Search dblp for Publications

export results for "stream:journals/cybersecapplications:"

 download as .bib file

@article{DBLP:journals/cybersecapplications/AdhikariK25,
  author       = {Ashish Adhikari and
                  Prasad A. Kulkarni},
  title        = {Survey of techniques to detect common weaknesses in program binaries},
  journal      = {Cyber Secur. Appl.},
  volume       = {3},
  pages        = {100061},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.csa.2024.100061},
  doi          = {10.1016/J.CSA.2024.100061},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/AdhikariK25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/AlguliyevAS25,
  author       = {Rasim M. Alguliyev and
                  Ramiz M. Aliguliyev and
                  Lyudmila V. Sukhostat},
  title        = {An approach for assessing the functional vulnerabilities criticality
                  of {CPS} components},
  journal      = {Cyber Secur. Appl.},
  volume       = {3},
  pages        = {100058},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.csa.2024.100058},
  doi          = {10.1016/J.CSA.2024.100058},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/AlguliyevAS25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/AlqudhaibiAJWS25,
  author       = {Adel Alqudhaibi and
                  Majed Albarrak and
                  Sandeep Jagtap and
                  Nikki Williams and
                  Konstantinos Salonitis},
  title        = {Securing industry 4.0: Assessing cybersecurity challenges and proposing
                  strategies for manufacturing management},
  journal      = {Cyber Secur. Appl.},
  volume       = {3},
  pages        = {100067},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.csa.2024.100067},
  doi          = {10.1016/J.CSA.2024.100067},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/AlqudhaibiAJWS25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/Baghirov25,
  author       = {Elshan Baghirov},
  title        = {A comprehensive investigation into robust malware detection with explainable
                  {AI}},
  journal      = {Cyber Secur. Appl.},
  volume       = {3},
  pages        = {100072},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.csa.2024.100072},
  doi          = {10.1016/J.CSA.2024.100072},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/Baghirov25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/BamakanF25,
  author       = {Seyed Mojtaba Hosseini Bamakan and
                  Saeed Banaeian Far},
  title        = {Distributed and trustworthy digital twin platform based on blockchain
                  and Web3 technologies},
  journal      = {Cyber Secur. Appl.},
  volume       = {3},
  pages        = {100064},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.csa.2024.100064},
  doi          = {10.1016/J.CSA.2024.100064},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/BamakanF25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/DahiphaleRBD25,
  author       = {Vijay Dahiphale and
                  Hrishikesh Raut and
                  Gaurav Bansod and
                  Devendra Dahiphale},
  title        = {Securing IoT devices with fast and energy efficient implementation
                  of {PRIDE} and {PRESENT} ciphers},
  journal      = {Cyber Secur. Appl.},
  volume       = {3},
  pages        = {100055},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.csa.2024.100055},
  doi          = {10.1016/J.CSA.2024.100055},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/DahiphaleRBD25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/HossainHACKH25,
  author       = {Md. Alamgir Hossain and
                  Tahmid Hasan and
                  Fahad Ahmed and
                  Sheikh Hasib Cheragee and
                  Muntasir Hasan Kanchan and
                  Md Alimul Haque},
  title        = {Towards superior android ransomware detection: An ensemble machine
                  learning perspective},
  journal      = {Cyber Secur. Appl.},
  volume       = {3},
  pages        = {100076},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.csa.2024.100076},
  doi          = {10.1016/J.CSA.2024.100076},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/HossainHACKH25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/JainGG25,
  author       = {Ankit Kumar Jain and
                  Nishant Gupta and
                  Brij B. Gupta},
  title        = {A survey on scalable consensus algorithms for blockchain technology},
  journal      = {Cyber Secur. Appl.},
  volume       = {3},
  pages        = {100065},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.csa.2024.100065},
  doi          = {10.1016/J.CSA.2024.100065},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/JainGG25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/KR25,
  author       = {Chithanya K. V. K and
                  V. Lokeswara Reddy},
  title        = {Automatic intrusion detection model with secure data storage on cloud
                  using adaptive cyclic shift transposition with enhanced {ANFIS} classifier},
  journal      = {Cyber Secur. Appl.},
  volume       = {3},
  pages        = {100073},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.csa.2024.100073},
  doi          = {10.1016/J.CSA.2024.100073},
  timestamp    = {Wed, 27 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/KR25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/KokilaK25,
  author       = {M. Kokila and
                  Srinivasa Reddy Konda},
  title        = {Authentication, access control and scalability models in Internet
                  of Things Security-A review},
  journal      = {Cyber Secur. Appl.},
  volume       = {3},
