Unmasking the common traits: an ensemble approach for effective malware detection Parthajit BorahUpasana SarmahJ. K. Kalita Regular Contribution 30 April 2024
Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things Uneneibotejit OtokwalaAndrei PetrovskiHarsha Kalutarage Regular Contribution Open access 30 April 2024
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks Raja Zeeshan HaiderBaber AslamZafar Iqbal Regular Contribution 29 April 2024
Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis Ahmed M. Asfahani Regular Contribution 26 April 2024
An online intrusion detection method for industrial control systems based on extended belief rule base Guangyu QianJinyuan LiYou Cao Regular Contribution 26 April 2024
A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection N. D. PatelB. M. MehtreRajeev Wankar Regular Contribution 25 April 2024
Validation and extension of two domain-specific information privacy competency models Aikaterini SoumelidouAggeliki Tsohou Regular Contribution Open access 22 April 2024
A generic framework for blockchain-assisted on-chain auditing for off-chain storage Saeed Banaeian FarMaryam Rajabzadeh AsaarAfrooz Haghbin Regular Contribution 18 April 2024
Enhancing security in QCA-based circuits using optimal key gate placement M. AmuthaK. R. Kavitha Regular Contribution 17 April 2024
Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard Abdullah Hamad N. Almoqbil Regular Contribution 13 April 2024
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network Kousik BarikSanjay MisraLuis Fernandez-Sanz Regular Contribution Open access 12 April 2024
Selfish mining attack in blockchain: a systematic literature review Nadisha MadhushanieSugandima VidanagamachchiNalin Arachchilage Regular Contribution 10 April 2024
Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack Joaquín Navajas-AdánEulàlia Badia-GelabertRafael Mayo-García Regular Contribution Open access 04 April 2024
Trustworthy machine learning in the context of security and privacy Ramesh UpretiPedro G. LindAnis Yazidi Regular Contribution Open access 03 April 2024
Attribute inference privacy protection for pre-trained models Hossein Abedi KhorasganiNoman MohammedYang Wang Regular Contribution 02 April 2024
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives Emmanuel KwartengMumin Cebe Regular Contribution 29 March 2024
A context-aware on-board intrusion detection system for smart vehicles Davide MicaleIlaria MatteucciGiuseppe Patanè Regular Contribution Open access 28 March 2024
Mastering data privacy: leveraging K-anonymity for robust health data sharing Stylianos KaragiannisChristoforos NtantogianLuís Landeiro Ribeiro Regular Contribution Open access 26 March 2024
International journal of information security: a bibliometric study, 2007–2023 Rahul Dwivedi Regular Contribution 25 March 2024
MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs Md. Alamin TalukderSelina SharminSunil Aryal Regular Contribution Open access 19 March 2024
Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things Ala MughaidIbrahim ObeidatHazem Migdady Regular Contribution 19 March 2024
A new approach for detecting process injection attacks using memory analysis Mohammed NasereddinRaad Al-Qassas Regular Contribution 16 March 2024
Generative AI for pentesting: the good, the bad, the ugly Eric HilarioSami AzamBharanidharan Shanmugam Regular Contribution Open access 15 March 2024
Spatial de-correlation of generated keys from wireless channels using adversarial deep learning Amir AliabadianMohammadreza ZahabiMajid Mobini Regular Contribution 15 March 2024
Random forest evaluation using multi-key homomorphic encryption and lookup tables Diana-Elena PetreanRodica Potolea Regular Contribution Open access 14 March 2024
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards Anil Kumar ChillaraParesh SaxenaKrishnakumar Kesavan Regular Contribution 14 March 2024
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT) Vagner E. QuincozesSilvio E. QuincozesAnis Koubaa Regular Contribution 13 March 2024
Dynamic authentication for intelligent sensor clouds in the Internet of Things Hussain Al-AqrabiAhmed M. ManasrahHoda Alkhzaimi Regular Contribution 13 March 2024
Abuse-freeness in contract signing: a blockchain-based proposal Josep-Lluís Ferrer-GomilaM. Francisca Hinarejos Regular Contribution Open access 10 March 2024
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network Eslam AbdelkreemSherif HusseinAshraf Tammam Regular Contribution Open access 07 March 2024
Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies W. M. A. B. WijesundaraJoong-Sun LeeTakashi Obi Regular Contribution Open access 07 March 2024
Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices Rajiv ShahDeniz CemilogluVasilis Katos Regular Contribution Open access 06 March 2024
A comprehensive review on permissions-based Android malware detection Yash SharmaAnshul Arora Regular Contribution 04 March 2024
AutoPKI: public key infrastructure for IoT with automated trust transfer Joel HöglundSimon BougetShahid Raza Regular Contribution Open access 02 March 2024
Real-time system call-based ransomware detection Christopher Jun Wen ChewVimal KumarRobi Malik Regular Contribution Open access 02 March 2024
RAMA: a risk assessment solution for healthcare organizations Michail SmyrlisEvangelos FlorosGeorge Spanoudakis Regular Contribution Open access 01 March 2024
Pioneering automated vulnerability detection for smart contracts in blockchain using KEVM: Guardian ADRGAN Rohini G. PiseSonali Patil Regular Contribution 27 February 2024
Neighbor discovery protocol anomaly-based detection system using neural network algorithm Redhwan M. A. SaadMohammed AnbarIznan H. Hasbullah Regular Contribution 11 February 2024
Robust password security: a genetic programming approach with imbalanced dataset handling Nikola AndelićSandi Baressi S̆egotaZlatan Car Regular Contribution 07 February 2024
Activity-based payments: alternative (anonymous) online payment model Rafał Leszczyna Regular Contribution 03 February 2024
Maritime decision-makers and cyber security: deck officers’ perception of cyber risks towards IT and OT systems Marie Haugli-SandvikMass Soldal LundFrøy Birte Bjørneseth Regular Contribution Open access 02 February 2024
Tracing the evolution of cyber resilience: a historical and conceptual review Vasiliki TzavaraSavvas Vassiliadis Regular Contribution Open access 01 February 2024
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns Giddeon Njamngang AngaforIryna YevseyevaLeandros Maglaras Regular Contribution 29 January 2024
Blockchain-based BATMAN protocol using mobile ad hoc network (MANET) with an ensemble algorithm Upendra SinghSumit Kumar SharmaPreeti Jha Regular contribution 27 January 2024
BLISS: blockchain-based integrated security system for internet of things (IoT) applications Lokendra VishwakarmaDebasis Das Regular Contribution 25 January 2024
An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction Yesi Novaria KunangSiti NurmainiBhakti Yudho Suprapto Regular Contribution 23 January 2024
From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity Awais YousafJianying Zhou Regular Contribution 19 January 2024
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review Elham EbrahimpourShahram Babaie Survey 12 January 2024
Correction: A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs) Osama Bassam J. RabieShitharth SelvarajanMueen Uddin Correction Open access 10 January 2024
A deep learning approach based on multi-view consensus for SQL injection detection Arzu Gorgulu Kakisim Regular Contribution Open access 09 January 2024 Pages: 1541 - 1556