default search action
Search dblp for Publications
export results for "stream:journals/cybersecapplications:"
@article{DBLP:journals/cybersecapplications/AdhikariK25, author = {Ashish Adhikari and Prasad A. Kulkarni}, title = {Survey of techniques to detect common weaknesses in program binaries}, journal = {Cyber Secur. Appl.}, volume = {3}, pages = {100061}, year = {2025}, url = {https://doi.org/10.1016/j.csa.2024.100061}, doi = {10.1016/J.CSA.2024.100061}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/AdhikariK25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/AlguliyevAS25, author = {Rasim M. Alguliyev and Ramiz M. Aliguliyev and Lyudmila V. Sukhostat}, title = {An approach for assessing the functional vulnerabilities criticality of {CPS} components}, journal = {Cyber Secur. Appl.}, volume = {3}, pages = {100058}, year = {2025}, url = {https://doi.org/10.1016/j.csa.2024.100058}, doi = {10.1016/J.CSA.2024.100058}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/AlguliyevAS25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/AlqudhaibiAJWS25, author = {Adel Alqudhaibi and Majed Albarrak and Sandeep Jagtap and Nikki Williams and Konstantinos Salonitis}, title = {Securing industry 4.0: Assessing cybersecurity challenges and proposing strategies for manufacturing management}, journal = {Cyber Secur. Appl.}, volume = {3}, pages = {100067}, year = {2025}, url = {https://doi.org/10.1016/j.csa.2024.100067}, doi = {10.1016/J.CSA.2024.100067}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/AlqudhaibiAJWS25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/Baghirov25, author = {Elshan Baghirov}, title = {A comprehensive investigation into robust malware detection with explainable {AI}}, journal = {Cyber Secur. Appl.}, volume = {3}, pages = {100072}, year = {2025}, url = {https://doi.org/10.1016/j.csa.2024.100072}, doi = {10.1016/J.CSA.2024.100072}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/Baghirov25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/BamakanF25, author = {Seyed Mojtaba Hosseini Bamakan and Saeed Banaeian Far}, title = {Distributed and trustworthy digital twin platform based on blockchain and Web3 technologies}, journal = {Cyber Secur. Appl.}, volume = {3}, pages = {100064}, year = {2025}, url = {https://doi.org/10.1016/j.csa.2024.100064}, doi = {10.1016/J.CSA.2024.100064}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/BamakanF25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/DahiphaleRBD25, author = {Vijay Dahiphale and Hrishikesh Raut and Gaurav Bansod and Devendra Dahiphale}, title = {Securing IoT devices with fast and energy efficient implementation of {PRIDE} and {PRESENT} ciphers}, journal = {Cyber Secur. Appl.}, volume = {3}, pages = {100055}, year = {2025}, url = {https://doi.org/10.1016/j.csa.2024.100055}, doi = {10.1016/J.CSA.2024.100055}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/DahiphaleRBD25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/HossainHACKH25, author = {Md. Alamgir Hossain and Tahmid Hasan and Fahad Ahmed and Sheikh Hasib Cheragee and Muntasir Hasan Kanchan and Md Alimul Haque}, title = {Towards superior android ransomware detection: An ensemble machine learning perspective}, journal = {Cyber Secur. Appl.}, volume = {3}, pages = {100076}, year = {2025}, url = {https://doi.org/10.1016/j.csa.2024.100076}, doi = {10.1016/J.CSA.2024.100076}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/HossainHACKH25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/JainGG25, author = {Ankit Kumar Jain and Nishant Gupta and Brij B. Gupta}, title = {A survey on scalable consensus algorithms for blockchain technology}, journal = {Cyber Secur. Appl.}, volume = {3}, pages = {100065}, year = {2025}, url = {https://doi.org/10.1016/j.csa.2024.100065}, doi = {10.1016/J.CSA.2024.100065}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/JainGG25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/KR25, author = {Chithanya K. V. K and V. Lokeswara Reddy}, title = {Automatic intrusion detection model with secure data storage on cloud using adaptive cyclic shift transposition with enhanced {ANFIS} classifier}, journal = {Cyber Secur. Appl.}, volume = {3}, pages = {100073}, year = {2025}, url = {https://doi.org/10.1016/j.csa.2024.100073}, doi = {10.1016/J.CSA.2024.100073}, timestamp = {Wed, 27 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/KR25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/KokilaK25, author = {M. Kokila and Srinivasa Reddy Konda}, title = {Authentication, access control and scalability models in Internet of Things Security-A review}, journal = {Cyber Secur. Appl.}, volume = {3}, pages = {100057}, year = {2025}, url = {https://doi.org/10.1016/j.csa.2024.100057}, doi = {10.1016/J.CSA.2024.100057}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/KokilaK25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/MagaraZ25, author = {Tinashe Magara and Yousheng Zhou}, title = {{EMAKAS:} An efficient three-factor mutual authentication and key-agreement scheme for IoT environment}, journal = {Cyber Secur. Appl.}, volume = {3}, pages = {100066}, year = {2025}, url = {https://doi.org/10.1016/j.csa.2024.100066}, doi = {10.1016/J.CSA.2024.100066}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/MagaraZ25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/ManickamD25, author = {Muthukumar Manickam and Ganesh Gopal Devarajan}, title = {An improved three factor authentication protocol for wireless body area networks}, journal = {Cyber Secur. Appl.