Stop the war!
Остановите войну!
for scientists:
default search action
International Journal of Information Security, Volume 23
Volume 23, Number 1, February 2024
- Arun Sekar Rajasekaran, Maria Azees:
A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation. 1-13 - Hakima Rym Rahal, Sihem Slatnia, Okba Kazar, Ezedin Barka, Saad Harous:
Blockchain-based multi-diagnosis deep learning application for various diseases classification. 15-30 - Stefano Silvestri, Shareful Islam, Dmitry Amelin, Gabriele Weiler, Spyridon Papastergiou, Mario Ciampi:
Cyber threat assessment and management for securing healthcare ecosystems using natural language processing. 31-50 - Osama Bassam J. Rabie, Shitharth Selvarajan, Tawfiq Hasanin, Gouse Baig Mohammad, Abddulrhman M. Alshareef, Mueen Uddin:
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs). 51-80 - Afnan A. Alharbi:
Federated transfer learning for attack detection for Internet of Medical Things. 81-100 - Alexandre Rekeraho, Daniel Tudor Cotfas, Petru Adrian Cotfas, Titus Constantin Balan, Emmanuel Tuyishime, Rebecca Acheampong:
Cybersecurity challenges in IoT-based smart renewable energy. 101-117 - Sofiane Lagraa, Martin Husák, Hamida Seba, Satyanarayana Vuppala, Radu State, Moussa Ouedraogo:
A review on graph-based approaches for network security monitoring and botnet detection. 119-140 - Believe Ayodele, Victor Buttigieg:
SDN as a defence mechanism: a comprehensive survey. 141-185 - Konstantinos Adamos, George Stergiopoulos, Michalis Karamousadakis, Dimitris Gritzalis:
Enhancing attack resilience of cyber-physical systems through state dependency graph models. 187-198 - K. Dinesh, S. V. N. Santhosh Kumar:
Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network. 199-223 - Åvald Åslaugson Sommervoll, László Erdodi, Fabio Massimo Zennaro:
Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents. 225-246 - Hakan Kekül, Burhan Ergen, Halil Arslan:
Estimating vulnerability metrics with word embedding and multiclass classification methods. 247-270 - Silviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian:
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware. 271-297 - Gwonsang Ryu, Daeseon Choi:
Detection of adversarial attacks based on differences in image entropy. 299-314 - Bhavya Dhingra, Vidhi Jain, Deepak Kumar Sharma, Koyel Datta Gupta, Deepika Kukreja:
RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment. 315-330 - Philgeun Jin, Namjun Kim, Sangjin Lee, Doowon Jeong:
Forensic investigation of the dark web on the Tor network: pathway toward the surface web. 331-346 - Aristeidis Farao, Georgios Paparis, Sakshyam Panda, Emmanouil Panaousis, Apostolis Zarras, Christos Xenakis:
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain. 347-371 - Fabrice Mvah, Vianney Kengne Tchendji, Clémentin Tayou Djamégni, Ahmed H. Anwar, Deepak K. Tosh, Charles A. Kamhoua:
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks. 373-387 - Jun Narita, Takao Murakami, Hideitsu Hino, Masakatsu Nishigaki, Tetsushi Ohki:
Synthesizing differentially private location traces including co-locations. 389-410 - Tao Feng, Wentao Jin, Minghu Zhang, Lu Zheng:
Security assessment and improvement of smart grid NIKE protocol. 411-429 - Oussama Amine, Karim Baghery, Zaira Pindado, Carla Ràfols:
Simulation extractable versions of Groth's zk-SNARK revisited. 431-445 - Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate:
Pepal: Penalizing multimedia breaches and partial leakages. 447-465 - Marius Elmiger, Mouad Lemoudden, Nikolaos Pitropakis, William J. Buchanan:
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant. 467-485 - Partha Sarathi Chakraborty, Somanath Tripathy, Sanjeet Kumar Nayak:
BASPED: Blockchain assisted searchable public key encryption over outsourced data. 487-503 - Muhammad Adnan, Muhammad Osama Imam, Muhammad Furqan Javed, Iqbal Murtza:
Improving spam email classification accuracy using ensemble techniques: a stacking approach. 505-517 - Poornima M. Chanal, Mahabaleshwar S. Kakkasageri:
Blockchain-based data integrity framework for Internet of Things. 519-532 - Md. Ahsan Ayub, Ambareen Siraj, Bobby Filar, Maanak Gupta:
RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware. 533-556 - Vikas Kumar Jain, Meenakshi Tripathi:
An integrated deep learning model for Ethereum smart contract vulnerability detection. 557-575 - Anjum, Rahul Katarya:
Hate speech, toxicity detection in online social media: a recent survey of state of the art and opportunities. 577-608 - Aikaterini Triakosia, Panagiotis Rizomiliotis, Cecilia Tonelli, Fabio Federici, Valerio Senni:
Secure outsourcing of manufacturing compliance checks. 609-627 - Junichiro Hayata, Jacob C. N. Schuldt, Goichiro Hanaoka, Kanta Matsuura:
On private information retrieval supporting range queries. 629-647 - Vidhi Bansal, Niyati Baliyan, Mohona Ghosh:
MLChain: a privacy-preserving model learning framework using blockchain. 649-677 - Patruni Muralidhara Rao, Abdul Gaffar Humayun:
PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks. 679-698
Volume 23, Number 2, April 2024
- Constantinos Patsakis, Eugenia A. Politou, Efthimios Alepis, Julio C. Hernandez-Castro:
Cashing out crypto: state of practice in ransom payments. 699-712 - Ahlem Hamdi, Lamia Fourati, Samiha Ayed:
Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures. 713-757 - Houssam Zouhri, Ali Idri, Ahmed Ratnani:
Evaluating the impact of filter-based feature selection in intrusion detection systems. 759-785 - Miguel Angel Olivero, Antonia Bertolino, Francisco José Domínguez Mayo, María José Escalona, Ilaria Matteucci:
A systematic mapping study on security for systems of systems. 787-817 - Richa Goenka, Meenu Chawla, Namita Tiwari:
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy. 819-848 - Mamatha Maddu, Yamarthi Narasimha Rao:
Network intrusion detection and mitigation in SDN using deep learning models. 849-862 - Auwal Shehu Ali, Zarul Fitri Zaaba, Manmeet Mahinderjit Singh:
The rise of "security and privacy": bibliometric analysis of computer privacy research. 863-885 - Ehab Alkhateeb, Ali A. Ghorbani, Arash Habibi Lashkari:
A survey on run-time packers and mitigation techniques. 887-913 - Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi:
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks. 915-934 - Gaurav Tyagi, Rahul Kumar:
An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function. 935-962 - Antonio Villalón-Huerta, Ismael Ripoll-Ripoll, Hector Marco-Gisbert:
A survey and characterization of Close Access Cyberspace Operations. 963-980 - Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel:
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems. 981-997 - Peng Xun, Ziyu Yang, Haoyang Zhu, Zhu Tang:
Locating collaborative attack targets based on physical invariants toward cyber-physical systems. 999-1017 - Patruni Muralidhara Rao, Abdul Gaffar Humayun:
Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks. 1019 - Ricardo Martins Gonçalves, Miguel Mira da Silva, Paulo Rupino da Cunha:
Olympus: a GDPR compliant blockchain system. 1021-1036 - Jalaiah Saikam, Koteswararao Ch:
An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152. 1037-1054 - Subhash Ariyadasa, Shantha Fernando, Subha Fernando:
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks. 1055-1076 - Lei Xu, Junhai Zhai:
Generating adversarial examples with collaborative generative models. 1077-1091 - Juan Manuel Castelo Gómez, Sergio Ruiz-Villafranca:
Integrating the edge computing paradigm into the development of IoT forensic methodologies. 1093-1116 - Kenan Ince:
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT. 1117-1130 - Firas Hamila, Mohammad Hamad, Daniel Costa Salgado, Sebastian Steinhorst:
Enhancing security in Fiat-Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication. 1131-1148 - Thomas Prantl, Lukas Horn, Simon Engel, Lukas Iffländer, Lukas Beierlieb, Christian Krupitzer, André Bauer, Mansi Sakarvadia, Ian T. Foster, Samuel Kounev:
De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem. 1149-1169 - Jessica B. Heluany, Vasileios Gkioulos:
A review on digital twins for power generation and distribution. 1171-1195 - Rao Faizan Ali, P. D. D. Dominic, Sadaf Hina, Sheraz Naseer:
Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees. 1197-1213 - Philip Empl, Daniel Schlette, Lukas Stöger, Günther Pernul:
Generating ICS vulnerability playbooks with open standards. 1215-1230 - Habib El Amin, Lina Oueidat, Maroun Chamoun, Abed Ellatif Samhat, Antoine Feghali:
Blockchain-based multi-organizational cyber risk management framework for collaborative environments. 1231-1249 - Himanshu Nandanwar, Rahul Katarya:
TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment. 1251-1277 - Dimmiti Srinivasa Rao, Emerson Ajith Jubilson:
Cyberattack defense mechanism using deep learning techniques in software-defined networks. 1279-1291 - Sepideh Niktabe, Arash Habibi Lashkari, Dilli Prasad Sharma:
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition. 1293-1316 - Rupshali Dasgupta, Meghabriti Pramanik, Pabitra Mitra, Dipanwita Roy Chowdhury:
Intrusion detection for power grid: a review. 1317-1329 - H. Asad, S. Adhikari, Ilir Gashi:
A perspective-retrospective analysis of diversity in signature-based open-source network intrusion detection systems. 1331-1346 - Sultan S. Alqahtani:
Security bug reports classification using fasttext. 1347-1358 - Fatna El Mendili, Mohammed Fattah, Nisrine Berros, Youness Filaly, Younès El Bouzekri El Idrissi:
Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning. 1359-1388 - Sohail Abbas, Manar Abu Talib, Qassim Nasir, Sally Idhis, Mariam M. Alaboudi, Ali Mohamed:
Radio frequency fingerprinting techniques for device identification: a survey. 1389-1427 - Ferney Martínez, Luis Enrique Sánchez, Antonio Santos-Olmo, David Garcia Rosado, Eduardo Fernández-Medina:
Maritime cybersecurity: protecting digital seas. 1429-1457 - Ndukwe Ukeje, Jairo A. Gutiérrez, Krassie Petrova:
Information security and privacy challenges of cloud computing for government adoption: a systematic review. 1459-1475 - Aybars Oruc, Nabin Chowdhury, Vasileios Gkioulos:
A modular cyber security training programme for the maritime domain. 1477-1512 - Fei Zuo, Junghwan Rhee:
Vulnerability discovery based on source code patch commit mining: a systematic literature review. 1513-1526 - Fulvio Frati, Georgiana Darau, Nikos Salamanos, Pantelitsa Leonidou, Costas Iordanou, Dimitris Plachouris, Efstratios Syrmas, Evangelos Floros, George Nikitakis, George Spanoudakis, Konstantinos Kalais, Stella Tsichlaki, Ernesto Damiani, George C. Kagadis, Jihane Najar, Michael Sirivianos:
Cybersecurity training and healthcare: the AERAS approach. 1527-1539 - Arzu Gorgulu Kakisim:
A deep learning approach based on multi-view consensus for SQL injection detection. 1541-1556
Volume 23, Number 3, June 2024
- Yakub Kayode Saheed, Sanjay Misra:
A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things. 1557-1581 - Elham Ebrahimpour, Shahram Babaie:
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review. 1583-1602 - Awais Yousaf, Jianying Zhou:
From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity. 1603-1618 - Yesi Novaria Kunang, Siti Nurmaini, Deris Stiawan, Bhakti Yudho Suprapto:
An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction. 1619-1648 - Lokendra Vishwakarma, Debasis Das:
BLISS: blockchain-based integrated security system for internet of things (IoT) applications. 1649-1665 - Upendra Singh, Sumit Kumar Sharma, Mukul Shukla, Preeti Jha:
Blockchain-based BATMAN protocol using mobile ad hoc network (MANET) with an ensemble algorithm. 1667-1677 - Giddeon Njamngang Angafor, Iryna Yevseyeva, Leandros Maglaras:
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns. 1679-1693 - Vasiliki Tzavara, Savvas Vassiliadis:
Tracing the evolution of cyber resilience: a historical and conceptual review. 1695-1719 - Marie Haugli-Sandvik, Mass Soldal Lund, Frøy Birte Bjørneseth:
Maritime decision-makers and cyber security: deck officers' perception of cyber risks towards IT and OT systems. 1721-1739 - Rafal Leszczyna:
Activity-based payments: alternative (anonymous) online payment model. 1741-1759 - Nikola Andelic, Sandi Baressi Segota, Zlatan Car:
Robust password security: a genetic programming approach with imbalanced dataset handling. 1761-1786 - Redhwan M. A. Saad, Mohammed Anbar, Selvakumar Manickam, Samir I. Shaheen, Iznan Husainy Hasbullah:
Neighbor discovery protocol anomaly-based detection system using neural network algorithm. 1787-1803 - Rohini G. Pise, Sonali Patil:
Pioneering automated vulnerability detection for smart contracts in blockchain using KEVM: Guardian ADRGAN. 1805-1819 - Michail Smyrlis, Evangelos Floros, Ioannis Basdekis, Dumitru-Bogdan Prelipcean, Aristeidis Sotiropoulos, Hervé Debar, Apostolis Zarras, George Spanoudakis:
RAMA: a risk assessment solution for healthcare organizations. 1821-1838 - Christopher Jun-Wen Chew, Vimal Kumar, Panos Patros, Robi Malik:
Real-time system call-based ransomware detection. 1839-1858 - Joel Höglund, Simon Bouget, Martin Furuhed, John Preuß Mattsson, Göran Selander, Shahid Raza:
AutoPKI: public key infrastructure for IoT with automated trust transfer. 1859-1875 - Yash Sharma, Anshul Arora:
A comprehensive review on permissions-based Android malware detection. 1877-1912 - Rajiv Shah, Deniz Cemiloglu, Cagatay Yucel, Raian Ali, Vasilis Katos:
Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices. 1913-1926 - W. M. A. B. Wijesundara, Joong Sun Lee, Dara Tith, Eleni Aloupogianni, Hiroyuki Suzuki, Takashi Obi:
Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies. 1927-1937 - Eslam Abdelkreem, Sherif Hussein, Ashraf Tammam:
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network. 1939-1961 - Josep Lluís Ferrer-Gomila, M. Francisca Hinarejos:
Abuse-freeness in contract signing: a blockchain-based proposal. 1963-1974 - Vagner Ereno Quincozes, Silvio E. Quincozes, Juliano F. Kazienko, Simone Gama, Omar Cheikhrouhou, Anis Koubaa:
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT). 1975-2002 - Hussain Al-Aqrabi, Ahmed M. Manasrah, Richard Hill, Mohammed Q. Shatnawi, Mohammad Sh. Daoud, Hoda Alkhzaimi:
Dynamic authentication for intelligent sensor clouds in the Internet of Things. 2003-2021 - Diana-Elena Petrean, Rodica Potolea:
Random forest evaluation using multi-key homomorphic encryption and lookup tables. 2023-2041 - Anil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti, Manik Gupta, Raghu Kondapalli, Zhichao Zhang, Krishnakumar Kesavan:
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards. 2043-2061 - Amir Aliabadian, Mohammad Reza Zahabi, Majid Mobini:
Spatial de-correlation of generated keys from wireless channels using adversarial deep learning. 2063-2073 - Eric Hilario, Sami Azam, Jawahar Sundaram, Khwaja Imran Mohammed, Bharanidharan Shanmugam:
Generative AI for pentesting: the good, the bad, the ugly. 2075-2097 - Mohammed Nasereddin, Raad S. Al-Qassas:
A new approach for detecting process injection attacks using memory analysis. 2099-2121 - Ala Mughaid, Ibrahim Obeidat, Laith Abualigah, Shadi AlZu'bi, Mohammad Sh. Daoud, Hazem Migdady:
Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things. 2123-2137 - Md. Alamin Talukder, Selina Sharmin, Md. Ashraf Uddin, Md. Manowarul Islam, Sunil Aryal:
MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs. 2139-2158 - Rahul Dwivedi:
International journal of information security: a bibliometric study, 2007-2023. 2159-2187 - Stylianos Karagiannis, Christoforos Ntantogian, Emmanouil Magkos, Aggeliki Tsohou, Luís Landeiro Ribeiro:
Mastering data privacy: leveraging K-anonymity for robust health data sharing. 2189-2201 - Davide Micale, Ilaria Matteucci, Florian Fenzl, Roland Rieke, Giuseppe Patanè:
A context-aware on-board intrusion detection system for smart vehicles. 2203-2223 - Emmanuel Kwarteng, Mumin Cebe:
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives. 2225-2268 - Hossein Abedi Khorasgani, Noman Mohammed, Yang Wang:
Attribute inference privacy protection for pre-trained models. 2269-2285 - Ramesh Upreti, Pedro G. Lind, Ahmed Elmokashfi, Anis Yazidi:
Trustworthy machine learning in the context of security and privacy. 2287-2314 - Nadisha Madhushanie, Sugandima Vidanagamachchi, Nalin A. G. Arachchilage:
Selfish mining attack in blockchain: a systematic literature review. 2333-2351 - Kousik Barik, Sanjay Misra, Luis Fernández Sanz:
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network. 2353-2376 - Abdullah Hamad N. Almoqbil:
Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard. 2377-2394 - M. Amutha, K. R. Kavitha:
Enhancing security in QCA-based circuits using optimal key gate placement. 2395-2405 - Saeed Banaeian Far, Maryam Rajabzadeh Asaar, Afrooz Haghbin:
A generic framework for blockchain-assisted on-chain auditing for off-chain storage. 2407-2435 - Aikaterini Soumelidou, Aggeliki Tsohou:
Validation and extension of two domain-specific information privacy competency models. 2437-2455 - N. D. Patel, B. M. Mehtre, Rajeev Wankar:
A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection. 2457-2487 - Osama Bassam J. Rabie, Shitharth Selvarajan, Tawfiq Hasanin, Gouse Baig Mohammad, Abddulrhman M. Alshareef, Mueen Uddin:
Correction: A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs). 2489
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.