


default search action
Journal of Information Security and Applications, Volume 95
Volume 95, 2025
- Puja Das, Chitra Jain, Abdullah M. Alshahrani, Moutushi Singh, Md. Zeyaullah, Hytham Hummad:

Quantum-resilient blockchain framework for privacy-preserving genomic data sharing and analysis. 104245 - Kuan Fan, Jie Bai, Shiyue Zhou, Wenbo Shi, Ning Lu

:
Blockchain-based secure and fair data trading mechanism for healthcare. 104252 - Hao Zhang

, Yunfei Li, Tianqing Zhu, Changzhou Han
, Sheng Wen
, Yang Xiang:
A scalable and semi-supervised approach for Ethereum fraud detection using Graph Neural Networks and K-Nearest Neighbors clustering. 104255 - Caiyuan Tang, Feng Wang, Chenbin Zhao

, Hui Cui
, Zuobin Ying
, Ching-Chun Chang, Chin-Chen Chang:
FM-DPDP: Fine-grained Multicopy Dynamic Provable Data Possession with flexible storage. 104262 - Francesco Saccone

, Pietro Melillo
, Arnaldo Sgueglia, Andrea Di Sorbo, Corrado Aaron Visaggio:
The ransomware blueprint: Attack patterns and strategic variations across gangs. 104264 - Bao Wankang

, Zhongxiang Zheng:
VeriKNN: A verifiable and efficient secure k-NN query scheme via homomorphic encryption in dual-cloud environments. 104265 - Qian Zhou

, Jiayang Wu
, Weizhi Meng
:
ABA-LEP: Autonomous Bidirectional Authentication and Lightweight Encryption Protocol for drones under ARM architecture. 104268 - Yuqin Xie, Daofeng Li, Yuan Zhang, Xiaoxue Liang, Guoren Xiong:

Attention-guided adversarial sample generation for robust webshell detection. 104270 - Liangwei Yao

, Hongliang Zhu, Yang Xin:
Res2Next with attention mechanisms for malware classification based on feature visualization. 104271 - Carlton Shepherd

, Elliot A. J. Hurley
:
Entropy collapse in mobile sensors: The hidden risks of sensor-based security. 104272 - Chouhan Kumar Rath

, Amit Kr Mandal
, Anirban Sarkar:
Blockchain-based dynamic MUD profiles for tamper-proof IoT access control. 104273 - Nahida Majeed Wani

, Girraj Kumar Verma
, Neeraj Kumar
:
Quantum-safe and provable secure vehicle to infrastructure authenticated key-agreement for VANETs. 104274 - K. M. Sameera

, Vinod P.
, Anderson Rocha
, Rafidha Rehiman K. A., Mauro Conti:
WeiDetect: Weibull distribution-based defense against poisoning attacks in federated learning for network intrusion detection systems. 104275 - Yibo Huang, Xinkai Dai, Haixia Dong, Zhiyong Li, Qiuyu Zhang

:
A 3D robust chaotic speech encryption scheme based on feature hashing and key distribution. 104276 - Miles Q. Li

, Benjamin C. M. Fung
:
Security concerns for Large Language Models: A survey. 104284 - Xuejun Fan, Fei Zhao, Xiu Xu:

Multi-party post-quantum key exchange schemes. 104288 - Yanpeng Ba

, Yuan Ping
, Zengpeng Li, Zheng Yuan:
Collusion-resistant multi-user searchable symmetric encryption with conjunctive query and suppressed pattern leakage. 104289 - Matthew G. Gaber

, Mohiuddin Ahmed, Helge Janicke:
Defeating evasive malware with Peekaboo: Extracting authentic malware behavior with dynamic binary instrumentation. 104290 - Burak Aydin

, Hakan Aydin
, Sedat Görmüs
:
Intrusion detection systems in IoT: A detailed review of threat categories, detection strategies, and future technologies. 104291 - Muhammad Tanveer, Kainat Toor, Abdullah G. Alharbi, Syed Rizwan Hassan

:
SecTwin: A secure and efficient authentication mechanism for vehicular digital twins. 104292

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














