


default search action
International Journal of Information Security, Volume 22
Volume 22, Number 1, February 2023
- Gulab Sah

, Subhasish Banerjee
, Sweety Singh:
Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches. 1-27 - Pablo Picazo-Sanchez

, Magnus Almgren
:
Gridchain: an investigation of privacy for the future local distribution grid. 29-46 - Abdelhakim Hannousse

, Mohamed Cherif Nait-Hamoud
, Salima Yahiouche:
A deep learner model for multi-language webshell detection. 47-61 - Seema Sangari

, Eric Dallal, Michael E. Whitman:
Modeling reporting delays in cyber incidents: an industry-level comparison. 63-76 - Branislav Rajic

, Zarko Stanisavljevic
, Pavle V. Vuletic
:
Early web application attack detection using network traffic analysis. 77-91 - Nemi Chandra Rathore

, Somanath Tripathy:
Restricting data-leakage using fine-grained access control on OSN objects. 93-106 - Pinar Gurkan Balikcioglu, Melih Sirlanci

, Ozge Acar Kucuk, Bulut Ulukapi, Ramazan Türkmen, Cengiz Acartürk
:
Malicious code detection in android: the role of sequence characteristics and disassembling methods. 107-118 - Amit Sharma, Brij B. Gupta

, Awadhesh Kumar Singh, V. K. Saraswat:
A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network. 119-135 - Sajad Hamzenejadi, Mahdieh Ghazvini

, Seyedamiryousef Hosseini Goki:
Mobile botnet detection: a comprehensive survey. 137-175 - Shubhangi Rastogi, Divya Bansal:

A review on fake news detection 3T's: typology, time of detection, taxonomies. 177-212 - Emre Süren

, Fredrik Heiding, Johannes Olegård, Robert Lagerström:
PatrIoT: practical and agile threat research for IoT. 213-233 - Safa Mohamed

, Ridha Ejbali:
Deep SARSA-based reinforcement learning approach for anomaly network intrusion detection system. 235-247 - Ahmed Amro

, Vasileios Gkioulos:
Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth. 249-288 - Luay Alawneh

, Mohammad Al-Zinati, Mahmoud Al-Ayyoub:
User identification using deep learning and human activity mobile sensor data. 289-301 - Irini Lygerou, Shreyas Srinivasa, Emmanouil Vasilomanolakis, George Stergiopoulos

, Dimitris Gritzalis
:
Correction to: A decentralized honeypot for IoT Protocols based on Android devices. 303
Volume 22, Number 2, April 2023
- Qin An

, Wilson Cheong Hin Hong
, Xiaoshu Xu
, Yunfeng Zhang
, Kimberly Kolletar-Zhu
:
How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates. 305-317 - Murat Kuzlu, Ferhat Özgür Çatak

, Umit Cali, Evren Çatak, Ozgur Guler:
Adversarial security mitigations of mmWave beamforming prediction models using defensive distillation and adversarial retraining. 319-332 - Swati

, Sangita Roy, Jawar Singh
, Jimson Mathew
:
Design and analysis of DDoS mitigating network architecture. 333-345 - Efstratios Chatzoglou, Vasileios Kouliaridis

, Georgios Karopoulos, Georgios Kambourakis
:
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study. 347-365 - Reza Mohammadi, Chhagan Lal, Mauro Conti

:
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN. 367-379 - Panagiotis Andriotis

, Myles Kirby, Atsuhiro Takasu
:
Bu-Dash: a universal and dynamic graphical password scheme (extended version). 381-401 - Kailash Chandra Mishra

, Subrata Dutta
:
A simple and secure user authentication scheme using Map Street View with usability analysis based on ISO/IEC 25022. 403-415 - Kapilan Kulayan Arumugam Gandhi

, Chamundeswari Arumugam
:
Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device. 417-431 - Hanxun Zhou, Longyu Kang, Hong Pan, Wei Guo, Yong Feng:

An intrusion detection approach based on incremental long short-term memory. 433-446 - Gorka Guardiola Muzquiz

, Enrique Soriano-Salvador
:
SealFSv2: combining storage-based and ratcheting for tamper-evident logging. 447-466 - Bander A. Alzahrani

, Nikos Fotiou, Aiiad Albeshri, Abdullah Almuhaimeed
, Khalid Alsubhi:
Distributed access control for information-centric networking architectures using verifiable credentials. 467-478 - Melike Burakgazi Bilgen, Osman Abul

, Kemal Bicakci:
Authentication-enabled attribute-based access control for smart homes. 479-495 - Kai Wang, Jinxia Wu, Tianqing Zhu, Wei Ren, Ying Hong:

