical proactive defense against sophisticated cyber threats. While traditional security measures are essential, their reactive nature often falls short in countering ...
Graphical abstractDisplay Omitted
- research-articleNovember 2024
CESA: Communication efficient secure aggregation scheme via sparse graph in federated learning
Journal of Network and Computer Applications (JNCA), Volume 231, Issue Chttps://doi.org/10.1016/j.jnca.2024.103997AbstractAs a distributed learning paradigm, federated learning can be effectively applied to the decentralized system since it can resolve the “data island” problem. However, it is also vulnerable to serious privacy breaches. Although existing secure ...
- research-articleNovember 2024
Privacy-preserving federated learning for proactive maintenance of IoT-empowered multi-location smart city facilities
Journal of Network and Computer Applications (JNCA), Volume 231, Issue Chttps://doi.org/10.1016/j.jnca.2024.103996AbstractThe widespread adoption of the Internet of Things (IoT) and deep learning (DL) have facilitated a social paradigm shift towards smart cities, accelerating the rapid construction of smart facilities. However, newly constructed facilities often ...
Highlights- Proactive maintenance of smart facilities can be achieved with federated learning
- Privacy of FL model parameters can be preserved with fully homomorphic encryption
- Our proposed method FedSTMA outperforms other existing cutting-edge ...
- review-articleNovember 2024
Privacy preservation in Artificial Intelligence and Extended Reality (AI-XR) metaverses: A survey
Journal of Network and Computer Applications (JNCA), Volume 231, Issue Chttps://doi.org/10.1016/j.jnca.2024.103989AbstractThe metaverse is a nascent concept that envisions a virtual universe, a collaborative space where individuals can interact, create, and participate in a wide range of activities. Privacy in the metaverse is a critical concern as the concept ...
- research-articleNovember 2024
CRSFL: Cluster-based Resource-aware Split Federated Learning for Continuous Authentication
- Mohamad Wazzeh,
- Mohamad Arafeh,
- Hani Sami,
- Hakima Ould-Slimane,
- Chamseddine Talhi,
- Azzam Mourad,
- Hadi Otrok
Journal of Network and Computer Applications (JNCA), Volume 231, Issue Chttps://doi.org/10.1016/j.jnca.2024.103987AbstractIn the ever-changing world of technology, continuous authentication and comprehensive access management are essential during user interactions with a device. Split Learning (SL) and Federated Learning (FL) have recently emerged as promising ...
Highlights- Continuous authentication on user IoT devices.
- Cluster-Based Resource-aware Split Federated Learning.
- Privacy-preserving decentralized learning for authentication.
- Genetic algorithm resource-aware client selection.
- Machine ...
- research-articleNovember 2024
An efficient exact method with polynomial time-complexity to achieve k-strong barrier coverage in heterogeneous wireless multimedia sensor networks
Journal of Network and Computer Applications (JNCA), Volume 231, Issue Chttps://doi.org/10.1016/j.jnca.2024.103985AbstractBarrier coverage in Wireless Sensor Networks (WSNs) plays a pivotal role in surveillance and security applications. It serves as a fundamental mechanism for identifying and detecting potential intruders who endeavor to infiltrate a sensor ...
Highlights- Formulate the k-strong barrier problem in heterogeneous wireless sensor networks.
- Propose an exact algorithm, named ExA-KSB, to solve the MMS-KSB problem.
- Prove that ExA-KSB achieves an exact solution within polynomial time ...
- research-articleNovember 2024
DFier: A directed vulnerability verifier for Ethereum smart contracts
Journal of Network and Computer Applications (JNCA), Volume 231, Issue Chttps://doi.org/10.1016/j.jnca.2024.103984AbstractSmart contracts are self-executing digital agreements that automatically enforce the terms between parties, playing a crucial role in blockchain systems. However, due to the potential losses of digital assets caused by vulnerabilities, the ...
- research-articleNovember 2024
Anomalous state detection in radio access networks: A proof-of-concept
Journal of Network and Computer Applications (JNCA), Volume 231, Issue Chttps://doi.org/10.1016/j.jnca.2024.103979AbstractModern radio access networks (RANs) are both highly complex and potentially vulnerable to unauthorized security setting changes. A RAN is studied in a proof-of-concept experiment to demonstrate that an unauthorized network state is detectable at ...
- research-articleNovember 2024
A low-storage synchronization framework for blockchain systems
Journal of Network and Computer Applications (JNCA), Volume 231, Issue Chttps://doi.org/10.1016/j.jnca.2024.103977AbstractThe advent of blockchain technology has brought major changes to traditional centralized storage. Therefore, various fields have begun to study the application and development of blockchain. However, blockchain technology has a serious ...