


default search action
International Journal of Information Security, Volume 21
Volume 21, Number 1, February 2022
- Hee Yeon Kim

, Ji Hoon Kim
, Ho Kyun Oh
, Beom Jin Lee, Si Woo Mun, Jeong Hoon Shin, Kyounggon Kim
:
DAPP: automatic detection and analysis of prototype pollution vulnerability in Node.js modules. 1-23 - Hansub Shin, Sungyong Sim, Hyukyoon Kwon

, Sangheum Hwang, Younho Lee
:
A new smart smudge attack using CNN. 25-36 - George Stergiopoulos

, Panagiotis Dedousis, Dimitris Gritzalis
:
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0. 37-59 - Christos Lyvas, Christoforos Ntantogian

, Christos Xenakis
:
[m]allotROPism: a metamorphic engine for malicious software variation development. 61-78 - Mina Sheikhalishahi, Andrea Saracino

, Fabio Martinelli, Antonio La Marra:
Privacy preserving data sharing and analysis for edge-based architectures. 79-101 - An Braeken

:
Public key versus symmetric key cryptography in client-server authentication protocols. 103-114 - Jean-Paul A. Yaacoub

, Hassan N. Noura
, Ola Salman
, Ali Chehab
:
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. 115-158 - Track for surveys. 159

Volume 21, Number 2, April 2022
- Aun Yichiet

, Yen-Min Jasmina Khaw, Ming-Lee Gan, Vasaki Ponnusamy:
A semantic-aware log generation method for network activities. 161-177 - Franco Tommasi

, Christian Catalano
, Ivan Taurino:
Browser-in-the-Middle (BitM) attack. 179-189 - Roberto Vasconcelos Melo, Douglas D. J. de Macedo

, Diego Kreutz, Alessandra De Benedictis, Maurício M. Fiorenza:
ISM-AC: an immune security model based on alert correlation and software-defined networking. 191-205 - Hector B. Hougaard

, Atsuko Miyaji
:
Authenticated logarithmic-order supersingular isogeny group key exchange. 207-221 - Kindson Munonye

, Péter Martinek:
Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow. 223-237 - Metehan Yildirim

, Emin Anarim:
Mitigating insider threat by profiling users based on mouse usage pattern: ensemble learning and frequency domain analysis. 239-251 - Alexander Bajic

, Georg T. Becker
:
Automated benchmark network diversification for realistic attack simulation with application to moving target defense. 253-278 - Mamoru Mimura

, Ryo Ito:
Applying NLP techniques to malware detection in a practical environment. 279-291 - László Erdodi

, Fabio Massimo Zennaro
:
The Agent Web Model: modeling web hacking for reinforcement learning. 293-309 - Junwon Lee

, Heejo Lee:
An SSH predictive model using machine learning with web proxy session logs. 311-322 - Taha Elamine Hadjadj

, Adel Bouhoula
, Rim Tebourbi, Riadh Ksantini:
Optimization of parallel firewalls filtering rules. 323-340 - Zheng Zhang, Shaohao Xie, Fangguo Zhang

:
Topology-hiding garbled circuits without universal circuits. 341-356 - Ioannis Kazoleas, Panagiotis Karampelas

:
A novel malicious remote administration tool using stealth and self-defense techniques. 357-378 - Tahir Ahmad

, Umberto Morelli
, Silvio Ranise, Nicola Zannone
:
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system. 379-408 - Zach Parish

, Connor Cushing, Shourya Aggarwal, Amirali Salehi-Abari, Julie Thorpe:
Password guessers under a microscope: an in-depth analysis to inform deployments. 409-425
Volume 21, Number 3, June 2022
- Cheolhee Park

, Dowon Hong
, Changho Seo:
Evaluating differentially private decision tree model over model inversion attack. 1-14 - Sairath Bhattacharjya, Hossein Saiedian

:
Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture. 427-436 - Aaron Spence

, Shaun Bangay:
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures. 437-453 - Saleh A. Alghamdi

:
Novel trust-aware intrusion detection and prevention system for 5G MANET-Cloud. 469-488 - Amal Ghorbel

, Mahmoud Ghorbel, Mohamed Jmaiel:
Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain. 489-508 - Lu Zhang

, Arie Taal, Reginald Cushing, Cees de Laat, Paola Grosso
:
A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces. 509-525 - Jaya Singh