  pages        = {100057},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.csa.2024.100057},
  doi          = {10.1016/J.CSA.2024.100057},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/KokilaK25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/MagaraZ25,
  author       = {Tinashe Magara and
                  Yousheng Zhou},
  title        = {{EMAKAS:} An efficient three-factor mutual authentication and key-agreement
                  scheme for IoT environment},
  journal      = {Cyber Secur. Appl.},
  volume       = {3},
  pages        = {100066},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.csa.2024.100066},
  doi          = {10.1016/J.CSA.2024.100066},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/MagaraZ25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/ManickamD25,
  author       = {Muthukumar Manickam and
                  Ganesh Gopal Devarajan},
  title        = {An improved three factor authentication protocol for wireless body
                  area networks},
  journal      = {Cyber Secur. Appl.},
  volume       = {3},
  pages        = {100062},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.csa.2024.100062},
  doi          = {10.1016/J.CSA.2024.100062},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/ManickamD25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/MarkkandeyanARGVL25,
  author       = {S. Markkandeyan and
                  A. Dennis Ananth and
                  M. Rajakumaran and
                  R. G. Gokila and
                  R. Venkatesan and
                  B. Lakshmi},
  title        = {Novel hybrid deep learning based cyber security threat detection model
                  with optimization algorithm},
  journal      = {Cyber Secur. Appl.},
  volume       = {3},
  pages        = {100075},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.csa.2024.100075},
  doi          = {10.1016/J.CSA.2024.100075},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/MarkkandeyanARGVL25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/MauryaMK25,
  author       = {Satya Prakash Maurya and
                  Rahul Mishra and
                  Upma Kumari},
  title        = {Neural secret key enabled secure cloud storage with efficient packet
                  checker algorithm},
  journal      = {Cyber Secur. Appl.},
  volume       = {3},
  pages        = {100071},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.csa.2024.100071},
  doi          = {10.1016/J.CSA.2024.100071},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/MauryaMK25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/OlanrewajuGeorgeP25,
  author       = {Babatunde Olanrewaju{-}George and
                  Bernardi Pranggono},
  title        = {Federated learning-based intrusion detection system for the internet
                  of things using unsupervised and supervised deep learning models},
  journal      = {Cyber Secur. Appl.},
  volume       = {3},
  pages        = {100068},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.csa.2024.100068},
  doi          = {10.1016/J.CSA.2024.100068},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/OlanrewajuGeorgeP25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/PanigrahiP25,
  author       = {Rasmita Panigrahi and
                  Neelamadhab Padhy},
  title        = {An effective steganographic technique for hiding the image data using
                  the {LSB} technique},
  journal      = {Cyber Secur. Appl.},
  volume       = {3},
  pages        = {100069},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.csa.2024.100069},
  doi          = {10.1016/J.CSA.2024.100069},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/PanigrahiP25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/TahirAUK25,
  author       = {Mahjabeen Tahir and
                  Azizol Abdullah and
                  Nur Izura Udzir and
                  Khairul Azhar Kasmiran},
  title        = {A novel approach for handling missing data to enhance network intrusion
                  detection system},
  journal      = {Cyber Secur. Appl.},
  volume       = {3},
  pages        = {100063},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.csa.2024.100063},
  doi          = {10.1016/J.CSA.2024.100063},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/TahirAUK25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/TanimuA25,
  author       = {Jibrilla Abubakar Tanimu and
                  Wafia Abada},
  title        = {Addressing cybersecurity challenges in robotics: {A} comprehensive
                  overview},
  journal      = {Cyber Secur. Appl.},
  volume       = {3},
  pages        = {100074},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.csa.2024.100074},
  doi          = {10.1016/J.CSA.2024.100074},
  timestamp    = {Wed, 27 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/TanimuA25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/AdmassMD24,
  author       = {Wasyihun Sema Admass and
                  Yirga Yayeh Munaye and
                  Abebe Abeshu Diro},
  title        = {Cyber security: State of the art, challenges and future directions},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100031},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2023.100031},
  doi          = {10.1016/J.CSA.2023.100031},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/AdmassMD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/AhmadM24,
  author       = {Shahnawaz Ahmad and
                  Shabana Mehfuz},
  title        = {Efficient time-oriented latency-based secure data encryption for cloud
                  storage},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100027},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2023.100027},
