An online intrusion detection method for industrial control systems based on extended belief rule base Guangyu QianJinyuan LiYou Cao Regular Contribution 26 April 2024 Pages: 2491 - 2514
Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis Ahmed M. Asfahani Regular Contribution 26 April 2024 Pages: 2515 - 2530
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks Raja Zeeshan HaiderBaber AslamZafar Iqbal Regular Contribution 29 April 2024 Pages: 2531 - 2545
Unmasking the common traits: an ensemble approach for effective malware detection Parthajit BorahUpasana SarmahJ. K. Kalita Regular Contribution 30 April 2024 Pages: 2547 - 2557
Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things Uneneibotejit OtokwalaAndrei PetrovskiHarsha Kalutarage Regular Contribution Open access 30 April 2024 Pages: 2559 - 2581
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA) Mustafa Ahmed ElberriÜmit TokeşerJose Manuel Lopez-Guede Regular Contribution Open access 05 May 2024 Pages: 2583 - 2606
Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis Indy HaverkampDipti K. Sarmah Regular Contribution Open access 05 May 2024 Pages: 2607 - 2635
An improved and efficient coercion-resistant measure for electronic voting system Tzer-Long ChenChia-Hui LiuZhen-Yu Wu Regular Contribution 07 May 2024 Pages: 2637 - 2654
Dynamic vulnerability severity calculator for industrial control systems Pavlos CheimonidisKonstantinos Rantos Regular Contribution 08 May 2024 Pages: 2655 - 2676
IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications Guru Prasad BhandariGebremariam AssresTor-Morten Grønli Regular Contribution Open access 09 May 2024 Pages: 2677 - 2690
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle Alexandros ZacharisVasilios KatosConstantinos Patsakis Regular Contribution Open access 10 May 2024 Pages: 2691 - 2710
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms Ashish BajajDinesh Kumar Vishwakarma Regular Contribution 13 May 2024 Pages: 2711 - 2737
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation Aida AkbarzadehLaszlo ErdodiTore Geir Soltvedt Regular Contribution Open access 14 May 2024 Pages: 2739 - 2758
Decentralised identity federations using blockchain Mirza Kamrul Bashar ShuhanSyed Md. HasnayeenMd Sadek Ferdous Regular Contribution 16 May 2024 Pages: 2759 - 2782
BA-flag: a self-prevention mechanism of selfish mining attacks in blockchain technology Nadisha MadhushanieSugandima VidanagamachchiNalin Arachchilage Regular Contribution 20 May 2024 Pages: 2783 - 2792
Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalability Antonio PayaVicente-GarcíaAlberto Gómez Regular Contribution 20 May 2024 Pages: 2793 - 2808
Model-Agnostic Utility-Preserving Biometric Information Anonymization Chun-Fu ChenBill MoriartyPierangela Samarati Regular Contribution 23 May 2024 Pages: 2809 - 2826
IoT cybersecurity in 5G and beyond: a systematic literature review Sandeep PirbhulalSabarathinam ChockalingamHabtamu Abie Regular Contribution 28 May 2024 Pages: 2827 - 2879
A compliance-based ranking of certificate authorities using probabilistic approaches Kashif JunaidMuhammad Umar JanjuaJunaid Qadir Regular Contribution 29 May 2024 Pages: 2881 - 2910
A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications Thomas Oakley BrowneMohammad AbedinMohammad Jabed Morshed Chowdhury Regular Contribution Open access 05 June 2024 Pages: 2911 - 2938
Email bombing attack detection and mitigation using machine learning Sanjeev ShuklaManoj MisraGaurav Varshney Regular Contribution 13 June 2024 Pages: 2939 - 2949
Swarm-intelligence for the modern ICT ecosystems George HatzivasilisEftychia LakkaStephan Kiefer Regular Contribution 18 June 2024 Pages: 2951 - 2975
A dynamic C-V2X anonymous authentication and group key agreement protocol Beibei CuiWei HeYan Cui Regular Contribution 18 June 2024 Pages: 2977 - 2989
Acnn: arbitrary trace attacks based on leakage area detection Chong XiaoMing Tang Regular Contribution 26 June 2024 Pages: 2991 - 3006
Gaming the system: tetromino-based covert channel and its impact on mobile security Efstratios VasilellisVasileios BotsosDimitris Gritzalis Regular Contribution 28 June 2024 Pages: 3007 - 3027
Multi-party codebook distribution strategy based on secret sharing Wei SheHaige FengWei Liu Regular Contribution 02 July 2024 Pages: 3029 - 3042
Expediting the design and development of secure cloud-based mobile apps Francisco T. ChimucoJoāo B. F. SequeirosPedro R. M. Inácio Regular Contribution Open access 04 July 2024 Pages: 3043 - 3064
Trust management in the internet of vehicles: a systematic literature review of blockchain integration Shirin AbbasiNavid KhaledianAmir Masoud Rahmani Regular Contribution 05 July 2024 Pages: 3065 - 3088
Adaptive context-aware access control for IoT environments leveraging fog computing Rudri KalariaA. S. M. KayesAhmad Salehi Shahraki Regular Contribution Open access 08 July 2024 Pages: 3089 - 3107