default search action
Journal of Cyber Security and Mobility, Volume 9
Volume 9, Number 1, 2020
- Amar Abane, Mehammed Daoui, Samia Bouzefrane, Soumya Banerjee, Paul Mühlethaler:
A Realistic Deployment of Named Data Networking in the Internet of Things. 1-46 - Ravdeep Kour, Adithya Thaduri, Ramin Karim:
Railway Defender Kill Chain to Predict and Detect Cyber-Attacks. 47-90
- Joo Yeon Cho, Andrew Sergeev, Jim Zou:
Securing Ethernet-based Optical Fronthaul for 5G Network. 91-110 - Martin Steinebach, Sebastian Lutz, Huajian Liu:
Privacy and Robust Hashes Privacy-Preserving Forensics for Image Re-Identification. 111-140 - Martin Steinebach, Marcel Schäfer, Alexander Karakuz, Katharina Brandl:
Detection and Analysis of Tor Onion Services. 141-174
Volume 9, Number 2, 2020
- Martin Steinebach, Huajian Liu, Karol Gotkowski:
Fake News Detection by Image Montage Recognition. 175-202 - Andrea Tundis, Leon Böck, Victoria Stanilescu, Max Mühlhäuser:
Experiencing the Detection of Radicalized Criminals on Facebook Social Network and Data-related Issues. 203-236
- El Yazid Dari, Ahmed Bendahmane, Mohamed Essaaidi:
Optimal Method for Detecting Collusive Saboteur Smart Meters in Smart Grid. 237-264
- Tobias Dam, Lukas Daniel Klausner, Sebastian Schrittwieser:
Typosquatting for Fun and Profit: Cross-Country Analysis of Pop-Up Scam. 265-300 - Elena Doynikova, Andrey Fedorchenko, Igor V. Kotenko:
A Semantic Model for Security Evaluation of Information Systems. 301-330
- Ahmad O. Aseeri:
Noise-Resilient Neural Network-Based Adversarial Attack Modeling for XOR Physical Unclonable Functions. 331-354
Volume 9, Number 3, 2020
- Samuel Tweneboah-Koduah, Francis Atsu, Ramjee Prasad:
Reaction of Stock Volatility to Data Breach: an Event Study. 355-384 - Maha Saadeh, Azzam Sleit, Khair Eddin Sabri, Wesam Almobaideen:
Object Authentication in the Context of the Internet of Things: A Survey. 385-448 - Muneer Alwazzeh, Sameer Karaman, Mohammad Nur Shamma:
Man in The Middle Attacks Against SSL/TLS: Mitigation and Defeat. 449-468
Volume 9, Number 4, 2020
- Victor Odumuyiwa, Analogbei Chibueze:
Automatic Detection of HTTP Injection Attacks using Convolutional Neural Network and Deep Neural Network. 489-514 - B. J. Bejoy, S. Janakiraman:
Enhanced AIS Based Intrusion Detection System Using Natural Killer Cells. 515-534 - Zakaria Hassan Abdelwahab, Talaat A. Elgarf, Abdelhalim Zekry:
Analyzing SNOW and ZUC Security Algorithms Using NIST SP 800-22 and Enhancing their Randomness. 535-576 - Pamarthi NagaRaju, Nallamothu Nagamalleswara Rao:
OB-MECC: An Efficient Confidentiality and Security Enhancement for Cloud Storage System. 577-600 - Shardha Porwal, Sangeeta Mittal:
A Privacy Preserving and Efficient Multi Authority - CP-ABE Scheme for Secure Cloud Communication. 601-626
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.