  doi          = {10.1016/J.CSA.2023.100027},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/AhmadM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/AnithaJSMV24,
  author       = {H. M. Anitha and
                  P. Jayarekha and
                  Audithan Sivaraman and
                  Ashima Mehta and
                  Nalina Venkatamune},
  title        = {{SDN} enabled role based shared secret scheme for virtual machine
                  security in cloud environment},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100043},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2024.100043},
  doi          = {10.1016/J.CSA.2024.100043},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/AnithaJSMV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/BinnarBK24,
  author       = {Pranita Binnar and
                  Sunil Bhirud and
                  Faruk Kazi},
  title        = {Security analysis of cyber physical system using digital forensic
                  incident response},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100034},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2023.100034},
  doi          = {10.1016/J.CSA.2023.100034},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/BinnarBK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/CmKSJ24,
  author       = {Nalayini Cm and
                  Jeevaa Katiravan and
                  Geetha S and
                  Christy Eunaicy Ji},
  title        = {A novel dual optimized {IDS} to detect DDoS attack in {SDN} using
                  hyper tuned {RFE} and deep grid network},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100042},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2024.100042},
  doi          = {10.1016/J.CSA.2024.100042},
  timestamp    = {Mon, 08 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/CmKSJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/FarA24,
  author       = {Saeed Banaeian Far and
                  Maryam Rajabzadeh Asaar},
  title        = {A blockchain-based anonymous reporting system with no central authority:
                  Architecture and protocol},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100032},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2023.100032},
  doi          = {10.1016/J.CSA.2023.100032},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/FarA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/GarciaM24,
  author       = {R{\'{e}}mi Garcia and
                  Paolo Modesti},
  title        = {Automatic generation of security protocols attacks specifications
                  and implementations},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100038},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2024.100038},
  doi          = {10.1016/J.CSA.2024.100038},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/GarciaM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/Glisic24,
  author       = {Savo Glisic},
  title        = {Quantum vs post-quantum security for future networks: Survey},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100039},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2024.100039},
  doi          = {10.1016/J.CSA.2024.100039},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/Glisic24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/KaleemD24,
  author       = {Mohd Kaleem and
                  Ganesh Gopal Devarajan},
  title        = {Energy-efficient classification strategy for detecting interference
                  and malicious sensor nodes in wireless body area Networks},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100048},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2024.100048},
  doi          = {10.1016/J.CSA.2024.100048},
  timestamp    = {Mon, 08 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/KaleemD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/ManickamD24,
  author       = {Muthukumar Manickam and
                  Ganesh Gopal Devarajan},
  title        = {A three-factor mutual authentication scheme for telecare medical information
                  system based on {ECC}},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100035},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2024.100035},
  doi          = {10.1016/J.CSA.2024.100035},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/ManickamD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/MuraleedharaCJD24,
  author       = {Prathibha Muraleedhara and
                  Mary Subaja Christo and
                  Jaya J and
                  Yuvasini D},
  title        = {Any Bluetooth device can be hacked. Know how?},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100041},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2024.100041},
  doi          = {10.1016/J.CSA.2024.100041},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/MuraleedharaCJD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/NabiZ24,
  author       = {Faisal Nabi and
                  Xujuan Zhou},
  title        = {Enhancing intrusion detection systems through dimensionality reduction:
                  {A} comparative study of machine learning techniques for cyber security},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100033},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2023.100033},
  doi          = {10.1016/J.CSA.2023.100033},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/NabiZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/NairDM24,
  author       = {Aditi Nair and
                  Diti Dalal and
                  Ramchandra S. Mangrulkar},
  title        = {Colour image encryption algorithm using Rubik's cube scrambling with
