Issue 4/2023
Content (18 Articles)
P2ADF: a privacy-preserving attack detection framework in fog-IoT environment
Jasleen Kaur, Alka Agrawal, Raees Ahmad Khan
Privacy and safety improvement of VANET data via a safety-related privacy scheme
Ruqayah Al-ani, Thar Baker, Bo Zhou, Qi Shi
Efficient searchable symmetric encryption supporting range queries
Eirini Molla, Panagiotis Rizomiliotis, Stefanos Gritzalis
A novel two-level secure access control approach for blockchain platform in healthcare
Shweta Mittal, Mohona Ghosh
Anonymity and everlasting privacy in electronic voting
Panagiotis Grontas, Aris Pagourtzis
Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation
Francisco T. Chimuco, João B. F. Sequeiros, Carolina Galvão Lopes, Tiago M. C. Simões, Mário M. Freire, Pedro R. M. Inácio
Blockchain and smart contract architecture for notaries services under civil law: a Brazilian experience
Leonardo Dias Menezes, Luciano Vieira de Araújo, Marislei Nishijima
Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning
Pankaj Pandey, Nishchol Mishra
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning
Brandon Bowen, Anitha Chennamaneni, Ana Goulart, Daisy Lin
AAIA: an efficient aggregation scheme against inverting attack for federated learning
Zhen Yang, Shisong Yang, Yunbo Huang, José-Fernán Martínez, Lourdes López, Yuwen Chen
Causal effect analysis-based intrusion detection system for IoT applications
Srividya Bhaskara, Santosh Singh Rathore
From zero-shot machine learning to zero-day attack detection
Mohanad Sarhan, Siamak Layeghy, Marcus Gallagher, Marius Portmann
LDES: detector design for version number attack detection using linear temporal logic based on discrete event system
Abhay Deep Seth, Santosh Biswas, Amit Kumar Dhar
TENET: a new hybrid network architecture for adversarial defense
Omer Faruk Tuna, Ferhat Ozgur Catak, M. Taner Eskil
Cyber range design framework for cyber security education and training
M. N. Katsantonis, A. Manikas, I. Mavridis, D. Gritzalis
Business-layer client-side racer: dynamic security testing of the web application against client-side race condition in the business layer
Mitra Alidoosti, Alireza Nowroozi, Ahmad Nickabadi
A typology of secure multicast communication over 5 G/6 G networks
Nizamud Din, Abdul Waheed, Shamsher Ullah, Noor Ul Amin, Gautam Srivastava, Farhan Ullah, Jerry Chun-Wei Lin
Securing MQTT protocol for IoT environment using IDS based on ensemble learning
Hayette Zeghida, Mehdi Boulaiche, Ramdane Chikh