


default search action
International Journal of Information Security, Volume 23
Volume 23, Number 1, February 2024
- Arun Sekar Rajasekaran
, Maria Azees:
A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation. 1-13 - Hakima Rym Rahal, Sihem Slatnia, Okba Kazar
, Ezedin Barka, Saad Harous
:
Blockchain-based multi-diagnosis deep learning application for various diseases classification. 15-30 - Stefano Silvestri
, Shareful Islam, Dmitry Amelin, Gabriele Weiler, Spyridon Papastergiou, Mario Ciampi:
Cyber threat assessment and management for securing healthcare ecosystems using natural language processing. 31-50 - Osama Bassam J. Rabie
, Shitharth Selvarajan
, Tawfiq Hasanin
, Gouse Baig Mohammad, Abddulrhman M. Alshareef
, Mueen Uddin:
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs). 51-80 - Afnan A. Alharbi
:
Federated transfer learning for attack detection for Internet of Medical Things. 81-100 - Alexandre Rekeraho
, Daniel Tudor Cotfas, Petru Adrian Cotfas, Titus Constantin Balan, Emmanuel Tuyishime
, Rebecca Acheampong:
Cybersecurity challenges in IoT-based smart renewable energy. 101-117 - Sofiane Lagraa, Martin Husák, Hamida Seba, Satyanarayana Vuppala, Radu State, Moussa Ouedraogo:
A review on graph-based approaches for network security monitoring and botnet detection. 119-140 - Believe Ayodele
, Victor Buttigieg
:
SDN as a defence mechanism: a comprehensive survey. 141-185 - Konstantinos Adamos
, George Stergiopoulos, Michalis Karamousadakis, Dimitris Gritzalis:
Enhancing attack resilience of cyber-physical systems through state dependency graph models. 187-198 - K. Dinesh
, S. V. N. Santhosh Kumar:
Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network. 199-223 - Åvald Åslaugson Sommervoll
, László Erdodi, Fabio Massimo Zennaro:
Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents. 225-246 - Hakan Kekül, Burhan Ergen, Halil Arslan
:
Estimating vulnerability metrics with word embedding and multiclass classification methods. 247-270 - Silviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian:
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware. 271-297 - Gwonsang Ryu, Daeseon Choi:
Detection of adversarial attacks based on differences in image entropy. 299-314 - Bhavya Dhingra, Vidhi Jain, Deepak Kumar Sharma, Koyel Datta Gupta, Deepika Kukreja:
RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment. 315-330 - Philgeun Jin, Namjun Kim, Sangjin Lee, Doowon Jeong
:
Forensic investigation of the dark web on the Tor network: pathway toward the surface web. 331-346 - Aristeidis Farao
, Georgios Paparis
, Sakshyam Panda
, Emmanouil Panaousis
, Apostolis Zarras
, Christos Xenakis
:
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain. 347-371 - Fabrice Mvah
, Vianney Kengne Tchendji
, Clémentin Tayou Djamégni
, Ahmed H. Anwar
, Deepak K. Tosh
, Charles A. Kamhoua
:
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks. 373-387 - Jun Narita, Takao Murakami, Hideitsu Hino, Masakatsu Nishigaki, Tetsushi Ohki
:
Synthesizing differentially private location traces including co-locations. 389-410 - Tao Feng, Wentao Jin, Minghu Zhang, Lu Zheng:
Security assessment and improvement of smart grid NIKE protocol. 411-429 - Oussama Amine, Karim Baghery
, Zaira Pindado, Carla Ràfols:
Simulation extractable versions of Groth's zk-SNARK revisited. 431-445 - Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate:
Pepal: Penalizing multimedia breaches and partial leakages. 447-465 - Marius Elmiger, Mouad Lemoudden
, Nikolaos Pitropakis, William J. Buchanan:
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant. 467-485 - Partha Sarathi Chakraborty, Somanath Tripathy, Sanjeet Kumar Nayak
:
BASPED: Blockchain assisted searchable public key encryption over outsourced data. 487-503 - Muhammad Adnan, Muhammad Osama Imam, Muhammad Furqan Javed, Iqbal Murtza:
Improving spam email classification accuracy using ensemble techniques: a stacking approach. 505-517 - Poornima M. Chanal
, Mahabaleshwar S. Kakkasageri:
Blockchain-based data integrity framework for Internet of Things. 519-532 - Md. Ahsan Ayub
, Ambareen Siraj, Bobby Filar, Maanak Gupta:
RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware. 533-556 - Vikas Kumar Jain, Meenakshi Tripathi:
An integrated deep learning model for Ethereum smart contract vulnerability detection. 557-575 - Anjum, Rahul Katarya
:
Hate speech, toxicity detection in online social media: a recent survey of state of the art and opportunities. 577-608 - Aikaterini Triakosia, Panagiotis Rizomiliotis, Cecilia Tonelli, Fabio Federici, Valerio Senni:
Secure outsourcing of manufacturing compliance checks. 609-627 - Junichiro Hayata
, Jacob C. N. Schuldt, Goichiro Hanaoka, Kanta Matsuura:
On private information retrieval supporting range queries. 629-647 - Vidhi Bansal
, Niyati Baliyan, Mohona Ghosh
:
MLChain: a privacy-preserving model learning framework using blockchain. 649-677 - Patruni Muralidhara Rao
, Abdul Gaffar Humayun
:
PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks. 679-698
Volume 23, Number 2, April 2024
- Constantinos Patsakis, Eugenia A. Politou, Efthimios Alepis, Julio C. Hernandez-Castro:
Cashing out crypto: state of practice in ransom payments. 699-712 - Ahlem Hamdi, Lamia Fourati, Samiha Ayed:
Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures. 713-757 - Houssam Zouhri
, Ali Idri, Ahmed Ratnani:
Evaluating the impact of filter-based feature selection in intrusion detection systems. 759-785 - Miguel Angel Olivero, Antonia Bertolino, Francisco José Domínguez Mayo, María José Escalona, Ilaria Matteucci:
A systematic mapping study on security for systems of systems. 787-817 - Richa Goenka
, Meenu Chawla, Namita Tiwari:
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy. 819-848 - Mamatha Maddu, Yamarthi Narasimha Rao:
Network intrusion detection and mitigation in SDN using deep learning models. 849-862 - Auwal Shehu Ali
, Zarul Fitri Zaaba
, Manmeet Mahinderjit Singh:
The rise of "security and privacy": bibliometric analysis of computer privacy research. 863-885 - Ehab Alkhateeb
, Ali A. Ghorbani, Arash Habibi Lashkari:
A survey on run-time packers and mitigation techniques. 887-913 - Pradeepkumar Bhale
, Santosh Biswas, Sukumar Nandi:
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks. 915-934 - Gaurav Tyagi
, Rahul Kumar:
An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function. 935-962 - Antonio Villalón-Huerta
, Ismael Ripoll-Ripoll
, Hector Marco-Gisbert
:
A survey and characterization of Close Access Cyberspace Operations. 963-980 - Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel:
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems. 981-997 - Peng Xun, Ziyu Yang, Haoyang Zhu, Zhu Tang:
Locating collaborative attack targets based on physical invariants toward cyber-physical systems. 999-1017 - Patruni Muralidhara Rao, Abdul Gaffar Humayun
:
Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks. 1019 - Ricardo Martins Gonçalves
, Miguel Mira da Silva
, Paulo Rupino da Cunha
:
Olympus: a GDPR compliant blockchain system. 1021-1036 - Jalaiah Saikam
, Koteswararao Ch
:
An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152. 1037-1054 - Subhash Ariyadasa
, Shantha Fernando
, Subha Fernando
:
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks. 1055-1076 - Lei Xu, Junhai Zhai:
Generating adversarial examples with collaborative generative models. 1077-1091 - Juan Manuel Castelo Gómez, Sergio Ruiz-Villafranca
:
Integrating the edge computing paradigm into the development of IoT forensic methodologies. 1093-1116 - Kenan Ince
:
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT. 1117-1130 - Firas Hamila, Mohammad Hamad
, Daniel Costa Salgado, Sebastian Steinhorst:
Enhancing security in Fiat-Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication. 1131-1148 - Thomas Prantl, Lukas Horn, Simon Engel, Lukas Iffländer, Lukas Beierlieb, Christian Krupitzer, André Bauer
, Mansi Sakarvadia, Ian T. Foster, Samuel Kounev:
De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem. 1149-1169 - Jessica B. Heluany, Vasileios Gkioulos:
A review on digital twins for power generation and distribution. 1171-1195 - Rao Faizan Ali
, P. D. D. Dominic
, Sadaf Hina
, Sheraz Naseer
:
Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees. 1197-1213 - Philip Empl, Daniel Schlette, Lukas Stöger, Günther Pernul:
Generating ICS vulnerability playbooks with open standards. 1215-1230 - Habib El Amin, Lina Oueidat, Maroun Chamoun, Abed Ellatif Samhat
, Antoine Feghali:
Blockchain-based multi-organizational cyber risk management framework for collaborative environments. 1231-1249 - Himanshu Nandanwar, Rahul Katarya:
TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment. 1251-1277 - Dimmiti Srinivasa Rao, Emerson Ajith Jubilson:
Cyberattack defense mechanism using deep learning techniques in software-defined networks. 1279-1291 - Sepideh Niktabe
, Arash Habibi Lashkari
, Dilli Prasad Sharma
:
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition. 1293-1316 - Rupshali Dasgupta
, Meghabriti Pramanik, Pabitra Mitra, Dipanwita Roy Chowdhury:
Intrusion detection for power grid: a review. 1317-1329 - H. Asad, S. Adhikari
, Ilir Gashi:
A perspective-retrospective analysis of diversity in signature-based open-source network intrusion detection systems. 1331-1346 - Sultan S. Alqahtani:
Security bug reports classification using fasttext. 1347-1358 - Fatna El Mendili
, Mohammed Fattah, Nisrine Berros, Youness Filaly, Younès El Bouzekri El Idrissi:
Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning. 1359-1388 - Sohail Abbas, Manar Abu Talib, Qassim Nasir, Sally Idhis, Mariam M. Alaboudi, Ali Mohamed:
Radio frequency fingerprinting techniques for device identification: a survey. 1389-1427 - Ferney Martínez, Luis Enrique Sánchez, Antonio Santos-Olmo, David Garcia Rosado, Eduardo Fernández-Medina:
Maritime cybersecurity: protecting digital seas. 1429-1457 - Ndukwe Ukeje, Jairo A. Gutiérrez
, Krassie Petrova:
Information security and privacy challenges of cloud computing for government adoption: a systematic review. 1459-1475 - Aybars Oruc
, Nabin Chowdhury, Vasileios Gkioulos:
A modular cyber security training programme for the maritime domain. 1477-1512 - Fei Zuo, Junghwan Rhee:
Vulnerability discovery based on source code patch commit mining: a systematic literature review. 1513-1526 - Fulvio Frati, Georgiana Darau, Nikos Salamanos
, Pantelitsa Leonidou, Costas Iordanou, Dimitris Plachouris, Efstratios Syrmas, Evangelos Floros, George Nikitakis, George Spanoudakis, Konstantinos Kalais, Stella Tsichlaki, Ernesto Damiani, George C. Kagadis, Jihane Najar, Michael Sirivianos:
Cybersecurity training and healthcare: the AERAS approach. 1527-1539 - Arzu Gorgulu Kakisim:
A deep learning approach based on multi-view consensus for SQL injection detection. 1541-1556
Volume 23, Number 3, June 2024
- Yakub Kayode Saheed
, Sanjay Misra:
A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things. 1557-1581 - Elham Ebrahimpour, Shahram Babaie:
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review. 1583-1602 - Awais Yousaf
, Jianying Zhou:
From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity. 1603-1618 - Yesi Novaria Kunang
, Siti Nurmaini
, Deris Stiawan
, Bhakti Yudho Suprapto
:
An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction. 1619-1648 - Lokendra Vishwakarma, Debasis Das:
BLISS: blockchain-based integrated security system for internet of things (IoT) applications. 1649-1665 - Upendra Singh
, Sumit Kumar Sharma
, Mukul Shukla, Preeti Jha:
Blockchain-based BATMAN protocol using mobile ad hoc network (MANET) with an ensemble algorithm. 1667-1677 - Giddeon Njamngang Angafor, Iryna Yevseyeva, Leandros Maglaras
:
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns. 1679-1693 - Vasiliki Tzavara, Savvas Vassiliadis:
Tracing the evolution of cyber resilience: a historical and conceptual review. 1695-1719 - Marie Haugli-Sandvik
, Mass Soldal Lund, Frøy Birte Bjørneseth:
Maritime decision-makers and cyber security: deck officers' perception of cyber risks towards IT and OT systems. 1721-1739 - Rafal Leszczyna:
Activity-based payments: alternative (anonymous) online payment model. 1741-1759 - Nikola Andelic, Sandi Baressi Segota, Zlatan Car
:
Robust password security: a genetic programming approach with imbalanced dataset handling. 1761-1786 - Redhwan M. A. Saad
, Mohammed Anbar, Selvakumar Manickam, Samir I. Shaheen, Iznan Husainy Hasbullah:
Neighbor discovery protocol anomaly-based detection system using neural network algorithm. 1787-1803 - Rohini G. Pise, Sonali Patil:
Pioneering automated vulnerability detection for smart contracts in blockchain using KEVM: Guardian ADRGAN. 1805-1819 - Michail Smyrlis
, Evangelos Floros, Ioannis Basdekis, Dumitru-Bogdan Prelipcean, Aristeidis Sotiropoulos, Hervé Debar, Apostolis Zarras
, George Spanoudakis
:
RAMA: a risk assessment solution for healthcare organizations. 1821-1838 - Christopher Jun-Wen Chew, Vimal Kumar, Panos Patros
, Robi Malik:
Real-time system call-based ransomware detection. 1839-1858 - Joel Höglund, Simon Bouget, Martin Furuhed, John Preuß Mattsson, Göran Selander, Shahid Raza:
