default search action
International Journal of Information Security, Volume 22
Volume 22, Number 1, February 2023
- Gulab Sah, Subhasish Banerjee, Sweety Singh:
Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches. 1-27 - Pablo Picazo-Sanchez, Magnus Almgren:
Gridchain: an investigation of privacy for the future local distribution grid. 29-46 - Abdelhakim Hannousse, Mohamed Cherif Nait-Hamoud, Salima Yahiouche:
A deep learner model for multi-language webshell detection. 47-61 - Seema Sangari, Eric Dallal, Michael E. Whitman:
Modeling reporting delays in cyber incidents: an industry-level comparison. 63-76 - Branislav Rajic, Zarko Stanisavljevic, Pavle V. Vuletic:
Early web application attack detection using network traffic analysis. 77-91 - Nemi Chandra Rathore, Somanath Tripathy:
Restricting data-leakage using fine-grained access control on OSN objects. 93-106 - Pinar Gurkan Balikcioglu, Melih Sirlanci, Ozge Acar Kucuk, Bulut Ulukapi, Ramazan Türkmen, Cengiz Acartürk:
Malicious code detection in android: the role of sequence characteristics and disassembling methods. 107-118 - Amit Sharma, Brij B. Gupta, Awadhesh Kumar Singh, V. K. Saraswat:
A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network. 119-135 - Sajad Hamzenejadi, Mahdieh Ghazvini, Seyedamiryousef Hosseini Goki:
Mobile botnet detection: a comprehensive survey. 137-175 - Shubhangi Rastogi, Divya Bansal:
A review on fake news detection 3T's: typology, time of detection, taxonomies. 177-212 - Emre Süren, Fredrik Heiding, Johannes Olegård, Robert Lagerström:
PatrIoT: practical and agile threat research for IoT. 213-233 - Safa Mohamed, Ridha Ejbali:
Deep SARSA-based reinforcement learning approach for anomaly network intrusion detection system. 235-247 - Ahmed Amro, Vasileios Gkioulos:
Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth. 249-288 - Luay Alawneh, Mohammad Al-Zinati, Mahmoud Al-Ayyoub:
User identification using deep learning and human activity mobile sensor data. 289-301 - Irini Lygerou, Shreyas Srinivasa, Emmanouil Vasilomanolakis, George Stergiopoulos, Dimitris Gritzalis:
Correction to: A decentralized honeypot for IoT Protocols based on Android devices. 303
Volume 22, Number 2, April 2023
- Qin An, Wilson Cheong Hin Hong, Xiaoshu Xu, Yunfeng Zhang, Kimberly Kolletar-Zhu:
How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates. 305-317 - Murat Kuzlu, Ferhat Özgür Çatak, Umit Cali, Evren Çatak, Ozgur Guler:
Adversarial security mitigations of mmWave beamforming prediction models using defensive distillation and adversarial retraining. 319-332 - Swati, Sangita Roy, Jawar Singh, Jimson Mathew:
Design and analysis of DDoS mitigating network architecture. 333-345 - Efstratios Chatzoglou, Vasileios Kouliaridis, Georgios Karopoulos, Georgios Kambourakis:
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study. 347-365 - Reza Mohammadi, Chhagan Lal, Mauro Conti:
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN. 367-379 - Panagiotis Andriotis, Myles Kirby, Atsuhiro Takasu:
Bu-Dash: a universal and dynamic graphical password scheme (extended version). 381-401 - Kailash Chandra Mishra, Subrata Dutta:
A simple and secure user authentication scheme using Map Street View with usability analysis based on ISO/IEC 25022. 403-415 - Kapilan Kulayan Arumugam Gandhi, Chamundeswari Arumugam:
Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device. 417-431 - Hanxun Zhou, Longyu Kang, Hong Pan, Wei Guo, Yong Feng:
An intrusion detection approach based on incremental long short-term memory. 433-446 - Gorka Guardiola Muzquiz, Enrique Soriano-Salvador:
SealFSv2: combining storage-based and ratcheting for tamper-evident logging. 447-466 - Bander A. Alzahrani, Nikos Fotiou, Aiiad Albeshri, Abdullah Almuhaimeed, Khalid Alsubhi:
Distributed access control for information-centric networking architectures using verifiable credentials. 467-478 - Melike Burakgazi Bilgen, Osman Abul, Kemal Bicakci:
Authentication-enabled attribute-based access control for smart homes. 479-495 - Kai Wang, Jinxia Wu, Tianqing Zhu, Wei Ren, Ying Hong:
Defense against membership inference attack in graph neural networks through graph perturbation. 497-509 - Hira Ahmad, Muhammad Ahtazaz Ahsan, Adnan Noor Mian:
Trends in publishing blockchain surveys: a bibliometric perspective. 511-523 - Haya Brama, Lihi Dery, Tal Grinshpoun:
Evaluation of neural networks defenses and attacks using NDCG and reciprocal rank metrics. 525-540
Volume 22, Number 3, June 2023
- Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Miguel Azorín Castillo, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
Intelligent and behavioral-based detection of malware in IoT spectrum sensors. 541-561 - Aida Akbarzadeh, Sokratis K. Katsikas:
Dependency-based security risk assessment for cyber-physical systems. 563-578 - Martin Higgins, Wangkun Xu, Fei Teng, Thomas Parisini:
Cyber-physical risk assessment for false data injection attacks considering moving target defences. 579-589 - Eranga Bandara, Xueping Liang, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Nalin Ranasinghe, Kasun De Zoysa:
Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system (IPFS). 591-609 - Taher Al-Shehari, Rakan Alsowail:
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection. 611-629 - Marmar Orooji, Seyedeh Shaghayegh Rabbanian, Gerald M. Knapp:
Flexible adversary disclosure risk measure for identity and attribute disclosure attacks. 631-645 - Imdad Ullah, Roksana Boreli, Salil S. Kanhere:
Privacy in targeted advertising on mobile devices: a survey. 647-678 - Yingchun Chen, Jinguo Li, Naiwang Guo:
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment. 679-689 - Juan Miguel López Velásquez, Sergio Mauricio Martínez Monterrubio, Luis Enrique Sánchez Crespo, David Garcia Rosado:
Systematic review of SIEM technology: SIEM-SC birth. 691-711 - Rudolf Lovrencic, Dejan Skvorc:
Multi-cloud applications: data and code fragmentation for improved security. 713-721 - Guangjia Song, Jianhua Hu, Hui Wang:
A novel frame switching model based on virtual MAC in SDN. 723-736 - Aggeliki Tsohou, Vasiliki Diamantopoulou, Stefanos Gritzalis, Costas Lambrinoudakis:
Cyber insurance: state of the art, trends and future directions. 737-748
Volume 22, Number 4, August 2023
- Jasleen Kaur, Alka Agrawal, Raees Ahmad Khan:
P2ADF: a privacy-preserving attack detection framework in fog-IoT environment. 749-762 - Ruqayah Al-Ani, Thar Baker, Bo Zhou, Qi Shi:
Privacy and safety improvement of VANET data via a safety-related privacy scheme. 763-783 - Eirini Molla, Panagiotis Rizomiliotis, Stefanos Gritzalis:
Efficient searchable symmetric encryption supporting range queries. 785-798 - Shweta Mittal, Mohona Ghosh:
A novel two-level secure access control approach for blockchain platform in healthcare. 799-817 - Panagiotis Grontas, Aris Pagourtzis:
Anonymity and everlasting privacy in electronic voting. 819-832 - Francisco T. Chimuco, João B. F. Sequeiros, Carolina Galvão Lopes, Tiago M. C. Simões, Mário M. Freire, Pedro R. M. Inácio:
Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation. 833-867 - Leonardo Dias Menezes, Luciano Vieira de Araújo, Marislei Nishijima:
Blockchain and smart contract architecture for notaries services under civil law: a Brazilian experience. 869-880 - Pankaj Pandey, Nishchol Mishra:
Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning. 881-891 - Brandon Bowen, Anitha Chennamaneni, Ana E. Goulart, Daisy Lin:
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning. 893-917 - Zhen Yang, Shisong Yang, Yunbo Huang, José-Fernán Martínez, Lourdes López-Santidrián, Yuwen Chen:
AAIA: an efficient aggregation scheme against inverting attack for federated learning. 919-930 - Srividya Bhaskara, Santosh Singh Rathore:
Causal effect analysis-based intrusion detection system for IoT applications. 931-946 - Mohanad Sarhan, Siamak Layeghy, Marcus Gallagher, Marius Portmann:
From zero-shot machine learning to zero-day attack detection. 947-959 - Abhay Deep Seth, Santosh Biswas, Amit Kumar Dhar:
LDES: detector design for version number attack detection using linear temporal logic based on discrete event system. 961-985 - Ömer Faruk Tuna, Ferhat Özgür Çatak, Mustafa Taner Eskil:
TENET: a new hybrid network architecture for adversarial defense. 987-1004 - Menelaos N. Katsantonis, Athanassios Manikas, Ioannis Mavridis, Dimitris Gritzalis:
Cyber range design framework for cyber security education and training. 1005-1027 - Mitra Alidoosti, Alireza Nowroozi, Ahmad Nickabadi:
Business-layer client-side racer: dynamic security testing of the web application against client-side race condition in the business layer. 1029-1054 - Nizamud Din, Abdul Waheed, Shamsher Ullah, Noor Ul Amin, Gautam Srivastava, Farhan Ullah, Jerry Chun-Wei Lin:
A typology of secure multicast communication over 5 G/6 G networks. 1055-1073 - Hayette Zeghida, Mehdi Boulaiche, Ramdane Chikh:
Securing MQTT protocol for IoT environment using IDS based on ensemble learning. 1075-1086
Volume 22, Number 5, October 2023
- Moon-Seok Kim, Sungho Kim, Sang-Kyung Yoo, Bong-Soo Lee, Ji-Man Yu, Il-Woong Tcho, Yang-Kyu Choi:
Error reduction of SRAM-based physically unclonable function for chip authentication. 1087-1098 - Feiyang Cai, Xenofon D. Koutsoukos:
Real-time detection of deception attacks in cyber-physical systems. 1099-1114 - Sibo Shi, Shengwei Tian, Bo Wang, Tiejun Zhou, Guanxin Chen:
SFCGDroid: android malware detection based on sensitive function call graph. 1115-1124 - Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed:
A systematic literature review for network intrusion detection system (IDS). 1125-1162 - Reza Mohammadi:
A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT. 1163-1175 - Shahriar Mohammadi, Mehdi Babagoli:
A novel hybrid hunger games algorithm for intrusion detection systems based on nonlinear regression modeling. 1177-1195 - Suhail Ahmad, Ajaz Hussain Mir:
Protection of centralized SDN control plane from high-rate Packet-In messages. 1197-1206 - Or Naim, Doron Cohen, Irad Ben-Gal:
Malicious website identification using design attribute learning. 1207-1217 - Wenjuan Li, Yu Wang, Jin Li:
A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems. 1219-1230 - Andreas Grüner, Alexander Mühle, Niko Lockenvitz, Christoph Meinel:
Analyzing and comparing the security of self-sovereign identity management systems through threat modeling. 1231-1248 - Denghui Zhang, Zhaoquan Gu, Lijing Ren, Muhammad Shafiq:
An interpretability security framework for intelligent decision support systems based on saliency map. 1249-1260 - Suryakanta Panda, Samrat Mondal, Ashok Kumar Das, Willy Susilo:
Secure access privilege delegation using attribute-based encryption. 1261-1276 - Sara Baradaran, Mahdi Heidari, Ali Kamali, Maryam Mouzarani:
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes. 1277-1290 - Thomas Prantl, André Bauer, Lukas Iffländer, Christian Krupitzer, Samuel Kounev:
Recommendation of secure group communication schemes using multi-objective optimization. 1291-1332 - Alexandros Zacharis, Constantinos Patsakis:
AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition. 1333-1354 - Md. Mumtahin Habib Ullah Mazumder, Md. Eusha Kadir, Sadia Sharmin, Md. Shariful Islam, Muhammad Mahbub Alam:
cFEM: a cluster based feature extraction method for network intrusion detection. 1355-1369 - S. Asha, P. Vinod, Varun G. Menon:
A defensive framework for deepfake detection under adversarial settings using temporal and spatial features. 1371-1382 - Feiyang Cai, Xenofon D. Koutsoukos:
Correction: Real-time detection of deception attacks in cyber-physical systems. 1383 - Hamed Sepehrzadeh:
A method for insider threat assessment by modeling the internal employee interactions. 1385-1393 - Cristina Alcaraz, Jesus Cumplido, Alicia Triviño:
OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.0. 1395-1421 - Runzheng Wang, Jian Gao, Shuhua Huang:
AIHGAT: A novel method of malware detection and homology analysis using assembly instruction heterogeneous graph. 1423-1443 - Mar Gimenez-Aguilar, José María de Fuentes, Lorena González-Manzano:
Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus. 1445-1480 - Taqwa Ahmed Alhaj, Maheyzah Md Siraj, Anazida Zainal, Inshirah Idris, Anjum Nazir, Fatin A. Elhaj, Tasneem Darwish:
An effective attack scenario construction model based on identification of attack steps and stages. 1481-1496 - Yin Sheng Zhang:
Analysis of OSPU security effect and data assembly verification under semi-network OS architecture. 1497-1509 - Alexandros Papanikolaou, Aggelos Alevizopoulos, Christos Ilioudis, Konstantinos Demertzis, Konstantinos Rantos:
An autoML network traffic analyzer for cyber threat detection. 1511-1530
Volume 22, Number 6, December 2023
- Nabin Chowdhury, Vasileios Gkioulos:
A personalized learning theory-based cyber-security training exercise. 1531-1546 - Luong Thai Ngoc, Doan Hoang:
BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks. 1547-1566 - Lorena González-Manzano, José María de Fuentes, Flavio Lombardi, Cristina Ramos:
A technical characterization of APTs by leveraging public resources. 1567-1584 - Rabie Barhoun, Maryam Ed-Daibouni:
Trust modeling in a distributed collaborative environment: application to a collaborative healthcare system. 1585-1604 - Lorenzo Rovida:
Fast but approximate homomorphic k-means based on masking technique. 1605-1619 - Ankur Shukla, Basel Katt, Muhammad Mudassar Yamin:
A quantitative framework for security assurance evaluation and selection of cloud services: a case study. 1621-1650 - Taiwo Blessing Ogunseyi, Cossi Blaise Avoussoukpo, Yiqiang Jiang:
A systematic review of privacy techniques in recommendation systems. 1651-1664 - Christian Lopez, Jesús Solano, Esteban Rivera, Lizzy Tengana, Johana Florez-Lozano, Alejandra Castelblanco, Martín Ochoa:
Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques. 1665-1685 - Mo'ath Zyout, Raed Shatnawi, Hassan Najadat:
Malware classification approaches utilizing binary and text encoding of permissions. 1687-1712 - Mathias Ekstedt, Zeeshan Afzal, Preetam Mukherjee, Simon Hacks, Robert Lagerström:
Yet another cybersecurity risk assessment framework. 1713-1729 - K. S. Kuppusamy, Balayogi G:
Accessible password strength assessment method for visually challenged users. 1731-1741 - Saurabh Pandey, Nitesh Kumar, Anand Handa, Sandeep Kumar Shukla:
Evading malware classifiers using RL agent with action-mask. 1743-1763 - Zhenyu Guan, Lixin Zhang, Bohan Huang, Bihe Zhao, Song Bian:
Adaptive hyperparameter optimization for black-box adversarial attack. 1765-1779 - Muhammad Ali, Mansoor-ul-haque, Muhammad Hanif Durad, Anila Usman, Syed Muhammad Mohsin, Hana Mujlid, Carsten Maple:
Effective network intrusion detection using stacking-based ensemble approach. 1781-1798 - Srinidhi Madabhushi, Rinku Dewri:
A survey of anomaly detection methods for power grids. 1799-1832 - Ahmed Fraz Baig, Sigurd Eskeland, Bian Yang:
Privacy-preserving continuous authentication using behavioral biometrics. 1833-1847 - Nasiru Ibrahim, Harin Sellahewa:
A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on android Pattern Unlock. 1849-1863 - Kristijan Ziza, Predrag Tadic, Pavle V. Vuletic:
DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour. 1865-1880 - M. Sneha, A. Keerthan Kumar, Nikhil V. Hegde, A. S. Anish, G. Shobha:
RADS: a real-time anomaly detection model for software-defined networks using machine learning. 1881-1891 - Christos Smiliotopoulos, Georgios Kambourakis, Konstantia Barbatsalou:
On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs. 1893-1919 - Dmitry Levshun, Olga Tushkanova, Andrey Chechulin:
Two-model active learning approach for inappropriate information classification in social networks. 1921-1936 - Najet Hamdi:
Federated learning-based intrusion detection system for Internet of Things. 1937-1948 - Sarabjeet Kaur, Amanpreet Kaur Sandhu, Abhinav Bhandari:
Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review. 1949-1988 - Saida Farhat, Manel Abdelkader, Amel Meddeb-Makhlouf, Faouzi Zarai:
CADS-ML/DL: efficient cloud-based multi-attack detection system. 1989-2013 - Vicenç Torra, Guillermo Navarro-Arribas:
Attribute disclosure risk for k-anonymity: the case of numerical data. 2015-2024
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.