default search action
International Journal of Information Security, Volume 23
Volume 23, Number 1, February 2024
- Arun Sekar Rajasekaran, Maria Azees:
A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation. 1-13 - Hakima Rym Rahal, Sihem Slatnia, Okba Kazar, Ezedin Barka, Saad Harous:
Blockchain-based multi-diagnosis deep learning application for various diseases classification. 15-30 - Stefano Silvestri, Shareful Islam, Dmitry Amelin, Gabriele Weiler, Spyridon Papastergiou, Mario Ciampi:
Cyber threat assessment and management for securing healthcare ecosystems using natural language processing. 31-50 - Osama Bassam J. Rabie, Shitharth Selvarajan, Tawfiq Hasanin, Gouse Baig Mohammad, Abddulrhman M. Alshareef, Mueen Uddin:
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs). 51-80 - Afnan A. Alharbi:
Federated transfer learning for attack detection for Internet of Medical Things. 81-100 - Alexandre Rekeraho, Daniel Tudor Cotfas, Petru Adrian Cotfas, Titus Constantin Balan, Emmanuel Tuyishime, Rebecca Acheampong:
Cybersecurity challenges in IoT-based smart renewable energy. 101-117 - Sofiane Lagraa, Martin Husák, Hamida Seba, Satyanarayana Vuppala, Radu State, Moussa Ouedraogo:
A review on graph-based approaches for network security monitoring and botnet detection. 119-140 - Believe Ayodele, Victor Buttigieg:
SDN as a defence mechanism: a comprehensive survey. 141-185 - Konstantinos Adamos, George Stergiopoulos, Michalis Karamousadakis, Dimitris Gritzalis:
Enhancing attack resilience of cyber-physical systems through state dependency graph models. 187-198 - K. Dinesh, S. V. N. Santhosh Kumar:
Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network. 199-223 - Åvald Åslaugson Sommervoll, László Erdodi, Fabio Massimo Zennaro:
Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents. 225-246 - Hakan Kekül, Burhan Ergen, Halil Arslan:
Estimating vulnerability metrics with word embedding and multiclass classification methods. 247-270 - Silviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian:
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware. 271-297 - Gwonsang Ryu, Daeseon Choi:
Detection of adversarial attacks based on differences in image entropy. 299-314 - Bhavya Dhingra, Vidhi Jain, Deepak Kumar Sharma, Koyel Datta Gupta, Deepika Kukreja:
RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment. 315-330 - Philgeun Jin, Namjun Kim, Sangjin Lee, Doowon Jeong:
Forensic investigation of the dark web on the Tor network: pathway toward the surface web. 331-346 - Aristeidis Farao, Georgios Paparis, Sakshyam Panda, Emmanouil Panaousis, Apostolis Zarras, Christos Xenakis:
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain. 347-371 - Fabrice Mvah, Vianney Kengne Tchendji, Clémentin Tayou Djamégni, Ahmed H. Anwar, Deepak K. Tosh, Charles A. Kamhoua:
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks. 373-387 - Jun Narita, Takao Murakami, Hideitsu Hino, Masakatsu Nishigaki, Tetsushi Ohki:
Synthesizing differentially private location traces including co-locations. 389-410 - Tao Feng, Wentao Jin, Minghu Zhang, Lu Zheng:
Security assessment and improvement of smart grid NIKE protocol. 411-429 - Oussama Amine, Karim Baghery, Zaira Pindado, Carla Ràfols:
Simulation extractable versions of Groth's zk-SNARK revisited. 431-445 - Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate:
Pepal: Penalizing multimedia breaches and partial leakages. 447-465 - Marius Elmiger, Mouad Lemoudden, Nikolaos Pitropakis, William J. Buchanan:
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant. 467-485 - Partha Sarathi Chakraborty, Somanath Tripathy, Sanjeet Kumar Nayak:
BASPED: Blockchain assisted searchable public key encryption over outsourced data. 487-503 - Muhammad Adnan, Muhammad Osama Imam, Muhammad Furqan Javed, Iqbal Murtza:
