


default search action
International Journal of Information Security, Volume 23
Volume 23, Number 1, February 2024
- Arun Sekar Rajasekaran
, Maria Azees:
A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation. 1-13 - Hakima Rym Rahal, Sihem Slatnia, Okba Kazar
, Ezedin Barka, Saad Harous
:
Blockchain-based multi-diagnosis deep learning application for various diseases classification. 15-30 - Stefano Silvestri
, Shareful Islam, Dmitry Amelin, Gabriele Weiler, Spyridon Papastergiou, Mario Ciampi:
Cyber threat assessment and management for securing healthcare ecosystems using natural language processing. 31-50 - Osama Bassam J. Rabie
, Shitharth Selvarajan
, Tawfiq Hasanin
, Gouse Baig Mohammad, Abddulrhman M. Alshareef
, Mueen Uddin:
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs). 51-80 - Afnan A. Alharbi
:
Federated transfer learning for attack detection for Internet of Medical Things. 81-100 - Alexandre Rekeraho
, Daniel Tudor Cotfas, Petru Adrian Cotfas, Titus Constantin Balan, Emmanuel Tuyishime
, Rebecca Acheampong:
Cybersecurity challenges in IoT-based smart renewable energy. 101-117 - Sofiane Lagraa, Martin Husák, Hamida Seba, Satyanarayana Vuppala, Radu State, Moussa Ouedraogo:
A review on graph-based approaches for network security monitoring and botnet detection. 119-140 - Believe Ayodele
, Victor Buttigieg
:
SDN as a defence mechanism: a comprehensive survey. 141-185 - Konstantinos Adamos
, George Stergiopoulos, Michalis Karamousadakis, Dimitris Gritzalis:
Enhancing attack resilience of cyber-physical systems through state dependency graph models. 187-198 - K. Dinesh
, S. V. N. Santhosh Kumar:
Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network. 199-223 - Åvald Åslaugson Sommervoll
, László Erdodi, Fabio Massimo Zennaro:
Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents. 225-246 - Hakan Kekül, Burhan Ergen, Halil Arslan
:
Estimating vulnerability metrics with word embedding and multiclass classification methods. 247-270 - Silviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian:
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware. 271-297 - Gwonsang Ryu, Daeseon Choi:
Detection of adversarial attacks based on differences in image entropy. 299-314 - Bhavya Dhingra, Vidhi Jain, Deepak Kumar Sharma, Koyel Datta Gupta, Deepika Kukreja:
RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment. 315-330 - Philgeun Jin, Namjun Kim, Sangjin Lee, Doowon Jeong
:
Forensic investigation of the dark web on the Tor network: pathway toward the surface web. 331-346 - Aristeidis Farao
, Georgios Paparis
, Sakshyam Panda
, Emmanouil Panaousis
, Apostolis Zarras
, Christos Xenakis
:
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain. 347-371 - Fabrice Mvah
, Vianney Kengne Tchendji
, Clémentin Tayou Djamégni
, Ahmed H. Anwar
, Deepak K. Tosh
, Charles A. Kamhoua
:
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks. 373-387 - Jun Narita, Takao Murakami, Hideitsu Hino, Masakatsu Nishigaki, Tetsushi Ohki
:
Synthesizing differentially private location traces including co-locations. 389-410 - Tao Feng, Wentao Jin, Minghu Zhang, Lu Zheng:
Security assessment and improvement of smart grid NIKE protocol. 411-429 - Oussama Amine, Karim Baghery
, Zaira Pindado, Carla Ràfols:
Simulation extractable versions of Groth's zk-SNARK revisited. 431-445 - Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate:
Pepal: Penalizing multimedia breaches and partial leakages. 447-465 - Marius Elmiger, Mouad Lemoudden
, Nikolaos Pitropakis, William J. Buchanan:
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant. 467-485 - Partha Sarathi Chakraborty, Somanath Tripathy, Sanjeet Kumar Nayak
:
BASPED: Blockchain assisted searchable public key encryption over outsourced data. 487-503 - Muhammad Adnan, Muhammad Osama Imam, Muhammad Furqan Javed, Iqbal Murtza:
