A
-
A, Meharaj Begum
Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. [Volume 16, Issue 1, 2024, Pages 1-16]
-
Abbasi, Junaid Ur Rehman
An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios [Volume 16, Issue 1, 2024, Pages 17-35]
-
Ali, Mohammad
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]
-
Amirmohseni, Morteza
Safety Guards for Ethereum Smart Contracts [Volume 16, Issue 1, 2024, Pages 37-53]
-
Aref, Mohammad Reza
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]
-
Arock, Michael
Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. [Volume 16, Issue 1, 2024, Pages 1-16]
-
Ayyasamy, Ramesh Kumar
An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios [Volume 16, Issue 1, 2024, Pages 17-35]
B
-
Boro, Debojit
Slowloris Attack Detection Using Adaptive Timeout-Based Approach [Volume 16, Issue 1, 2024, Pages 79-92]
C
-
Chegenizadeh, Mostafa
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]
D
-
Dorri Nogoorani, Sadegh
Safety Guards for Ethereum Smart Contracts [Volume 16, Issue 1, 2024, Pages 37-53]
K
-
Kalhoro, Anam
An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios [Volume 16, Issue 1, 2024, Pages 17-35]
-
Kalhoro, Shadab
An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios [Volume 16, Issue 1, 2024, Pages 17-35]
-
Küçüksille, Ecir Uğur
Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner [Volume 16, Issue 1, 2024, Pages 55-77]
M
-
Mohajeri, Javad
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]
S
-
Shaikh, Farhan Bashir
An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios [Volume 16, Issue 1, 2024, Pages 17-35]
T
-
Talukdar, Kangkan
Slowloris Attack Detection Using Adaptive Timeout-Based Approach [Volume 16, Issue 1, 2024, Pages 79-92]
Y
-
Yalçınkaya, Mehmet Ali
Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner [Volume 16, Issue 1, 2024, Pages 55-77]