R
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Int. J. Inf. Sec.
2001
2009
2016
2024
2001
2024
Keyphrases
Publications
volume 23, number 1, 2024
Easwar Vivek Mangipudi
,
Krutarth Rao
,
Jeremy Clark
,
Aniket Kate
Pepal: Penalizing multimedia breaches and partial leakages.
Int. J. Inf. Sec.
23 (1) (2024)
Alexandre Rekeraho
,
Daniel Tudor Cotfas
,
Petru Adrian Cotfas
,
Titus Constantin Balan
,
Emmanuel Tuyishime
,
Rebecca Acheampong
Cybersecurity challenges in IoT-based smart renewable energy.
Int. J. Inf. Sec.
23 (1) (2024)
Philgeun Jin
,
Namjun Kim
,
Sangjin Lee
,
Doowon Jeong
Forensic investigation of the dark web on the Tor network: pathway toward the surface web.
Int. J. Inf. Sec.
23 (1) (2024)
Stefano Silvestri
,
Shareful Islam
,
Dmitry Amelin
,
Gabriele Weiler
,
Spyridon Papastergiou
,
Mario Ciampi
Cyber threat assessment and management for securing healthcare ecosystems using natural language processing.
Int. J. Inf. Sec.
23 (1) (2024)
Osama Bassam J. Rabie
,
Shitharth Selvarajan
,
Tawfiq Hasanin
,
Gouse Baig Mohammad
,
Abddulrhman M. Alshareef
,
Mueen Uddin
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs).
Int. J. Inf. Sec.
23 (1) (2024)
Fabrice Mvah
,
Vianney Kengne Tchendji
,
Clémentin Tayou Djamégni
,
Ahmed H. Anwar
,
Deepak K. Tosh
,
Charles A. Kamhoua
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks.
Int. J. Inf. Sec.
23 (1) (2024)
Marius Elmiger
,
Mouad Lemoudden
,
Nikolaos Pitropakis
,
William J. Buchanan
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant.
Int. J. Inf. Sec.
23 (1) (2024)
Aristeidis Farao
,
Georgios Paparis
,
Sakshyam Panda
,
Emmanouil Panaousis
,
Apostolis Zarras
,
Christos Xenakis
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain.
Int. J. Inf. Sec.
23 (1) (2024)
Jun Narita
,
Takao Murakami
,
Hideitsu Hino
,
Masakatsu Nishigaki
,
Tetsushi Ohki
Synthesizing differentially private location traces including co-locations.
Int. J. Inf. Sec.
23 (1) (2024)
Afnan A. Alharbi
Federated transfer learning for attack detection for Internet of Medical Things.
Int. J. Inf. Sec.
23 (1) (2024)
Tao Feng
,
Wentao Jin
,
Minghu Zhang
,
Lu Zheng
Security assessment and improvement of smart grid NIKE protocol.
Int. J. Inf. Sec.
23 (1) (2024)
K. Dinesh
,
S. V. N. Santhosh Kumar
Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network.
Int. J. Inf. Sec.
23 (1) (2024)
Åvald Åslaugson Sommervoll
,
László Erdodi
,
Fabio Massimo Zennaro
Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents.
Int. J. Inf. Sec.
23 (1) (2024)
Bhavya Dhingra
,
Vidhi Jain
,
Deepak Kumar Sharma
,
Koyel Datta Gupta
,
Deepika Kukreja
RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment.
Int. J. Inf. Sec.
23 (1) (2024)
Junichiro Hayata
,
Jacob C. N. Schuldt
,
Goichiro Hanaoka
,
Kanta Matsuura
On private information retrieval supporting range queries.
Int. J. Inf. Sec.
23 (1) (2024)
Gwonsang Ryu
,
Daeseon Choi
Detection of adversarial attacks based on differences in image entropy.
Int. J. Inf. Sec.
23 (1) (2024)
Aikaterini Triakosia
,
Panagiotis Rizomiliotis
,
Cecilia Tonelli
,
Fabio Federici
,
Valerio Senni
Secure outsourcing of manufacturing compliance checks.
Int. J. Inf. Sec.
23 (1) (2024)
Sofiane Lagraa
,
Martin Husák
,
Hamida Seba
,
Satyanarayana Vuppala
,
Radu State
,
Moussa Ouedraogo
A review on graph-based approaches for network security monitoring and botnet detection.
Int. J. Inf. Sec.
23 (1) (2024)
Hakan Kekül
,
Burhan Ergen
,
Halil Arslan
Estimating vulnerability metrics with word embedding and multiclass classification methods.
Int. J. Inf. Sec.
23 (1) (2024)
Anjum
,
Rahul Katarya
Hate speech, toxicity detection in online social media: a recent survey of state of the art and opportunities.
Int. J. Inf. Sec.
23 (1) (2024)
Vidhi Bansal
,
Niyati Baliyan
,
Mohona Ghosh
MLChain: a privacy-preserving model learning framework using blockchain.
Int. J. Inf. Sec.
23 (1) (2024)
Silviu Constantin Vitel
,
Marilena Lupascu
,
Dragos Teodor Gavrilut
,
Henri Luchian
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware.
Int. J. Inf. Sec.
23 (1) (2024)
Muralidhara Rao Patruni
,
Abdul Gaffar Humayun
PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks.
Int. J. Inf. Sec.