Improving spam email classification accuracy using ensemble techniques: a stacking approach. 505-517 - Poornima M. Chanal
, Mahabaleshwar S. Kakkasageri:
Blockchain-based data integrity framework for Internet of Things. 519-532 - Md. Ahsan Ayub
, Ambareen Siraj, Bobby Filar, Maanak Gupta:
RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware. 533-556 - Vikas Kumar Jain, Meenakshi Tripathi:
An integrated deep learning model for Ethereum smart contract vulnerability detection. 557-575 - Anjum, Rahul Katarya
:
Hate speech, toxicity detection in online social media: a recent survey of state of the art and opportunities. 577-608 - Aikaterini Triakosia, Panagiotis Rizomiliotis, Cecilia Tonelli, Fabio Federici, Valerio Senni:
Secure outsourcing of manufacturing compliance checks. 609-627 - Junichiro Hayata
, Jacob C. N. Schuldt, Goichiro Hanaoka, Kanta Matsuura:
On private information retrieval supporting range queries. 629-647 - Vidhi Bansal
, Niyati Baliyan, Mohona Ghosh
:
MLChain: a privacy-preserving model learning framework using blockchain. 649-677 - Patruni Muralidhara Rao
, Abdul Gaffar Humayun
:
PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks. 679-698
Volume 23, Number 2, April 2024
- Constantinos Patsakis, Eugenia A. Politou, Efthimios Alepis, Julio C. Hernandez-Castro:
Cashing out crypto: state of practice in ransom payments. 699-712 - Ahlem Hamdi, Lamia Fourati, Samiha Ayed:
Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures. 713-757 - Houssam Zouhri
, Ali Idri, Ahmed Ratnani:
Evaluating the impact of filter-based feature selection in intrusion detection systems. 759-785 - Miguel Angel Olivero, Antonia Bertolino, Francisco José Domínguez Mayo, María José Escalona, Ilaria Matteucci:
A systematic mapping study on security for systems of systems. 787-817 - Richa Goenka
, Meenu Chawla, Namita Tiwari:
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy. 819-848 - Mamatha Maddu, Yamarthi Narasimha Rao:
Network intrusion detection and mitigation in SDN using deep learning models. 849-862 - Auwal Shehu Ali
, Zarul Fitri Zaaba
, Manmeet Mahinderjit Singh:
The rise of "security and privacy": bibliometric analysis of computer privacy research. 863-885 - Ehab Alkhateeb
, Ali A. Ghorbani, Arash Habibi Lashkari:
A survey on run-time packers and mitigation techniques. 887-913 - Pradeepkumar Bhale
, Santosh Biswas, Sukumar Nandi:
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks. 915-934 - Gaurav Tyagi
, Rahul Kumar:
An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function. 935-962 - Antonio Villalón-Huerta
, Ismael Ripoll-Ripoll
, Hector Marco-Gisbert
:
A survey and characterization of Close Access Cyberspace Operations. 963-980 - Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel:
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems. 981-997 - Peng Xun, Ziyu Yang, Haoyang Zhu, Zhu Tang:
Locating collaborative attack targets based on physical invariants toward cyber-physical systems. 999-1017 - Patruni Muralidhara Rao, Abdul Gaffar Humayun
:
Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks. 1019 - Ricardo Martins Gonçalves
, Miguel Mira da Silva
, Paulo Rupino da Cunha
:
Olympus: a GDPR compliant blockchain system. 1021-1036 - Jalaiah Saikam
, Koteswararao Ch
:
An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152. 1037-1054 - Subhash Ariyadasa
, Shantha Fernando
, Subha Fernando
:
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks. 1055-1076 - Lei Xu, Junhai Zhai:
Generating adversarial examples with collaborative generative models. 1077-1091 - Juan Manuel Castelo Gómez, Sergio Ruiz-Villafranca
:
Integrating the edge computing paradigm into the development of IoT forensic methodologies. 1093-1116 - Kenan Ince
:
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT. 1117-1130 - Firas Hamila, Mohammad Hamad
