Issue 2/2023
Content (15 Articles)
How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates
Qin An, Wilson Cheong Hin Hong, XiaoShu Xu, Yunfeng Zhang, Kimberly Kolletar-Zhu
Adversarial security mitigations of mmWave beamforming prediction models using defensive distillation and adversarial retraining
Murat Kuzlu, Ferhat Ozgur Catak, Umit Cali, Evren Catak, Ozgur Guler
Design and analysis of DDoS mitigating network architecture
Swati, Sangita Roy, Jawar Singh, Jimson Mathew
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study
Efstratios Chatzoglou, Vasileios Kouliaridis, Georgios Karopoulos, Georgios Kambourakis
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN
Reza Mohammadi, Chhagan Lal, Mauro Conti
Bu-Dash: a universal and dynamic graphical password scheme (extended version)
Panagiotis Andriotis, Myles Kirby, Atsuhiro Takasu
A simple and secure user authentication scheme using Map Street View with usability analysis based on ISO/IEC 25022
Kailash Chandra Mishra, Subrata Dutta
Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device
Kapilan Kulayan Arumugam Gandhi, Chamundeswari Arumugam
An intrusion detection approach based on incremental long short-term memory
Hanxun Zhou, Longyu Kang, Hong Pan, Guo Wei, Yong Feng
SealFSv2: combining storage-based and ratcheting for tamper-evident logging
Gorka Guardiola-Múzquiz, Enrique Soriano-Salvador
Distributed access control for information-centric networking architectures using verifiable credentials
Bander Alzahrani, Nikos Fotiou, Aiiad Albeshri, Abdullah Almuhaimeed, Khalid Alsubhi
Authentication-enabled attribute-based access control for smart homes
Melike Burakgazi Bilgen, Osman Abul, Kemal Bicakci
Defense against membership inference attack in graph neural networks through graph perturbation
Kai Wang, Jinxia Wu, Tianqing Zhu, Wei Ren, Ying Hong
Trends in publishing blockchain surveys: a bibliometric perspective
Hira Ahmad, Muhammad Ahtazaz Ahsan, Adnan Noor Mian
Evaluation of neural networks defenses and attacks using NDCG and reciprocal rank metrics
Haya Brama, Lihi Dery, Tal Grinshpoun