default search action
International Journal of Information Security, Volume 21
Volume 21, Number 1, February 2022
- Hee Yeon Kim, Ji Hoon Kim, Ho Kyun Oh, Beom Jin Lee, Si Woo Mun, Jeong Hoon Shin, Kyounggon Kim:
DAPP: automatic detection and analysis of prototype pollution vulnerability in Node.js modules. 1-23 - Hansub Shin, Sungyong Sim, Hyukyoon Kwon, Sangheum Hwang, Younho Lee:
A new smart smudge attack using CNN. 25-36 - George Stergiopoulos, Panagiotis Dedousis, Dimitris Gritzalis:
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0. 37-59 - Christos Lyvas, Christoforos Ntantogian, Christos Xenakis:
[m]allotROPism: a metamorphic engine for malicious software variation development. 61-78 - Mina Sheikhalishahi, Andrea Saracino, Fabio Martinelli, Antonio La Marra:
Privacy preserving data sharing and analysis for edge-based architectures. 79-101 - An Braeken:
Public key versus symmetric key cryptography in client-server authentication protocols. 103-114 - Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab:
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. 115-158 - Track for surveys. 159
Volume 21, Number 2, April 2022
- Aun Yichiet, Yen-Min Jasmina Khaw, Ming-Lee Gan, Vasaki Ponnusamy:
A semantic-aware log generation method for network activities. 161-177 - Franco Tommasi, Christian Catalano, Ivan Taurino:
Browser-in-the-Middle (BitM) attack. 179-189 - Roberto Vasconcelos Melo, Douglas D. J. de Macedo, Diego Kreutz, Alessandra De Benedictis, Maurício M. Fiorenza:
ISM-AC: an immune security model based on alert correlation and software-defined networking. 191-205 - Hector B. Hougaard, Atsuko Miyaji:
Authenticated logarithmic-order supersingular isogeny group key exchange. 207-221 - Kindson Munonye, Péter Martinek:
Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow. 223-237 - Metehan Yildirim, Emin Anarim:
Mitigating insider threat by profiling users based on mouse usage pattern: ensemble learning and frequency domain analysis. 239-251 - Alexander Bajic, Georg T. Becker:
Automated benchmark network diversification for realistic attack simulation with application to moving target defense. 253-278 - Mamoru Mimura, Ryo Ito:
Applying NLP techniques to malware detection in a practical environment. 279-291 - László Erdodi, Fabio Massimo Zennaro:
The Agent Web Model: modeling web hacking for reinforcement learning. 293-309 - Junwon Lee, Heejo Lee:
An SSH predictive model using machine learning with web proxy session logs. 311-322 - Taha Elamine Hadjadj, Adel Bouhoula, Rim Tebourbi, Riadh Ksantini:
Optimization of parallel firewalls filtering rules. 323-340 - Zheng Zhang, Shaohao Xie, Fangguo Zhang:
Topology-hiding garbled circuits without universal circuits. 341-356 - Ioannis Kazoleas, Panagiotis Karampelas:
A novel malicious remote administration tool using stealth and self-defense techniques. 357-378 - Tahir Ahmad, Umberto Morelli, Silvio Ranise, Nicola Zannone:
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system. 379-408 - Zach Parish, Connor Cushing, Shourya Aggarwal, Amirali Salehi-Abari, Julie Thorpe:
Password guessers under a microscope: an in-depth analysis to inform deployments. 409-425
Volume 21, Number 3, June 2022
- Cheolhee Park, Dowon Hong, Changho Seo:
Evaluating differentially private decision tree model over model inversion attack. 1-14 - Sairath Bhattacharjya, Hossein Saiedian:
Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture. 427-436 - Aaron Spence, Shaun Bangay:
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures. 437-453 - Saleh A. Alghamdi:
Novel trust-aware intrusion detection and prevention system for 5G MANET-Cloud. 469-488 - Amal Ghorbel, Mahmoud Ghorbel, Mohamed Jmaiel:
Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain. 489-508 - Lu Zhang, Arie Taal, Reginald Cushing, Cees de Laat, Paola Grosso:
A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces. 509-525 - Jaya Singh, Ayush Sinha, Priyanka Goli, Venkatesan Subramanian, Sandeep Kumar Shukla, Om Prakash Vyas:
Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology. 527-546 - Mahdi Soltani, Mahdi Jafari Siavoshani, Amir Hossein Jahangir:
A content-based deep intrusion detection system. 547-562 - Ferucio Laurentiu Tiplea:
Narrow privacy and desynchronization in Vaudenay's RFID model. 563-575 - Haibat Khan, Benjamin Dowling, Keith M. Martin:
Pragmatic authenticated key agreement for IEEE Std 802.15.6. 577-595 - Bradley Potteiger, Feiyang Cai, Zhenkai Zhang, Xenofon D. Koutsoukos:
Data space randomization for securing cyber-physical systems. 597-610 - Noureddine Amraoui, Belhassen Zouari:
Anomalous behavior detection-based approach for authenticating smart home system users. 611-636 - Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Maintaining the level of operational effectiveness of a CSOC under adverse conditions. 637-651 - Maryam Zulfiqar, Muhammad Umar Janjua, Muhammad Hassan, Talha Ahmad, Tania Saleem, Jack W. Stokes:
Tracking adoption of revocation and cryptographic features in X.509 certificates. 653-668 - Paolo D'Arco, Roberto De Prisco, Zahra Ebadi Ansaroudi, Rocco Zaccagnino:
Gossamer: weaknesses and performance. 669-687 - Xiaokuan Zhang, Jihun Hamm, Michael K. Reiter, Yinqian Zhang:
Defeating traffic analysis via differential privacy: a case study on streaming traffic. 689-706
Volume 21, Number 4, August 2022
- Kazuki Koike, Ryotaro Kobayashi, Masahiko Katoh:
IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core. 1-19 - Andrea Huszti, Szabolcs Kovács, Norbert Oláh:
Scalable, password-based and threshold authentication for smart homes. 707-723 - Jinsung Kim, Younghoon Ban, Eunbyeol Ko, Haehyun Cho, Jeong Hyun Yi:
MAPAS: a practical deep learning-based android malware detection system. 725-738 - Mahdieh Zabihimayvan, Derek Doran:
A first look at references from the dark to the surface web world: a case study in Tor. 739-755 - Ryan Karl, Hannah Burchfield, Jonathan Takeshita, Taeho Jung:
Developing non-interactive MPC with trusted hardware for enhanced security. 777-797 - Qian Gong, Phil DeMar, Mine Altunay:
ThunderSecure: deploying real-time intrusion detection for 100G research networks by leveraging stream-based features and one-class classification network. 799-812 - Kengo Zenitani:
A multi-objective cost-benefit optimization algorithm for network hardening. 813-832 - Yuichi Komano, Takaaki Mizuki:
Coin-based Secure Computations. 833-846 - Munshi Saifuzzaman, Tajkia Nuri Ananna, Mohammad Jabed Morshed Chowdhury, Md. Sadek Ferdous, Farida Chowdhury:
A systematic literature review on wearable health data publishing under differential privacy. 847-872 - Ankit Agrawal, Ashutosh Bhatia, Ayush Bahuguna, Kamlesh Tiwari, K. Haribabu, Deepak Vishwakarma, Rekha Kaushik:
A survey on analyzing encrypted network traffic of mobile devices. 873-915 - Unsub Zia, Mark McCartney, Bryan W. Scotney, Jorge Martínez, Mamun I. AbuTair, Jamshed Memon, Ali Sajjad:
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains. 917-935 - Teik Guan Tan, Pawel Szalachowski, Jianying Zhou:
Challenges of post-quantum digital signing in real-world applications: a survey. 937-952
Volume 21, Number 5, October 2022
- Jai Hyun Park, Jung Hee Cheon, Dongwoo Kim:
Efficient verifiable computation over quotient polynomial rings. 953-971 - Christos Lyvas, Costas Lambrinoudakis, Dimitris Geneiatakis:
IntentAuth: Securing Android's Intent-based inter-process communication. 973-982 - Ram Govind Singh, Ananya Shrivastava, Sushmita Ruj:
