Skip to main content
Top

International Journal of Information Security

Issue 2/2024

Content (40 Articles)

Open Access Regular Contribution

Cashing out crypto: state of practice in ransom payments

Constantinos Patsakis, Eugenia Politou, Efthimios Alepis, Julio Hernandez-Castro

Regular Contribution

Evaluating the impact of filter-based feature selection in intrusion detection systems

Houssam Zouhri, Ali Idri, Ahmed Ratnani

Open Access Special Issue Paper

A systematic mapping study on security for systems of systems

Miguel Angel Olivero, Antonia Bertolino, Francisco José Dominguez-Mayo, María José Escalona, Ilaria Matteucci

Regular Contribution

Network intrusion detection and mitigation in SDN using deep learning models

Mamatha Maddu, Yamarthi Narasimha Rao

Survey

The rise of “security and privacy”: bibliometric analysis of computer privacy research

Auwal Shehu Ali, Zarul Fitri Zaaba, Manmeet Mahinderjit Singh

Special Issue Paper

A survey on run-time packers and mitigation techniques

Ehab Alkhateeb, Ali Ghorbani, Arash Habibi Lashkari

Regular Contribution

A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks

Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi

Regular Contribution

A survey and characterization of Close Access Cyberspace Operations

Antonio Villalón-Huerta, Ismael Ripoll-Ripoll, Hector Marco-Gisbert

Open Access Regular Contribution

Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems

Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel

Regular Contribution

Locating collaborative attack targets based on physical invariants toward cyber-physical systems

Peng Xun, Ziyu Yang, Haoyang Zhu, Zhu Tang

Open Access Regular Contribution

Olympus: a GDPR compliant blockchain system

Ricardo Martins Gonçalves, Miguel Mira da Silva, Paulo Rupino da Cunha

Regular Contribution

SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks

Subhash Ariyadasa, Shantha Fernando, Subha Fernando

Regular Contribution

Integrating the edge computing paradigm into the development of IoT forensic methodologies

Juan Manuel Castelo Gómez, Sergio Ruiz-Villafranca

Open Access Regular Contribution

Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication

Firas Hamila, Mohammad Hamad, Daniel Costa Salgado, Sebastian Steinhorst

Open Access Regular Contribution

De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem

Thomas Prantl, Lukas Horn, Simon Engel, Lukas Iffländer, Lukas Beierlieb, Christian Krupitzer, André Bauer, Mansi Sakarvadia, Ian Foster, Samuel Kounev

Open Access Regular Contribution

A review on digital twins for power generation and distribution

Jessica B. Heluany, Vasileios Gkioulos

Regular Contribution

Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees

Rao Faizan Ali, P. D. D. Dominic, Sadaf Hina, Sheraz Naseer

Open Access Regular Contribution

Generating ICS vulnerability playbooks with open standards

Philip Empl, Daniel Schlette, Lukas Stöger, Günther Pernul

Regular Contribution

Blockchain-based multi-organizational cyber risk management framework for collaborative environments

Habib El Amin, Lina Oueidat, Maroun Chamoun, Abed Ellatif Samhat, Antoine Feghali

Regular Contribution

Cyberattack defense mechanism using deep learning techniques in software-defined networks

Dimmiti Srinivasa Rao, Ajith Jubilson Emerson

Regular Contribution

Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition

Sepideh Niktabe, Arash Habibi Lashkari, Dilli Prasad Sharma

Regular Contribution

Intrusion detection for power grid: a review

Rupshali Dasgupta, Meghabriti Pramanik, Pabitra Mitra, Dipanwita Roy Chowdhury

Regular Contribution

Security bug reports classification using fasttext

Sultan S. Alqahtani

Regular Contribution

Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning

Fatna El Mendili, Mohammed Fattah, Nisrine Berros, Youness Filaly, Younès El Bouzekri El Idrissi

Regular Contribution

Radio frequency fingerprinting techniques for device identification: a survey

Sohail Abbas, Manar Abu Talib, Qassim Nasir, Sally Idhis, Mariam Alaboudi, Ali Mohamed

Regular Contribution

Maritime cybersecurity: protecting digital seas

Ferney Martínez, Luis Enrique Sànchez, Antonio Santos-Olmo, David G. Rosado, Eduardo Fernàndez-Medina

Open Access Regular Contribution

A modular cyber security training programme for the maritime domain

Aybars Oruc, Nabin Chowdhury, Vasileios Gkioulos

Regular Contribution

Cybersecurity training and healthcare: the AERAS approach

Fulvio Frati, Georgiana Darau, Nikos Salamanos, Pantelitsa Leonidou, Costas Iordanou, Dimitris Plachouris, Efstratios Syrmas, Evangelos Floros, George Nikitakis, George Spanoudakis, Konstantinos Kalais, Stella Tsichlaki, Ernesto Damiani, George C. Kagadis, Jihane Najar, Michael Sirivianos

Open Access Regular Contribution

A deep learning approach based on multi-view consensus for SQL injection detection

Arzu Gorgulu Kakisim

Premium Partner