, Ayush Sinha, Priyanka Goli, Venkatesan Subramanian, Sandeep Kumar Shukla, Om Prakash Vyas:
Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology. 527-546 - Mahdi Soltani, Mahdi Jafari Siavoshani, Amir Hossein Jahangir

:
A content-based deep intrusion detection system. 547-562 - Ferucio Laurentiu Tiplea

:
Narrow privacy and desynchronization in Vaudenay's RFID model. 563-575 - Haibat Khan

, Benjamin Dowling
, Keith M. Martin:
Pragmatic authenticated key agreement for IEEE Std 802.15.6. 577-595 - Bradley Potteiger

, Feiyang Cai, Zhenkai Zhang, Xenofon D. Koutsoukos:
Data space randomization for securing cyber-physical systems. 597-610 - Noureddine Amraoui

, Belhassen Zouari:
Anomalous behavior detection-based approach for authenticating smart home system users. 611-636 - Ankit Shah, Rajesh Ganesan

, Sushil Jajodia
, Hasan Cam:
Maintaining the level of operational effectiveness of a CSOC under adverse conditions. 637-651 - Maryam Zulfiqar, Muhammad Umar Janjua, Muhammad Hassan

, Talha Ahmad, Tania Saleem
, Jack W. Stokes:
Tracking adoption of revocation and cryptographic features in X.509 certificates. 653-668 - Paolo D'Arco, Roberto De Prisco

, Zahra Ebadi Ansaroudi
, Rocco Zaccagnino:
Gossamer: weaknesses and performance. 669-687 - Xiaokuan Zhang

, Jihun Hamm, Michael K. Reiter, Yinqian Zhang:
Defeating traffic analysis via differential privacy: a case study on streaming traffic. 689-706
Volume 21, Number 4, August 2022
- Kazuki Koike

, Ryotaro Kobayashi
, Masahiko Katoh:
IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core. 1-19 - Andrea Huszti, Szabolcs Kovács, Norbert Oláh

:
Scalable, password-based and threshold authentication for smart homes. 707-723 - Jinsung Kim, Younghoon Ban, Eunbyeol Ko, Haehyun Cho

, Jeong Hyun Yi
:
MAPAS: a practical deep learning-based android malware detection system. 725-738 - Mahdieh Zabihimayvan

, Derek Doran:
A first look at references from the dark to the surface web world: a case study in Tor. 739-755 - Ryan Karl, Hannah Burchfield, Jonathan Takeshita, Taeho Jung

:
Developing non-interactive MPC with trusted hardware for enhanced security. 777-797 - Qian Gong

, Phil DeMar, Mine Altunay:
ThunderSecure: deploying real-time intrusion detection for 100G research networks by leveraging stream-based features and one-class classification network. 799-812 - Kengo Zenitani

:
A multi-objective cost-benefit optimization algorithm for network hardening. 813-832 - Yuichi Komano

, Takaaki Mizuki
:
Coin-based Secure Computations. 833-846 - Munshi Saifuzzaman

, Tajkia Nuri Ananna
, Mohammad Jabed Morshed Chowdhury
, Md Sadek Ferdous
, Farida Chowdhury
:
A systematic literature review on wearable health data publishing under differential privacy. 847-872 - Ankit Agrawal

, Ashutosh Bhatia
, Ayush Bahuguna
, Kamlesh Tiwari, K. Haribabu
, Deepak Vishwakarma, Rekha Kaushik:
A survey on analyzing encrypted network traffic of mobile devices. 873-915 - Unsub Zia

, Mark McCartney, Bryan W. Scotney
, Jorge Martínez
, Mamun I. AbuTair
, Jamshed Memon
, Ali Sajjad
:
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains. 917-935 - Teik Guan Tan

, Pawel Szalachowski, Jianying Zhou
:
Challenges of post-quantum digital signing in real-world applications: a survey. 937-952
Volume 21, Number 5, October 2022
- Jai Hyun Park

, Jung Hee Cheon
, Dongwoo Kim
:
Efficient verifiable computation over quotient polynomial rings. 953-971 - Christos Lyvas, Costas Lambrinoudakis, Dimitris Geneiatakis:

IntentAuth: Securing Android's Intent-based inter-process communication. 973-982 - Ram Govind Singh, Ananya Shrivastava, Sushmita Ruj:

A Digital Asset Inheritance Model to Convey Online Persona Posthumously. 983-1003 - Elena Agostini

, Massimo Bernaschi:
BitCracker: BitLocker meets GPUs. 1005-1018 - Ilyes Ahmim

, Nacira Ghoualmi-Zine
, Ahmed Ahmim
, Marwa Ahmim:
Security analysis on "Three-factor authentication protocol using physical unclonable function for IoV". 1019-1026 - Marcel Armour

, Bertram Poettering
:
Algorithm substitution attacks against receivers. 1027-1050 - Seyit Camtepe

, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal
, Marcin Pawlowski, Josef Pieprzyk
:
ANS-based compression and encryption with 128-bit security. 1051-1067 - Rosa Pericàs-Gornals

, Macià Mut Puigserver
, María Magdalena Payeras Capellà
:
Highly private blockchain-based management system for digital COVID-19 certificates. 1069-1090 - Vasileios Vlachos

, Yannis C. Stamatiou
, Pantelis Tzamalis, Sotiris E. Nikoletseas:
The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats. 1091-1106 - Beyza Cevik

, Nur Altiparmak, Murat Aksu, Sevil Sen
:
Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries. 1107-1125 - Hiroki Inayoshi

, Shohei Kakei
, Eiji Takimoto
, Koichi Mouri
, Shoichi Saito
:
Value-utilized taint propagation: toward precise detection of apps' information flows across Android API calls. 1127-1149 - Ricard Borges

, Francesc Sebé
, Magda Valls
:
An anonymous and unlinkable electronic toll collection system. 1151-1162 - Jeet Rabari

, P. Arun Raj Kumar:
A survey on interest packet flooding attacks and its countermeasures in named data networking. 1163-1187 - Andrew D. Syrmakesis, Cristina Alcaraz

, Nikos D. Hatziargyriou
:
Classifying resilience approaches for protecting smart grids against cyber threats. 1189-1210
Volume 21, Number 6, December 2022
- Irini Lygerou, Shreyas Srinivasa

, Emmanouil Vasilomanolakis
, George Stergiopoulos
, Dimitris Gritzalis
:
A decentralized honeypot for IoT Protocols based on Android devices. 1211-1222 - Bingxue Fu

, Xing Yu
, Tao Feng
:
CT-GCN: a phishing identification model for blockchain cryptocurrency transactions. 1223-1232 - Matthias Templ

, Murat Sariyar:
A systematic overview on methods to protect sensitive data provided for various analyses. 1233-1246 - Abdenour Kifouche

, Mohamed Salah Azzaz
, Rédha Hamouche, Rémy Kocik:
Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications. 1247-1262 - C. Prajisha

, A. R. Vasudevan:
An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM. 1263-1282 - Pablo Picazo-Sanchez

, Lara Ortiz-Martin, Gerardo Schneider, Andrei Sabelfeld:
Are chrome extensions compliant with the spirit of least privilege? 1283-1297 - Kayode S. Adewole

, Vicenç Torra
:
DFTMicroagg: a dual-level anonymization algorithm for smart grid data. 1299-1321 - Florian Skopik

, Arndt Bonitz, Volker Grantz, Günter Göhler:
From scattered data to actionable knowledge: flexible cyber security reporting in the military domain. 1323-1347 - Vicenç Torra

, Edgar Galván, Guillermo Navarro-Arribas
:
PSO + FL = PAASO: particle swarm optimization + federated learning = privacy-aware agent swarm optimization. 1349-1359 - Xiaodong Yang, Wenjia Wang, Caifen Wang:

Security analysis and improvement of a privacy-preserving authentication scheme in VANET. 1361-1371 - Mohammad Abdussami

, Ruhul Amin
, Satyanarayana Vollala:
LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment. 1373-1387 - R. Kishore, Iacovos Ioannou

, Christophoros Christophorou, N. Prabagarane, Vasos Vassiliou, S. Vignesh, H. Vinayak, S. Venkatesh, Andreas Pitsillides:
A security protocol for D2D communications in 5G networks using elliptic curve cryptography. 1389-1408 - Raju Kumar

, Aruna Bhat
:
A study of machine learning-based models for detection, control, and mitigation of cyberbullying in online social media. 1409-1431

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














