


default search action
International Journal of Information Security, Volume 24
Volume 24, Number 1, February 2025
- Manika Garg, Anita Goel:
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication. 1 - Shriniwas Patil, Keyur Parmar:
Novel mechanism for anonymous reporting and anonymous rewarding using blockchain technology. 2 - Max Landauer
, Florian Skopik
, Branka Stojanovic, Andreas Flatscher, Torsten Ullrich:
A review of time-series analysis for cyber security analytics: from intrusion detection to attack prediction. 3 - Md Shafiul Alam, Saif Ahmed
, Mohsin Dhali, Syed Shah Alam:
Citizens' engagement with cybersecurity measures in Bangladesh: a cross-sectional study. 4 - Mohamed Aly Bouke
, Omar Imhemed Alramli
, Azizol Abdullah
:
XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection. 5 - Sajal Aggarwal
, Ashish Bajaj, Dinesh Kumar Vishwakarma:
HOMOGRAPH: a novel textual adversarial attack architecture to unmask the susceptibility of linguistic acceptability classifiers. 6 - Vitalina Holubenko, Diogo Gaspar, Rúben Leal, Paulo Silva:
Autonomous intrusion detection for IoT: a decentralized and privacy preserving approach. 7 - Pablo Pérez-Tirador
, Madhav P. Desai, Alejandro Rodriguez, Elena Berral, Teresa Romero, Gabriel Caffarena, Ruzica Jevtic:
Side-channel attacks and countermeasures for heart rate retrieval from ECG characterization device. 8 - Manal Jlil
, Kaoutar Jouti, Jaouad Boumhidi, Chakir Loqman:
Improving traceability in e-governance file-sharing systems: the Moroccan justice system as a use case. 9 - Debrup Chakraborty, Avishek Majumder, Subhabrata Samajder:
Making searchable symmetric encryption schemes smaller and faster. 10 - Luís Prates, Rúben Pereira:
DevSecOps practices and tools. 11 - Samson O. Oruma, Ricardo Colomo Palacios, Vasileios Gkioulos:
Architectural views for social robots in public spaces: business, system, and security strategies. 12 - Ashutosh Kumar
, L. Kavisankar, S. Venkatesan, Manish Kumar, Suneel Yadav, Sandeep Kumar Shukla, Rahamatullah Khondoker:
IoT device security audit tools: a comprehensive analysis and a layered architecture approach for addressing expanded security requirements. 13 - Weinan Liu, Jiawen Shi, Hong Wang, Tingting Chen, Qingqing Li, Zhaoyang Han, Jiangjun Yuan:
A location-updating based self-healing group key management scheme for VANETs. 14 - Ilias Chanis, Avi Arampatzis:
Enhancing phishing email detection with stylometric features and classifier stacking. 15 - Zijing Zhang
, Vimal Kumar
, Bernhard Pfahringer
, Albert Bifet
:
Ai-enabled automated common vulnerability scoring from common vulnerabilities and exposures descriptions. 16 - Cristina Alcaraz, Iman Hasnaouia Meskini
, Javier López:
Digital twin communities: an approach for secure DT data sharing. 17 - Lior Tabansky
, Eynan Lichterman:
PROGRESS: the sectoral approach to cyber resilience. 18 - Dheerendra Mishra, Komal Pursharthi, Mrityunjay Singh, Ankita Mishra:
Construction of post quantum secure authenticated key agreement protocol for dew-assisted IoT systems. 19 - A. Termanini, Dawood Al-Abri, Hadj Bourdoucen, Ahmed Al-Maashri:
Using machine learning to detect network intrusions in industrial control systems: a survey. 20 - Sondes Ksibi, Faouzi Jaïdi
, Adel Bouhoula:
MLRA-Sec: an adaptive and intelligent cyber-security-assessment model for internet of medical things (IoMT). 21 - Narges Kazempour, Mahtab Mirmohseni, Mohammad Reza Aref:
Information-theoretic privacy-preserving user authentication. 22 - Jinguo Li, Mengli Lu, Jin Zhang, Jing Wu:
Aldp-fl: an adaptive local differential privacy-based federated learning mechanism for IoT. 23 - Milos Stankovic, Xiao Hu, Akif Ahsen Ozer, Umit Karabiyik:
How engaged are you? A forensic analysis of the Oura Ring Gen 3 application across iOS, Android, and Cloud platforms. 24 - John Prakash Arockiasamy, Irene Sabarimuthu, Lydia Elizabeth Benjamin, Srinivasan Palaniswami:
pbins: private bins for top-k semantic search over encrypted data using transformers. 25 - Sonia Laudanna, Andrea Di Sorbo, Vinod Puthuvath, Corrado Aaron Visaggio, Gerardo Canfora:
Transformer or Autoencoder? Who is the ultimate adversary for attack detectors? 26 - Idoia Gamiz
, Cristina Regueiro
, Oscar Lage, Eduardo Jacob, Jasone Astorga:
Challenges and future research directions in secure multi-party computation for resource-constrained devices and large-scale computations. 27 - Hajime Ono
, Kazuhiro Minami, Hideitsu Hino:
When should we use top coding in locally private estimation? 28 - Anum Paracha, Junaid Arshad, Mohamed Ben Farah
, Khalid N. Ismail
:
Deep behavioral analysis of machine learning algorithms against data poisoning. 29 - Joohee Lee, Sangrae Cho, Soohyung Kim, Saerom Park:
Verifiable computation over encrypted data via MPC-in-the-head zero-knowledge proofs. 30 - Ricardo Reyes-Acosta, Carlos Alberto Domínguez-Báez
, Ricardo Mendoza González, Miguel Vargas Martin:
Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: a multivocal state of knowledge review. 31 - Yehong Luo, Nafei Zhu, Ziwen Wang, Lei Sun, Jingsha He, Anca Delia Jurcut, Yuzi Yi, Xiangjun Ma:
Privacy information propagation in online social networks - a case study based on Weibo data. 32 - Wanyi Gu, Guojun Wang
, Peiqiang Li, Guangxin Zhai, Xubin Li:
Detecting unknown vulnerabilities in smart contracts with the CNN-BiLSTM model. 33 - María Magdalena Payeras Capellà, Macià Mut Puigserver, Rosa Pericàs-Gornals:
Transferable channels for fair micropurchases. 34 - Retraction Note: Deep learning based network intrusion detection system: a systematic literature review and future scopes. 35
- Qisheng Chen
, Kazumasa Omote
:
An intrinsic evaluator for embedding methods in malicious URL detection. 36 - Antonio Borrero-Foncubierta, Mercedes Rodriguez-Garcia, Andrés Muñoz, Juan Manuel Dodero:
Protecting privacy in the age of big data: exploring data linking methods for quasi-identifier selection. 37 - Angeliki Kitsiou, Maria Sideri, Michail Pantelelis
, Stavros Simou, Aikaterini-Georgia Mavroeidi, Katerina Vgena, Eleni Tzortzaki, Christos Kalloniatis:
Developers' mindset on self-adaptive privacy and its requirements for cloud computing environments. 38 - Wei Yu, Zhixiang Chen, Hui Wang, Zeyu Miao, Dake Zhong:
Industrial network intrusion detection in open-set scenarios. 39 - Eduard-Matei Constantinescu, Mohammed El-hajj, Luca Mariot:
Exploring smooth number-based MAC algorithms for secure communication in IoT devices: a systematic literature review. 40 - Ángel Jesús Varela-Vaca
, María Teresa Gómez-López, Yolanda Morales Zamora, Rafael M. Gasca:
Business process models and simulation to enable GDPR compliance. 41 - Jonas Ingemarsson
, Marcus Birath
, Joakim Kävrestad
:
Factors influencing Swedish citizens' willingness to provide their mobile phones to forensic examination. 42 - Shao-Fang Wen, Ankur Shukla, Basel Katt:
Artificial intelligence for system security assurance: A systematic literature review. 43 - Israa Abuelezz, Mahmoud Barhamgi, Sameha Alshakhsi, Ala Yankouskaya, Armstrong Nhlabatsi, Khaled M. Khan, Raian Ali:
How do gender and age similarities with a potential social engineer influence one's trust and willingness to take security risks? 44 - Juan Ignacio Iturbe Araya, Helena Rifà-Pous:
Enhancing unsupervised anomaly-based cyberattacks detection in smart homes through hyperparameter optimization. 45 - Farid Binbeshr
, Chee Siong Khaw, Lip Yee Por
, Muhammad Imam, Alawi A. Al-Saggaf, Anas Ahmad Abudaqa:
A systematic review of graphical password methods resistant to shoulder-surfing attacks. 46 - Konstantinos E. Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, Dimitrios Serpanos:
Balancing the act? Resampling versus imbalanced data for Wi-Fi IDS. 47 - Phan The Duy, Nghi Hoang Khoa, Nguyen Huu Quyen
, Le Cong Trinh, Vu Trung Kien, Trinh Minh Hoang, Van-Hau Pham:
Vulnsense: efficient vulnerability detection in ethereum smart contracts by multimodal learning with graph neural network and language model. 48 - Chun Yang, Yining Ma, Binyu Xie, Yanni Li, Shuo Cong:
Multi-user covert communication in power internet of things networks. 49 - Mohammad Ryiad Al-Eiadeh, Mustafa Abdallah:
PR-DRA: PageRank-based defense resource allocation methods for securing interdependent systems modeled by attack graphs. 50 - Mohamed Rahouti, Hamza Drid, Khaled Hamouid, Karima Massmi, Sif Eddine Mehenna:
Brave-sdn: blockchain-reliant authentication for versatile east-west bound in distributed SDNs. 51 - Mohammad Hadi Rezayati, Abdolah Amirany, Mohammad Hossein Moaiyeri, Kian Jafari:
A new method for securing binary deep neural networks against model replication attacks using magnetic tunnel junctions. 52 - Sani M. Abdullahi
, Sanja Lazarova-Molnar:
On the adoption and deployment of secure and privacy-preserving IIoT in smart manufacturing: a comprehensive guide with recent advances. 53 - Kosuke Higuchi
, Ryotaro Kobayashi
:
Real-time open-file backup system with machine-learning detection model for ransomware. 54 - Mariam Arutunian, Sevak Sargsyan, Hripsime Hovhannisyan, Garnik Khroyan, Albert Mkrtchyan, Hovhannes Movsisyan, Arutyun Avetisyan, Hayk Aslanyan:
Accurate code fragment clone detection and its application in identifying known CVE clones. 55 - Marouane Kihal, Lamia Hamza:
Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter. 56 - Jason Diakoumakos
, Evangelos Chaskos
, Nicholas Kolokotronis
, George Lepouras
:
Cyber-security gamification in federation of cyber ranges: design, implementation, and evaluation. 57 - Hajime Ono
:
Theoretical lower bounds for one-dimensional locally private estimations with missing data. 58 - Qisheng Chen, Kazumasa Omote:
Correction to: An intrinsic evaluator for embedding methods in malicious URL detection. 59 - Trong-Nghia To, Danh Le Kim, Do Thi Thu Hien, Nghi Hoang Khoa, Hien Do Hoang, Phan The Duy, Van-Hau Pham:
On the effectiveness of adversarial samples against ensemble learning-based windows PE malware detectors. 60 - Nasibeh Mohammadi, Afshin Rezakhani, Hamid Haj Seyyed Javadi, Parvaneh Asghari:
Enhancing time-series access control using deep recurrent neural networks and generative adversarial networks. 61 - Tala Talaei Khoei, Khair Al Shamaileh, Vijaya Kumar Devabhaktuni, Naima Kaabouch:
Performance analysis of capsule networks for detecting GPS spoofing attacks on unmanned aerial vehicles. 62 - Faheem Ullah, Jingsha He, Nafei Zhu, Ahsan Wajahat
, Ahsan Nazir, Sirajuddin Qureshi, Hasan Shahzad:
Ehr management evolution through purpose-based access control and blockchain smart contracts. 63 - Nasim Tavakkoli
, Orçun Çetin, Emre Ekmekcioglu
, Erkay Savas
:
From frontlines to online: examining target preferences in the Russia-Ukraine conflict. 64 - Lingrui Ren, Xingcan Zhang, Jian Wang:
Low complexity decompression method for FPGA bitstreams. 65 - Jeonggak Lyu
, Ahyun Song
, Euiseong Seo
, Gibum Kim
:
An exploratory analysis of the DPRK cyber threat landscape using publicly available reports. 66 - Eszter Kail, Annamária Riethné Nagy, Rita Fleiner, Anna Bánáti, Erno Rigó
:
Low-impact, near real-time risk assessment for legacy IT infrastructures. 67 - Vicenç Torra:
Differentially private Choquet integral: extending mean, median, and order statistics. 68 - Cho Do Xuan, Dat Bui Quang, Vinh Dang Quang:
Large language models based vulnerability detection: How does it enhance performance? 69 - Sourena Khanzadeh, Euclides Carlos Pinto Neto, Shahrear Iqbal, Manar H. Alalfi, Scott Buffett:
An exploratory study on domain knowledge infusion in deep learning for automated threat defense. 71 - Eduardo B. Fernandez, Antonio Muñoz
:
A cluster of patterns for trusted computing. 72
Volume 24, Number 2, April 2025
- I Putu Arya Dharmaadi
, Elias Athanasopoulos, Fatih Turkmen
:
Fuzzing frameworks for server-side web applications: a survey. 73 - George Chatzisofroniou, Panayiotis Kotzanikolaou:
Security analysis of the Wi-Fi Easy Connect. 74 - Lorena González-Manzano, Joaquín García-Alfaro:
Software vulnerability detection under poisoning attacks using CNN-based image processing. 75 - Francesco Brancati, Diamantea Mongelli, Francesco Mariotti, Paolo Lollini:
A cybersecurity risk assessment methodology for industrial automation control systems. 76 - Koffi Anderson Koffi, Vyron Kampourakis
, Constantinos Kolias, Jia Song, Robert C. Ivans:
Speeding-up fuzzing through directional seeds. 77 - Seyed Mohammad Taghavi Far, Farid Feyzi:
Large language models for software vulnerability detection: a guide for researchers on models, methods, techniques, datasets, and metrics. 78 - Anil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti:
USB-GATE: USB-based GAN-augmented transformer reinforced defense framework for adversarial keystroke injection attacks. 79 - Marcos Rogério Silveira, Adriano Mauro Cansian, Hugo Koji Kobayashi:
Semi-supervised approach for detecting malicious domains in TLDs in their first query. 80 - Alessandro Cantelli-Forti
, Giacomo Longo, Francesco Lupia, Enrico Russo:
WEFT: a consistent and tamper-proof methodology for acquisition of automatically verifiable forensic web evidence. 81 - Josef Pieprzyk, Marcin Pawlowski, Pawel Morawiecki, Arash Mahboubi
, Jarek Duda, Seyit Camtepe:
Pseudorandom bit generation with asymmetric numeral systems. 82 - Ailton Santos Filho
, Ricardo J. Rodríguez
, Eduardo L. Feitosa
:
Automated broken object-level authorization attack detection in REST APIs through OpenAPI to colored petri nets transformation. 83 - Hyeonhak Kim, Sanjin Park:
Cryptocurrency recovery framework using pre-signed transaction. 84 - Anum Paracha, Junaid Arshad, Mohamed Ben Farah
, Khalid N. Ismail
:
Outlier-oriented poisoning attack: a grey-box approach to disturb decision boundaries by perturbing outliers in multiclass learning. 85 - Mario Raciti
, Giampaolo Bella:
The SPADA methodology for threat modelling. 86 - John Prakash Arockiasamy, Irene Sabarimuthu, Lydia Elizabeth Benjamin, Srinivasan Palaniswami:
Correction: PBINS: private bins for top-k semantic search over encrypted data using transformers. 87 - K. Kamatchi, E. Uma:
Insights into user behavioral-based insider threat detection: systematic review. 88 - Hyeonhak Kim, Sangjin Park
:
Correction: Cryptocurrency recovery framework using pre-signed transaction. 89 - Kitty Kioskli, Elisavet Grigoriou, Shareeful Islam, Andrianos M. Yiorkas, Loizos Christofi, Haralambos Mouratidis:
A risk and conformity assessment framework to ensure security and resilience of healthcare systems and medical supply chain. 90 - Saeid Jamshidi
, Amin Nikanjam, Kawser Wazed Nafi, Foutse Khomh:
Understanding the impact of IoT security patterns on CPU usage and energy consumption: a dynamic approach for selecting patterns with deep reinforcement learning. 91 - Md. Alamgir Hossain
, Md Delwar Hossain
, Roya Choupani, Erdogan Dogdu:
MRS-PFIDS: federated learning driven detection of network intrusions in maritime radar systems. 92 - Carolina Cardoso Novo
, Mirian Picinini Méxas
, Lidia Angulo Meza
:
Applications of cyber insurance in smart cities: a systematic literature review. 93 - Javier Martínez Llamas, Davy Preuveneers, Wouter Joosen:
Certified unlearning for a trustworthy machine learning-based access control administration. 94 - Enrique Mármol Campos, Aurora González-Vidal, José Luis Hernández-Ramos, Antonio F. Skarmeta:
Federated learning for misbehaviour detection with variational autoencoders and Gaussian mixture models. 95 - Tobias Pfaller, Florian Skopik, Paul Smith, Maria Leitner:
Exploring a comprehensive approach to customize cyber exercises utilizing a process-based lifecycle model. 96 - Hao Yan, Jian Zhang, Zhangguo Tang, Hancheng Long, Min Zhu, Tianyue Zhang, Linglong Luo, Huanzhou Li:
Malware classification method based on feature fusion. 97 - Piero Delvecchio
, Stefano Galantucci
, Andrea Iannacone
, Giuseppe Pirlo
:
CARIOCA: prioritizing the use of IoC by threats assessment shared on the MISP platform. 98 - Daniel Cohen, Dov Te'eni, Inbal Yahav, Alexey Zagalsky, David G. Schwartz, Gahl Silverman
, Yossi Mann, Amir Elalouf, Jeremy Makowski:
Human-AI Enhancement of Cyber Threat Intelligence. 99
Volume 24, Number 3, June 2025
- Razvan Florea
, Mitica Craus
:
Enhancing network security through integration of game theory in software-defined networking framework. 100 - Patrik Pucer
, Bostjan Zvanut
, Simon Vrhovec
:
Adoption of smartphones among older adults and the role of perceived threat of cyberattacks. 101 - Hoki Kim, Youngdoo Son, Junyoung Byun:
Homomorphic encryption-based fault diagnosis in IoT-enabled industrial systems. 102 - Satoshi Okada, Houda Jmila, Kunio Akashi, Takuho Mitsunaga, Yuji Sekiya, Hideki Takase, Gregory Blanc, Hiroshi Nakamura:
Xai-driven black-box adversarial attacks on network intrusion detectors. 103 - Risto Vaarandi
, Hayretdin Bahsi:
Using large language models for template detection from security event logs. 104 - Wael Khalafalla, Wen-Xing Zhu, Ahmed Elkhalil, Salah-ud-din Khokhar:
Efficient authentication scheme for heterogeneous signcryption with cryptographic reverse firewalls for VANETs. 105 - Kashif Junaid, Muhammad Umar Janjua:
Analyzing shared keys in X.509 certificates with domain ownership. 106 - Yichao Wang
, Budi Arief
, Julio C. Hernandez-Castro
:
Secure in the dark? An in-depth analysis of dark web markets security. 107 - Miroslaw Kutylowski
, Anna Lauks-Dutka
, Przemyslaw Blaskiewicz
:
Darknet signatures: public ledgers and a threat of illegal betting platforms. 108 - Sultan S. Alqahtani:
Beyond the code: analyzing OSS developers security awareness and practices. 109 - Wesam Almobaideen, Orieb Abu Alghanam, Muhammad Abdullah, Syed Basit Hussain, Umar Alam:
Comprehensive review on machine learning and deep learning techniques for malware detection in android and IoT devices. 110 - Vahideh Moghtadaiee, Mina Alishahi, Milad Rabiei:
Differentially private GANs for generating synthetic indoor location data. 111 - Rebecca Acheampong, Titus Constantin Balan, Dorin-Mircea Popovici, Emmanuel Tuyishime, Alexandre Rekeraho, Gheorghe-Daniel Voinea:
Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach. 112 - Moon-Seok Kim, Sang-Kyung Yoo, Junki Kang, Sungho Kim:
Impact of temperature fluctuations on SRAM- based physically unclonable functions. 113 - Mohd Azeem Faizi Noor, Khurram Mustafa:
A comprehensive analysis of cryptocurrency breaches at endpoint. 114 - Piotr Arabas, Marek Dawidiuk:
Filter aggregation for DDoS prevention systems: hardware perspective. 115 - Guitouni Zied, Noeman Ammar, Mohsen Machhout:
An efficient hardware implementation of SHA-3 using 3D cellular automata for secure wireless sensor networks. 116 - Amir Javadpour, Forough Ja'fari, Tarik Taleb, Chafika Benzaïd:
Detecting malicious nodes using game theory and reinforcement learning in software-defined networks. 117 - Sourena Khanzadeh, Euclides Carlos Pinto Neto, Shahrear Iqbal, Manar H. Alalfi, Scott Buffett:
Correction: An exploratory study on domain knowledge infusion in deep learning for automated threat defense. 118 - Kalam Khadka, Abu Barkat Ullah:
Human factors in cybersecurity: an interdisciplinary review and framework proposal. 119 - Thanos Papaioannou, Spyridon Eftychios Kokotos, Aggeliki Tsohou:
Educational escape rooms for raising information privacy competences: An empirical validation. 120 - Victor Figueroa, Luis Enrique Sánchez Crespo, Antonio Santos-Olmo, David Garcia Rosado, Eduardo Fernández-Medina:
Building a holistic cybersecurity framework for e-Government based on a systematic analysis of proposals. 121 - Diego Cabuya-Padilla, Daniel Díaz López, Juan Martínez-Páez, Laura Hernández, Carlos Castañeda Marroquín:
SERDUX-MARCIM: Maritime Cyberattack simulation using Dynamic Modeling, Compartmental Models in Epidemiology and Agent-based Modeling. 122 - Athanasios Dimitriadis, Angelos Papoutsis, Dimitrios Kavalieros, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris:
EVACTI: evaluating the actionability of cyber threat intelligence. 123 - Yi-Wei Ma, Po-Hung Chiu:
A novel risk-based access control engine in zero trust architecture for IoT network. 124 - Afnan Alhindi, Saad Al-Ahmadi, Mohamed Maher Ben Ismail:
Advancements and challenges in privacy-preserving split learning: experimental findings and future directions. 125

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.