Defense against membership inference attack in graph neural networks through graph perturbation. 497-509 - Hira Ahmad, Muhammad Ahtazaz Ahsan, Adnan Noor Mian

:
Trends in publishing blockchain surveys: a bibliometric perspective. 511-523 - Haya Brama, Lihi Dery, Tal Grinshpoun:

Evaluation of neural networks defenses and attacks using NDCG and reciprocal rank metrics. 525-540
Volume 22, Number 3, June 2023
- Alberto Huertas Celdrán

, Pedro Miguel Sánchez Sánchez
, Miguel Azorín Castillo, Gérôme Bovet
, Gregorio Martínez Pérez
, Burkhard Stiller
:
Intelligent and behavioral-based detection of malware in IoT spectrum sensors. 541-561 - Aida Akbarzadeh

, Sokratis K. Katsikas:
Dependency-based security risk assessment for cyber-physical systems. 563-578 - Martin Higgins, Wangkun Xu, Fei Teng

, Thomas Parisini:
Cyber-physical risk assessment for false data injection attacks considering moving target defences. 579-589 - Eranga Bandara, Xueping Liang, Sachin Shetty

, Ravi Mukkamala, Peter Foytik, Nalin Ranasinghe, Kasun De Zoysa
:
Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system (IPFS). 591-609 - Taher Al-Shehari

, Rakan A. Alsowail:
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection. 611-629 - Marmar Orooji, Seyedeh Shaghayegh Rabbanian

, Gerald M. Knapp:
Flexible adversary disclosure risk measure for identity and attribute disclosure attacks. 631-645 - Imdad Ullah

, Roksana Boreli, Salil S. Kanhere
:
Privacy in targeted advertising on mobile devices: a survey. 647-678 - Yingchun Chen, Jinguo Li

, Naiwang Guo:
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment. 679-689 - Juan Miguel López Velásquez

, Sergio Mauricio Martínez Monterrubio
, Luis Enrique Sánchez Crespo
, David Garcia Rosado:
Systematic review of SIEM technology: SIEM-SC birth. 691-711 - Rudolf Lovrencic

, Dejan Skvorc:
Multi-cloud applications: data and code fragmentation for improved security. 713-721 - Guangjia Song

, Jianhua Hu, Hui Wang:
A novel frame switching model based on virtual MAC in SDN. 723-736 - Aggeliki Tsohou, Vasiliki Diamantopoulou, Stefanos Gritzalis, Costas Lambrinoudakis:

Cyber insurance: state of the art, trends and future directions. 737-748
Volume 22, Number 4, August 2023
- Jasleen Kaur

, Alka Agrawal, Raees Ahmad Khan:
P2ADF: a privacy-preserving attack detection framework in fog-IoT environment. 749-762 - Ruqayah Al-Ani

, Thar Baker
, Bo Zhou, Qi Shi
:
Privacy and safety improvement of VANET data via a safety-related privacy scheme. 763-783 - Eirini Molla

, Panagiotis Rizomiliotis, Stefanos Gritzalis:
Efficient searchable symmetric encryption supporting range queries. 785-798 - Shweta Mittal, Mohona Ghosh

:
A novel two-level secure access control approach for blockchain platform in healthcare. 799-817 - Panagiotis Grontas

, Aris Pagourtzis
:
Anonymity and everlasting privacy in electronic voting. 819-832 - Francisco T. Chimuco

, João B. F. Sequeiros, Carolina Galvão Lopes, Tiago M. C. Simões
, Mário M. Freire
, Pedro R. M. Inácio:
Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation. 833-867 - Leonardo Dias Menezes

, Luciano Vieira de Araújo
, Marislei Nishijima
:
Blockchain and smart contract architecture for notaries services under civil law: a Brazilian experience. 869-880 - Pankaj Pandey

, Nishchol Mishra
:
Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning. 881-891 - Brandon Bowen, Anitha Chennamaneni, Ana E. Goulart, Daisy Lin:

BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning. 893-917 - Zhen Yang, Shisong Yang, Yunbo Huang, José-Fernán Martínez, Lourdes López-Santidrián, Yuwen Chen:

AAIA: an efficient aggregation scheme against inverting attack for federated learning. 919-930 - Srividya Bhaskara, Santosh Singh Rathore:

Causal effect analysis-based intrusion detection system for IoT applications. 931-946 - Mohanad Sarhan, Siamak Layeghy

, Marcus Gallagher
, Marius Portmann
:
From zero-shot machine learning to zero-day attack detection. 947-959 - Abhay Deep Seth

