Skip to main content
Top

International Journal of Information Security

Issue 1/2024

Content (33 Articles)

Special Issue Paper

Blockchain-based multi-diagnosis deep learning application for various diseases classification

Hakima Rym Rahal, Sihem Slatnia, Okba Kazar, Ezedin Barka, Saad Harous

Open Access Special Issue Paper

Cyber threat assessment and management for securing healthcare ecosystems using natural language processing

Stefano Silvestri, Shareful Islam, Dmitry Amelin, Gabriele Weiler, Spyridon Papastergiou, Mario Ciampi

Open Access Special Issue Paper

A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)

Osama Bassam J. Rabie, Shitharth Selvarajan, Tawfiq Hasanin, Gouse Baig Mohammed, Abddulrhman M. Alshareef, Mueen Uddin

Survey

Cybersecurity challenges in IoT-based smart renewable energy

Alexandre Rekeraho, Daniel Tudor Cotfas, Petru Adrian Cotfas, Titus Constantin Bălan, Emmanuel Tuyishime, Rebecca Acheampong

Survey

A review on graph-based approaches for network security monitoring and botnet detection

Sofiane Lagraa, Martin Husák, Hamida Seba, Satyanarayana Vuppala, Radu State, Moussa Ouedraogo

Open Access Special Issue Paper

SDN as a defence mechanism: a comprehensive survey

Believe Ayodele, Victor Buttigieg

Open Access Regular Contribution

Enhancing attack resilience of cyber-physical systems through state dependency graph models

Konstantinos Adamos, George Stergiopoulos, Michalis Karamousadakis, Dimitris Gritzalis

Open Access Regular contribution

Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents

Åvald Åslaugson Sommervoll, László Erdődi, Fabio Massimo Zennaro

Regular Contribution

Estimating vulnerability metrics with word embedding and multiclass classification methods

Hakan Kekül, Burhan Ergen, Halil Arslan

Regular Contribution

Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware

Silviu Viţel, Marilena Lupaşcu, Dragoş Teodor Gavriluţ, Henri Luchian

Open Access Regular Contribution

Detection of adversarial attacks based on differences in image entropy

Gwonsang Ryu, Daeseon Choi

Regular Contribution

RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment

Bhavya Dhingra, Vidhi Jain, Deepak Kumar Sharma, Koyel Datta Gupta, Deepika Kukreja

Regular contribution

Forensic investigation of the dark web on the Tor network: pathway toward the surface web

Philgeun Jin, Namjun Kim, Sangjin Lee, Doowon Jeong

Open Access Regular Contribution

INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain

Aristeidis Farao, Georgios Paparis, Sakshyam Panda, Emmanouil Panaousis, Apostolis Zarras, Christos Xenakis

Regular Contribution

GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks

Fabrice Mvah, Vianney Kengne Tchendji, Clémentin Tayou Djamegni, Ahmed H. Anwar, Deepak K. Tosh, Charles Kamhoua

Open Access Regular Contribution

Synthesizing differentially private location traces including co-locations

Jun Narita, Takao Murakami, Hideitsu Hino, Masakatsu Nishigaki, Tetsushi Ohki

Regular Contribution

Security assessment and improvement of smart grid NIKE protocol

Tao Feng, Wentao Jin, Minghu Zhang, Lu Zheng

Open Access Regular contribution

Simulation extractable versions of Groth’s zk-SNARK revisited

Oussama Amine, Karim Baghery, Zaira Pindado, Carla Ràfols

Regular contribution

Pepal: Penalizing multimedia breaches and partial leakages

Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate

Open Access Regular Contribution

Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant

Marius Elmiger, Mouad Lemoudden, Nikolaos Pitropakis, William J. Buchanan

Regular Contribution

BASPED: Blockchain assisted searchable public key encryption over outsourced data

Partha Sarathi Chakraborty, Somanath Tripathy, Sanjeet Kumar Nayak

Open Access Regular Contribution

Improving spam email classification accuracy using ensemble techniques: a stacking approach

Muhammad Adnan, Muhammad Osama Imam, Muhammad Furqan Javed, Iqbal Murtza

Regular contribution

Blockchain-based data integrity framework for Internet of Things

Poornima M. Chanal, Mahabaleshwar S. Kakkasageri

Regular Contribution

RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware

Md. Ahsan Ayub, Ambareen Siraj, Bobby Filar, Maanak Gupta

Regular Contribution

An integrated deep learning model for Ethereum smart contract vulnerability detection

Vikas Kumar Jain, Meenakshi Tripathi

Open Access Regular Contribution

Secure outsourcing of manufacturing compliance checks

Aikaterini Triakosia, Panagiotis Rizomiliotis, Cecilia Tonelli, Fabio Federici, Valerio Senni

Regular contribution

On private information retrieval supporting range queries

Junichiro Hayata, Jacob C. N. Schuldt, Goichiro Hanaoka, Kanta Matsuura

Regular Contribution

MLChain: a privacy-preserving model learning framework using blockchain

Vidhi Bansal, Niyati Baliyan, Mohona Ghosh

Premium Partner