P2ADF: a privacy-preserving attack detection framework in fog-IoT environment Jasleen KaurAlka AgrawalRaees Ahmad Khan Regular Contribution 18 January 2023 Pages: 749 - 762
Privacy and safety improvement of VANET data via a safety-related privacy scheme Ruqayah Al-aniThar BakerQi Shi Regular contribution 06 February 2023 Pages: 763 - 783
Efficient searchable symmetric encryption supporting range queries Eirini MollaPanagiotis RizomiliotisStefanos Gritzalis Regular contribution 09 February 2023 Pages: 785 - 798
A novel two-level secure access control approach for blockchain platform in healthcare Shweta MittalMohona Ghosh Regular contribution 10 February 2023 Pages: 799 - 817
Anonymity and everlasting privacy in electronic voting Panagiotis GrontasAris Pagourtzis Regular contribution 15 February 2023 Pages: 819 - 832
Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation Francisco T. ChimucoJoão B. F. SequeirosPedro R. M. Inácio Regular Contribution Open access 17 February 2023 Pages: 833 - 867
Blockchain and smart contract architecture for notaries services under civil law: a Brazilian experience Leonardo Dias MenezesLuciano Vieira de AraújoMarislei Nishijima Regular Contribution 25 February 2023 Pages: 869 - 880
Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning Pankaj PandeyNishchol Mishra Regular contribution 01 March 2023 Pages: 881 - 891
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning Brandon BowenAnitha ChennamaneniDaisy Lin Regular Contribution 02 March 2023 Pages: 893 - 917
AAIA: an efficient aggregation scheme against inverting attack for federated learning Zhen YangShisong YangYuwen Chen Regular Contribution 02 March 2023 Pages: 919 - 930
Causal effect analysis-based intrusion detection system for IoT applications Srividya BhaskaraSantosh Singh Rathore Regular Contribution 08 March 2023 Pages: 931 - 946
From zero-shot machine learning to zero-day attack detection Mohanad SarhanSiamak LayeghyMarius Portmann Regular Contribution Open access 15 March 2023 Pages: 947 - 959
LDES: detector design for version number attack detection using linear temporal logic based on discrete event system Abhay Deep SethSantosh BiswasAmit Kumar Dhar Regular contribution 17 March 2023 Pages: 961 - 985
TENET: a new hybrid network architecture for adversarial defense Omer Faruk TunaFerhat Ozgur CatakM. Taner Eskil Regular contribution 17 March 2023 Pages: 987 - 1004
Cyber range design framework for cyber security education and training M. N. KatsantonisA. ManikasD. Gritzalis Regular Contribution Open access 18 March 2023 Pages: 1005 - 1027
Business-layer client-side racer: dynamic security testing of the web application against client-side race condition in the business layer Mitra AlidoostiAlireza NowrooziAhmad Nickabadi Regular contribution 20 March 2023 Pages: 1029 - 1054
A typology of secure multicast communication over 5 G/6 G networks Nizamud DinAbdul WaheedJerry Chun-Wei Lin Regular Contribution 24 March 2023 Pages: 1055 - 1073
Securing MQTT protocol for IoT environment using IDS based on ensemble learning Hayette ZeghidaMehdi BoulaicheRamdane Chikh Regular Contribution 24 March 2023 Pages: 1075 - 1086