, Santosh Biswas, Amit Kumar Dhar:
LDES: detector design for version number attack detection using linear temporal logic based on discrete event system. 961-985 - Ömer Faruk Tuna

, Ferhat Özgür Çatak, Mustafa Taner Eskil:
TENET: a new hybrid network architecture for adversarial defense. 987-1004 - Menelaos N. Katsantonis

, Athanassios Manikas
, Ioannis Mavridis, Dimitris Gritzalis:
Cyber range design framework for cyber security education and training. 1005-1027 - Mitra Alidoosti

, Alireza Nowroozi
, Ahmad Nickabadi:
Business-layer client-side racer: dynamic security testing of the web application against client-side race condition in the business layer. 1029-1054 - Nizamud Din, Abdul Waheed, Shamsher Ullah

, Noor Ul Amin, Gautam Srivastava, Farhan Ullah
, Jerry Chun-Wei Lin
:
A typology of secure multicast communication over 5 G/6 G networks. 1055-1073 - Hayette Zeghida, Mehdi Boulaiche, Ramdane Chikh:

Securing MQTT protocol for IoT environment using IDS based on ensemble learning. 1075-1086
Volume 22, Number 5, October 2023
- Moon-Seok Kim, Sungho Kim, Sang-Kyung Yoo, Bong-Soo Lee, Ji-Man Yu, Il-Woong Tcho, Yang-Kyu Choi:

Error reduction of SRAM-based physically unclonable function for chip authentication. 1087-1098 - Feiyang Cai

, Xenofon D. Koutsoukos:
Real-time detection of deception attacks in cyber-physical systems. 1099-1114 - Sibo Shi, Shengwei Tian, Bo Wang, Tiejun Zhou, Guanxin Chen:

SFCGDroid: android malware detection based on sensitive function call graph. 1115-1124 - Oluwadamilare Harazeem Abdulganiyu

, Taha Ait Tchakoucht, Yakub Kayode Saheed
:
A systematic literature review for network intrusion detection system (IDS). 1125-1162 - Reza Mohammadi:

A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT. 1163-1175 - Shahriar Mohammadi, Mehdi Babagoli:

A novel hybrid hunger games algorithm for intrusion detection systems based on nonlinear regression modeling. 1177-1195 - Suhail Ahmad, Ajaz Hussain Mir:

Protection of centralized SDN control plane from high-rate Packet-In messages. 1197-1206 - Or Naim, Doron Cohen, Irad Ben-Gal:

Malicious website identification using design attribute learning. 1207-1217 - Wenjuan Li, Yu Wang

, Jin Li:
A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems. 1219-1230 - Andreas Grüner, Alexander Mühle, Niko Lockenvitz, Christoph Meinel:

Analyzing and comparing the security of self-sovereign identity management systems through threat modeling. 1231-1248 - Denghui Zhang, Zhaoquan Gu, Lijing Ren, Muhammad Shafiq

:
An interpretability security framework for intelligent decision support systems based on saliency map. 1249-1260 - Suryakanta Panda

, Samrat Mondal, Ashok Kumar Das, Willy Susilo
:
Secure access privilege delegation using attribute-based encryption. 1261-1276 - Sara Baradaran

, Mahdi Heidari
, Ali Kamali
, Maryam Mouzarani
:
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes. 1277-1290 - Thomas Prantl, André Bauer

, Lukas Iffländer, Christian Krupitzer, Samuel Kounev:
Recommendation of secure group communication schemes using multi-objective optimization. 1291-1332 - Alexandros Zacharis, Constantinos Patsakis

:
AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition. 1333-1354 - Md. Mumtahin Habib Ullah Mazumder

, Md. Eusha Kadir, Sadia Sharmin
, Md. Shariful Islam, Muhammad Mahbub Alam:
cFEM: a cluster based feature extraction method for network intrusion detection. 1355-1369 - S. Asha

, P. Vinod, Varun G. Menon
:
A defensive framework for deepfake detection under adversarial settings using temporal and spatial features. 1371-1382 - Feiyang Cai

, Xenofon D. Koutsoukos:
Correction: Real-time detection of deception attacks in cyber-physical systems. 1383 - Hamed Sepehrzadeh:

A method for insider threat assessment by modeling the internal employee interactions. 1385-1393 - Cristina Alcaraz

, Jesus Cumplido, Alicia Triviño:
OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.0. 1395-1421 - Runzheng Wang, Jian Gao, Shuhua Huang:

AIHGAT: A novel method of malware detection and homology analysis using assembly instruction heterogeneous graph. 1423-1443 - Mar Gimenez-Aguilar

