- Zubair Ahmad, Stefano Calzavara, Samuele Casarin, Ben Stock:
Information flow control for comparative privacy analyses. Int. J. Inf. Sec. 23(5): 3199-3216 (2024) - Aida Akbarzadeh, Laszlo Erdodi, Siv Hilde Houmb, Tore Geir Soltvedt:
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation. Int. J. Inf. Sec. 23(4): 2739-2758 (2024) - Hussain Al-Aqrabi, Ahmed M. Manasrah, Richard Hill, Mohammed Q. Shatnawi, Mohammad Sh. Daoud, Hoda Alkhzaimi:
Dynamic authentication for intelligent sensor clouds in the Internet of Things. Int. J. Inf. Sec. 23(3): 2003-2021 (2024) - Afnan A. Alharbi:
Federated transfer learning for attack detection for Internet of Medical Things. Int. J. Inf. Sec. 23(1): 81-100 (2024) - Rao Faizan Ali, P. D. D. Dominic, Sadaf Hina, Sheraz Naseer:
Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees. Int. J. Inf. Sec. 23(2): 1197-1213 (2024) - Auwal Shehu Ali, Zarul Fitri Zaaba, Manmeet Mahinderjit Singh:
The rise of "security and privacy": bibliometric analysis of computer privacy research. Int. J. Inf. Sec. 23(2): 863-885 (2024) - Amir Aliabadian, Mohammad Reza Zahabi, Majid Mobini:
Spatial de-correlation of generated keys from wireless channels using adversarial deep learning. Int. J. Inf. Sec. 23(3): 2063-2073 (2024) - Ehab Alkhateeb, Ali A. Ghorbani, Arash Habibi Lashkari:
A survey on run-time packers and mitigation techniques. Int. J. Inf. Sec. 23(2): 887-913 (2024) - Abdullah Hamad N. Almoqbil:
Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard. Int. J. Inf. Sec. 23(3): 2377-2394 (2024) - Abdulrahman K. Alnaim:
Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing security. Int. J. Inf. Sec. 23(6): 3569-3589 (2024) - Sultan S. Alqahtani:
Security bug reports classification using fasttext. Int. J. Inf. Sec. 23(2): 1347-1358 (2024) - Habib El Amin, Lina Oueidat, Maroun Chamoun, Abed Ellatif Samhat, Antoine Feghali:
Blockchain-based multi-organizational cyber risk management framework for collaborative environments. Int. J. Inf. Sec. 23(2): 1231-1249 (2024) - Oussama Amine, Karim Baghery, Zaira Pindado, Carla Ràfols:
Simulation extractable versions of Groth's zk-SNARK revisited. Int. J. Inf. Sec. 23(1): 431-445 (2024) - M. Amutha, K. R. Kavitha:
Enhancing security in QCA-based circuits using optimal key gate placement. Int. J. Inf. Sec. 23(3): 2395-2405 (2024) - Nikola Andelic, Sandi Baressi Segota, Zlatan Car:
Robust password security: a genetic programming approach with imbalanced dataset handling. Int. J. Inf. Sec. 23(3): 1761-1786 (2024) - Giddeon Njamngang Angafor, Iryna Yevseyeva, Leandros Maglaras:
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns. Int. J. Inf. Sec. 23(3): 1679-1693 (2024) - Anjum, Rahul Katarya:
Hate speech, toxicity detection in online social media: a recent survey of state of the art and opportunities. Int. J. Inf. Sec. 23(1): 577-608 (2024) - Pedro Antunes, Nuno Guimarães:
Guiding the implementation of data privacy with microservices. Int. J. Inf. Sec. 23(6): 3591-3608 (2024) - Süleyman Muhammed Arikan, Aynur Koçak, Mustafa Alkan:
Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system. Int. J. Inf. Sec. 23(5): 3135-3151 (2024) - Subhash Ariyadasa, Shantha Fernando, Subha Fernando:
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks. Int. J. Inf. Sec. 23(2): 1055-1076 (2024) - H. Asad, S. Adhikari, Ilir Gashi:
A perspective-retrospective analysis of diversity in signature-based open-source network intrusion detection systems. Int. J. Inf. Sec. 23(2): 1331-1346 (2024) - Ahmed M. Asfahani:
Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis. Int. J. Inf. Sec. 23(4): 2515-2530 (2024) - Believe Ayodele, Victor Buttigieg:
SDN as a defence mechanism: a comprehensive survey. Int. J. Inf. Sec. 23(1): 141-185 (2024) - Md. Ahsan Ayub, Ambareen Siraj, Bobby Filar, Maanak Gupta:
RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware. Int. J. Inf. Sec. 23(1): 533-556 (2024) - Ashish Bajaj, Dinesh Kumar Vishwakarma:
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms. Int. J. Inf. Sec. 23(4): 2711-2737 (2024) - Vidhi Bansal, Niyati Baliyan, Mohona Ghosh:
MLChain: a privacy-preserving model learning framework using blockchain. Int. J. Inf. Sec. 23(1): 649-677 (2024) - Kousik Barik, Sanjay Misra, Luis Fernández Sanz:
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network. Int. J. Inf. Sec. 23(3): 2353-2376 (2024) - Martin Bedoya, Sara Palacios, Daniel Díaz López, Estefania Laverde, Pantaleone Nespoli:
Enhancing DevSecOps practice with Large Language Models and Security Chaos Engineering. Int. J. Inf. Sec. 23(6): 3765-3788 (2024) - Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi:
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks. Int. J. Inf. Sec. 23(2): 915-934 (2024) - Guru Prasad Bhandari, Gebremariam Assres, Nikola Gavric, Andrii Shalaginov, Tor-Morten Grønli:
IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications. Int. J. Inf. Sec. 23(4): 2677-2690 (2024)