Featured Articles

Software Testing Evolution: Comparative Insights into Traditional and Emerging Practices

Software Testing Evolution: Comparative Insights ...

DOI: 10.62762/JSE.2025.246843

Singularity Cipher: A Topology-Driven Cryptographic Scheme Based on Visual Paradox and Klein Bottle Illusions

Singularity Cipher: A Topology-Driven Cryptograph...

DOI: 10.62762/TISC.2025.186894

AI-Driven Intrusion Detection System Using SSH Honeypots

AI-Driven Intrusion Detection System Using SSH Ho...

DOI: 10.62762/TC.2025.521799

Requirements Elicitation in Transition: A Review of Conventional and Contemporary Approaches

Requirements Elicitation in Transition: A Review ...

DOI: 10.62762/JSE.2025.862549

Secure Aware Outlier Detection in Underwater Wireless Sensor Networks using Deep Learning

Secure Aware Outlier Detection in Underwater Wire...

DOI: 10.62762/TISC.2025.610386

Secure Software Engineering for Industrial IoT: A Comprehensive Review of Threat Modeling and Defense Mechanisms

Secure Software Engineering for Industrial IoT: A...

DOI: 10.62762/JSE.2025.834259

A Novel Interpretable Lightweight Ensemble Learning Method for Static and Dynamic Medical and Healthcare Data Classification

A Novel Interpretable Lightweight Ensemble Learni...

DOI: 10.62762/TETAI.2025.713474

MARTE-Based Modeling and Analysis for Real-Time Neuromorphic Computing in Embedded Systems

MARTE-Based Modeling and Analysis for Real-Time N...

DOI: 10.62762/JSE.2025.495949

Featured Journals