Published: 2025-09-08

A Systematic Literature Review on Continuous Authentication in Zero Trust Architecture for Business

Syahreen Zulkifli, Noor Hafizah, Nurazean Maarop, Abdul Ghafar, Syafiqa Anneisa, Adam Zulkifli

16-26

Retracted

Retracted

164 - 176

Toward Deep Learning ECAPA-TDNN Model Enhancement for Speaker Recognition

Freha Mezzoudj, Chahreddine Medjahed, Ahmed Slimani

377-384

Benchmarking Reachability Techniques for the Optimization of RDF Queries

Abdallah KHELIL, Rachid KHALLADI, Mostafa BOUFERA, Liza RAAB

385-393

Trade Openness and Economic Growth in West African Countries: Does Human Capital Matter?

Ijeoma Christina Onuogu, Benedict N. Akanegbu, Nnanna P. Azu

394-406

A Lightweight DNA-Chaos Hybrid Encryption Framework for Real-Time IoT Image Security

Mohammad Ubaidullah Bokhari, Azizur Rahman, Shahnwaz Afzal, Md. Zeyauddin

443-461

Toward a Reliable IoT Communication Protocol: UPPAAL-Verified Timed Automata for CoAP

Khalida Farida Khelili, laid Kahloul, Abdelkarim Tahari

462-478

A Metrics-Driven Framework for Reliable Master Data

Chafika Benkherourou, Abdelhabib Bourouis, Tidjani Fatima Zohra

479-486

An Efficient Advanced Data Integration From Multiple Sources For Fraud Detection Using Etl And Fl-Zsl-Glnrp3n

Rajesh Kumar Kanji, Vinodkumar Reddy Surasani, Sangeetha Govindarajan, Sai Tejaswi Bellapukonda

774 - 796

A Multi-Objective Genetic Algorithm Optimization of Delay and UAV Energy Consumption for Task Offloading in Flying Fog Computing

Abdessamed Sassi, Mohamed Amine ATTALAH, Sofiane ZAIDI, Carlos T. CALAFATE, Nour El Houda Dehimi

958-966