AutoPKI: public key infrastructure for IoT with automated trust transfer. 1859-1875 - Yash Sharma
, Anshul Arora
:
A comprehensive review on permissions-based Android malware detection. 1877-1912 - Rajiv Shah
, Deniz Cemiloglu, Cagatay Yucel, Raian Ali, Vasilis Katos:
Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices. 1913-1926 - W. M. A. B. Wijesundara
, Joong Sun Lee
, Dara Tith
, Eleni Aloupogianni
, Hiroyuki Suzuki
, Takashi Obi
:
Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies. 1927-1937 - Eslam Abdelkreem, Sherif Hussein, Ashraf Tammam:
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network. 1939-1961 - Josep Lluís Ferrer-Gomila
, M. Francisca Hinarejos
:
Abuse-freeness in contract signing: a blockchain-based proposal. 1963-1974 - Vagner Ereno Quincozes
, Silvio E. Quincozes
, Juliano F. Kazienko
, Simone Gama
, Omar Cheikhrouhou
, Anis Koubaa
:
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT). 1975-2002 - Hussain Al-Aqrabi, Ahmed M. Manasrah, Richard Hill
, Mohammed Q. Shatnawi, Mohammad Sh. Daoud, Hoda Alkhzaimi:
Dynamic authentication for intelligent sensor clouds in the Internet of Things. 2003-2021 - Diana-Elena Petrean
, Rodica Potolea
:
Random forest evaluation using multi-key homomorphic encryption and lookup tables. 2023-2041 - Anil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti, Manik Gupta, Raghu Kondapalli, Zhichao Zhang, Krishnakumar Kesavan:
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards. 2043-2061 - Amir Aliabadian, Mohammad Reza Zahabi, Majid Mobini:
Spatial de-correlation of generated keys from wireless channels using adversarial deep learning. 2063-2073 - Eric Hilario, Sami Azam, Jawahar Sundaram, Khwaja Imran Mohammed
, Bharanidharan Shanmugam
:
Generative AI for pentesting: the good, the bad, the ugly. 2075-2097 - Mohammed Nasereddin
, Raad S. Al-Qassas
:
A new approach for detecting process injection attacks using memory analysis. 2099-2121 - Ala Mughaid, Ibrahim Obeidat, Laith Abualigah, Shadi AlZu'bi, Mohammad Sh. Daoud, Hazem Migdady:
Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things. 2123-2137 - Md. Alamin Talukder
, Selina Sharmin, Md. Ashraf Uddin, Md. Manowarul Islam, Sunil Aryal:
MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs. 2139-2158 - Rahul Dwivedi
:
International journal of information security: a bibliometric study, 2007-2023. 2159-2187 - Stylianos Karagiannis
, Christoforos Ntantogian, Emmanouil Magkos, Aggeliki Tsohou, Luís Landeiro Ribeiro
:
Mastering data privacy: leveraging K-anonymity for robust health data sharing. 2189-2201 - Davide Micale, Ilaria Matteucci, Florian Fenzl, Roland Rieke
, Giuseppe Patanè:
A context-aware on-board intrusion detection system for smart vehicles. 2203-2223 - Emmanuel Kwarteng
, Mumin Cebe:
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives. 2225-2268 - Hossein Abedi Khorasgani, Noman Mohammed, Yang Wang:
Attribute inference privacy protection for pre-trained models. 2269-2285 - Ramesh Upreti, Pedro G. Lind, Ahmed Elmokashfi, Anis Yazidi:
Trustworthy machine learning in the context of security and privacy. 2287-2314 - Nadisha Madhushanie, Sugandima Vidanagamachchi, Nalin A. G. Arachchilage:
Selfish mining attack in blockchain: a systematic literature review. 2333-2351 - Kousik Barik
, Sanjay Misra, Luis Fernández Sanz:
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network. 2353-2376 - Abdullah Hamad N. Almoqbil:
Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard. 2377-2394 - M. Amutha, K. R. Kavitha:
Enhancing security in QCA-based circuits using optimal key gate placement. 2395-2405 - Saeed Banaeian Far, Maryam Rajabzadeh Asaar, Afrooz Haghbin:
A generic framework for blockchain-assisted on-chain auditing for off-chain storage. 2407-2435 - Aikaterini Soumelidou
, Aggeliki Tsohou
:
Validation and extension of two domain-specific information privacy competency models. 2437-2455 - N. D. Patel
, B. M. Mehtre, Rajeev Wankar:
A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection. 2457-2487 - Osama Bassam J. Rabie
, Shitharth Selvarajan, Tawfiq Hasanin, Gouse Baig Mohammad, Abddulrhman M. Alshareef, Mueen Uddin:
Correction: A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs). 2489
Volume 23, Number 4, August 2024
- Guangyu Qian, Jinyuan Li, Wei He, Wei Zhang, You Cao:
An online intrusion detection method for industrial control systems based on extended belief rule base. 2491-2514