A decentralized honeypot for IoT Protocols based on Android devices Irini LygerouShreyas SrinivasaDimitris Gritzalis Regular Contribution 06 August 2022 Pages: 1211 - 1222
CT-GCN: a phishing identification model for blockchain cryptocurrency transactions Bingxue FuXing YuTao Feng Regular Contribution 11 August 2022 Pages: 1223 - 1232
A systematic overview on methods to protect sensitive data provided for various analyses Matthias TemplMurat Sariyar regular contribution Open access 18 August 2022 Pages: 1233 - 1246
Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications Abdenour KifoucheMohamed Salah AzzazRemy Kocik Regular contribution 01 September 2022 Pages: 1247 - 1262
An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM C. PrajishaA. R. Vasudevan regular contribution 03 September 2022 Pages: 1263 - 1282
Are chrome extensions compliant with the spirit of least privilege? Pablo Picazo-SanchezLara Ortiz-MartinAndrei Sabelfeld Regular contribution Open access 04 September 2022 Pages: 1283 - 1297
DFTMicroagg: a dual-level anonymization algorithm for smart grid data Kayode S. AdewoleVicenç Torra Regular contribution Open access 07 September 2022 Pages: 1299 - 1321
From scattered data to actionable knowledge: flexible cyber security reporting in the military domain Florian SkopikArndt BonitzGünter Göhler regular contribution Open access 14 September 2022 Pages: 1323 - 1347
PSO + FL = PAASO: particle swarm optimization + federated learning = privacy-aware agent swarm optimization Vicenç TorraEdgar GalvánGuillermo Navarro-Arribas Regular contribution Open access 22 September 2022 Pages: 1349 - 1359
Security analysis and improvement of a privacy-preserving authentication scheme in VANET Xiaodong YangWenjia WangCaifen Wang Regular contribution 26 September 2022 Pages: 1361 - 1371
LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment Mohammad AbdussamiRuhul AminSatyanarayana Vollala Regular contribution 30 September 2022 Pages: 1373 - 1387
A security protocol for D2D communications in 5G networks using elliptic curve cryptography R. KishoreI. IoannouA. Pitsillides Regular contribution 04 October 2022 Pages: 1389 - 1408
A study of machine learning-based models for detection, control, and mitigation of cyberbullying in online social media Raju KumarAruna Bhat Survey 08 August 2022 Pages: 1409 - 1431