, Daniel Costa Salgado, Sebastian Steinhorst:
Enhancing security in Fiat-Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication. 1131-1148 - Thomas Prantl, Lukas Horn, Simon Engel, Lukas Iffländer, Lukas Beierlieb, Christian Krupitzer, André Bauer
, Mansi Sakarvadia, Ian T. Foster, Samuel Kounev:
De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem. 1149-1169 - Jessica B. Heluany, Vasileios Gkioulos:
A review on digital twins for power generation and distribution. 1171-1195 - Rao Faizan Ali
, P. D. D. Dominic
, Sadaf Hina
, Sheraz Naseer
:
Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees. 1197-1213 - Philip Empl, Daniel Schlette, Lukas Stöger, Günther Pernul:
Generating ICS vulnerability playbooks with open standards. 1215-1230 - Habib El Amin, Lina Oueidat, Maroun Chamoun, Abed Ellatif Samhat
, Antoine Feghali:
Blockchain-based multi-organizational cyber risk management framework for collaborative environments. 1231-1249 - Himanshu Nandanwar, Rahul Katarya:
TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment. 1251-1277 - Dimmiti Srinivasa Rao, Emerson Ajith Jubilson:
Cyberattack defense mechanism using deep learning techniques in software-defined networks. 1279-1291 - Sepideh Niktabe
, Arash Habibi Lashkari
, Dilli Prasad Sharma
:
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition. 1293-1316 - Rupshali Dasgupta
, Meghabriti Pramanik, Pabitra Mitra, Dipanwita Roy Chowdhury:
Intrusion detection for power grid: a review. 1317-1329 - H. Asad, S. Adhikari
, Ilir Gashi:
A perspective-retrospective analysis of diversity in signature-based open-source network intrusion detection systems. 1331-1346 - Sultan S. Alqahtani:
Security bug reports classification using fasttext. 1347-1358 - Fatna El Mendili
, Mohammed Fattah, Nisrine Berros, Youness Filaly, Younès El Bouzekri El Idrissi:
Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning. 1359-1388 - Sohail Abbas, Manar Abu Talib, Qassim Nasir, Sally Idhis, Mariam M. Alaboudi, Ali Mohamed:
Radio frequency fingerprinting techniques for device identification: a survey. 1389-1427 - Ferney Martínez, Luis Enrique Sánchez, Antonio Santos-Olmo, David Garcia Rosado, Eduardo Fernández-Medina:
Maritime cybersecurity: protecting digital seas. 1429-1457 - Ndukwe Ukeje, Jairo A. Gutiérrez
, Krassie Petrova:
Information security and privacy challenges of cloud computing for government adoption: a systematic review. 1459-1475 - Aybars Oruc
, Nabin Chowdhury, Vasileios Gkioulos:
A modular cyber security training programme for the maritime domain. 1477-1512 - Fei Zuo, Junghwan Rhee:
Vulnerability discovery based on source code patch commit mining: a systematic literature review. 1513-1526 - Fulvio Frati, Georgiana Darau, Nikos Salamanos
, Pantelitsa Leonidou, Costas Iordanou, Dimitris Plachouris, Efstratios Syrmas, Evangelos Floros, George Nikitakis, George Spanoudakis, Konstantinos Kalais, Stella Tsichlaki, Ernesto Damiani, George C. Kagadis, Jihane Najar, Michael Sirivianos:
Cybersecurity training and healthcare: the AERAS approach. 1527-1539 - Arzu Gorgulu Kakisim:
A deep learning approach based on multi-view consensus for SQL injection detection. 1541-1556
Volume 23, Number 3, June 2024
- Yakub Kayode Saheed
, Sanjay Misra:
A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things. 1557-1581 - Elham Ebrahimpour, Shahram Babaie:
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review. 1583-1602 - Awais Yousaf
, Jianying Zhou:
From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity. 1603-1618 - Yesi Novaria Kunang
, Siti Nurmaini
, Deris Stiawan
, Bhakti Yudho Suprapto
:
An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction. 1619-1648 - Lokendra Vishwakarma, Debasis Das:
BLISS: blockchain-based integrated security system for internet of things (IoT) applications. 1649-1665 - Upendra Singh
, Sumit Kumar Sharma
