A
-
Access Policy Update
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]
-
Adaptive Timeout
Slowloris Attack Detection Using Adaptive Timeout-Based Approach [Volume 16, Issue 1, 2024, Pages 79-92]
-
Anonymous Attribute-Based Encryption
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]
B
-
Blind Access Policy
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]
-
Blockchain
Safety Guards for Ethereum Smart Contracts [Volume 16, Issue 1, 2024, Pages 37-53]
D
-
Data mining
Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner [Volume 16, Issue 1, 2024, Pages 55-77]
-
DDoS Attack
Slowloris Attack Detection Using Adaptive Timeout-Based Approach [Volume 16, Issue 1, 2024, Pages 79-92]
F
-
Fast Decryption
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]
-
Flooding attack
Slowloris Attack Detection Using Adaptive Timeout-Based Approach [Volume 16, Issue 1, 2024, Pages 79-92]
H
-
HTTP Protocol
Slowloris Attack Detection Using Adaptive Timeout-Based Approach [Volume 16, Issue 1, 2024, Pages 79-92]
I
-
Intelligent Applications
An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios [Volume 16, Issue 1, 2024, Pages 17-35]
M
-
Machine Learning
Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner [Volume 16, Issue 1, 2024, Pages 55-77]
-
Mobile Communication
An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios [Volume 16, Issue 1, 2024, Pages 17-35]
-
Modified Parse Tree
Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. [Volume 16, Issue 1, 2024, Pages 1-16]
N
-
Neural Network Model
Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. [Volume 16, Issue 1, 2024, Pages 1-16]
O
-
Online/Offline Encryption
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]
P
-
Pattern mining
Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. [Volume 16, Issue 1, 2024, Pages 1-16]
R
-
Runtime Monitoring
Safety Guards for Ethereum Smart Contracts [Volume 16, Issue 1, 2024, Pages 37-53]
S
-
Security Attacks
An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios [Volume 16, Issue 1, 2024, Pages 17-35]
-
Slowloris Attack
Slowloris Attack Detection Using Adaptive Timeout-Based Approach [Volume 16, Issue 1, 2024, Pages 79-92]
-
Smart Contract
Safety Guards for Ethereum Smart Contracts [Volume 16, Issue 1, 2024, Pages 37-53]
-
SQLIA detection
Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. [Volume 16, Issue 1, 2024, Pages 1-16]
W
-
Web Application Penetration Tests
Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner [Volume 16, Issue 1, 2024, Pages 55-77]
-
Web Application Security
Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. [Volume 16, Issue 1, 2024, Pages 1-16]
-
Web Application Vulnerabilities
Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner [Volume 16, Issue 1, 2024, Pages 55-77]