Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation Aida AkbarzadehLaszlo ErdodiTore Geir Soltvedt Regular Contribution Open access 14 May 2024
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms Ashish BajajDinesh Kumar Vishwakarma Regular Contribution 13 May 2024
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle Alexandros ZacharisVasilios KatosConstantinos Patsakis Regular Contribution Open access 10 May 2024
IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications Guru Prasad BhandariGebremariam AssresTor-Morten Grønli Regular Contribution Open access 09 May 2024
Dynamic vulnerability severity calculator for industrial control systems Pavlos CheimonidisKonstantinos Rantos Regular Contribution 08 May 2024
An improved and efficient coercion-resistant measure for electronic voting system Tzer-Long ChenChia-Hui LiuZhen-Yu Wu Regular Contribution 07 May 2024
Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis Indy HaverkampDipti K. Sarmah Regular Contribution Open access 05 May 2024
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA) Mustafa Ahmed ElberriÜmit TokeşerJose Manuel Lopez-Guede Regular Contribution Open access 05 May 2024
Unmasking the common traits: an ensemble approach for effective malware detection Parthajit BorahUpasana SarmahJ. K. Kalita Regular Contribution 30 April 2024
Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things Uneneibotejit OtokwalaAndrei PetrovskiHarsha Kalutarage Regular Contribution Open access 30 April 2024
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks Raja Zeeshan HaiderBaber AslamZafar Iqbal Regular Contribution 29 April 2024
Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis Ahmed M. Asfahani Regular Contribution 26 April 2024
An online intrusion detection method for industrial control systems based on extended belief rule base Guangyu QianJinyuan LiYou Cao Regular Contribution 26 April 2024
A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection N. D. PatelB. M. MehtreRajeev Wankar Regular Contribution 25 April 2024
Validation and extension of two domain-specific information privacy competency models Aikaterini SoumelidouAggeliki Tsohou Regular Contribution Open access 22 April 2024
A generic framework for blockchain-assisted on-chain auditing for off-chain storage Saeed Banaeian FarMaryam Rajabzadeh AsaarAfrooz Haghbin Regular Contribution 18 April 2024
Enhancing security in QCA-based circuits using optimal key gate placement M. AmuthaK. R. Kavitha Regular Contribution 17 April 2024
Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard Abdullah Hamad N. Almoqbil Regular Contribution 13 April 2024
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network Kousik BarikSanjay MisraLuis Fernandez-Sanz Regular Contribution Open access 12 April 2024
Selfish mining attack in blockchain: a systematic literature review Nadisha MadhushanieSugandima VidanagamachchiNalin Arachchilage Regular Contribution 10 April 2024
Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack Joaquín Navajas-AdánEulàlia Badia-GelabertRafael Mayo-García Regular Contribution Open access 04 April 2024
Trustworthy machine learning in the context of security and privacy Ramesh UpretiPedro G. LindAnis Yazidi Regular Contribution Open access 03 April 2024
Attribute inference privacy protection for pre-trained models Hossein Abedi KhorasganiNoman MohammedYang Wang Regular Contribution 02 April 2024
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives Emmanuel KwartengMumin Cebe Regular Contribution 29 March 2024
A context-aware on-board intrusion detection system for smart vehicles Davide MicaleIlaria MatteucciGiuseppe Patanè Regular Contribution Open access 28 March 2024
Mastering data privacy: leveraging K-anonymity for robust health data sharing Stylianos KaragiannisChristoforos NtantogianLuís Landeiro Ribeiro Regular Contribution Open access 26 March 2024
International journal of information security: a bibliometric study, 2007–2023 Rahul Dwivedi Regular Contribution 25 March 2024
MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs Md. Alamin TalukderSelina SharminSunil Aryal Regular Contribution Open access 19 March 2024
Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things Ala MughaidIbrahim ObeidatHazem Migdady Regular Contribution 19 March 2024
A new approach for detecting process injection attacks using memory analysis Mohammed NasereddinRaad Al-Qassas Regular Contribution 16 March 2024
Generative AI for pentesting: the good, the bad, the ugly Eric HilarioSami AzamBharanidharan Shanmugam Regular Contribution Open access 15 March 2024
Spatial de-correlation of generated keys from wireless channels using adversarial deep learning Amir AliabadianMohammadreza ZahabiMajid Mobini Regular Contribution 15 March 2024
Random forest evaluation using multi-key homomorphic encryption and lookup tables Diana-Elena PetreanRodica Potolea Regular Contribution Open access 14 March 2024
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards Anil Kumar ChillaraParesh SaxenaKrishnakumar Kesavan Regular Contribution 14 March 2024
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT) Vagner E. QuincozesSilvio E. QuincozesAnis Koubaa Regular Contribution 13 March 2024
Dynamic authentication for intelligent sensor clouds in the Internet of Things Hussain Al-AqrabiAhmed M. ManasrahHoda Alkhzaimi Regular Contribution 13 March 2024
Abuse-freeness in contract signing: a blockchain-based proposal Josep-Lluís Ferrer-GomilaM. Francisca Hinarejos Regular Contribution Open access 10 March 2024
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network Eslam AbdelkreemSherif HusseinAshraf Tammam Regular Contribution Open access 07 March 2024
Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies W. M. A. B. WijesundaraJoong-Sun LeeTakashi Obi Regular Contribution Open access 07 March 2024
Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices Rajiv ShahDeniz CemilogluVasilis Katos Regular Contribution Open access 06 March 2024
A comprehensive review on permissions-based Android malware detection Yash SharmaAnshul Arora Regular Contribution 04 March 2024
AutoPKI: public key infrastructure for IoT with automated trust transfer Joel HöglundSimon BougetShahid Raza Regular Contribution Open access 02 March 2024
Real-time system call-based ransomware detection Christopher Jun Wen ChewVimal KumarRobi Malik Regular Contribution Open access 02 March 2024
RAMA: a risk assessment solution for healthcare organizations Michail SmyrlisEvangelos FlorosGeorge Spanoudakis Regular Contribution Open access 01 March 2024
Pioneering automated vulnerability detection for smart contracts in blockchain using KEVM: Guardian ADRGAN Rohini G. PiseSonali Patil Regular Contribution 27 February 2024
Neighbor discovery protocol anomaly-based detection system using neural network algorithm Redhwan M. A. SaadMohammed AnbarIznan H. Hasbullah Regular Contribution 11 February 2024
Robust password security: a genetic programming approach with imbalanced dataset handling Nikola AndelićSandi Baressi S̆egotaZlatan Car Regular Contribution 07 February 2024
Activity-based payments: alternative (anonymous) online payment model Rafał Leszczyna Regular Contribution 03 February 2024
Maritime decision-makers and cyber security: deck officers’ perception of cyber risks towards IT and OT systems Marie Haugli-SandvikMass Soldal LundFrøy Birte Bjørneseth Regular Contribution Open access 02 February 2024
Tracing the evolution of cyber resilience: a historical and conceptual review Vasiliki TzavaraSavvas Vassiliadis Regular Contribution Open access 01 February 2024