


default search action
International Journal of Information Security, Volume 24
Volume 24, Number 1, February 2025
- Manika Garg, Anita Goel:
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication. 1 - Shriniwas Patil, Keyur Parmar:
Novel mechanism for anonymous reporting and anonymous rewarding using blockchain technology. 2 - Max Landauer, Florian Skopik, Branka Stojanovic, Andreas Flatscher, Torsten Ullrich:
A review of time-series analysis for cyber security analytics: from intrusion detection to attack prediction. 3 - Md Shafiul Alam, Saif Ahmed, Mohsin Dhali, Syed Shah Alam:
Citizens' engagement with cybersecurity measures in Bangladesh: a cross-sectional study. 4 - Mohamed Aly Bouke
, Omar Imhemed Alramli
, Azizol Abdullah
:
XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection. 5 - Sajal Aggarwal, Ashish Bajaj, Dinesh Kumar Vishwakarma:
HOMOGRAPH: a novel textual adversarial attack architecture to unmask the susceptibility of linguistic acceptability classifiers. 6 - Vitalina Holubenko, Diogo Gaspar, Rúben Leal, Paulo Silva:
Autonomous intrusion detection for IoT: a decentralized and privacy preserving approach. 7 - Pablo Pérez-Tirador, Madhav P. Desai, Alejandro Rodriguez, Elena Berral, Teresa Romero, Gabriel Caffarena, Ruzica Jevtic:
Side-channel attacks and countermeasures for heart rate retrieval from ECG characterization device. 8 - Manal Jlil, Kaoutar Jouti, Jaouad Boumhidi, Chakir Loqman:
Improving traceability in e-governance file-sharing systems: the Moroccan justice system as a use case. 9 - Debrup Chakraborty, Avishek Majumder, Subhabrata Samajder:
Making searchable symmetric encryption schemes smaller and faster. 10 - Luís Prates, Rúben Pereira:
DevSecOps practices and tools. 11 - Samson O. Oruma, Ricardo Colomo Palacios, Vasileios Gkioulos:
Architectural views for social robots in public spaces: business, system, and security strategies. 12 - Ashutosh Kumar, L. Kavisankar, S. Venkatesan, Manish Kumar, Suneel Yadav, Sandeep Kumar Shukla, Rahamatullah Khondoker:
IoT device security audit tools: a comprehensive analysis and a layered architecture approach for addressing expanded security requirements. 13 - Weinan Liu, Jiawen Shi, Hong Wang, Tingting Chen, Qingqing Li, Zhaoyang Han, Jiangjun Yuan:
A location-updating based self-healing group key management scheme for VANETs. 14 - Ilias Chanis, Avi Arampatzis:
Enhancing phishing email detection with stylometric features and classifier stacking. 15 - Zijing Zhang
, Vimal Kumar
, Bernhard Pfahringer
, Albert Bifet
:
Ai-enabled automated common vulnerability scoring from common vulnerabilities and exposures descriptions. 16 - Cristina Alcaraz, Iman Hasnaouia Meskini, Javier López:
Digital twin communities: an approach for secure DT data sharing. 17 - Lior Tabansky
, Eynan Lichterman:
PROGRESS: the sectoral approach to cyber resilience. 18 - Dheerendra Mishra, Komal Pursharthi, Mrityunjay Singh, Ankita Mishra:
Construction of post quantum secure authenticated key agreement protocol for dew-assisted IoT systems. 19 - A. Termanini, Dawood Al-Abri, Hadj Bourdoucen, Ahmed Al-Maashri:
Using machine learning to detect network intrusions in industrial control systems: a survey. 20 - Sondes Ksibi, Faouzi Jaïdi, Adel Bouhoula:
MLRA-Sec: an adaptive and intelligent cyber-security-assessment model for internet of medical things (IoMT). 21 - Narges Kazempour, Mahtab Mirmohseni, Mohammad Reza Aref:
Information-theoretic privacy-preserving user authentication. 22 - Jinguo Li, Mengli Lu, Jin Zhang, Jing Wu:
Aldp-fl: an adaptive local differential privacy-based federated learning mechanism for IoT. 23 - Milos Stankovic, Xiao Hu, Akif Ahsen Ozer, Umit Karabiyik:
How engaged are you? A forensic analysis of the Oura Ring Gen 3 application across iOS, Android, and Cloud platforms. 24 - John Prakash Arockiasamy, Irene Sabarimuthu, Lydia Elizabeth Benjamin, Srinivasan Palaniswami:
pbins: private bins for top-k semantic search over encrypted data using transformers. 25 - Sonia Laudanna, Andrea Di Sorbo, Vinod Puthuvath, Corrado Aaron Visaggio, Gerardo Canfora:
Transformer or Autoencoder? Who is the ultimate adversary for attack detectors? 26 - Idoia Gamiz, Cristina Regueiro, Oscar Lage, Eduardo Jacob, Jasone Astorga:
Challenges and future research directions in secure multi-party computation for resource-constrained devices and large-scale computations. 27 - Hajime Ono, Kazuhiro Minami, Hideitsu Hino:
When should we use top coding in locally private estimation? 28 - Anum Paracha, Junaid Arshad, Mohamed Ben Farah, Khalid N. Ismail:
Deep behavioral analysis of machine learning algorithms against data poisoning. 29 - Joohee Lee, Sangrae Cho, Soohyung Kim, Saerom Park:
Verifiable computation over encrypted data via MPC-in-the-head zero-knowledge proofs. 30 - Ricardo Reyes-Acosta, Carlos Alberto Domínguez-Báez, Ricardo Mendoza González, Miguel Vargas Martin:
Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: a multivocal state of knowledge review. 31 - Yehong Luo, Nafei Zhu, Ziwen Wang, Lei Sun, Jingsha He, Anca Delia Jurcut, Yuzi Yi, Xiangjun Ma:
Privacy information propagation in online social networks - a case study based on Weibo data. 32 - Wanyi Gu, Guojun Wang
, Peiqiang Li, Guangxin Zhai, Xubin Li:
Detecting unknown vulnerabilities in smart contracts with the CNN-BiLSTM model. 33 - María Magdalena Payeras Capellà, Macià Mut Puigserver, Rosa Pericàs-Gornals:
Transferable channels for fair micropurchases. 34 - Retraction Note: Deep learning based network intrusion detection system: a systematic literature review and future scopes. 35
- Qisheng Chen, Kazumasa Omote
:
An intrinsic evaluator for embedding methods in malicious URL detection. 36 - Antonio Borrero-Foncubierta, Mercedes Rodriguez-Garcia, Andrés Muñoz, Juan Manuel Dodero:
Protecting privacy in the age of big data: exploring data linking methods for quasi-identifier selection. 37 - Angeliki Kitsiou, Maria Sideri, Michail Pantelelis, Stavros Simou, Aikaterini-Georgia Mavroeidi, Katerina Vgena, Eleni Tzortzaki, Christos Kalloniatis:
Developers' mindset on self-adaptive privacy and its requirements for cloud computing environments. 38 - Wei Yu, Zhixiang Chen, Hui Wang, Zeyu Miao, Dake Zhong:
Industrial network intrusion detection in open-set scenarios. 39 - Eduard-Matei Constantinescu, Mohammed El-hajj, Luca Mariot:
Exploring smooth number-based MAC algorithms for secure communication in IoT devices: a systematic literature review. 40 - Ángel Jesús Varela-Vaca, María Teresa Gómez-López, Yolanda Morales Zamora, Rafael M. Gasca:
Business process models and simulation to enable GDPR compliance. 41 - Jonas Ingemarsson, Marcus Birath
, Joakim Kävrestad:
Factors influencing Swedish citizens' willingness to provide their mobile phones to forensic examination. 42 - Shao-Fang Wen, Ankur Shukla, Basel Katt:
Artificial intelligence for system security assurance: A systematic literature review. 43 - Israa Abuelezz, Mahmoud Barhamgi, Sameha Alshakhsi, Ala Yankouskaya, Armstrong Nhlabatsi, Khaled M. Khan, Raian Ali:
How do gender and age similarities with a potential social engineer influence one's trust and willingness to take security risks? 44 - Juan Ignacio Iturbe Araya, Helena Rifà-Pous:
Enhancing unsupervised anomaly-based cyberattacks detection in smart homes through hyperparameter optimization. 45 - Farid Binbeshr, Chee Siong Khaw, Lip Yee Por, Muhammad Imam, Alawi A. Al-Saggaf, Anas Ahmad Abudaqa:
A systematic review of graphical password methods resistant to shoulder-surfing attacks. 46 - Konstantinos E. Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, Dimitrios Serpanos:
Balancing the act? Resampling versus imbalanced data for Wi-Fi IDS. 47 - Phan The Duy, Nghi Hoang Khoa, Nguyen Huu Quyen, Le Cong Trinh, Vu Trung Kien, Trinh Minh Hoang, Van-Hau Pham:
Vulnsense: efficient vulnerability detection in ethereum smart contracts by multimodal learning with graph neural network and language model. 48 - Chun Yang, Yining Ma, Binyu Xie, Yanni Li, Shuo Cong:
Multi-user covert communication in power internet of things networks. 49 - Mohammad Ryiad Al-Eiadeh, Mustafa Abdallah:
PR-DRA: PageRank-based defense resource allocation methods for securing interdependent systems modeled by attack graphs. 50 - Mohamed Rahouti, Hamza Drid, Khaled Hamouid, Karima Massmi, Sif Eddine Mehenna:
Brave-sdn: blockchain-reliant authentication for versatile east-west bound in distributed SDNs. 51 - Mohammad Hadi Rezayati, Abdolah Amirany, Mohammad Hossein Moaiyeri, Kian Jafari:
A new method for securing binary deep neural networks against model replication attacks using magnetic tunnel junctions. 52 - Sani M. Abdullahi, Sanja Lazarova-Molnar:
On the adoption and deployment of secure and privacy-preserving IIoT in smart manufacturing: a comprehensive guide with recent advances. 53 - Kosuke Higuchi, Ryotaro Kobayashi
:
Real-time open-file backup system with machine-learning detection model for ransomware. 54 - Mariam Arutunian, Sevak Sargsyan, Hripsime Hovhannisyan, Garnik Khroyan, Albert Mkrtchyan, Hovhannes Movsisyan, Arutyun Avetisyan, Hayk Aslanyan:
Accurate code fragment clone detection and its application in identifying known CVE clones. 55 - Marouane Kihal, Lamia Hamza:
Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter. 56 - Jason Diakoumakos
, Evangelos Chaskos
, Nicholas Kolokotronis
, George Lepouras
:
Cyber-security gamification in federation of cyber ranges: design, implementation, and evaluation. 57 - Hajime Ono:
Theoretical lower bounds for one-dimensional locally private estimations with missing data. 58 - Qisheng Chen, Kazumasa Omote:
Correction to: An intrinsic evaluator for embedding methods in malicious URL detection. 59 - Trong-Nghia To, Danh Le Kim, Do Thi Thu Hien, Nghi Hoang Khoa, Hien Do Hoang, Phan The Duy, Van-Hau Pham:
On the effectiveness of adversarial samples against ensemble learning-based windows PE malware detectors. 60 - Nasibeh Mohammadi, Afshin Rezakhani, Hamid Haj Seyyed Javadi, Parvaneh Asghari:
Enhancing time-series access control using deep recurrent neural networks and generative adversarial networks. 61 - Tala Talaei Khoei, Khair Al Shamaileh, Vijaya Kumar Devabhaktuni, Naima Kaabouch:
Performance analysis of capsule networks for detecting GPS spoofing attacks on unmanned aerial vehicles. 62 - Faheem Ullah, Jingsha He, Nafei Zhu, Ahsan Wajahat, Ahsan Nazir, Sirajuddin Qureshi, Hasan Shahzad:
Ehr management evolution through purpose-based access control and blockchain smart contracts. 63 - Nasim Tavakkoli
, Orçun Çetin, Emre Ekmekcioglu, Erkay Savas
:
From frontlines to online: examining target preferences in the Russia-Ukraine conflict. 64 - Lingrui Ren, Xingcan Zhang, Jian Wang:
Low complexity decompression method for FPGA bitstreams. 65 - Jeonggak Lyu, Ahyun Song, Euiseong Seo
, Gibum Kim
:
An exploratory analysis of the DPRK cyber threat landscape using publicly available reports. 66 - Eszter Kail, Annamária Riethné Nagy, Rita Fleiner, Anna Bánáti, Erno Rigó:
Low-impact, near real-time risk assessment for legacy IT infrastructures. 67 - Vicenç Torra:
Differentially private Choquet integral: extending mean, median, and order statistics. 68 - Cho Do Xuan, Dat Bui Quang, Vinh Dang Quang:
Large language models based vulnerability detection: How does it enhance performance? 69 - Sourena Khanzadeh, Euclides Carlos Pinto Neto, Shahrear Iqbal, Manar Alalfi, Scott Buffett:
An exploratory study on domain knowledge infusion in deep learning for automated threat defense. 71 - Eduardo B. Fernandez, Antonio Muñoz:
A cluster of patterns for trusted computing. 72

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.