


default search action
Journal of Cyber Security and Mobility, Volume 10
Volume 10, Number 1, 2021
- Niklas Bunzel, Martin Steinebach

, Huajian Liu
:
Cover-aware Steganalysis. 1-26 - Ludwig Englbrecht

, Günther Pernul
:
A Combined Approach for a Privacy-Aware Digital Forensic Investigation in Enterprises. 27-64 - Zhen Li, Qi Liao

:
Game Theory of Data-selling Ransomware. 65-96 - Uwe Breidenbach

, Martin Steinebach
, Huajian Liu
:
Privacy-Enhanced Robust Image Hashing with Bloom Filters. 97-132 - Florian Platzer

, Marcel Schäfer, Martin Steinebach
:
Critical Traffic Analysis on the Tor Network. 133-160 - Joo Yeon Cho

, Andrew Sergeev
:
Post-quantum MACsec in Ethernet Networks. 161-176
- Shymalagowri Selvaganapathy

, G. Sudha Sadasivam
, Vinayakumar Ravi
:
A Review on Android Malware: Attacks, Countermeasures and Challenges Ahead. 177-230 - Charu Negi, Preeti Mishra

, Pooja Chaudhary, Harsh Vardhan:
A Review and Case Study on Android Malware: Threat Model, Attacks, Techniques and Tools. 231-260 - Zainab Rashid Alkindi

, Mohamed Sarrab, Nasser Alzeidi:
User Privacy and Data Flow Control for Android Apps: Systematic Literature Review. 261-304
Volume 10, Number 2, 2021
- Stéphane Mocanu

, Jean-Marc Thiriet
:
Real-Time Performance and Security of IEC 61850 Process Bus Communications. 305-346 - Emeline Marechal

, Benoit Donnet
:
Targeted Attack through Network Fingerprinting. 347-376
- Sihem Baccari

, Mohamed Hadded
, Haifa Touati
, Paul Mühlethaler:
A Secure Trust-aware Cross-layer Routing Protocol for Vehicular Ad hoc Networks. 377-402 - Rupali M. Chopade

, Vinod Keshaorao Pachghare:
Database Security Enhancement by Eliminating the Redundant and Incorrect Spelled Data Entries. 403-420 - Rupali M. Chopade

, Vinod Keshaorao Pachghare:
Data Tamper Detection from NoSQL Database in Forensic Environment. 421-450
- Yuji Sakurai

, Takuya Watanabe
, Tetsuya Okuda, Mitsuaki Akiyama
, Tatsuya Mori
:
Identifying the Phishing Websites Using the Patterns of TLS Certificates. 451-486
Volume 10, Number 3, 2021
- M. Raviraja Holla

, Alwyn R. Pais, Suma D.
:
An Accelerator-based Logistic Map Image Cryptosystems for Grayscale Images. 487-510
Volume 10, Number 4, 2021
- Rajeev Singh

, Sukhwinder Singh:
A Lightweight Security Scheme (LSS) for Wireless Node Communication for Border Surveillance System. 641-662 - Adarsh Anand, Navneet Bhatt

, Jasmine Kaur
, Yoshinobu Tamura
:
Time Lag-Based Modelling for Software Vulnerability Exploitation Process. 663-678 - Nupur Goyal

, Tanuja Joshi, Mangey Ram
:
Evaluating and Improving a Content Delivery Network (CDN) Workflow using Stochastic Modelling. 679-698
- Bayisa Kune Mamade

, Diriba Mangasha Dabala
:
Exploring The Correlation between Cyber Security Awareness, Protection Measures and the State of Victimhood: The Case Study of Ambo University's Academic Staffs. 699-724

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