A Digital Asset Inheritance Model to Convey Online Persona Posthumously. 983-1003 - Elena Agostini, Massimo Bernaschi:
BitCracker: BitLocker meets GPUs. 1005-1018 - Ilyes Ahmim, Nacira Ghoualmi-Zine, Ahmed Ahmim, Marwa Ahmim:
Security analysis on "Three-factor authentication protocol using physical unclonable function for IoV". 1019-1026 - Marcel Armour, Bertram Poettering:
Algorithm substitution attacks against receivers. 1027-1050 - Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk:
ANS-based compression and encryption with 128-bit security. 1051-1067 - Rosa Pericàs-Gornals, Macià Mut Puigserver, María Magdalena Payeras Capellà:
Highly private blockchain-based management system for digital COVID-19 certificates. 1069-1090 - Vasileios Vlachos, Yannis C. Stamatiou, Pantelis Tzamalis, Sotiris E. Nikoletseas:
The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats. 1091-1106 - Beyza Cevik, Nur Altiparmak, Murat Aksu, Sevil Sen:
Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries. 1107-1125 - Hiroki Inayoshi, Shohei Kakei, Eiji Takimoto, Koichi Mouri, Shoichi Saito:
Value-utilized taint propagation: toward precise detection of apps' information flows across Android API calls. 1127-1149 - Ricard Borges, Francesc Sebé, Magda Valls:
An anonymous and unlinkable electronic toll collection system. 1151-1162 - Jeet Rabari, P. Arun Raj Kumar:
A survey on interest packet flooding attacks and its countermeasures in named data networking. 1163-1187 - Andrew D. Syrmakesis, Cristina Alcaraz, Nikos D. Hatziargyriou:
Classifying resilience approaches for protecting smart grids against cyber threats. 1189-1210
Volume 21, Number 6, December 2022
- Irini Lygerou, Shreyas Srinivasa, Emmanouil Vasilomanolakis, George Stergiopoulos, Dimitris Gritzalis:
A decentralized honeypot for IoT Protocols based on Android devices. 1211-1222 - Bingxue Fu, Xing Yu, Tao Feng:
CT-GCN: a phishing identification model for blockchain cryptocurrency transactions. 1223-1232 - Matthias Templ, Murat Sariyar:
A systematic overview on methods to protect sensitive data provided for various analyses. 1233-1246 - Abdenour Kifouche, Mohamed Salah Azzaz, Rédha Hamouche, Rémy Kocik:
Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications. 1247-1262 - C. Prajisha, A. R. Vasudevan:
An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM. 1263-1282 - Pablo Picazo-Sanchez, Lara Ortiz-Martin, Gerardo Schneider, Andrei Sabelfeld:
Are chrome extensions compliant with the spirit of least privilege? 1283-1297 - Kayode S. Adewole, Vicenç Torra:
DFTMicroagg: a dual-level anonymization algorithm for smart grid data. 1299-1321 - Florian Skopik, Arndt Bonitz, Volker Grantz, Günter Göhler:
From scattered data to actionable knowledge: flexible cyber security reporting in the military domain. 1323-1347 - Vicenç Torra, Edgar Galván, Guillermo Navarro-Arribas:
PSO + FL = PAASO: particle swarm optimization + federated learning = privacy-aware agent swarm optimization. 1349-1359 - Xiaodong Yang, Wenjia Wang, Caifen Wang:
Security analysis and improvement of a privacy-preserving authentication scheme in VANET. 1361-1371 - Mohammad Abdussami, Ruhul Amin, Satyanarayana Vollala:
LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment. 1373-1387 - R. Kishore, Iacovos Ioannou, Christophoros Christophorou, N. Prabagarane, Vasos Vassiliou, S. Vignesh, H. Vinayak, S. Venkatesh, Andreas Pitsillides:
A security protocol for D2D communications in 5G networks using elliptic curve cryptography. 1389-1408 - Raju Kumar, Aruna Bhat:
A study of machine learning-based models for detection, control, and mitigation of cyberbullying in online social media. 1409-1431
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.