A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications Thomas Oakley BrowneMohammad AbedinMohammad Jabed Morshed Chowdhury Regular Contribution Open access 05 June 2024
A compliance-based ranking of certificate authorities using probabilistic approaches Kashif JunaidMuhammad Umar JanjuaJunaid Qadir Regular Contribution 29 May 2024
IoT cybersecurity in 5G and beyond: a systematic literature review Sandeep PirbhulalSabarathinam ChockalingamHabtamu Abie Regular Contribution 28 May 2024
Model-Agnostic Utility-Preserving Biometric Information Anonymization Chun-Fu ChenBill MoriartyPierangela Samarati Regular Contribution 23 May 2024
BA-flag: a self-prevention mechanism of selfish mining attacks in blockchain technology Nadisha MadhushanieSugandima VidanagamachchiNalin Arachchilage Regular Contribution 20 May 2024
Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalability Antonio PayaVicente-GarcíaAlberto Gómez Regular Contribution 20 May 2024
Decentralised identity federations using blockchain Mirza Kamrul Bashar ShuhanSyed Md. HasnayeenMd Sadek Ferdous Regular Contribution 16 May 2024
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation Aida AkbarzadehLaszlo ErdodiTore Geir Soltvedt Regular Contribution Open access 14 May 2024
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms Ashish BajajDinesh Kumar Vishwakarma Regular Contribution 13 May 2024
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle Alexandros ZacharisVasilios KatosConstantinos Patsakis Regular Contribution Open access 10 May 2024
IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications Guru Prasad BhandariGebremariam AssresTor-Morten Grønli Regular Contribution Open access 09 May 2024
Dynamic vulnerability severity calculator for industrial control systems Pavlos CheimonidisKonstantinos Rantos Regular Contribution 08 May 2024
An improved and efficient coercion-resistant measure for electronic voting system Tzer-Long ChenChia-Hui LiuZhen-Yu Wu Regular Contribution 07 May 2024
Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis Indy HaverkampDipti K. Sarmah Regular Contribution Open access 05 May 2024
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA) Mustafa Ahmed ElberriÜmit TokeşerJose Manuel Lopez-Guede Regular Contribution Open access 05 May 2024
Unmasking the common traits: an ensemble approach for effective malware detection Parthajit BorahUpasana SarmahJ. K. Kalita Regular Contribution 30 April 2024
Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things Uneneibotejit OtokwalaAndrei PetrovskiHarsha Kalutarage Regular Contribution Open access 30 April 2024
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks Raja Zeeshan HaiderBaber AslamZafar Iqbal Regular Contribution 29 April 2024
Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis Ahmed M. Asfahani Regular Contribution 26 April 2024
An online intrusion detection method for industrial control systems based on extended belief rule base Guangyu QianJinyuan LiYou Cao Regular Contribution 26 April 2024
A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection N. D. PatelB. M. MehtreRajeev Wankar Regular Contribution 25 April 2024 Pages: 2457 - 2487
Validation and extension of two domain-specific information privacy competency models Aikaterini SoumelidouAggeliki Tsohou Regular Contribution Open access 22 April 2024 Pages: 2437 - 2455
A generic framework for blockchain-assisted on-chain auditing for off-chain storage Saeed Banaeian FarMaryam Rajabzadeh AsaarAfrooz Haghbin Regular Contribution 18 April 2024 Pages: 2407 - 2435
Enhancing security in QCA-based circuits using optimal key gate placement M. AmuthaK. R. Kavitha Regular Contribution 17 April 2024 Pages: 2395 - 2405
Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard Abdullah Hamad N. Almoqbil Regular Contribution 13 April 2024 Pages: 2377 - 2394
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network Kousik BarikSanjay MisraLuis Fernandez-Sanz Regular Contribution Open access 12 April 2024 Pages: 2353 - 2376
