Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns Giddeon Njamngang AngaforIryna YevseyevaLeandros Maglaras Regular Contribution 29 January 2024
Blockchain-based BATMAN protocol using mobile ad hoc network (MANET) with an ensemble algorithm Upendra SinghSumit Kumar SharmaPreeti Jha Regular contribution 27 January 2024
BLISS: blockchain-based integrated security system for internet of things (IoT) applications Lokendra VishwakarmaDebasis Das Regular Contribution 25 January 2024
An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction Yesi Novaria KunangSiti NurmainiBhakti Yudho Suprapto Regular Contribution 23 January 2024
From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity Awais YousafJianying Zhou Regular Contribution 19 January 2024
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review Elham EbrahimpourShahram Babaie Survey 12 January 2024
Correction: A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs) Osama Bassam J. RabieShitharth SelvarajanMueen Uddin Correction Open access 10 January 2024
A deep learning approach based on multi-view consensus for SQL injection detection Arzu Gorgulu Kakisim Regular Contribution Open access 09 January 2024 Pages: 1541 - 1556
A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things Yakub Kayode SaheedSanjay Misra Regular Contribution Open access 09 January 2024
Federated transfer learning for attack detection for Internet of Medical Things Afnan A. Alharbi Special Issue Paper 08 January 2024 Pages: 81 - 100
Cybersecurity training and healthcare: the AERAS approach Fulvio FratiGeorgiana DarauMichael Sirivianos Regular Contribution 06 January 2024 Pages: 1527 - 1539
Vulnerability discovery based on source code patch commit mining: a systematic literature review Fei ZuoJunghwan Rhee Regular Contribution 06 January 2024 Pages: 1513 - 1526
A modular cyber security training programme for the maritime domain Aybars OrucNabin ChowdhuryVasileios Gkioulos Regular Contribution Open access 03 January 2024 Pages: 1477 - 1512
Information security and privacy challenges of cloud computing for government adoption: a systematic review Ndukwe UkejeJairo GutierrezKrassie Petrova Regular Contribition 03 January 2024 Pages: 1459 - 1475
Maritime cybersecurity: protecting digital seas Ferney MartínezLuis Enrique SànchezEduardo Fernàndez-Medina Regular Contribution 02 January 2024 Pages: 1429 - 1457
Radio frequency fingerprinting techniques for device identification: a survey Sohail AbbasManar Abu TalibAli Mohamed Regular Contribution 28 December 2023 Pages: 1389 - 1427
Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning Fatna El MendiliMohammed FattahYounès El Bouzekri El Idrissi Regular Contribution 27 December 2023 Pages: 1359 - 1388
Security bug reports classification using fasttext Sultan S. Alqahtani Regular Contribution 22 December 2023 Pages: 1347 - 1358
A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems H. AsadS. AdhikariIlir Gashi Regular Contribution Open access 20 December 2023 Pages: 1331 - 1346
Intrusion detection for power grid: a review Rupshali DasguptaMeghabriti PramanikDipanwita Roy Chowdhury Regular Contribution 20 December 2023 Pages: 1317 - 1329
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition Sepideh NiktabeArash Habibi LashkariDilli Prasad Sharma Regular Contribution 15 December 2023 Pages: 1293 - 1316
Cyberattack defense mechanism using deep learning techniques in software-defined networks Dimmiti Srinivasa RaoAjith Jubilson Emerson Regular Contribution 15 December 2023 Pages: 1279 - 1291
TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment Himanshu NandanwarRahul Katarya Regular Contriburtion 14 December 2023 Pages: 1251 - 1277
Blockchain-based multi-organizational cyber risk management framework for collaborative environments Habib El AminLina OueidatAntoine Feghali Regular Contribution 13 December 2023 Pages: 1231 - 1249
Generating ICS vulnerability playbooks with open standards Philip EmplDaniel SchletteGünther Pernul Regular Contribution Open access 11 December 2023 Pages: 1215 - 1230
Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees Rao Faizan AliP. D. D. DominicSheraz Naseer Regular Contribution 08 December 2023 Pages: 1197 - 1213
A review on digital twins for power generation and distribution Jessica B. HeluanyVasileios Gkioulos Regular Contribution Open access 01 December 2023 Pages: 1171 - 1195
De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem Thomas PrantlLukas HornSamuel Kounev Regular Contribution Open access 27 November 2023 Pages: 1149 - 1169
Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication Firas HamilaMohammad HamadSebastian Steinhorst Regular Contribution Open access 25 November 2023 Pages: 1131 - 1148
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT Kenan Ince Regular Contribution 22 November 2023 Pages: 1117 - 1130
Integrating the edge computing paradigm into the development of IoT forensic methodologies Juan Manuel Castelo GómezSergio Ruiz-Villafranca Regular Contribution 22 November 2023 Pages: 1093 - 1116
Generating adversarial examples with collaborative generative models Lei XuJunhai Zhai Regular Contribution 21 November 2023 Pages: 1077 - 1091
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks Subhash AriyadasaShantha FernandoSubha Fernando Regular Contribution 21 November 2023 Pages: 1055 - 1076
An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152 Jalaiah SaikamKoteswararao Ch Regular Contribution 21 November 2023 Pages: 1037 - 1054
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs) Osama Bassam J. RabieShitharth SelvarajanMueen Uddin Special Issue Paper Open access 20 November 2023 Pages: 51 - 80
Olympus: a GDPR compliant blockchain system Ricardo Martins GonçalvesMiguel Mira da SilvaPaulo Rupino da Cunha Regular Contribution Open access 17 November 2023 Pages: 1021 - 1036
Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks Muralidhara Rao PatruniAbdul Gaffar Humayun Publisher Correction 11 November 2023 Pages: 1019 - 1019
Locating collaborative attack targets based on physical invariants toward cyber-physical systems Peng XunZiyu YangZhu Tang Regular Contribution 08 November 2023 Pages: 999 - 1017
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems Ehsan ToreiniMaryam MehrnezhadAad van Moorsel Regular Contribution Open access 07 November 2023 Pages: 981 - 997
A survey and characterization of Close Access Cyberspace Operations Antonio Villalón-HuertaIsmael Ripoll-RipollHector Marco-Gisbert Regular Contribution 03 November 2023 Pages: 963 - 980
An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function Gaurav TyagiRahul Kumar Regular Contribution 02 November 2023 Pages: 935 - 962
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks Pradeepkumar BhaleSantosh BiswasSukumar Nandi Regular Contribution 02 November 2023 Pages: 915 - 934
A survey on run-time packers and mitigation techniques Ehab AlkhateebAli GhorbaniArash Habibi Lashkari Special Issue Paper 01 November 2023 Pages: 887 - 913
The rise of “security and privacy”: bibliometric analysis of computer privacy research Auwal Shehu AliZarul Fitri ZaabaManmeet Mahinderjit Singh Survey 31 October 2023 Pages: 863 - 885
Network intrusion detection and mitigation in SDN using deep learning models Mamatha MadduYamarthi Narasimha Rao Regular Contribution 29 October 2023 Pages: 849 - 862
Cyber threat assessment and management for securing healthcare ecosystems using natural language processing Stefano SilvestriShareful IslamMario Ciampi Special Issue Paper Open access 27 October 2023 Pages: 31 - 50
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy Richa GoenkaMeenu ChawlaNamita Tiwari Regular Contribution 19 October 2023 Pages: 819 - 848
A systematic mapping study on security for systems of systems Miguel Angel OliveroAntonia BertolinoIlaria Matteucci Special Issue Paper Open access 18 October 2023 Pages: 787 - 817
Evaluating the impact of filter-based feature selection in intrusion detection systems Houssam ZouhriAli IdriAhmed Ratnani Regular Contribution 17 October 2023 Pages: 759 - 785
Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures Ahlem HamdiLamia FouratiSamiha Ayed Special Issue Paper 14 October 2023 Pages: 713 - 757