                  bitmap shuffling and frame rotation},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100030},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2023.100030},
  doi          = {10.1016/J.CSA.2023.100030},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/NairDM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/RahamanTAB24,
  author       = {Mosiur Rahaman and
                  Farhin Tabassum and
                  Varsha Arya and
                  Ritika Bansal},
  title        = {Secure and sustainable food processing supply chain framework based
                  on Hyperledger Fabric technology},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100045},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2024.100045},
  doi          = {10.1016/J.CSA.2024.100045},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/RahamanTAB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/RajasekaranSAK24,
  author       = {Arun Sekar Rajasekaran and
                  L. Sowmiya and
                  Maria Azees and
                  R. Kannadasan},
  title        = {A survey on exploring the challenges and applications of wireless
                  body area networks (WBANs)},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100047},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2024.100047},
  doi          = {10.1016/J.CSA.2024.100047},
  timestamp    = {Mon, 08 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/RajasekaranSAK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/SetiaCSKSAGW24,
  author       = {Himanshu Setia and
                  Amit Chhabra and
                  Sunil K. Singh and
                  Sudhakar Kumar and
                  Sarita Sharma and
                  Varsha Arya and
                  Brij B. Gupta and
                  Jinsong Wu},
  title        = {Securing the road ahead: Machine learning-driven DDoS attack detection
                  in {VANET} cloud environments},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100037},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2024.100037},
  doi          = {10.1016/J.CSA.2024.100037},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/SetiaCSKSAGW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/ShombotDBA24,
  author       = {Emmanuel Song Shombot and
                  Gilles Dusserre and
                  Robert Bestak and
                  Nasir Baba Ahmed},
  title        = {An application for predicting phishing attacks: {A} case of implementing
                  a support vector machine learning model},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100036},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2024.100036},
  doi          = {10.1016/J.CSA.2024.100036},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/ShombotDBA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/SultanaKAA24,
  author       = {Habiba Sultana and
                  A. H. M. Kamal and
                  Tasnim Sakib Apon and
                  Md. Golam Rabiul Alam},
  title        = {Increasing embedding capacity of stego images by exploiting edge pixels
                  in prediction error space},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100028},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2023.100028},
  doi          = {10.1016/J.CSA.2023.100028},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/SultanaKAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/ThotadiDREPMOR24,
  author       = {Chaitanyateja Thotadi and
                  Monith Debbala and
                  Subba Rao and
                  Ajay Eeralla and
                  Basker Palaniswamy and
                  Srijanee Mookherji and
                  Vanga Odelu and
                  Alavalapati Goutham Reddy},
  title        = {E-Brightpass: {A} Secure way to access social networks on smartphones},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100021},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2023.100021},
  doi          = {10.1016/J.CSA.2023.100021},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/ThotadiDREPMOR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/VajrobolGG24,
  author       = {Vajratiya Vajrobol and
                  Brij B. Gupta and
                  Akshat Gaurav},
  title        = {Mutual information based logistic regression for phishing {URL} detection},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100044},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2024.100044},
  doi          = {10.1016/J.CSA.2024.100044},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/VajrobolGG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/VatsKSMPABA24,
  author       = {Tarun Vats and
                  Sudhakar Kumar and
                  Sunil K. Singh and
                  Uday Madan and
                  Mehak Preet and
                  Varsha Arya and
                  Ritika Bansal and
                  Ammar Almomani},
  title        = {Navigating the landscape: Safeguarding privacy and security in the
                  era of ambient intelligence within healthcare settings},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100046},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2024.100046},
  doi          = {10.1016/J.CSA.2024.100046},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/VatsKSMPABA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/WazidMMD24,
  author       = {Mohammad Wazid and
                  Amit Kumar Mishra and
                  Noor Mohd and
                  Ashok Kumar Das},
  title        = {A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges,
