A

  • Access Policy Update HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]

  • Adaptive Timeout Slowloris Attack Detection Using Adaptive Timeout-Based Approach [Volume 16, Issue 1, 2024, Pages 79-92]

  • Anonymous Attribute-Based Encryption HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]

B

  • Blind Access Policy HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]

  • Blockchain Safety Guards for Ethereum Smart Contracts [Volume 16, Issue 1, 2024, Pages 37-53]

D

  • Data mining Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner [Volume 16, Issue 1, 2024, Pages 55-77]

  • DDoS Attack Slowloris Attack Detection Using Adaptive Timeout-Based Approach [Volume 16, Issue 1, 2024, Pages 79-92]

F

  • Fast Decryption HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]

  • Flooding attack Slowloris Attack Detection Using Adaptive Timeout-Based Approach [Volume 16, Issue 1, 2024, Pages 79-92]

H

  • HTTP Protocol Slowloris Attack Detection Using Adaptive Timeout-Based Approach [Volume 16, Issue 1, 2024, Pages 79-92]

I

  • Intelligent Applications An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios [Volume 16, Issue 1, 2024, Pages 17-35]

M

  • Machine Learning Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner [Volume 16, Issue 1, 2024, Pages 55-77]

  • Mobile Communication An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios [Volume 16, Issue 1, 2024, Pages 17-35]

  • Modified Parse Tree Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. [Volume 16, Issue 1, 2024, Pages 1-16]

N

  • Neural Network Model Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. [Volume 16, Issue 1, 2024, Pages 1-16]

O

  • Online/Offline Encryption HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]

P

  • Pattern mining Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. [Volume 16, Issue 1, 2024, Pages 1-16]

R

  • Runtime Monitoring Safety Guards for Ethereum Smart Contracts [Volume 16, Issue 1, 2024, Pages 37-53]

S

  • Security Attacks An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios [Volume 16, Issue 1, 2024, Pages 17-35]

  • Slowloris Attack Slowloris Attack Detection Using Adaptive Timeout-Based Approach [Volume 16, Issue 1, 2024, Pages 79-92]

  • Smart Contract Safety Guards for Ethereum Smart Contracts [Volume 16, Issue 1, 2024, Pages 37-53]

  • SQLIA detection Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. [Volume 16, Issue 1, 2024, Pages 1-16]

W

  • Web Application Penetration Tests Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner [Volume 16, Issue 1, 2024, Pages 55-77]

  • Web Application Security Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. [Volume 16, Issue 1, 2024, Pages 1-16]

  • Web Application Vulnerabilities Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner [Volume 16, Issue 1, 2024, Pages 55-77]