Ausgabe 2/2024
Inhalt (40 Artikel)
Cashing out crypto: state of practice in ransom payments
Constantinos Patsakis, Eugenia Politou, Efthimios Alepis, Julio Hernandez-Castro
Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures
Ahlem Hamdi, Lamia Fourati, Samiha Ayed
Evaluating the impact of filter-based feature selection in intrusion detection systems
Houssam Zouhri, Ali Idri, Ahmed Ratnani
A systematic mapping study on security for systems of systems
Miguel Angel Olivero, Antonia Bertolino, Francisco José Dominguez-Mayo, María José Escalona, Ilaria Matteucci
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy
Richa Goenka, Meenu Chawla, Namita Tiwari
Network intrusion detection and mitigation in SDN using deep learning models
Mamatha Maddu, Yamarthi Narasimha Rao
The rise of “security and privacy”: bibliometric analysis of computer privacy research
Auwal Shehu Ali, Zarul Fitri Zaaba, Manmeet Mahinderjit Singh
A survey on run-time packers and mitigation techniques
Ehab Alkhateeb, Ali Ghorbani, Arash Habibi Lashkari
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks
Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi
An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function
Gaurav Tyagi, Rahul Kumar
A survey and characterization of Close Access Cyberspace Operations
Antonio Villalón-Huerta, Ismael Ripoll-Ripoll, Hector Marco-Gisbert
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems
Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel
Locating collaborative attack targets based on physical invariants toward cyber-physical systems
Peng Xun, Ziyu Yang, Haoyang Zhu, Zhu Tang
Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks
Muralidhara Rao Patruni, Abdul Gaffar Humayun
Olympus: a GDPR compliant blockchain system
Ricardo Martins Gonçalves, Miguel Mira da Silva, Paulo Rupino da Cunha
An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152
Jalaiah Saikam, Koteswararao Ch
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks
Subhash Ariyadasa, Shantha Fernando, Subha Fernando
Generating adversarial examples with collaborative generative models
Lei Xu, Junhai Zhai
Integrating the edge computing paradigm into the development of IoT forensic methodologies
Juan Manuel Castelo Gómez, Sergio Ruiz-Villafranca
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT
Kenan Ince
Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication
Firas Hamila, Mohammad Hamad, Daniel Costa Salgado, Sebastian Steinhorst
De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem
Thomas Prantl, Lukas Horn, Simon Engel, Lukas Iffländer, Lukas Beierlieb, Christian Krupitzer, André Bauer, Mansi Sakarvadia, Ian Foster, Samuel Kounev
A review on digital twins for power generation and distribution
Jessica B. Heluany, Vasileios Gkioulos
Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees
Rao Faizan Ali, P. D. D. Dominic, Sadaf Hina, Sheraz Naseer
Generating ICS vulnerability playbooks with open standards
Philip Empl, Daniel Schlette, Lukas Stöger, Günther Pernul
Blockchain-based multi-organizational cyber risk management framework for collaborative environments
Habib El Amin, Lina Oueidat, Maroun Chamoun, Abed Ellatif Samhat, Antoine Feghali
TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment
Himanshu Nandanwar, Rahul Katarya
Cyberattack defense mechanism using deep learning techniques in software-defined networks
Dimmiti Srinivasa Rao, Ajith Jubilson Emerson
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition
Sepideh Niktabe, Arash Habibi Lashkari, Dilli Prasad Sharma
Intrusion detection for power grid: a review
Rupshali Dasgupta, Meghabriti Pramanik, Pabitra Mitra, Dipanwita Roy Chowdhury
A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems
H. Asad, S. Adhikari, Ilir Gashi
Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning
Fatna El Mendili, Mohammed Fattah, Nisrine Berros, Youness Filaly, Younès El Bouzekri El Idrissi
Radio frequency fingerprinting techniques for device identification: a survey
Sohail Abbas, Manar Abu Talib, Qassim Nasir, Sally Idhis, Mariam Alaboudi, Ali Mohamed
Maritime cybersecurity: protecting digital seas
Ferney Martínez, Luis Enrique Sànchez, Antonio Santos-Olmo, David G. Rosado, Eduardo Fernàndez-Medina
Information security and privacy challenges of cloud computing for government adoption: a systematic review
Ndukwe Ukeje, Jairo Gutierrez, Krassie Petrova
A modular cyber security training programme for the maritime domain
Aybars Oruc, Nabin Chowdhury, Vasileios Gkioulos
Vulnerability discovery based on source code patch commit mining: a systematic literature review
Fei Zuo, Junghwan Rhee
Cybersecurity training and healthcare: the AERAS approach
Fulvio Frati, Georgiana Darau, Nikos Salamanos, Pantelitsa Leonidou, Costas Iordanou, Dimitris Plachouris, Efstratios Syrmas, Evangelos Floros, George Nikitakis, George Spanoudakis, Konstantinos Kalais, Stella Tsichlaki, Ernesto Damiani, George C. Kagadis, Jihane Najar, Michael Sirivianos
A deep learning approach based on multi-view consensus for SQL injection detection
Arzu Gorgulu Kakisim