}, volume = {3}, pages = {100062}, year = {2025}, url = {https://doi.org/10.1016/j.csa.2024.100062}, doi = {10.1016/J.CSA.2024.100062}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/ManickamD25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/MarkkandeyanARGVL25, author = {S. Markkandeyan and A. Dennis Ananth and M. Rajakumaran and R. G. Gokila and R. Venkatesan and B. Lakshmi}, title = {Novel hybrid deep learning based cyber security threat detection model with optimization algorithm}, journal = {Cyber Secur. Appl.}, volume = {3}, pages = {100075}, year = {2025}, url = {https://doi.org/10.1016/j.csa.2024.100075}, doi = {10.1016/J.CSA.2024.100075}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/MarkkandeyanARGVL25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/MauryaMK25, author = {Satya Prakash Maurya and Rahul Mishra and Upma Kumari}, title = {Neural secret key enabled secure cloud storage with efficient packet checker algorithm}, journal = {Cyber Secur. Appl.}, volume = {3}, pages = {100071}, year = {2025}, url = {https://doi.org/10.1016/j.csa.2024.100071}, doi = {10.1016/J.CSA.2024.100071}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/MauryaMK25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/OlanrewajuGeorgeP25, author = {Babatunde Olanrewaju{-}George and Bernardi Pranggono}, title = {Federated learning-based intrusion detection system for the internet of things using unsupervised and supervised deep learning models}, journal = {Cyber Secur. Appl.}, volume = {3}, pages = {100068}, year = {2025}, url = {https://doi.org/10.1016/j.csa.2024.100068}, doi = {10.1016/J.CSA.2024.100068}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/OlanrewajuGeorgeP25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/PanigrahiP25, author = {Rasmita Panigrahi and Neelamadhab Padhy}, title = {An effective steganographic technique for hiding the image data using the {LSB} technique}, journal = {Cyber Secur. Appl.}, volume = {3}, pages = {100069}, year = {2025}, url = {https://doi.org/10.1016/j.csa.2024.100069}, doi = {10.1016/J.CSA.2024.100069}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/PanigrahiP25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/TahirAUK25, author = {Mahjabeen Tahir and Azizol Abdullah and Nur Izura Udzir and Khairul Azhar Kasmiran}, title = {A novel approach for handling missing data to enhance network intrusion detection system}, journal = {Cyber Secur. Appl.}, volume = {3}, pages = {100063}, year = {2025}, url = {https://doi.org/10.1016/j.csa.2024.100063}, doi = {10.1016/J.CSA.2024.100063}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/TahirAUK25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/TanimuA25, author = {Jibrilla Abubakar Tanimu and Wafia Abada}, title = {Addressing cybersecurity challenges in robotics: {A} comprehensive overview}, journal = {Cyber Secur. Appl.}, volume = {3}, pages = {100074}, year = {2025}, url = {https://doi.org/10.1016/j.csa.2024.100074}, doi = {10.1016/J.CSA.2024.100074}, timestamp = {Wed, 27 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/TanimuA25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/AdmassMD24, author = {Wasyihun Sema Admass and Yirga Yayeh Munaye and Abebe Abeshu Diro}, title = {Cyber security: State of the art, challenges and future directions}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100031}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2023.100031}, doi = {10.1016/J.CSA.2023.100031}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecapplications/AdmassMD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/AhmadM24, author = {Shahnawaz Ahmad and Shabana Mehfuz}, title = {Efficient time-oriented latency-based secure data encryption for cloud storage}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100027}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2023.100027}, doi = {10.1016/J.CSA.2023.100027}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/AhmadM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/AnithaJSMV24, author = {H. M. Anitha and P. Jayarekha and Audithan Sivaraman and Ashima Mehta and Nalina Venkatamune}, title = {{SDN} enabled role based shared secret scheme for virtual machine security in cloud environment}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100043}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2024.100043}, doi = {10.1016/J.CSA.2024.100043}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/AnithaJSMV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/BinnarBK24, author = {Pranita Binnar and Sunil Bhirud and Faruk Kazi}, title = {Security analysis of cyber physical system using digital forensic incident response}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100034}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2023.100034}, doi = {10.1016/J.CSA.2023.100034}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/BinnarBK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/CmKSJ24, author = {Nalayini Cm and Jeevaa Katiravan and Geetha S and Christy Eunaicy Ji}, title = {A novel dual optimized {IDS} to detect DDoS attack in {SDN} using hyper tuned {RFE} and deep grid network}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100042}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2024.100042}, doi = {10.1016/J.CSA.2024.100042}, timestamp = {Mon, 08 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecapplications/CmKSJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/FarA24, author = {Saeed Banaeian Far and Maryam Rajabzadeh Asaar}, title = {A blockchain-based anonymous reporting system with no central authority: Architecture and protocol}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100032}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2023.100032}, doi = {10.1016/J.CSA.2023.100032}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/FarA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/GarciaM24, author = {R{\'{e}}mi Garcia and Paolo Modesti}, title = {Automatic generation of security protocols attacks specifications and implementations}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100038}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2024.100038}, doi = {10.1016/J.CSA.2024.100038}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/GarciaM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/Glisic24, author = {Savo Glisic}, title = {Quantum vs post-quantum security for future networks: Survey}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100039}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2024.100039}, doi = {10.1016/J.CSA.2024.100039}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecapplications/Glisic24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/KaleemD24, author = {Mohd Kaleem and Ganesh Gopal Devarajan}, title = {Energy-efficient classification strategy for detecting interference and malicious sensor nodes in wireless body area Networks}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100048}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2024.100048}, doi = {10.1016/J.CSA.2024.100048}, timestamp = {Mon, 08 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecapplications/KaleemD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/ManickamD24, author = {Muthukumar Manickam and Ganesh Gopal Devarajan}, title = {A three-factor mutual authentication scheme for telecare medical information system based on {ECC}}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100035}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2024.100035}, doi = {10.1016/J.CSA.2024.100035}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/ManickamD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/MuraleedharaCJD24, author = {Prathibha Muraleedhara and Mary Subaja Christo and Jaya J and Yuvasini D}, title = {Any Bluetooth device can be hacked. Know how?}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100041}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2024.100041}, doi = {10.1016/J.CSA.2024.100041}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecapplications/MuraleedharaCJD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/NabiZ24, author = {Faisal Nabi and Xujuan Zhou}, title = {Enhancing intrusion detection systems through dimensionality reduction: {A} comparative study of machine learning techniques for cyber security}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100033}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2023.100033}, doi = {10.1016/J.CSA.2023.100033}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/NabiZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/NairDM24, author = {Aditi Nair and Diti Dalal and Ramchandra S. Mangrulkar}, title = {Colour image encryption algorithm using Rubik's cube scrambling with bitmap shuffling and frame rotation}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100030}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2023.100030}, doi = {10.1016/J.CSA.2023.100030}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/NairDM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/RahamanTAB24, author = {Mosiur Rahaman and Farhin Tabassum and Varsha Arya and Ritika Bansal}, title = {Secure and sustainable food processing supply chain framework based on Hyperledger Fabric technology}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100045}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2024.100045}, doi = {10.1016/J.CSA.2024.100045}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecapplications/RahamanTAB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/RajasekaranSAK24, author = {Arun Sekar Rajasekaran and L. Sowmiya and Maria Azees and R. Kannadasan}, title = {A survey on exploring the challenges and applications of wireless body area networks (WBANs)}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100047}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2024.100047}, doi = {10.1016/J.CSA.2024.100047}, timestamp = {Mon, 08 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecapplications/RajasekaranSAK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/SetiaCSKSAGW24, author = {Himanshu Setia and Amit Chhabra and Sunil K. Singh and Sudhakar Kumar and Sarita Sharma and Varsha Arya and Brij B. Gupta and Jinsong Wu}, title = {Securing the road ahead: Machine learning-driven DDoS attack detection in {VANET} cloud environments}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100037}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2024.100037}, doi = {10.1016/J.CSA.2024.100037}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/SetiaCSKSAGW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/ShombotDBA24, author = {Emmanuel Song Shombot and Gilles Dusserre and Robert Bestak and Nasir Baba Ahmed}, title = {An application for predicting phishing attacks: {A} case of implementing a support vector machine learning model}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100036}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2024.100036}, doi = {10.1016/J.CSA.2024.100036}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/ShombotDBA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/SultanaKAA24, author = {Habiba Sultana and A. H. M. Kamal and Tasnim Sakib Apon and Md. Golam Rabiul Alam}, title = {Increasing embedding capacity of stego images by