                  and Societal Impact},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100040},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2024.100040},
  doi          = {10.1016/J.CSA.2024.100040},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/WazidMMD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/BaggaDR23,
  author       = {Palak Bagga and
                  Ashok Kumar Das and
                  Joel J. P. C. Rodrigues},
  title        = {Bilinear pairing-based access control and key agreement scheme for
                  smart transportation},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100001},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100001},
  doi          = {10.1016/J.CSA.2022.100001},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/BaggaDR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/GolightlyMGC23,
  author       = {Lewis Golightly and
                  Paolo Modesti and
                  R{\'{e}}mi Garcia and
                  Victor Chang},
  title        = {Securing distributed systems: {A} survey on access control techniques
                  for cloud, blockchain, IoT and {SDN}},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100015},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2023.100015},
  doi          = {10.1016/J.CSA.2023.100015},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/GolightlyMGC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/JavaidHSS23,
  author       = {Mohd Javaid and
                  Abid Haleem and
                  Ravi Pratap Singh and
                  Rajiv Suman},
  title        = {Towards insighting cybersecurity for healthcare domains: {A} comprehensive
                  review of recent practices and trends},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100016},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2023.100016},
  doi          = {10.1016/J.CSA.2023.100016},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/JavaidHSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/KumarAB23,
  author       = {C. Madan Kumar and
                  Ruhul Amin and
                  M. Brindha},
  title        = {Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication
                  Protocol for Telecare Medical Information System},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100013},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2023.100013},
  doi          = {10.1016/J.CSA.2023.100013},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/KumarAB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/LaiSWL23,
  author       = {Jinshan Lai and
                  Xiaotong Song and
                  Ruijin Wang and
                  Xiong Li},
  title        = {Edge intelligent collaborative privacy protection solution for smart
                  medical},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100010},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100010},
  doi          = {10.1016/J.CSA.2022.100010},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/LaiSWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/LiT23,
  author       = {Yi Li and
                  Meiqin Tang},
  title        = {Blockchain-powered distributed data auditing scheme for cloud-edge
                  healthcare system},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100017},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2023.100017},
  doi          = {10.1016/J.CSA.2023.100017},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/LiT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/LiuLJ23,
  author       = {Dengzhi Liu and
                  Zhimin Li and
                  Dongbao Jia},
  title        = {Secure distributed data integrity auditing with high efficiency in
                  5G-enabled software-defined edge computing},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100004},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100004},
  doi          = {10.1016/J.CSA.2022.100004},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/LiuLJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/MbungeMBM23,
  author       = {Elliot Mbunge and
                  Benhildah Muchemwa and
                  John Batani and
                  Nobuhle Mbuyisa},
  title        = {A review of deep learning models to detect malware in Android applications},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100014},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2023.100014},
  doi          = {10.1016/J.CSA.2023.100014},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/MbungeMBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/RajkumarDVR23,
  author       = {S. C. Rajkumar and
                  L. Jegatha Deborah and
                  Pandi Vijayakumar and
                  Karthick K R},
  title        = {Secure session key pairing and a lightweight key authentication scheme
                  for liable drone services},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100012},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100012},
  doi          = {10.1016/J.CSA.2022.100012},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/RajkumarDVR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/SaiRPN23,
  author       = {Bodicherla Digvijay Sri Sai and
                  Nikhil Ramisetty and
                  Shivangini Prasad and
                  Nenavath Srinivas Naik},
  title        = {A decentralised {KYC} based approach for microfinance using blockchain
                  technology},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100009},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100009},
