zk-DASTARK: A quantum-resistant, data authentication and zero-knowledge proof scheme for protecting data feed to smart contracts
April 01, 2025
Computers & Electrical Engineering - Volume 123, Part B, Article Number 110089
Intelligent parameter-based in-network IDS for IoT using UNSW-NB15 and BoT-IoT datasets
January 01, 2025
Journal of the Franklin Institute - Volume 362, Issue 1, Article Number 107440
Performance-Oriented and Sustainability-Oriented Design of an Effective Android Malware Detector
October 24, 2024
IEEE Access - Volume: 12, Page(s):159036-159055
Generisch-Net: A Generic Deep Model for Analyzing Human Motion with Wearable Sensors in the Internet of Health Things
September 24, 2024
MDPI Sensors - Volume 24(19), Article Number 6167
Forensic analysis of web browsers lifecycle: A case study
September 01, 2024
Journal of Information Security and Applications - Volume 85 , Article Number 103839
Unveiling Fall Origins: Leveraging Wearable Sensors to Detect Pre-Impact Fall Causes
August 01, 2024
IEEE Sensors Journal - Volume: 24, Issue: 15, Pages:24086-24095
Smart-Wearable Sensors and CNN-BiGRU Model: A Powerful Combination for Human Activity Recognition
December 07, 2023
IEEE Sensors Journal - Volume: 24, Issue: 2, 15 January 2024
Hiding EPR and watermark in medical images using repeated pixel differencing
October 16, 2023
Multimedia Tools and Applications - Pages 1-29
Machines Perceive Emotions: Identifying Affective States from Human Gait Using On-Body Smart Devices
April 09, 2023
Applied Sciences - Volume 13, Issue 8, 4828
A portable hardware security module and cryptographic key generator
November 01, 2022
Journal of Information Security and Applications - Volume 70, Article Number 103332
Permissions-Based Detection of Android Malware Using Machine Learning
April 02, 2022
Symmetry - Volume 14(4), Article Number 718
A Forensic Analysis of Video Streaming Activities on Android Applications
March 31, 2022
Mobile and Forensics - Volume 4, No.1, Pages 44-52
Forensic Analysis of Tor Browser on Windows 10 and Android 10 Operating Systems
October 22, 2021
IEEE Access - Volume 9, Pages 141273-141294
Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App
August 24, 2021
Applied Sciences - Volume 11, Issue 17, Article Number 7789
PUF-Based Key Generation Scheme for Secure Group Communication Using MEMS
July 15, 2021
Electronics - Volume 10(14), Article Number 1691
Enhanced adaptive data hiding method using LSB and pixel value differencing
March 06, 2021
Multimedia Tools and Applications - Pages 1-21
GAFOR: Genetic Algorithm Based Fuzzy Optimized Re-Clustering in Wireless Sensor Networks
December 28, 2020
Mathematics - Volume 9(1), Article Number 43
Real-Time Automated Contour Based Motion Tracking Using a Single-Camera for Upper Limb Angular Motion Measurement
January 31, 2020
Malaysian Journal of Computer Science - Volume 33(1), Pages 52-77
What Lies Beneath One’s Feet? Terrain Classification Using Inertial Data of Human Walk
July 31, 2019
Applied Sciences - Vol. 9 Issue 15, p3099-3099
High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution
November 09, 2018
Applied Sciences - NULL
Image Steganography in Spatial Domain: A Survey
July 01, 2018
Signal Processing: Image Communication - Volume 65, Pages 46-66
Recursive Information Hiding Scheme Through LSB, PVD Shift, and MPE
January 01, 2018
IETE Technical Review - Volume 35, Issue 1, Pages: 53-63
A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement
February 01, 2017
Signal Processing: Image Communication - Volume: 50 Pages: 44-57
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images
June 01, 2016
Symmetry - Volume 8, Issue 6, Article number 41
Evaluating Performance of Intrusion Detection System using Support Vector Machines: Review
September 01, 2015
International Journal of Security and its Applications - Volume 9, Issue 9, Pages 225-234
Crime Mining: A Comprehensive Survey
January 01, 2015
International Journal of u- and e- Service, Science and Technology - Volume 8, No.2, Pages 357-364
Challenges and Issues in DATA Stream: A Review
January 01, 2015
International Journal of Hybrid Information Technology - Volume 8, No.3, Pages 155-164
Application of Data Mining Using Artificial Neural Network: Survey
January 01, 2015
International Journal of Database Theory and Application - Volume 8, No.1, Pages 245-270
Secure Password Transmission for Web Applications over Internet using Cryptography and Image Steganography
January 01, 2015
International Journal of Security and Its Applications - Volume 9, No.2, Pages 179-188
Characterizing Strengths of Snort-based IDPS
April 02, 2014
Research Journal of Recent Sciences - Volume 3(4), Pages 88-94
Information Hiding Using Edge Boundaries of Objects
July 16, 2011
International Journal of Security and Its Applications - Volume 5, No. 3, Pages 1-10