exploiting edge pixels in prediction error space}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100028}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2023.100028}, doi = {10.1016/J.CSA.2023.100028}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/SultanaKAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/ThotadiDREPMOR24, author = {Chaitanyateja Thotadi and Monith Debbala and Subba Rao and Ajay Eeralla and Basker Palaniswamy and Srijanee Mookherji and Vanga Odelu and Alavalapati Goutham Reddy}, title = {E-Brightpass: {A} Secure way to access social networks on smartphones}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100021}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2023.100021}, doi = {10.1016/J.CSA.2023.100021}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/ThotadiDREPMOR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/VajrobolGG24, author = {Vajratiya Vajrobol and Brij B. Gupta and Akshat Gaurav}, title = {Mutual information based logistic regression for phishing {URL} detection}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100044}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2024.100044}, doi = {10.1016/J.CSA.2024.100044}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecapplications/VajrobolGG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/VatsKSMPABA24, author = {Tarun Vats and Sudhakar Kumar and Sunil K. Singh and Uday Madan and Mehak Preet and Varsha Arya and Ritika Bansal and Ammar Almomani}, title = {Navigating the landscape: Safeguarding privacy and security in the era of ambient intelligence within healthcare settings}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100046}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2024.100046}, doi = {10.1016/J.CSA.2024.100046}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecapplications/VatsKSMPABA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/WazidMMD24, author = {Mohammad Wazid and Amit Kumar Mishra and Noor Mohd and Ashok Kumar Das}, title = {A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100040}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2024.100040}, doi = {10.1016/J.CSA.2024.100040}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/WazidMMD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/BaggaDR23, author = {Palak Bagga and Ashok Kumar Das and Joel J. P. C. Rodrigues}, title = {Bilinear pairing-based access control and key agreement scheme for smart transportation}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100001}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100001}, doi = {10.1016/J.CSA.2022.100001}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/BaggaDR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/GolightlyMGC23, author = {Lewis Golightly and Paolo Modesti and R{\'{e}}mi Garcia and Victor Chang}, title = {Securing distributed systems: {A} survey on access control techniques for cloud, blockchain, IoT and {SDN}}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100015}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2023.100015}, doi = {10.1016/J.CSA.2023.100015}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/GolightlyMGC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/JavaidHSS23, author = {Mohd Javaid and Abid Haleem and Ravi Pratap Singh and Rajiv Suman}, title = {Towards insighting cybersecurity for healthcare domains: {A} comprehensive review of recent practices and trends}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100016}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2023.100016}, doi = {10.1016/J.CSA.2023.100016}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/JavaidHSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/KumarAB23, author = {C. Madan Kumar and Ruhul Amin and M. Brindha}, title = {Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100013}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2023.100013}, doi = {10.1016/J.CSA.2023.100013}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/KumarAB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/LaiSWL23, author = {Jinshan Lai and Xiaotong Song and Ruijin Wang and Xiong Li}, title = {Edge intelligent collaborative privacy protection solution for smart medical}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100010}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100010}, doi = {10.1016/J.CSA.2022.100010}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/LaiSWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/LiT23, author = {Yi Li and Meiqin Tang}, title = {Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100017}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2023.100017}, doi = {10.1016/J.CSA.2023.100017}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/LiT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/LiuLJ23, author = {Dengzhi Liu and Zhimin Li and Dongbao Jia}, title = {Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100004}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100004}, doi = {10.1016/J.CSA.2022.100004}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/LiuLJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/MbungeMBM23, author = {Elliot Mbunge and Benhildah Muchemwa and John Batani and Nobuhle Mbuyisa}, title = {A review of deep learning models to detect malware in Android applications}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100014}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2023.100014}, doi = {10.1016/J.CSA.2023.100014}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/MbungeMBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/RajkumarDVR23, author = {S. C. Rajkumar and L. Jegatha Deborah and Pandi Vijayakumar and Karthick K R}, title = {Secure session key pairing and a lightweight key authentication scheme for liable drone services}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100012}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100012}, doi = {10.1016/J.CSA.2022.100012}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecapplications/RajkumarDVR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/SaiRPN23, author = {Bodicherla Digvijay Sri Sai and Nikhil Ramisetty and Shivangini Prasad and Nenavath Srinivas Naik}, title = {A decentralised {KYC} based approach for microfinance using blockchain technology}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100009}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100009}, doi = {10.1016/J.CSA.2022.100009}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/SaiRPN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/SattarERDSPKU23, author = {Md Rahat Ibne Sattar and Md. Thowhid Bin Hossain Efty and Taiyaba Shadaka Rafa and Tusar Das and Md Sharif Samad and Abhijit Pathak and Mayeen Uddin Khandaker and Md Habib Ullah}, title = {An advanced and secure framework for conducting online examination using blockchain method}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100005}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100005}, doi = {10.1016/J.CSA.2022.100005}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/SattarERDSPKU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/SenapatiR23, author = {Biswa Ranjan Senapati and Bharat S. Rawal}, title = {Quantum communication with {RLP} quantum resistant cryptography in industrial manufacturing}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100019}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2023.100019}, doi = {10.1016/J.CSA.2023.100019}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/SenapatiR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/SheikM23, author = {Syed Amma Sheik and Amutha Prabakar Muniyandi}, title = {Secure authentication schemes in cloud computing with glimpse of artificial neural networks: {A} review}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100002}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100002}, doi = {10.1016/J.CSA.2022.100002}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/SheikM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/SinghKM23, author = {Anjali Singh and Marimuthu Karuppiah and Rajendra Prasad Mahapatra}, title = {Cryptanalysis on "a secure three-factor user authentication and key agreement protocol for {TMIS} with user anonymity "}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100008}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100008}, doi = {10.1016/J.CSA.2022.100008}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/SinghKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/Tan23, author = {Haowen Tan}, title = {An efficient IoT group association and data sharing mechanism in edge computing paradigm}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100003}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100003}, doi = {10.1016/J.CSA.2022.100003}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/Tan23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/ThapliyalSWSD23, author = {Siddhant Thapliyal and Shubham Singh and Mohammad Wazid and Devesh Pratap Singh and Ashok Kumar Das}, title = {Design of blockchain-enabled secure smart health monitoring system and its testbed implementation}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100020}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2023.100020}, doi = {10.1016/J.CSA.2023.100020}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/ThapliyalSWSD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/VijayalakshmiBGT23, author = {S. Vijayalakshmi and S. Bose and Logeswari Govindaraj and Anitha Thangasamy}, title = {Hybrid defense mechanism against malicious packet dropping attack for {MANET} using game theory}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100011}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100011}, doi = {10.1016/J.CSA.2022.100011}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/VijayalakshmiBGT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/XuLPF23, author = {Zhiyan Xu and Min Luo and Cong Peng and Qi Feng}, title = {Sanitizable signature scheme with privacy protection for electronic medical data sharing}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100018}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2023.100018}, doi = {10.1016/J.CSA.2023.100018}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/XuLPF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/YanJ23, author = {Weiwei Yan and Sai Ji}, title = {A secure and efficient {DSSE} scheme with constant storage costs in smart devices}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100006}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100006}, doi = {10.1016/J.CSA.2022.100006}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/YanJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/ZhouLWL23, author = {Yousheng Zhou and Xia Li and Ming Wang and Yuanni Liu}, title = {{PPT-LBS:} Privacy-preserving top-k query scheme for outsourced data of location-based services}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100007}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100007}, doi = {10.1016/J.CSA.2022.100007}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/ZhouLWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.