A

  • A, Meharaj Begum Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. [Volume 16, Issue 1, 2024, Pages 1-16]

  • Abbasi, Junaid Ur Rehman An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios [Volume 16, Issue 1, 2024, Pages 17-35]

  • Ali, Mohammad HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]

  • Amirmohseni, Morteza Safety Guards for Ethereum Smart Contracts [Volume 16, Issue 1, 2024, Pages 37-53]

  • Aref, Mohammad Reza HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]

  • Arock, Michael Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. [Volume 16, Issue 1, 2024, Pages 1-16]

  • Ayyasamy, Ramesh Kumar An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios [Volume 16, Issue 1, 2024, Pages 17-35]

B

  • Boro, Debojit Slowloris Attack Detection Using Adaptive Timeout-Based Approach [Volume 16, Issue 1, 2024, Pages 79-92]

C

  • Chegenizadeh, Mostafa HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]

D

K

  • Kalhoro, Anam An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios [Volume 16, Issue 1, 2024, Pages 17-35]

  • Kalhoro, Shadab An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios [Volume 16, Issue 1, 2024, Pages 17-35]

  • Küçüksille, Ecir Uğur Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner [Volume 16, Issue 1, 2024, Pages 55-77]

M

  • Mohajeri, Javad HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]

S

  • Shaikh, Farhan Bashir An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios [Volume 16, Issue 1, 2024, Pages 17-35]

T

  • Talukdar, Kangkan Slowloris Attack Detection Using Adaptive Timeout-Based Approach [Volume 16, Issue 1, 2024, Pages 79-92]

Y

  • Yalçınkaya, Mehmet Ali Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner [Volume 16, Issue 1, 2024, Pages 55-77]