23 (1) (2024)
Muhammad Adnan
,
Muhammad Osama Imam
,
Muhammad Furqan Javed
,
Iqbal Murtza
Improving spam email classification accuracy using ensemble techniques: a stacking approach.
Int. J. Inf. Sec.
23 (1) (2024)
Poornima M. Chanal
,
Mahabaleshwar S. Kakkasageri
Blockchain-based data integrity framework for Internet of Things.
Int. J. Inf. Sec.
23 (1) (2024)
Konstantinos Adamos
,
George Stergiopoulos
,
Michalis Karamousadakis
,
Dimitris Gritzalis
Enhancing attack resilience of cyber-physical systems through state dependency graph models.
Int. J. Inf. Sec.
23 (1) (2024)
Md. Ahsan Ayub
,
Ambareen Siraj
,
Bobby Filar
,
Maanak Gupta
RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware.
Int. J. Inf. Sec.
23 (1) (2024)
Believe Ayodele
,
Victor Buttigieg
SDN as a defence mechanism: a comprehensive survey.
Int. J. Inf. Sec.
23 (1) (2024)
Oussama Amine
,
Karim Baghery
,
Zaira Pindado
,
Carla Ràfols
Simulation extractable versions of Groth's zk-SNARK revisited.
Int. J. Inf. Sec.
23 (1) (2024)
Arun Sekar Rajasekaran
,
Maria Azees
A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation.
Int. J. Inf. Sec.
23 (1) (2024)
Vikas Kumar Jain
,
Meenakshi Tripathi
An integrated deep learning model for Ethereum smart contract vulnerability detection.
Int. J. Inf. Sec.
23 (1) (2024)
Partha Sarathi Chakraborty
,
Somanath Tripathy
,
Sanjeet Kumar Nayak
BASPED: Blockchain assisted searchable public key encryption over outsourced data.
Int. J. Inf. Sec.
23 (1) (2024)
Hakima Rym Rahal
,
Sihem Slatnia
,
Okba Kazar
,
Ezedin Barka
,
Saad Harous
Blockchain-based multi-diagnosis deep learning application for various diseases classification.
Int. J. Inf. Sec.
23 (1) (2024)
volume 22, number 6, 2023
Srinidhi Madabhushi
,
Rinku Dewri
A survey of anomaly detection methods for power grids.
Int. J. Inf. Sec.
22 (6) (2023)
Christos Smiliotopoulos
,
Georgios Kambourakis
,
Konstantia Barbatsalou
On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs.
Int. J. Inf. Sec.
22 (6) (2023)
K. S. Kuppusamy
,
Balayogi G
Accessible password strength assessment method for visually challenged users.
Int. J. Inf. Sec.
22 (6) (2023)
Lorenzo Rovida
Fast but approximate homomorphic k-means based on masking technique.
Int. J. Inf. Sec.
22 (6) (2023)
Saurabh Pandey
,
Nitesh Kumar
,
Anand Handa
,
Sandeep Kumar Shukla
Evading malware classifiers using RL agent with action-mask.
Int. J. Inf. Sec.
22 (6) (2023)
Nasiru Ibrahim
,
Harin Sellahewa
A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on android Pattern Unlock.
Int. J. Inf. Sec.
22 (6) (2023)
Nabin Chowdhury
,
Vasileios Gkioulos
A personalized learning theory-based cyber-security training exercise.
Int. J. Inf. Sec.
22 (6) (2023)
Muhammad Ali
,
Mansoor-ul-haque
,
Muhammad Hanif Durad
,
Anila Usman
,
Syed Muhammad Mohsin
,
Hana Mujlid
,
Carsten Maple
Effective network intrusion detection using stacking-based ensemble approach.
Int. J. Inf. Sec.
22 (6) (2023)
Luong Thai Ngoc
,
Doan Hoang
BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks.
Int. J. Inf. Sec.
22 (6) (2023)
Vicenç Torra
,
Guillermo Navarro-Arribas
Attribute disclosure risk for k-anonymity: the case of numerical data.
Int. J. Inf. Sec.
22 (6) (2023)
Taiwo Blessing Ogunseyi
,
Cossi Blaise Avoussoukpo
,
Yiqiang Jiang
A systematic review of privacy techniques in recommendation systems.
Int. J. Inf. Sec.
22 (6) (2023)
Kristijan Ziza
,
Predrag Tadic
,
Pavle V. Vuletic
DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour.
Int. J. Inf. Sec.
22 (6) (2023)
Dmitry Levshun
,
Olga Tushkanova
,
Andrey Chechulin
Two-model active learning approach for inappropriate information classification in social networks.
Int. J. Inf. Sec.
22 (6) (2023)
Najet Hamdi
Federated learning-based intrusion detection system for Internet of Things.
Int. J. Inf. Sec.
22 (6) (2023)
Sarabjeet Kaur
,
Amanpreet Kaur Sandhu
,
Abhinav Bhandari
Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review.
Int. J. Inf. Sec.
22 (6) (2023)
Lorena González-Manzano
,
José María de Fuentes
,
Flavio Lombardi
,
Cristina Ramos
A technical characterization of APTs by leveraging public resources.
Int. J. Inf. Sec.
22 (6) (2023)
Mo'ath Zyout
,
Raed Shatnawi
,
Hassan Najadat
Malware classification approaches utilizing binary and text encoding of permissions.
Int. J. Inf. Sec.
22 (6) (2023)