A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation Arun Sekar RajasekaranM. Azees Special Issue Paper 29 June 2023 Pages: 1 - 13
Blockchain-based multi-diagnosis deep learning application for various diseases classification Hakima Rym RahalSihem SlatniaSaad Harous Special Issue Paper 07 August 2023 Pages: 15 - 30
Cyber threat assessment and management for securing healthcare ecosystems using natural language processing Stefano SilvestriShareful IslamMario Ciampi Special Issue Paper Open access 27 October 2023 Pages: 31 - 50
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs) Osama Bassam J. RabieShitharth SelvarajanMueen Uddin Special Issue Paper Open access 20 November 2023 Pages: 51 - 80
Federated transfer learning for attack detection for Internet of Medical Things Afnan A. Alharbi Special Issue Paper 08 January 2024 Pages: 81 - 100
Cybersecurity challenges in IoT-based smart renewable energy Alexandre RekerahoDaniel Tudor CotfasRebecca Acheampong Survey 01 August 2023 Pages: 101 - 117
A review on graph-based approaches for network security monitoring and botnet detection Sofiane LagraaMartin HusákMoussa Ouedraogo Survey 30 August 2023 Pages: 119 - 140
SDN as a defence mechanism: a comprehensive survey Believe AyodeleVictor Buttigieg Special Issue Paper Open access 06 October 2023 Pages: 141 - 185
Enhancing attack resilience of cyber-physical systems through state dependency graph models Konstantinos AdamosGeorge StergiopoulosDimitris Gritzalis Regular Contribution Open access 22 July 2023 Pages: 187 - 198
Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network K. DineshS. V. N. Santhosh Kumar Regular Contribution 03 August 2023 Pages: 199 - 223
Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents Åvald Åslaugson SommervollLászló ErdődiFabio Massimo Zennaro Regular contribution Open access 10 August 2023 Pages: 225 - 246
Estimating vulnerability metrics with word embedding and multiclass classification methods Hakan KekülBurhan ErgenHalil Arslan Regular Contribution 11 August 2023 Pages: 247 - 270
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware Silviu ViţelMarilena LupaşcuHenri Luchian Regular Contribution 14 August 2023 Pages: 271 - 297
Detection of adversarial attacks based on differences in image entropy Gwonsang RyuDaeseon Choi Regular Contribution Open access 17 August 2023 Pages: 299 - 314
RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment Bhavya DhingraVidhi JainDeepika Kukreja Regular Contribution 18 August 2023 Pages: 315 - 330
Forensic investigation of the dark web on the Tor network: pathway toward the surface web Philgeun JinNamjun KimDoowon Jeong Regular contribution 22 August 2023 Pages: 331 - 346
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain Aristeidis FaraoGeorgios PaparisChristos Xenakis Regular Contribution Open access 25 August 2023 Pages: 347 - 371
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks Fabrice MvahVianney Kengne TchendjiCharles Kamhoua Regular Contribution 26 August 2023 Pages: 373 - 387
Synthesizing differentially private location traces including co-locations Jun NaritaTakao MurakamiTetsushi Ohki Regular Contribution Open access 29 August 2023 Pages: 389 - 410
Security assessment and improvement of smart grid NIKE protocol Tao FengWentao JinLu Zheng Regular Contribution 31 August 2023 Pages: 411 - 429
Simulation extractable versions of Groth’s zk-SNARK revisited Oussama AmineKarim BagheryCarla Ràfols Regular contribution Open access 05 September 2023 Pages: 431 - 445
Pepal: Penalizing multimedia breaches and partial leakages Easwar Vivek MangipudiKrutarth RaoAniket Kate Regular contribution 14 September 2023 Pages: 447 - 465
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant Marius ElmigerMouad LemouddenWilliam J. Buchanan Regular Contribution Open access 19 September 2023 Pages: 467 - 485
BASPED: Blockchain assisted searchable public key encryption over outsourced data Partha Sarathi ChakrabortySomanath TripathySanjeet Kumar Nayak Regular Contribution 20 September 2023 Pages: 487 - 503
Improving spam email classification accuracy using ensemble techniques: a stacking approach Muhammad AdnanMuhammad Osama ImamIqbal Murtza Regular Contribution Open access 20 September 2023 Pages: 505 - 517
Blockchain-based data integrity framework for Internet of Things Poornima M. ChanalMahabaleshwar S. Kakkasageri Regular contribution 21 September 2023 Pages: 519 - 532
RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware Md. Ahsan AyubAmbareen SirajMaanak Gupta Regular Contribution 23 September 2023 Pages: 533 - 556
An integrated deep learning model for Ethereum smart contract vulnerability detection Vikas Kumar JainMeenakshi Tripathi Regular Contribution 24 September 2023 Pages: 557 - 575
Hate speech, toxicity detection in online social media: a recent survey of state of the art and opportunities AnjumRahul Katarya Regular Contribution 25 September 2023 Pages: 577 - 608
Secure outsourcing of manufacturing compliance checks Aikaterini TriakosiaPanagiotis RizomiliotisValerio Senni Regular Contribution Open access 25 September 2023 Pages: 609 - 627
On private information retrieval supporting range queries Junichiro HayataJacob C. N. SchuldtKanta Matsuura Regular contribution 26 September 2023 Pages: 629 - 647
MLChain: a privacy-preserving model learning framework using blockchain Vidhi BansalNiyati BaliyanMohona Ghosh Regular Contribution 28 September 2023 Pages: 649 - 677
PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks Muralidhara Rao PatruniAbdul Gaffar Humayun Regular Contribution 09 October 2023 Pages: 679 - 698