Metaheuristic-Driven Feature Selection with SVM and KNN for Robust DDoS Attack Detection: A Comparative Study
By Rejwan Bin Sulaiman, Ansam Khraisat
Model-Based Systems Engineering Cybersecurity Risk Assessment for Industrial Control Systems Leveraging NIST Risk Management Framework Methodology
By Alexander Gampel , Timothy Eveleigh
A Novel Permissioned Blockchain Approach for Scalable and Privacy-Preserving IoT Authentication
By Santosh Reddy Addula, Aitizaz Ali
Insider Threats in Banking Sector: Detection, Prevention, and Mitigation
By Sopheaktra Huy, Sokroeurn Ang, Mony Ho, Vivekanandam Balasubramaniam
Designing a Robust Machine Learning-Based Framework for Secure Data Transmission in Internet of Things (IoT) Environments: A Multifaceted Approach to Security Challenges
By Omar Gheni Abdulateef, Atheer Joudah, Muna Ghazi Abdulsahib, Hussein Alrammahi
The Role of Simulating Digital Threats through Interactive Theater Performances
By Hayder Jaafar Aldaghlawy, Mahmood A. Al-Shareeda
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
By Siti Dhalila Mohd Satar, Masnida Hussin, Mohamad Afendee Mohamed , Nazirah Abd Hamid, Mohd Fadzil Abd Kadir, Roslinda Muda, Joshua Samual
Leveraging ACO, GA, and GWO for Enhancing Port Scan Attack Detection Using Machine Learning
By Mohammed AminAlmaiah, Rajan Kadel
A Comparative Analysis of Machine Learning Models on Detecting Malware in Android Devices
By Alagesh Leroy Chandran, Joshua Samual, Seyedmostafa Safavi, Aitizaz Ali
Comprehensive Study of SQL Injection Attacks Mitigation Methods and Future Directions
By Mohammed Al-olaqi, Ahmed Al-gailani, M M Hafizur Rahman