, Mukul Shukla, Preeti Jha:
Blockchain-based BATMAN protocol using mobile ad hoc network (MANET) with an ensemble algorithm. 1667-1677 - Giddeon Njamngang Angafor, Iryna Yevseyeva, Leandros Maglaras
:
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns. 1679-1693 - Vasiliki Tzavara, Savvas Vassiliadis:
Tracing the evolution of cyber resilience: a historical and conceptual review. 1695-1719 - Marie Haugli-Sandvik
, Mass Soldal Lund, Frøy Birte Bjørneseth:
Maritime decision-makers and cyber security: deck officers' perception of cyber risks towards IT and OT systems. 1721-1739 - Rafal Leszczyna:
Activity-based payments: alternative (anonymous) online payment model. 1741-1759 - Nikola Andelic, Sandi Baressi Segota, Zlatan Car
:
Robust password security: a genetic programming approach with imbalanced dataset handling. 1761-1786 - Redhwan M. A. Saad
, Mohammed Anbar, Selvakumar Manickam, Samir I. Shaheen, Iznan Husainy Hasbullah:
Neighbor discovery protocol anomaly-based detection system using neural network algorithm. 1787-1803 - Rohini G. Pise, Sonali Patil:
Pioneering automated vulnerability detection for smart contracts in blockchain using KEVM: Guardian ADRGAN. 1805-1819 - Michail Smyrlis
, Evangelos Floros, Ioannis Basdekis, Dumitru-Bogdan Prelipcean, Aristeidis Sotiropoulos, Hervé Debar, Apostolis Zarras
, George Spanoudakis
:
RAMA: a risk assessment solution for healthcare organizations. 1821-1838 - Christopher Jun-Wen Chew, Vimal Kumar, Panos Patros
, Robi Malik:
Real-time system call-based ransomware detection. 1839-1858 - Joel Höglund, Simon Bouget, Martin Furuhed, John Preuß Mattsson, Göran Selander, Shahid Raza:
AutoPKI: public key infrastructure for IoT with automated trust transfer. 1859-1875 - Yash Sharma
, Anshul Arora
:
A comprehensive review on permissions-based Android malware detection. 1877-1912 - Rajiv Shah
, Deniz Cemiloglu, Cagatay Yucel, Raian Ali, Vasilis Katos:
Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices. 1913-1926 - W. M. A. B. Wijesundara
, Joong Sun Lee
, Dara Tith
, Eleni Aloupogianni
, Hiroyuki Suzuki
, Takashi Obi
:
Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies. 1927-1937 - Eslam Abdelkreem, Sherif Hussein, Ashraf Tammam:
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network. 1939-1961 - Josep Lluís Ferrer-Gomila
, M. Francisca Hinarejos
:
Abuse-freeness in contract signing: a blockchain-based proposal. 1963-1974 - Vagner Ereno Quincozes
, Silvio E. Quincozes
, Juliano F. Kazienko
, Simone Gama
, Omar Cheikhrouhou
, Anis Koubaa
:
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT). 1975-2002 - Hussain Al-Aqrabi, Ahmed M. Manasrah, Richard Hill
, Mohammed Q. Shatnawi, Mohammad Sh. Daoud, Hoda Alkhzaimi:
Dynamic authentication for intelligent sensor clouds in the Internet of Things. 2003-2021 - Diana-Elena Petrean
, Rodica Potolea
:
Random forest evaluation using multi-key homomorphic encryption and lookup tables. 2023-2041 - Anil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti, Manik Gupta, Raghu Kondapalli, Zhichao Zhang, Krishnakumar Kesavan:
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards. 2043-2061 - Amir Aliabadian, Mohammad Reza Zahabi, Majid Mobini:
Spatial de-correlation of generated keys from wireless channels using adversarial deep learning. 2063-2073 - Eric Hilario, Sami Azam, Jawahar Sundaram, Khwaja Imran Mohammed
, Bharanidharan Shanmugam
:
Generative AI for pentesting: the good, the bad, the ugly. 2075-2097 - Mohammed Nasereddin
, Raad S. Al-Qassas
:
A new approach for detecting process injection attacks using memory analysis. 2099-2121 - Ala Mughaid, Ibrahim Obeidat, Laith Abualigah, Shadi AlZu'bi, Mohammad Sh. Daoud, Hazem Migdady:
Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things. 2123-2137 - Md. Alamin Talukder
, Selina Sharmin, Md. Ashraf Uddin, Md. Manowarul Islam, Sunil Aryal:
MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs. 2139-2158 - Rahul Dwivedi
:
International journal of information security: a bibliometric study, 2007-2023. 2159-2187 - Stylianos Karagiannis
, Christoforos Ntantogian, Emmanouil Magkos, Aggeliki Tsohou, Luís Landeiro Ribeiro
:
Mastering data privacy: leveraging K-anonymity for robust health data sharing. 2189-2201 - Davide Micale, Ilaria Matteucci, Florian Fenzl, Roland Rieke
, Giuseppe Patanè:
A context-aware on-board intrusion detection system for smart vehicles. 2203-2223 - Emmanuel Kwarteng
, Mumin Cebe:
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives. 2225-2268 - Hossein Abedi Khorasgani, Noman Mohammed, Yang Wang:
Attribute inference privacy protection for pre-trained models. 2269-2285 - Ramesh Upreti, Pedro G. Lind, Ahmed Elmokashfi, Anis Yazidi:
Trustworthy machine learning in the context of security and privacy. 2287-2314 - Nadisha Madhushanie, Sugandima Vidanagamachchi, Nalin A. G. Arachchilage:
Selfish mining attack in blockchain: a systematic literature review. 2333-2351 - Kousik Barik
, Sanjay Misra, Luis Fernández Sanz:
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network. 2353-2376 - Abdullah Hamad N. Almoqbil:
Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard. 2377-2394 - M. Amutha, K. R. Kavitha:
Enhancing security in QCA-based circuits using optimal key gate placement. 2395-2405 - Saeed Banaeian Far, Maryam Rajabzadeh Asaar, Afrooz Haghbin:
A generic framework for blockchain-assisted on-chain auditing for off-chain storage. 2407-2435 - Aikaterini Soumelidou
, Aggeliki Tsohou
:
Validation and extension of two domain-specific information privacy competency models. 2437-2455 - N. D. Patel
, B. M. Mehtre, Rajeev Wankar:
A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection. 2457-2487 - Osama Bassam J. Rabie
, Shitharth Selvarajan, Tawfiq Hasanin, Gouse Baig Mohammad, Abddulrhman M. Alshareef, Mueen Uddin:
Correction: A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs). 2489
Volume 23, Number 4, August 2024
- Guangyu Qian, Jinyuan Li, Wei He, Wei Zhang, You Cao:
An online intrusion detection method for industrial control systems based on extended belief rule base. 2491-2514 - Ahmed M. Asfahani
:
Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis. 2515-2530 - Raja Zeeshan Haider, Baber Aslam, Haider Abbas, Zafar Iqbal:
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks. 2531-2545 - Parthajit Borah, Upasana Sarmah
, D. K. Bhattacharyya, Jugal K. Kalita:
Unmasking the common traits: an ensemble approach for effective malware detection. 2547-2557 - Uneneibotejit Otokwala, Andrei Petrovski, Harsha Kalutarage:
Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things. 2559-2581 - Mustafa Ahmed Elberri, Ümit Tokeser, Javad Rahebi, José Manuel López-Guede:
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA). 2583-2606 - Indy Haverkamp, Dipti Kapoor Sarmah
:
Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis. 2607-2635 - Tzer-Long Chen, Chia-Hui Liu, Ya-Hui Ou, Yao-Min Huang, Zhen-Yu Wu
:
An improved and efficient coercion-resistant measure for electronic voting system. 2637-2654 - Pavlos Cheimonidis, Konstantinos Rantos:
Dynamic vulnerability severity calculator for industrial control systems. 2655-2676 - Guru Prasad Bhandari, Gebremariam Assres, Nikola Gavric, Andrii Shalaginov, Tor-Morten Grønli:
IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications. 2677-2690 - Alexandros Zacharis, Vasilios Katos, Constantinos Patsakis:
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle. 2691-2710 - Ashish Bajaj, Dinesh Kumar Vishwakarma:
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms. 2711-2737 - Aida Akbarzadeh, Laszlo Erdodi, Siv Hilde Houmb, Tore Geir Soltvedt:
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation. 2739-2758 - Mirza Kamrul Bashar Shuhan, Syed Md. Hasnayeen, Tanmoy Krishna Das, Md. Nazmus Sakib, Md. Sadek Ferdous:
Decentralised identity federations using blockchain. 2759-2782 - Nadisha Madhushanie, Sugandima Vidanagamachchi, Nalin A. G. Arachchilage:
BA-flag: a self-prevention mechanism of selfish mining attacks in blockchain technology. 2783-2792 - Antonio Paya
, Vicente García-Díaz
, Alberto Gómez
:
Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalability. 2793-2808 - Chun-Fu Chen, Bill Moriarty, Shaohan Hu, Sean Moran, Marco Pistoia, Vincenzo Piuri, Pierangela Samarati:
Model-Agnostic Utility-Preserving Biometric Information Anonymization. 2809-2826 - Sandeep Pirbhulal, Sabarathinam Chockalingam
, Ankur Shukla, Habtamu Abie:
IoT cybersecurity in 5G and beyond: a systematic literature review. 2827-2879 - Kashif Junaid, Muhammad Umar Janjua, Junaid Qadir:
A compliance-based ranking of certificate authorities using probabilistic approaches. 2881-2910 - Thomas Oakley Browne
, Mohammad Abedin, Mohammad Jabed Morshed Chowdhury:
A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications. 2911-2938 - Sanjeev Shukla, Manoj Misra, Gaurav Varshney:
Email bombing attack detection and mitigation using machine learning. 2939-2949 - George Hatzivasilis, Eftychia Lakka, Manos Athanatos, Sotiris Ioannidis, Grigoris Kalogiannis, Manolis Chatzimpyrros, George Spanoudakis, Spyros Papastergiou, Stylianos Karagiannis, Andreas Alexopoulos, Dimitry Amelin, Stephan Kiefer:
Swarm-intelligence for the modern ICT ecosystems. 2951-2975 - Beibei Cui, Wei He, Yan Cui:
A dynamic C-V2X anonymous authentication and group key agreement protocol. 2977-2989 - Chong Xiao, Ming Tang:
Acnn: arbitrary trace attacks based on leakage area detection. 2991-3006 - Efstratios Vasilellis, Vasileios Botsos, Argiro Anagnostopoulou, Dimitris Gritzalis:
Gaming the system: tetromino-based covert channel and its impact on mobile security. 3007-3027 - Wei She, Haige Feng, Zhao Tian, Xinpeng Rong, Tianxiang Ma, Wei Liu:
Multi-party codebook distribution strategy based on secret sharing. 3029-3042 - Francisco T. Chimuco, João B. F. Sequeiros, Tiago M. C. Simões, Mário M. Freire, Pedro R. M. Inácio
:
Expediting the design and development of secure cloud-based mobile apps. 3043-3064 - Shirin Abbasi
, Navid Khaledian
, Amir Masoud Rahmani:
Trust management in the internet of vehicles: a systematic literature review of blockchain integration. 3065-3088 - Rudri Kalaria, A. S. M. Kayes
, Wenny Rahayu, Eric Pardede, Ahmad Salehi Shahraki:
Adaptive context-aware access control for IoT environments leveraging fog computing. 3089-3107
Volume 23, Number 5, October 2024
- Marco Rasori
, Andrea Saracino
, Paolo Mori
, Marco Tiloca
:
Using the ACE framework to enforce access and usage control with notifications of revoked access rights. 3109-3133 - Süleyman Muhammed Arikan, Aynur Koçak, Mustafa Alkan:
Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system. 3135-3151 - Ivar Moen, Aybars Oruc
, Ahmed Amro, Vasileios Gkioulos, Georgios Kavallieratos:
Survey-based analysis of cybersecurity awareness of Turkish seafarers. 3153-3178 - Mariam Masmoudi
, Ikram Amous, Corinne Amel Zayani, Florence Sèdes:
Trust attack prevention based on Spark-blockchain in social IoT: a survey. 3179-3198 - Zubair Ahmad
, Stefano Calzavara, Samuele Casarin, Ben Stock:
Information flow control for comparative privacy analyses. 3199-3216 - Stylianos Gerasimou, Konstantinos Limniotis:
A study on privacy and security aspects of personalised apps. 3217-3239 - Yahui Wang, Zhiyong Zhang, Kejing Zhao, Peng Wang, Ruirui Wu:
A few-shot learning based method for industrial internet intrusion detection. 3241-3252 - Håvard Jakobsen Ofte
:
The awareness of operators: a goal-directed task analysis in SOCs for critical infrastructure. 3253-3282 - Tanjila Mawla, Maanak Gupta, Safwa Ameer, Ravi Sandhu:
