Articles
- Vol.23, No.1, 2025
- Vol.22, No.6, 2024
- Vol.22, No.5, 2024
- Vol.22, No.4, 2024
- Vol.22, No.3, 2024
- Vol.22, No.2, 2024
- Vol.22, No.1, 2024
- Vol.21, No.6, 2023
- Vol.21, No.5, 2023
- Vol.21, No.4, 2023
- Vol.21, No.3, 2023
- Vol.21, No.2, 2023
- Vol.21, No.1, 2023
- Vol.20, No.6, 2022
- Vol.20, No.5, 2022
- Vol.20, No.4, 2022
- Vol.20, No.3, 2022
- Vol.20, No.2, 2022
- Vol.20, No.1, 2022
- Vol.19, No.6, 2021
- Vol.19, No.5, 2021
- Vol.19, No.4, 2021
- Vol.19, No.3, 2021
- Vol.19, No.2, 2021
- Vol.19, No.1, 2021
This paper proposes a blockchain-integrated access control model that secures data exchange in healthcare networks. Utilizing decentralized identifiers and smart contracts, the approach enhances privacy and auditability across distributed systems managing sensitive medical records.
Victor Emmanuel Langston, Lucy Miranda Hawthorne, Noah Elijah Carrington, Yuki Mei Tanaka, Oliver Zachary Pierce
Paper ID: 72523101 | ✅ Access Request |
This study introduces a behavioral-based multi-factor authentication framework tailored for zero trust cloud environments. The model leverages usage patterns, location data, and biometric cues to authenticate users with enhanced precision and prevent unauthorized access.
Henry Lucas Montgomery, Claire Isabella Walsh, Benjamin Arthur Hughes, Sofia Madeleine Lawson, Wei Li Chen
Paper ID: 72523102 | ✅ Access Request |
This study introduces a behavioral-based multi-factor authentication framework tailored for zero-trust cloud enterprise models. It ensures identity integrity using passive behavioral signals, enabling seamless and secure access to mission-critical digital infrastructure.
Henry Lucas Montgomery, Claire Isabella Walsh, Benjamin Arthur Hughes, Sofia Madeleine Lawson
Paper ID: 72523103 | ✅ Access Request |
This research proposes a blockchain-integrated identity platform for healthcare systems that ensures secure patient data sharing across national borders while maintaining strict compliance with privacy regulations, utilizing smart contracts to manage access permissions dynamically.
Isabelle Renee Thornton, William Nathaniel Black, Georgia Louise Bradshaw, Oliver Graham Kendrick
Paper ID: 72523104 | ✅ Access Request |
This paper presents a temporal graph neural network model that detects anomalies in network traffic for cybersecurity systems. The model learns from evolving traffic patterns, identifying malicious activities in real time, significantly improving detection accuracy compared to baseline approaches.
Leonard Bryce Matthews, Amelia Juliet Forster, Hugo Sebastian King, Eleanor Victoria Dawson, Max Elliott Carter
Paper ID: 72523105 | ✅ Access Request |
This study introduces a privacy-preserving federated learning model for detecting cyber intrusions on distributed edge networks. It enables decentralized threat detection while maintaining data locality, improving security effectiveness in scenarios where central aggregation is not viable.
Grace Isabelle Thornton, Dominic Francis Howard, Zoe Abigail Spencer, Thomas Isaac Wilkins, Charlotte Rose Foster
Paper ID: 72523106 | ✅ Access Request |
This paper proposes a cloud architecture focused on multi-tenant virtual machine isolation to prevent lateral threats. It introduces dynamic enforcement policies that respond to behavioral signals, providing robust containment and secure coexistence within virtualized cloud environments.
Frederick Owen Bishop, Emily Theresa Chambers, Nathaniel George Ellis, Chloe Margaret Reynolds, Daniel Louis Barrett
Paper ID: 72523107 | ✅ Access Request |
Back