Ausgabe 5/2023
Inhalt (25 Artikel)
Error reduction of SRAM-based physically unclonable function for chip authentication
Moon-Seok Kim, Sungho Kim, Sang-Kyung Yoo, Bong-Soo Lee, Ji-Man Yu, Il-Woong Tcho, Yang-Kyu Choi
Real-time detection of deception attacks in cyber-physical systems
Feiyang Cai, Xenofon Koutsoukos
SFCGDroid: android malware detection based on sensitive function call graph
Sibo Shi, Shengwei Tian, Bo Wang, Tiejun Zhou, Guanxin Chen
A systematic literature review for network intrusion detection system (IDS)
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT
Reza Mohammadi
A novel hybrid hunger games algorithm for intrusion detection systems based on nonlinear regression modeling
Shahriar Mohammadi, Mehdi Babagoli
Protection of centralized SDN control plane from high-rate Packet-In messages
Suhail Ahmad, Ajaz Hussain Mir
Malicious website identification using design attribute learning
Or Naim, Doron Cohen, Irad Ben-Gal
A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems
Wenjuan Li, Yu Wang, Jin Li
Analyzing and comparing the security of self-sovereign identity management systems through threat modeling
Andreas Grüner, Alexander Mühle, Niko Lockenvitz, Christoph Meinel
An interpretability security framework for intelligent decision support systems based on saliency map
Denghui Zhang, Zhaoquan Gu, Lijing Ren, Muhammad Shafiq
Secure access privilege delegation using attribute-based encryption
Suryakanta Panda, Samrat Mondal, Ashok Kumar Das, Willy Susilo
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes
Sara Baradaran, Mahdi Heidari, Ali Kamali, Maryam Mouzarani
Recommendation of secure group communication schemes using multi-objective optimization
Thomas Prantl, André Bauer, Lukas Iffländer, Christian Krupitzer, Samuel Kounev
AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition
Alexandros Zacharis, Constantinos Patsakis
cFEM: a cluster based feature extraction method for network intrusion detection
Md. Mumtahin Habib Ullah Mazumder, Md. Eusha Kadir, Sadia Sharmin, Md. Shariful Islam, Muhammad Mahbub Alam
A defensive framework for deepfake detection under adversarial settings using temporal and spatial features
S. Asha, P. Vinod, Varun G. Menon
Correction: Real-time detection of deception attacks in cyber-physical systems
Feiyang Cai, Xenofon Koutsoukos
A method for insider threat assessment by modeling the internal employee interactions
Hamed Sepehrzadeh
OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.0
Cristina Alcaraz, Jesus Cumplido, Alicia Trivin̄o
AIHGAT: A novel method of malware detection and homology analysis using assembly instruction heterogeneous graph
Runzheng Wang, Jian Gao, Shuhua Huang
Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus
Mar Gimenez-Aguilar, Jose Maria de Fuentes, Lorena Gonzalez-Manzano
An effective attack scenario construction model based on identification of attack steps and stages
Taqwa Ahmed Alhaj, Maheyzah Md Siraj, Anazida Zainal, Inshirah Idris, Anjum Nazir, Fatin Elhaj, Tasneem Darwish
Analysis of OSPU security effect and data assembly verification under semi-network OS architecture
Yin Sheng Zhang
An autoML network traffic analyzer for cyber threat detection
Alexandros Papanikolaou, Aggelos Alevizopoulos, Christos Ilioudis, Konstantinos Demertzis, Konstantinos Rantos