Improving spam email classification accuracy using ensemble techniques: a stacking approach. 505-517 - Poornima M. Chanal, Mahabaleshwar S. Kakkasageri:
Blockchain-based data integrity framework for Internet of Things. 519-532 - Md. Ahsan Ayub, Ambareen Siraj, Bobby Filar, Maanak Gupta:
RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware. 533-556 - Vikas Kumar Jain, Meenakshi Tripathi:
An integrated deep learning model for Ethereum smart contract vulnerability detection. 557-575 - Anjum, Rahul Katarya:
Hate speech, toxicity detection in online social media: a recent survey of state of the art and opportunities. 577-608 - Aikaterini Triakosia, Panagiotis Rizomiliotis, Cecilia Tonelli, Fabio Federici, Valerio Senni:
Secure outsourcing of manufacturing compliance checks. 609-627 - Junichiro Hayata, Jacob C. N. Schuldt, Goichiro Hanaoka, Kanta Matsuura:
On private information retrieval supporting range queries. 629-647 - Vidhi Bansal, Niyati Baliyan, Mohona Ghosh:
MLChain: a privacy-preserving model learning framework using blockchain. 649-677 - Patruni Muralidhara Rao, Abdul Gaffar Humayun:
PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks. 679-698
Volume 23, Number 2, April 2024
- Constantinos Patsakis, Eugenia A. Politou, Efthimios Alepis, Julio C. Hernandez-Castro:
Cashing out crypto: state of practice in ransom payments. 699-712 - Ahlem Hamdi, Lamia Fourati, Samiha Ayed:
Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures. 713-757 - Houssam Zouhri, Ali Idri, Ahmed Ratnani:
Evaluating the impact of filter-based feature selection in intrusion detection systems. 759-785 - Miguel Angel Olivero, Antonia Bertolino, Francisco José Domínguez Mayo, María José Escalona, Ilaria Matteucci:
A systematic mapping study on security for systems of systems. 787-817 - Richa Goenka, Meenu Chawla, Namita Tiwari:
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy. 819-848 - Mamatha Maddu, Yamarthi Narasimha Rao:
Network intrusion detection and mitigation in SDN using deep learning models. 849-862 - Auwal Shehu Ali, Zarul Fitri Zaaba, Manmeet Mahinderjit Singh:
The rise of "security and privacy": bibliometric analysis of computer privacy research. 863-885 - Ehab Alkhateeb, Ali A. Ghorbani, Arash Habibi Lashkari:
A survey on run-time packers and mitigation techniques. 887-913 - Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi:
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks. 915-934 - Gaurav Tyagi, Rahul Kumar:
An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function. 935-962 - Antonio Villalón-Huerta, Ismael Ripoll-Ripoll, Hector Marco-Gisbert:
A survey and characterization of Close Access Cyberspace Operations. 963-980 - Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel:
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems. 981-997 - Peng Xun, Ziyu Yang, Haoyang Zhu, Zhu Tang:
Locating collaborative attack targets based on physical invariants toward cyber-physical systems. 999-1017 - Patruni Muralidhara Rao, Abdul Gaffar Humayun:
Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks. 1019 - Ricardo Martins Gonçalves, Miguel Mira da Silva, Paulo Rupino da Cunha:
Olympus: a GDPR compliant blockchain system. 1021-1036 - Jalaiah Saikam, Koteswararao Ch:
An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152. 1037-1054 - Subhash Ariyadasa, Shantha Fernando, Subha Fernando:
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks. 1055-1076 - Lei Xu, Junhai Zhai:
Generating adversarial examples with collaborative generative models. 1077-1091 - Juan Manuel Castelo Gómez, Sergio Ruiz-Villafranca:
Integrating the edge computing paradigm into the development of IoT forensic methodologies. 1093-1116 - Kenan Ince:
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT. 1117-1130 - Firas Hamila, Mohammad Hamad, Daniel Costa Salgado, Sebastian Steinhorst:
Enhancing security in Fiat-Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication. 1131-1148 - Thomas Prantl, Lukas Horn, Simon Engel, Lukas Iffländer, Lukas Beierlieb, Christian Krupitzer, André Bauer, Mansi Sakarvadia, Ian T. Foster, Samuel Kounev:
De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem. 1149-1169 - Jessica B. Heluany, Vasileios Gkioulos:
A review on digital twins for power generation and distribution. 1171-1195 - Rao Faizan Ali, P. D. D. Dominic, Sadaf Hina, Sheraz Naseer:
Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees. 1197-1213 - Philip Empl, Daniel Schlette, Lukas Stöger, Günther Pernul:
Generating ICS vulnerability playbooks with open standards. 1215-1230 - Habib El Amin, Lina Oueidat, Maroun Chamoun, Abed Ellatif Samhat, Antoine Feghali:
Blockchain-based multi-organizational cyber risk management framework for collaborative environments. 1231-1249 - Himanshu Nandanwar, Rahul Katarya:
TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment. 1251-1277 - Dimmiti Srinivasa Rao, Emerson Ajith Jubilson:
Cyberattack defense mechanism using deep learning techniques in software-defined networks. 1279-1291 - Sepideh Niktabe, Arash Habibi Lashkari, Dilli Prasad Sharma:
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition. 1293-1316 - Rupshali Dasgupta, Meghabriti Pramanik, Pabitra Mitra, Dipanwita Roy Chowdhury:
Intrusion detection for power grid: a review. 1317-1329 - H. Asad, S. Adhikari, Ilir Gashi:
A perspective-retrospective analysis of diversity in signature-based open-source network intrusion detection systems. 1331-1346 - Sultan S. Alqahtani:
Security bug reports classification using fasttext. 1347-1358 - Fatna El Mendili, Mohammed Fattah, Nisrine Berros, Youness Filaly, Younès El Bouzekri El Idrissi:
Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning. 1359-1388 - Sohail Abbas, Manar Abu Talib, Qassim Nasir, Sally Idhis, Mariam M. Alaboudi, Ali Mohamed:
Radio frequency fingerprinting techniques for device identification: a survey. 1389-1427 - Ferney Martínez, Luis Enrique Sánchez, Antonio Santos-Olmo, David Garcia Rosado, Eduardo Fernández-Medina:
Maritime cybersecurity: protecting digital seas. 1429-1457 - Ndukwe Ukeje, Jairo A. Gutiérrez, Krassie Petrova:
Information security and privacy challenges of cloud computing for government adoption: a systematic review. 1459-1475 - Aybars Oruc, Nabin Chowdhury, Vasileios Gkioulos:
A modular cyber security training programme for the maritime domain. 1477-1512 - Fei Zuo, Junghwan Rhee:
Vulnerability discovery based on source code patch commit mining: a systematic literature review. 1513-1526 - Fulvio Frati, Georgiana Darau, Nikos Salamanos, Pantelitsa Leonidou, Costas Iordanou, Dimitris Plachouris, Efstratios Syrmas, Evangelos Floros, George Nikitakis, George Spanoudakis, Konstantinos Kalais, Stella Tsichlaki, Ernesto Damiani, George C. Kagadis, Jihane Najar, Michael Sirivianos:
Cybersecurity training and healthcare: the AERAS approach. 1527-1539 - Arzu Gorgulu Kakisim:
A deep learning approach based on multi-view consensus for SQL injection detection. 1541-1556
Volume 23, Number 3, June 2024
- Yakub Kayode Saheed, Sanjay Misra:
A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things. 1557-1581 - Elham Ebrahimpour, Shahram Babaie:
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review. 1583-1602 - Awais Yousaf, Jianying Zhou:
From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity. 1603-1618 - Yesi Novaria Kunang, Siti Nurmaini, Deris Stiawan, Bhakti Yudho Suprapto:
An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction. 1619-1648 - Lokendra Vishwakarma, Debasis Das:
BLISS: blockchain-based integrated security system for internet of things (IoT) applications. 1649-1665 - Upendra Singh, Sumit Kumar Sharma, Mukul Shukla, Preeti Jha:
Blockchain-based BATMAN protocol using mobile ad hoc network (MANET) with an ensemble algorithm. 1667-1677 - Giddeon Njamngang Angafor, Iryna Yevseyeva, Leandros Maglaras:
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns. 1679-1693 - Vasiliki Tzavara, Savvas Vassiliadis:
Tracing the evolution of cyber resilience: a historical and conceptual review. 1695-1719 - Marie Haugli-Sandvik, Mass Soldal Lund, Frøy Birte Bjørneseth:
Maritime decision-makers and cyber security: deck officers' perception of cyber risks towards IT and OT systems. 1721-1739 - Rafal Leszczyna:
Activity-based payments: alternative (anonymous) online payment model. 1741-1759 - Nikola Andelic, Sandi Baressi Segota, Zlatan Car:
Robust password security: a genetic programming approach with imbalanced dataset handling. 1761-1786 - Redhwan M. A. Saad, Mohammed Anbar, Selvakumar Manickam, Samir I. Shaheen, Iznan Husainy Hasbullah:
Neighbor discovery protocol anomaly-based detection system using neural network algorithm. 1787-1803 - Rohini G. Pise, Sonali Patil:
Pioneering automated vulnerability detection for smart contracts in blockchain using KEVM: Guardian ADRGAN. 1805-1819 - Michail Smyrlis, Evangelos Floros, Ioannis Basdekis, Dumitru-Bogdan Prelipcean, Aristeidis Sotiropoulos, Hervé Debar, Apostolis Zarras, George Spanoudakis:
RAMA: a risk assessment solution for healthcare organizations. 1821-1838 - Christopher Jun-Wen Chew, Vimal Kumar, Panos Patros, Robi Malik:
Real-time system call-based ransomware detection. 1839-1858 - Joel Höglund, Simon Bouget, Martin Furuhed, John Preuß Mattsson, Göran Selander, Shahid Raza:
AutoPKI: public key infrastructure for IoT with automated trust transfer. 1859-1875 - Yash Sharma, Anshul Arora:
A comprehensive review on permissions-based Android malware detection. 1877-1912 - Rajiv Shah, Deniz Cemiloglu, Cagatay Yucel, Raian Ali, Vasilis Katos:
Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices. 1913-1926 - W. M. A. B. Wijesundara, Joong Sun Lee, Dara Tith, Eleni Aloupogianni, Hiroyuki Suzuki, Takashi Obi:
Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies. 1927-1937 - Eslam Abdelkreem, Sherif Hussein, Ashraf Tammam:
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network. 1939-1961 - Josep Lluís Ferrer-Gomila, M. Francisca Hinarejos:
Abuse-freeness in contract signing: a blockchain-based proposal. 1963-1974 - Vagner Ereno Quincozes, Silvio E. Quincozes, Juliano F. Kazienko, Simone Gama, Omar Cheikhrouhou, Anis Koubaa:
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT). 1975-2002 - Hussain Al-Aqrabi, Ahmed M. Manasrah, Richard Hill, Mohammed Q. Shatnawi, Mohammad Sh. Daoud, Hoda Alkhzaimi:
Dynamic authentication for intelligent sensor clouds in the Internet of Things. 2003-2021 - Diana-Elena Petrean, Rodica Potolea:
Random forest evaluation using multi-key homomorphic encryption and lookup tables. 2023-2041 - Anil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti, Manik Gupta, Raghu Kondapalli, Zhichao Zhang, Krishnakumar Kesavan:
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards. 2043-2061 - Amir Aliabadian, Mohammad Reza Zahabi, Majid Mobini:
Spatial de-correlation of generated keys from wireless channels using adversarial deep learning. 2063-2073 - Eric Hilario, Sami Azam, Jawahar Sundaram, Khwaja Imran Mohammed, Bharanidharan Shanmugam:
Generative AI for pentesting: the good, the bad, the ugly. 2075-2097 - Mohammed Nasereddin, Raad S. Al-Qassas:
A new approach for detecting process injection attacks using memory analysis. 2099-2121 - Ala Mughaid, Ibrahim Obeidat, Laith Abualigah, Shadi AlZu'bi, Mohammad Sh. Daoud, Hazem Migdady:
Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things. 2123-2137 - Md. Alamin Talukder, Selina Sharmin, Md. Ashraf Uddin, Md. Manowarul Islam, Sunil Aryal:
MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs. 2139-2158 - Rahul Dwivedi:
International journal of information security: a bibliometric study, 2007-2023. 2159-2187 - Stylianos Karagiannis, Christoforos Ntantogian, Emmanouil Magkos, Aggeliki Tsohou, Luís Landeiro Ribeiro:
Mastering data privacy: leveraging K-anonymity for robust health data sharing. 2189-2201 - Davide Micale, Ilaria Matteucci, Florian Fenzl, Roland Rieke, Giuseppe Patanè:
A context-aware on-board intrusion detection system for smart vehicles. 2203-2223 - Emmanuel Kwarteng, Mumin Cebe:
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives. 2225-2268 - Hossein Abedi Khorasgani, Noman Mohammed, Yang Wang:
Attribute inference privacy protection for pre-trained models. 2269-2285 - Ramesh Upreti, Pedro G. Lind, Ahmed Elmokashfi, Anis Yazidi:
Trustworthy machine learning in the context of security and privacy. 2287-2314 - Nadisha Madhushanie, Sugandima Vidanagamachchi, Nalin A. G. Arachchilage:
Selfish mining attack in blockchain: a systematic literature review. 2333-2351 - Kousik Barik, Sanjay Misra, Luis Fernández Sanz:
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network. 2353-2376 - Abdullah Hamad N. Almoqbil:
Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard. 2377-2394 - M. Amutha, K. R. Kavitha:
Enhancing security in QCA-based circuits using optimal key gate placement. 2395-2405 - Saeed Banaeian Far, Maryam Rajabzadeh Asaar, Afrooz Haghbin:
A generic framework for blockchain-assisted on-chain auditing for off-chain storage. 2407-2435 - Aikaterini Soumelidou, Aggeliki Tsohou:
Validation and extension of two domain-specific information privacy competency models. 2437-2455 - N. D. Patel, B. M. Mehtre, Rajeev Wankar:
A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection. 2457-2487 - Osama Bassam J. Rabie, Shitharth Selvarajan, Tawfiq Hasanin, Gouse Baig Mohammad, Abddulrhman M. Alshareef, Mueen Uddin:
Correction: A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs). 2489
Volume 23, Number 4, August 2024
- Guangyu Qian, Jinyuan Li, Wei He, Wei Zhang, You Cao:
An online intrusion detection method for industrial control systems based on extended belief rule base. 2491-2514 - Ahmed M. Asfahani:
Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis. 2515-2530 - Raja Zeeshan Haider, Baber Aslam, Haider Abbas, Zafar Iqbal:
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks. 2531-2545 - Parthajit Borah, Upasana Sarmah, D. K. Bhattacharyya, Jugal K. Kalita:
Unmasking the common traits: an ensemble approach for effective malware detection. 2547-2557 - Uneneibotejit Otokwala, Andrei Petrovski, Harsha Kalutarage:
Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things. 2559-2581 - Mustafa Ahmed Elberri, Ümit Tokeser, Javad Rahebi, José Manuel López-Guede:
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA). 2583-2606 - Indy Haverkamp, Dipti Kapoor Sarmah:
Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis. 2607-2635 - Tzer-Long Chen, Chia-Hui Liu, Ya-Hui Ou, Yao-Min Huang, Zhen-Yu Wu:
An improved and efficient coercion-resistant measure for electronic voting system. 2637-2654 - Pavlos Cheimonidis, Konstantinos Rantos:
Dynamic vulnerability severity calculator for industrial control systems. 2655-2676 - Guru Prasad Bhandari, Gebremariam Assres, Nikola Gavric, Andrii Shalaginov, Tor-Morten Grønli:
IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications. 2677-2690 - Alexandros Zacharis, Vasilios Katos, Constantinos Patsakis:
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle. 2691-2710 - Ashish Bajaj, Dinesh Kumar Vishwakarma:
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms. 2711-2737 - Aida Akbarzadeh, Laszlo Erdodi, Siv Hilde Houmb, Tore Geir Soltvedt:
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation. 2739-2758 - Mirza Kamrul Bashar Shuhan, Syed Md. Hasnayeen, Tanmoy Krishna Das, Md. Nazmus Sakib, Md. Sadek Ferdous:
Decentralised identity federations using blockchain. 2759-2782 - Nadisha Madhushanie, Sugandima Vidanagamachchi, Nalin A. G. Arachchilage:
BA-flag: a self-prevention mechanism of selfish mining attacks in blockchain technology. 2783-2792 - Antonio Paya, Vicente García-Díaz, Alberto Gómez:
Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalability. 2793-2808 - Chun-Fu Chen, Bill Moriarty, Shaohan Hu, Sean Moran, Marco Pistoia, Vincenzo Piuri, Pierangela Samarati:
Model-Agnostic Utility-Preserving Biometric Information Anonymization. 2809-2826 - Sandeep Pirbhulal, Sabarathinam Chockalingam, Ankur Shukla, Habtamu Abie:
IoT cybersecurity in 5G and beyond: a systematic literature review. 2827-2879 - Kashif Junaid, Muhammad Umar Janjua, Junaid Qadir:
A compliance-based ranking of certificate authorities using probabilistic approaches. 2881-2910 - Thomas Oakley Browne, Mohammad Abedin, Mohammad Jabed Morshed Chowdhury:
A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications. 2911-2938 - Sanjeev Shukla, Manoj Misra, Gaurav Varshney:
Email bombing attack detection and mitigation using machine learning. 2939-2949 - George Hatzivasilis, Eftychia Lakka, Manos Athanatos, Sotiris Ioannidis, Grigoris Kalogiannis, Manolis Chatzimpyrros, George Spanoudakis, Spyros Papastergiou, Stylianos Karagiannis, Andreas Alexopoulos, Dimitry Amelin, Stephan Kiefer:
Swarm-intelligence for the modern ICT ecosystems. 2951-2975 - Beibei Cui, Wei He, Yan Cui:
A dynamic C-V2X anonymous authentication and group key agreement protocol. 2977-2989 - Chong Xiao, Ming Tang:
Acnn: arbitrary trace attacks based on leakage area detection. 2991-3006 - Efstratios Vasilellis, Vasileios Botsos, Argiro Anagnostopoulou, Dimitris Gritzalis:
Gaming the system: tetromino-based covert channel and its impact on mobile security. 3007-3027 - Wei She, Haige Feng, Zhao Tian, Xinpeng Rong, Tianxiang Ma, Wei Liu:
Multi-party codebook distribution strategy based on secret sharing. 3029-3042 - Francisco T. Chimuco, João B. F. Sequeiros, Tiago M. C. Simões, Mário M. Freire, Pedro R. M. Inácio:
Expediting the design and development of secure cloud-based mobile apps. 3043-3064 - Shirin Abbasi, Navid Khaledian, Amir Masoud Rahmani:
Trust management in the internet of vehicles: a systematic literature review of blockchain integration. 3065-3088 - Rudri Kalaria, A. S. M. Kayes, Wenny Rahayu, Eric Pardede, Ahmad Salehi Shahraki:
Adaptive context-aware access control for IoT environments leveraging fog computing. 3089-3107
Volume 23, Number 5, October 2024
- Marco Rasori, Andrea Saracino, Paolo Mori, Marco Tiloca:
Using the ACE framework to enforce access and usage control with notifications of revoked access rights. 3109-3133 - Süleyman Muhammed Arikan, Aynur Koçak, Mustafa Alkan:
Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system. 3135-3151 - Ivar Moen, Aybars Oruc, Ahmed Amro, Vasileios Gkioulos, Georgios Kavallieratos:
Survey-based analysis of cybersecurity awareness of Turkish seafarers. 3153-3178 - Mariam Masmoudi, Ikram Amous, Corinne Amel Zayani, Florence Sèdes:
Trust attack prevention based on Spark-blockchain in social IoT: a survey. 3179-3198 - Zubair Ahmad, Stefano Calzavara, Samuele Casarin, Ben Stock:
Information flow control for comparative privacy analyses. 3199-3216 - Stylianos Gerasimou, Konstantinos Limniotis:
A study on privacy and security aspects of personalised apps. 3217-3239 - Yahui Wang, Zhiyong Zhang, Kejing Zhao, Peng Wang, Ruirui Wu:
A few-shot learning based method for industrial internet intrusion detection. 3241-3252 - Håvard Jakobsen Ofte:
The awareness of operators: a goal-directed task analysis in SOCs for critical infrastructure. 3253-3282 - Tanjila Mawla, Maanak Gupta, Safwa Ameer, Ravi Sandhu:
