- Stefano Bistarelli, Andrea Imparato, Francesco Santini:
A TCP-based covert channel with integrity check and retransmission. Int. J. Inf. Sec. 23(6): 3481-3512 (2024) - Parthajit Borah, Upasana Sarmah, D. K. Bhattacharyya, Jugal K. Kalita:
Unmasking the common traits: an ensemble approach for effective malware detection. Int. J. Inf. Sec. 23(4): 2547-2557 (2024) - Thomas Oakley Browne, Mohammad Abedin, Mohammad Jabed Morshed Chowdhury:
A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications. Int. J. Inf. Sec. 23(4): 2911-2938 (2024) - Patricia Callejo, Ignacio Gómez Fernández, Marcelo Bagnulo:
"Animation" URL in NFT marketplaces considered harmful for privacy. Int. J. Inf. Sec. 23(6): 3749-3763 (2024) - Partha Sarathi Chakraborty, Somanath Tripathy, Sanjeet Kumar Nayak:
BASPED: Blockchain assisted searchable public key encryption over outsourced data. Int. J. Inf. Sec. 23(1): 487-503 (2024) - Poornima M. Chanal, Mahabaleshwar S. Kakkasageri:
Blockchain-based data integrity framework for Internet of Things. Int. J. Inf. Sec. 23(1): 519-532 (2024) - Pavlos Cheimonidis, Konstantinos Rantos:
Dynamic vulnerability severity calculator for industrial control systems. Int. J. Inf. Sec. 23(4): 2655-2676 (2024) - Tzer-Long Chen, Chia-Hui Liu, Ya-Hui Ou, Yao-Min Huang, Zhen-Yu Wu:
An improved and efficient coercion-resistant measure for electronic voting system. Int. J. Inf. Sec. 23(4): 2637-2654 (2024) - Chun-Fu Chen, Bill Moriarty, Shaohan Hu, Sean Moran, Marco Pistoia, Vincenzo Piuri, Pierangela Samarati:
Model-Agnostic Utility-Preserving Biometric Information Anonymization. Int. J. Inf. Sec. 23(4): 2809-2826 (2024) - Christopher Jun-Wen Chew, Vimal Kumar, Panos Patros, Robi Malik:
Real-time system call-based ransomware detection. Int. J. Inf. Sec. 23(3): 1839-1858 (2024) - Anil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti, Manik Gupta, Raghu Kondapalli, Zhichao Zhang, Krishnakumar Kesavan:
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards. Int. J. Inf. Sec. 23(3): 2043-2061 (2024) - Francisco T. Chimuco, João B. F. Sequeiros, Tiago M. C. Simões, Mário M. Freire, Pedro R. M. Inácio:
Expediting the design and development of secure cloud-based mobile apps. Int. J. Inf. Sec. 23(4): 3043-3064 (2024) - Stephen Cook, Maryam Mehrnezhad, Ehsan Toreini:
Bluetooth security analysis of general and intimate health IoT devices and apps: the case of FemTech. Int. J. Inf. Sec. 23(6): 3547-3567 (2024) - Beibei Cui, Wei He, Yan Cui:
A dynamic C-V2X anonymous authentication and group key agreement protocol. Int. J. Inf. Sec. 23(4): 2977-2989 (2024) - Rupshali Dasgupta, Meghabriti Pramanik, Pabitra Mitra, Dipanwita Roy Chowdhury:
Intrusion detection for power grid: a review. Int. J. Inf. Sec. 23(2): 1317-1329 (2024) - Bhavya Dhingra, Vidhi Jain, Deepak Kumar Sharma, Koyel Datta Gupta, Deepika Kukreja:
RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment. Int. J. Inf. Sec. 23(1): 315-330 (2024) - K. Dinesh, S. V. N. Santhosh Kumar:
Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network. Int. J. Inf. Sec. 23(1): 199-223 (2024) - Rahul Dwivedi:
International journal of information security: a bibliometric study, 2007-2023. Int. J. Inf. Sec. 23(3): 2159-2187 (2024) - Elham Ebrahimpour, Shahram Babaie:
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review. Int. J. Inf. Sec. 23(3): 1583-1602 (2024) - Mustafa Ahmed Elberri, Ümit Tokeser, Javad Rahebi, José Manuel López-Guede:
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA). Int. J. Inf. Sec. 23(4): 2583-2606 (2024) - Marius Elmiger, Mouad Lemoudden, Nikolaos Pitropakis, William J. Buchanan:
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant. Int. J. Inf. Sec. 23(1): 467-485 (2024) - Philip Empl, Daniel Schlette, Lukas Stöger, Günther Pernul:
Generating ICS vulnerability playbooks with open standards. Int. J. Inf. Sec. 23(2): 1215-1230 (2024) - Shuhei Enomoto, Hiroki Kuzuno, Hiroshi Yamada, Yoshiaki Shiraishi, Masakatu Morii:
Early mitigation of CPU-optimized ransomware using monitoring encryption instructions. Int. J. Inf. Sec. 23(5): 3393-3413 (2024) - Saeed Banaeian Far, Maryam Rajabzadeh Asaar, Afrooz Haghbin:
A generic framework for blockchain-assisted on-chain auditing for off-chain storage. Int. J. Inf. Sec. 23(3): 2407-2435 (2024) - Aristeidis Farao, Georgios Paparis, Sakshyam Panda, Emmanouil Panaousis, Apostolis Zarras, Christos Xenakis:
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain. Int. J. Inf. Sec. 23(1): 347-371 (2024) - Tao Feng, Wentao Jin, Minghu Zhang, Lu Zheng:
Security assessment and improvement of smart grid NIKE protocol. Int. J. Inf. Sec. 23(1): 411-429 (2024) - Josep Lluís Ferrer-Gomila, M. Francisca Hinarejos:
Abuse-freeness in contract signing: a blockchain-based proposal. Int. J. Inf. Sec. 23(3): 1963-1974 (2024) - Fulvio Frati, Georgiana Darau, Nikos Salamanos, Pantelitsa Leonidou, Costas Iordanou, Dimitris Plachouris, Efstratios Syrmas, Evangelos Floros, George Nikitakis, George Spanoudakis, Konstantinos Kalais, Stella Tsichlaki, Ernesto Damiani, George C. Kagadis, Jihane Najar, Michael Sirivianos:
Cybersecurity training and healthcare: the AERAS approach. Int. J. Inf. Sec. 23(2): 1527-1539 (2024) - Stylianos Gerasimou, Konstantinos Limniotis:
A study on privacy and security aspects of personalised apps. Int. J. Inf. Sec. 23(5): 3217-3239 (2024) - Richa Goenka, Meenu Chawla, Namita Tiwari:
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy. Int. J. Inf. Sec. 23(2): 819-848 (2024)