As cyber threats evolve and grow progressively more sophisticated, cyber...
This paper extends and advances our recently introduced two-factor Honey...
While the benefits of 6G-enabled Internet of Things (IoT) are numerous,
...
Since 2016, NIST has been assessing lightweight encryption methods, and,...
Probabilistic Boolean Networks have been proposed for estimating the
beh...
Due to the high number of users on social media and the massive amounts ...
Although sufficient authentication mechanisms were enhanced by the use o...
The majority of systems rely on user authentication on passwords, but
pa...
Development and growth of Internet of Things (IoT) technology has
expone...
In Cyberspace nowadays, there is a burst of information that everyone ha...
How someone can get health insurance without sharing his health informat...
The NIS Directive introduces obligations for the security of the network...
In this paper, we are concerned with the problem of estimating the speed...
Bio-features are fast becoming a key tool to authenticate the IoT device...
As Critical National Infrastructures are becoming more vulnerable to cyb...
The United Nations conducts peace operations around the world, aiming
to...
Wireless communications are vulnerable against radio frequency (RF) jamm...
Vehicular Ad-Hoc Networks (VANETs) aim at enhancing road safety and prov...
This paper proposes a novel intrusion detection system (IDS) that combin...
This paper presents a comprehensive survey of the existing blockchain
pr...
Cyber peacekeeping is an emerging and multi-disciplinary field of resear...
This paper presents a comprehensive investigation of authentication sche...