Skip to main content
Top

International Journal of Information Security

Issue 5/2023

Content (25 Articles)

SURVEY

Error reduction of SRAM-based physically unclonable function for chip authentication

Moon-Seok Kim, Sungho Kim, Sang-Kyung Yoo, Bong-Soo Lee, Ji-Man Yu, Il-Woong Tcho, Yang-Kyu Choi

Open Access Special Issue Paper

Real-time detection of deception attacks in cyber-physical systems

Feiyang Cai, Xenofon Koutsoukos

Regular Contribution

SFCGDroid: android malware detection based on sensitive function call graph

Sibo Shi, Shengwei Tian, Bo Wang, Tiejun Zhou, Guanxin Chen

Regular Contribution

A systematic literature review for network intrusion detection system (IDS)

Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed

Regular Contribution

Protection of centralized SDN control plane from high-rate Packet-In messages

Suhail Ahmad, Ajaz Hussain Mir

Regular Contribution

Malicious website identification using design attribute learning

Or Naim, Doron Cohen, Irad Ben-Gal

Open Access Regular Contribution

Analyzing and comparing the security of self-sovereign identity management systems through threat modeling

Andreas Grüner, Alexander Mühle, Niko Lockenvitz, Christoph Meinel

Regular Contribution

An interpretability security framework for intelligent decision support systems based on saliency map

Denghui Zhang, Zhaoquan Gu, Lijing Ren, Muhammad Shafiq

Regular Contribution

Secure access privilege delegation using attribute-based encryption

Suryakanta Panda, Samrat Mondal, Ashok Kumar Das, Willy Susilo

Regular Contribution

A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes

Sara Baradaran, Mahdi Heidari, Ali Kamali, Maryam Mouzarani

Open Access Regular Contribution

Recommendation of secure group communication schemes using multi-objective optimization

Thomas Prantl, André Bauer, Lukas Iffländer, Christian Krupitzer, Samuel Kounev

Open Access Regular Contribution

AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition

Alexandros Zacharis, Constantinos Patsakis

Regular contribution

cFEM: a cluster based feature extraction method for network intrusion detection

Md. Mumtahin Habib Ullah Mazumder, Md. Eusha Kadir, Sadia Sharmin, Md. Shariful Islam, Muhammad Mahbub Alam

Open Access Special Issue Paper

OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.0

Cristina Alcaraz, Jesus Cumplido, Alicia Trivin̄o

Open Access Regular Contribution

Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus

Mar Gimenez-Aguilar, Jose Maria de Fuentes, Lorena Gonzalez-Manzano

Regular contribution

An effective attack scenario construction model based on identification of attack steps and stages

Taqwa Ahmed Alhaj, Maheyzah Md Siraj, Anazida Zainal, Inshirah Idris, Anjum Nazir, Fatin Elhaj, Tasneem Darwish

Regular Contribution

An autoML network traffic analyzer for cyber threat detection

Alexandros Papanikolaou, Aggelos Alevizopoulos, Christos Ilioudis, Konstantinos Demertzis, Konstantinos Rantos

Premium Partner