The $\mathrm {ACAC_{D}}$ model for mutable activity control and chain of dependencies in smart and connected systems. 3283-3310 - Yuejun Guo, Seifeddine Bettaieb, Fran Casino:
A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road ahead. 3311-3327 - Aulia Arif Wardana, Grzegorz Kolaczek, Arkadiusz Warzynski, Parman Sukarno:
Collaborative intrusion detection using weighted ensemble averaging deep neural network for coordinated attack detection in heterogeneous network. 3329-3349 - Hiroki Kuzuno, Toshihiro Yamauchi:
Mitigation of privilege escalation attack using kernel data relocation mechanism. 3351-3367 - Efstratios Vasilellis, Grigoris Gkionis, Dimitris Gritzalis:
Press play, install malware: a study of rhythm game-based malware dropping. 3369-3391 - Shuhei Enomoto, Hiroki Kuzuno, Hiroshi Yamada, Yoshiaki Shiraishi, Masakatu Morii:
Early mitigation of CPU-optimized ransomware using monitoring encryption instructions. 3393-3413 - Sorour Sheidani, Alireza Zarei:
Privacy-preserving two-party computation of line segment intersection. 3415-3432
Volume 23, Number 6, December 2024
- (Withdrawn) Deep learning based network intrusion detection system: a systematic literature review and future scopes. 3433-3463
- Beytüllah Yigit, Gürkan Gür, Bernhard Tellenbach, Fatih Alagöz:
Unmasking SDN flow table saturation: fingerprinting, attacks and defenses. 3465-3479 - Stefano Bistarelli, Andrea Imparato, Francesco Santini:
A TCP-based covert channel with integrity check and retransmission. 3481-3512 - Van-Hau Pham, Do Thi Thu Hien, Hien Do Hoang, Phan The Duy:
Defect-scanner: a comparative empirical study on language model and deep learning approach for software vulnerability detection. 3513-3526 - Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues:
A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks. 3527-3546 - Stephen Cook, Maryam Mehrnezhad, Ehsan Toreini:
Bluetooth security analysis of general and intimate health IoT devices and apps: the case of FemTech. 3547-3567 - Abdulrahman K. Alnaim:
Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing security. 3569-3589 - Pedro Antunes
, Nuno Guimarães
:
Guiding the implementation of data privacy with microservices. 3591-3608 - Takeshi Nakai, Kazumasa Shinagawa:
Secure multi-party computation with legally-enforceable fairness. 3609-3623 - Mohamed Amine Merzouk, Christopher Neal, Joséphine Delas, Reda Yaich, Nora Boulahia-Cuppens, Frédéric Cuppens:
Adversarial robustness of deep reinforcement learning-based intrusion detection. 3625-3651 - Safiullah Khan, Kashif Inayat, Fahad Bin Muslim, Yasir Ali Shah, Muhammad Atif Ur Rehman, Ayesha Khalid, Malik Imran, Akmalbek Abdusalomov:
Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher. 3653-3664 - Mohamed Abomhara, Livinus Obiora Nweke, Sule Yildirim Yayilgan, Debora Comparin, Kristel Teyras, Stéphanie de Labriolle:
Enhancing privacy protections in national identification systems: an examination of stakeholders' knowledge, attitudes, and practices of privacy by design. 3665-3689 - Jihane Jebrane, Saiida Lazaar:
An enhanced and verifiable lightweight authentication protocol for securing the Internet of Medical Things (IoMT) based on CP-ABE encryption. 3691-3710 - Àlex Miranda-Pascual
, Patricia Guerra-Balboa
, Javier Parra-Arnau, Jordi Forné
, Thorsten Strufe
:
An overview of proposals towards the privacy-preserving publication of trajectory data. 3711-3747 - Patricia Callejo
, Ignacio Gómez Fernández, Marcelo Bagnulo
:
"Animation" URL in NFT marketplaces considered harmful for privacy. 3749-3763 - Martin Bedoya, Sara Palacios, Daniel Díaz López, Estefania Laverde, Pantaleone Nespoli:
Enhancing DevSecOps practice with Large Language Models and Security Chaos Engineering. 3765-3788

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.