To search, Click below search items.
All Published Papers Search Service
Title
Emerging Threats in Internet-of-Things (IoT) Hardware Security
Author
Hashim Elshafie, Mosab Hamdan, Sayeed Salih, Refan Mohamed Almohamedh, Ala Eldin Abdallah Awouda, Abdelwahed Motwakel
Vol. 25 No. 4 pp. 27-52
Keywords
Internet-of-Things IOT, Hardware Security, IoT network attacks, Application-specific integrated circuit (ASIC) and IOT Ecosystem..
A Comparative Study of Generative LSTM Models for Multi-Instrumental Music Composition
Ko Ko Aung, Yasushi Nakabayashi, Ryuji Shioya, and Masato Masuda
Vol. 25 No. 4 pp. 11-26
Music Generative Model, LSTM model, Sound font system , Burma Traditional Instrument
Detecting SMS Phishing Based on Arabic Text-Content Using Deep Learning
Sadeem Alsufyani and Samah Alajmani
Vol. 25 No. 4 pp. 1-10
Phishing Threat; Arabic Phishing; Arabic SMS Text-content; Bidirectional GRU (BiGRU); Phone Phishing.
A Systematic Review of Security Vulnerabilities in Smart Home Devices and Mitigation Techniques
Mohammed K. Alzaylaee
Vol. 25 No. 3 pp. 206-214
Smart home security; IoT vulnerabilities; AI-driven anomaly detection; post-quantum encryption; blockchain authentication;