  doi          = {10.1016/J.CSA.2022.100009},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/SaiRPN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/SattarERDSPKU23,
  author       = {Md Rahat Ibne Sattar and
                  Md. Thowhid Bin Hossain Efty and
                  Taiyaba Shadaka Rafa and
                  Tusar Das and
                  Md Sharif Samad and
                  Abhijit Pathak and
                  Mayeen Uddin Khandaker and
                  Md Habib Ullah},
  title        = {An advanced and secure framework for conducting online examination
                  using blockchain method},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100005},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100005},
  doi          = {10.1016/J.CSA.2022.100005},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/SattarERDSPKU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/SenapatiR23,
  author       = {Biswa Ranjan Senapati and
                  Bharat S. Rawal},
  title        = {Quantum communication with {RLP} quantum resistant cryptography in
                  industrial manufacturing},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100019},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2023.100019},
  doi          = {10.1016/J.CSA.2023.100019},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/SenapatiR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/SheikM23,
  author       = {Syed Amma Sheik and
                  Amutha Prabakar Muniyandi},
  title        = {Secure authentication schemes in cloud computing with glimpse of artificial
                  neural networks: {A} review},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100002},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100002},
  doi          = {10.1016/J.CSA.2022.100002},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/SheikM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/SinghKM23,
  author       = {Anjali Singh and
                  Marimuthu Karuppiah and
                  Rajendra Prasad Mahapatra},
  title        = {Cryptanalysis on "a secure three-factor user authentication and key
                  agreement protocol for {TMIS} with user anonymity "},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100008},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100008},
  doi          = {10.1016/J.CSA.2022.100008},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/SinghKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/Tan23,
  author       = {Haowen Tan},
  title        = {An efficient IoT group association and data sharing mechanism in edge
                  computing paradigm},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100003},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100003},
  doi          = {10.1016/J.CSA.2022.100003},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/Tan23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/ThapliyalSWSD23,
  author       = {Siddhant Thapliyal and
                  Shubham Singh and
                  Mohammad Wazid and
                  Devesh Pratap Singh and
                  Ashok Kumar Das},
  title        = {Design of blockchain-enabled secure smart health monitoring system
                  and its testbed implementation},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100020},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2023.100020},
  doi          = {10.1016/J.CSA.2023.100020},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/ThapliyalSWSD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/VijayalakshmiBGT23,
  author       = {S. Vijayalakshmi and
                  S. Bose and
                  Logeswari Govindaraj and
                  Anitha Thangasamy},
  title        = {Hybrid defense mechanism against malicious packet dropping attack
                  for {MANET} using game theory},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100011},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100011},
  doi          = {10.1016/J.CSA.2022.100011},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/VijayalakshmiBGT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/XuLPF23,
  author       = {Zhiyan Xu and
                  Min Luo and
                  Cong Peng and
                  Qi Feng},
  title        = {Sanitizable signature scheme with privacy protection for electronic
                  medical data sharing},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100018},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2023.100018},
  doi          = {10.1016/J.CSA.2023.100018},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/XuLPF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/YanJ23,
  author       = {Weiwei Yan and
                  Sai Ji},
  title        = {A secure and efficient {DSSE} scheme with constant storage costs in
                  smart devices},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100006},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100006},
  doi          = {10.1016/J.CSA.2022.100006},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/YanJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/ZhouLWL23,
  author       = {Yousheng Zhou and
                  Xia Li and
                  Ming Wang and
                  Yuanni Liu},
  title        = {{PPT-LBS:} Privacy-preserving top-k query scheme for outsourced data
                  of location-based services},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100007},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100007},
  doi          = {10.1016/J.CSA.2022.100007},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/ZhouLWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}