Selfish mining attack in blockchain: a systematic literature review Nadisha MadhushanieSugandima VidanagamachchiNalin Arachchilage Regular Contribution 10 April 2024 Pages: 2333 - 2351
Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack Joaquín Navajas-AdánEulàlia Badia-GelabertRafael Mayo-García Regular Contribution Open access 04 April 2024 Pages: 2315 - 2331
Trustworthy machine learning in the context of security and privacy Ramesh UpretiPedro G. LindAnis Yazidi Regular Contribution Open access 03 April 2024 Pages: 2287 - 2314
Attribute inference privacy protection for pre-trained models Hossein Abedi KhorasganiNoman MohammedYang Wang Regular Contribution 02 April 2024 Pages: 2269 - 2285
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives Emmanuel KwartengMumin Cebe Regular Contribution 29 March 2024 Pages: 2225 - 2268
A context-aware on-board intrusion detection system for smart vehicles Davide MicaleIlaria MatteucciGiuseppe Patanè Regular Contribution Open access 28 March 2024 Pages: 2203 - 2223
Mastering data privacy: leveraging K-anonymity for robust health data sharing Stylianos KaragiannisChristoforos NtantogianLuís Landeiro Ribeiro Regular Contribution Open access 26 March 2024 Pages: 2189 - 2201
International journal of information security: a bibliometric study, 2007–2023 Rahul Dwivedi Regular Contribution 25 March 2024 Pages: 2159 - 2187
MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs Md. Alamin TalukderSelina SharminSunil Aryal Regular Contribution Open access 19 March 2024 Pages: 2139 - 2158
Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things Ala MughaidIbrahim ObeidatHazem Migdady Regular Contribution 19 March 2024 Pages: 2123 - 2137
A new approach for detecting process injection attacks using memory analysis Mohammed NasereddinRaad Al-Qassas Regular Contribution 16 March 2024 Pages: 2099 - 2121
Generative AI for pentesting: the good, the bad, the ugly Eric HilarioSami AzamBharanidharan Shanmugam Regular Contribution Open access 15 March 2024 Pages: 2075 - 2097
Spatial de-correlation of generated keys from wireless channels using adversarial deep learning Amir AliabadianMohammadreza ZahabiMajid Mobini Regular Contribution 15 March 2024 Pages: 2063 - 2073
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards Anil Kumar ChillaraParesh SaxenaKrishnakumar Kesavan Regular Contribution 14 March 2024 Pages: 2043 - 2061
Random forest evaluation using multi-key homomorphic encryption and lookup tables Diana-Elena PetreanRodica Potolea Regular Contribution Open access 14 March 2024 Pages: 2023 - 2041
Dynamic authentication for intelligent sensor clouds in the Internet of Things Hussain Al-AqrabiAhmed M. ManasrahHoda Alkhzaimi Regular Contribution 13 March 2024 Pages: 2003 - 2021
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT) Vagner E. QuincozesSilvio E. QuincozesAnis Koubaa Regular Contribution 13 March 2024 Pages: 1975 - 2002
Abuse-freeness in contract signing: a blockchain-based proposal Josep-Lluís Ferrer-GomilaM. Francisca Hinarejos Regular Contribution Open access 10 March 2024 Pages: 1963 - 1974
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network Eslam AbdelkreemSherif HusseinAshraf Tammam Regular Contribution Open access 07 March 2024 Pages: 1939 - 1961
Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies W. M. A. B. WijesundaraJoong-Sun LeeTakashi Obi Regular Contribution Open access 07 March 2024 Pages: 1927 - 1937
Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices Rajiv ShahDeniz CemilogluVasilis Katos Regular Contribution Open access 06 March 2024 Pages: 1913 - 1926
A comprehensive review on permissions-based Android malware detection Yash SharmaAnshul Arora Regular Contribution 04 March 2024 Pages: 1877 - 1912
AutoPKI: public key infrastructure for IoT with automated trust transfer Joel HöglundSimon BougetShahid Raza Regular Contribution Open access 02 March 2024 Pages: 1859 - 1875
Real-time system call-based ransomware detection Christopher Jun Wen ChewVimal KumarRobi Malik Regular Contribution Open access 02 March 2024 Pages: 1839 - 1858