, José María de Fuentes
, Lorena González-Manzano
:
Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus. 1445-1480 - Taqwa Ahmed Alhaj, Maheyzah Md Siraj, Anazida Binti Zainal, Inshirah Idris, Anjum Nazir, Fatin A. Elhaj

, Tasneem Darwish:
An effective attack scenario construction model based on identification of attack steps and stages. 1481-1496 - Yin Sheng Zhang:

Analysis of OSPU security effect and data assembly verification under semi-network OS architecture. 1497-1509 - Alexandros Papanikolaou, Aggelos Alevizopoulos

, Christos Ilioudis, Konstantinos Demertzis, Konstantinos Rantos:
An autoML network traffic analyzer for cyber threat detection. 1511-1530
Volume 22, Number 6, December 2023
- Nabin Chowdhury, Vasileios Gkioulos:

A personalized learning theory-based cyber-security training exercise. 1531-1546 - Luong Thai Ngoc, Doan Hoang

:
BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks. 1547-1566 - Lorena González-Manzano, José María de Fuentes, Flavio Lombardi, Cristina Ramos:

A technical characterization of APTs by leveraging public resources. 1567-1584 - Rabie Barhoun, Maryam Ed-Daibouni:

Trust modeling in a distributed collaborative environment: application to a collaborative healthcare system. 1585-1604 - Lorenzo Rovida

:
Fast but approximate homomorphic k-means based on masking technique. 1605-1619 - Ankur Shukla

, Basel Katt, Muhammad Mudassar Yamin:
A quantitative framework for security assurance evaluation and selection of cloud services: a case study. 1621-1650 - Taiwo Blessing Ogunseyi

, Cossi Blaise Avoussoukpo
, Yiqiang Jiang
:
A systematic review of privacy techniques in recommendation systems. 1651-1664 - Christian Lopez, Jesús Solano, Esteban Rivera, Lizzy Tengana, Johana Florez-Lozano

, Alejandra Castelblanco, Martín Ochoa:
Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques. 1665-1685 - Mo'ath Zyout, Raed Shatnawi

, Hassan Najadat
:
Malware classification approaches utilizing binary and text encoding of permissions. 1687-1712 - Mathias Ekstedt, Zeeshan Afzal, Preetam Mukherjee

, Simon Hacks, Robert Lagerström:
Yet another cybersecurity risk assessment framework. 1713-1729 - K. S. Kuppusamy, Balayogi G

:
Accessible password strength assessment method for visually challenged users. 1731-1741 - Saurabh Pandey, Nitesh Kumar, Anand Handa, Sandeep Kumar Shukla:

Evading malware classifiers using RL agent with action-mask. 1743-1763 - Zhenyu Guan, Lixin Zhang, Bohan Huang, Bihe Zhao, Song Bian:

Adaptive hyperparameter optimization for black-box adversarial attack. 1765-1779 - Muhammad Ali, Mansoor-ul-haque, Muhammad Hanif Durad, Anila Usman, Syed Muhammad Mohsin, Hana Mujlid, Carsten Maple:

Effective network intrusion detection using stacking-based ensemble approach. 1781-1798 - Srinidhi Madabhushi, Rinku Dewri:

A survey of anomaly detection methods for power grids. 1799-1832 - Ahmed Fraz Baig

, Sigurd Eskeland, Bian Yang:
Privacy-preserving continuous authentication using behavioral biometrics. 1833-1847 - Nasiru Ibrahim, Harin Sellahewa:

A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on android Pattern Unlock. 1849-1863 - Kristijan Ziza, Predrag Tadic

, Pavle V. Vuletic
:
DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour. 1865-1880 - M. Sneha, A. Keerthan Kumar, Nikhil V. Hegde, A. S. Anish, G. Shobha:

RADS: a real-time anomaly detection model for software-defined networks using machine learning. 1881-1891 - Christos Smiliotopoulos, Georgios Kambourakis, Konstantia Barbatsalou:

On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs. 1893-1919 - Dmitry Levshun

, Olga Tushkanova, Andrey Chechulin
:
Two-model active learning approach for inappropriate information classification in social networks. 1921-1936 - Najet Hamdi:

Federated learning-based intrusion detection system for Internet of Things. 1937-1948 - Sarabjeet Kaur

, Amanpreet Kaur Sandhu, Abhinav Bhandari:
Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review. 1949-1988 - Saida Farhat

, Manel Abdelkader, Amel Meddeb-Makhlouf
, Faouzi Zarai
:
CADS-ML/DL: efficient cloud-based multi-attack detection system. 1989-2013 - Vicenç Torra

, Guillermo Navarro-Arribas:
Attribute disclosure risk for k-anonymity: the case of numerical data. 2015-2024

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














