


default search action
Journal of Cyber Security and Mobility, Volume 9
Volume 9, Number 1, 2020
- Amar Abane
, Mehammed Daoui, Samia Bouzefrane, Soumya Banerjee, Paul Mühlethaler:
A Realistic Deployment of Named Data Networking in the Internet of Things. 1-46 - Ravdeep Kour, Adithya Thaduri, Ramin Karim:
Railway Defender Kill Chain to Predict and Detect Cyber-Attacks. 47-90
- Joo Yeon Cho
, Andrew Sergeev
, Jim Zou:
Securing Ethernet-based Optical Fronthaul for 5G Network. 91-110 - Martin Steinebach, Sebastian Lutz
, Huajian Liu
:
Privacy and Robust Hashes Privacy-Preserving Forensics for Image Re-Identification. 111-140 - Martin Steinebach, Marcel Schäfer
, Alexander Karakuz
, Katharina Brandl:
Detection and Analysis of Tor Onion Services. 141-174
Volume 9, Number 2, 2020
- Martin Steinebach, Huajian Liu
, Karol Gotkowski
:
Fake News Detection by Image Montage Recognition. 175-202 - Andrea Tundis
, Leon Böck, Victoria Stanilescu, Max Mühlhäuser:
Experiencing the Detection of Radicalized Criminals on Facebook Social Network and Data-related Issues. 203-236
- El Yazid Dari
, Ahmed Bendahmane
, Mohamed Essaaidi
:
Optimal Method for Detecting Collusive Saboteur Smart Meters in Smart Grid. 237-264
- Tobias Dam
, Lukas Daniel Klausner
, Sebastian Schrittwieser
:
Typosquatting for Fun and Profit: Cross-Country Analysis of Pop-Up Scam. 265-300 - Elena Doynikova
, Andrey Fedorchenko
, Igor V. Kotenko
:
A Semantic Model for Security Evaluation of Information Systems. 301-330
- Ahmad O. Aseeri
:
Noise-Resilient Neural Network-Based Adversarial Attack Modeling for XOR Physical Unclonable Functions. 331-354
Volume 9, Number 3, 2020
- Samuel Tweneboah-Koduah
, Francis Atsu
, Ramjee Prasad:
Reaction of Stock Volatility to Data Breach: an Event Study. 355-384 - Maha Saadeh
, Azzam Sleit, Khair Eddin Sabri
, Wesam Almobaideen
:
Object Authentication in the Context of the Internet of Things: A Survey. 385-448 - Muneer Alwazzeh
, Sameer Karaman, Mohammad Nur Shamma:
Man in The Middle Attacks Against SSL/TLS: Mitigation and Defeat. 449-468
Volume 9, Number 4, 2020
- Victor Odumuyiwa
, Analogbei Chibueze
:
Automatic Detection of HTTP Injection Attacks using Convolutional Neural Network and Deep Neural Network. 489-514 - B. J. Bejoy
, S. Janakiraman
:
Enhanced AIS Based Intrusion Detection System Using Natural Killer Cells. 515-534 - Zakaria Hassan Abdelwahab
, Talaat A. Elgarf
, Abdelhalim Zekry:
Analyzing SNOW and ZUC Security Algorithms Using NIST SP 800-22 and Enhancing their Randomness. 535-576 - Pamarthi NagaRaju
, Nallamothu Nagamalleswara Rao
:
OB-MECC: An Efficient Confidentiality and Security Enhancement for Cloud Storage System. 577-600 - Shardha Porwal
, Sangeeta Mittal
:
A Privacy Preserving and Efficient Multi Authority - CP-ABE Scheme for Secure Cloud Communication. 601-626

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.