The $\mathrm {ACAC_{D}}$ model for mutable activity control and chain of dependencies in smart and connected systems. 3283-3310 - Yuejun Guo, Seifeddine Bettaieb, Fran Casino:
A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road ahead. 3311-3327 - Aulia Arif Wardana, Grzegorz Kolaczek, Arkadiusz Warzynski, Parman Sukarno:
Collaborative intrusion detection using weighted ensemble averaging deep neural network for coordinated attack detection in heterogeneous network. 3329-3349 - Hiroki Kuzuno, Toshihiro Yamauchi:
Mitigation of privilege escalation attack using kernel data relocation mechanism. 3351-3367 - Efstratios Vasilellis, Grigoris Gkionis, Dimitris Gritzalis:
Press play, install malware: a study of rhythm game-based malware dropping. 3369-3391 - Shuhei Enomoto, Hiroki Kuzuno, Hiroshi Yamada, Yoshiaki Shiraishi, Masakatu Morii:
Early mitigation of CPU-optimized ransomware using monitoring encryption instructions. 3393-3413 - Sorour Sheidani, Alireza Zarei:
Privacy-preserving two-party computation of line segment intersection. 3415-3432
Volume 23, Number 6, December 2024
- (Withdrawn) Deep learning based network intrusion detection system: a systematic literature review and future scopes. 3433-3463
- Beytüllah Yigit, Gürkan Gür, Bernhard Tellenbach, Fatih Alagöz:
Unmasking SDN flow table saturation: fingerprinting, attacks and defenses. 3465-3479 - Stefano Bistarelli, Andrea Imparato, Francesco Santini:
A TCP-based covert channel with integrity check and retransmission. 3481-3512 - Van-Hau Pham, Do Thi Thu Hien, Hien Do Hoang, Phan The Duy:
Defect-scanner: a comparative empirical study on language model and deep learning approach for software vulnerability detection. 3513-3526 - Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues:
A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks. 3527-3546 - Stephen Cook, Maryam Mehrnezhad, Ehsan Toreini:
Bluetooth security analysis of general and intimate health IoT devices and apps: the case of FemTech. 3547-3567 - Abdulrahman K. Alnaim:
Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing security. 3569-3589 - Pedro Antunes, Nuno Guimarães:
Guiding the implementation of data privacy with microservices. 3591-3608 - Takeshi Nakai, Kazumasa Shinagawa:
Secure multi-party computation with legally-enforceable fairness. 3609-3623 - Mohamed Amine Merzouk, Christopher Neal, Joséphine Delas, Reda Yaich, Nora Boulahia-Cuppens, Frédéric Cuppens:
Adversarial robustness of deep reinforcement learning-based intrusion detection. 3625-3651 - Safiullah Khan, Kashif Inayat, Fahad Bin Muslim, Yasir Ali Shah, Muhammad Atif Ur Rehman, Ayesha Khalid, Malik Imran, Akmalbek Abdusalomov:
Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher. 3653-3664 - Mohamed Abomhara, Livinus Obiora Nweke, Sule Yildirim Yayilgan, Debora Comparin, Kristel Teyras, Stéphanie de Labriolle:
Enhancing privacy protections in national identification systems: an examination of stakeholders' knowledge, attitudes, and practices of privacy by design. 3665-3689 - Jihane Jebrane, Saiida Lazaar:
An enhanced and verifiable lightweight authentication protocol for securing the Internet of Medical Things (IoMT) based on CP-ABE encryption. 3691-3710 - Àlex Miranda-Pascual, Patricia Guerra-Balboa, Javier Parra-Arnau, Jordi Forné, Thorsten Strufe:
An overview of proposals towards the privacy-preserving publication of trajectory data. 3711-3747 - Patricia Callejo, Ignacio Gómez Fernández, Marcelo Bagnulo:
"Animation" URL in NFT marketplaces considered harmful for privacy. 3749-3763 - Martin Bedoya, Sara Palacios, Daniel Díaz López, Estefania Laverde, Pantaleone Nespoli:
Enhancing DevSecOps practice with Large Language Models and Security Chaos Engineering. 3765-3788
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.