Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model.

Meharaj Begum A; Michael Arock

Volume 16, Issue 1 , January 2024, Pages 1-16


  Whatever malware protection is upcoming, still the data are prone to cyber-attacks. The most threatening Structured Query Language Injection Attack (SQLIA) happens at the database layer of web applications leading to unlimited and unauthorized access to confidential information through malicious code ...  Read More

Research Article
An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios

Shadab Kalhoro; Farhan Bashir Shaikh; Anam Kalhoro; Junaid Ur Rehman Abbasi; Ramesh Kumar Ayyasamy

Volume 16, Issue 1 , January 2024, Pages 17-35


  With the advancement of ICTs, the fifth generation has developed into an emergent communication platform that supports high speed, low latency, and excellent connectivity to numerous devices with modern radio technology, service-oriented design, and cloud infrastructure. The recent developments in the ...  Read More

Research Article
Safety Guards for Ethereum Smart Contracts

Morteza Amirmohseni; Sadegh Dorri Nogoorani

Volume 16, Issue 1 , January 2024, Pages 37-53


  Smart contracts are applications that are deployed on a blockchain and can be executed through transactions. The code and the state of the smart contracts are persisted on the ledger, and their execution is validated by all blockchain nodes. Smart contracts often hold and manage amounts of cryptocurrency. ...  Read More

Research Article
Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner

Mehmet Ali Yalçınkaya; Ecir Uğur Küçüksille

Volume 16, Issue 1 , January 2024, Pages 55-77


  The widespread use of web applications and running on sensitive data has made them one of the most significant targets of cyber attackers. One of the most crucial security measures that can be taken is the detection and closure of vulnerabilities on web applications before attackers. In this study, a ...  Read More

Research Article
Slowloris Attack Detection Using Adaptive Timeout-Based Approach

Kangkan Talukdar; Debojit Boro

Volume 16, Issue 1 , January 2024, Pages 79-92


  Distributed Denial of Service (DDoS) attacks have become a critical threat to the Web with the increase in web-based transactions and application services offered by the Internet. With the vast resources and techniques easily available to the attackers countering them has become more challenging. They ...  Read More

Research Article
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices

Mostafa Chegenizadeh; Mohammad Ali; Javad Mohajeri; Mohammad Reza Aref

Volume 16, Issue 1 , January 2024, Pages 93-114


  Attribute-based encryption (ABE) is a promising cryptographic mechanism for providing confidentiality and fine-grained access control in the cloud-based area.However, due to high computational overhead, common ABE schemes are not suitable for resource-constrained devices.Additionally, access policies ...  Read More