Ausgabe 6/2022
Inhalt (13 Artikel)
A decentralized honeypot for IoT Protocols based on Android devices
Irini Lygerou, Shreyas Srinivasa, Emmanouil Vasilomanolakis, George Stergiopoulos, Dimitris Gritzalis
CT-GCN: a phishing identification model for blockchain cryptocurrency transactions
Bingxue Fu, Xing Yu, Tao Feng
A systematic overview on methods to protect sensitive data provided for various analyses
Matthias Templ, Murat Sariyar
Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications
Abdenour Kifouche, Mohamed Salah Azzaz, Redha Hamouche, Remy Kocik
An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM
C. Prajisha, A. R. Vasudevan
Are chrome extensions compliant with the spirit of least privilege?
Pablo Picazo-Sanchez, Lara Ortiz-Martin, Gerardo Schneider, Andrei Sabelfeld
DFTMicroagg: a dual-level anonymization algorithm for smart grid data
Kayode S. Adewole, Vicenç Torra
From scattered data to actionable knowledge: flexible cyber security reporting in the military domain
Florian Skopik, Arndt Bonitz, Volker Grantz, Günter Göhler
PSO + FL = PAASO: particle swarm optimization + federated learning = privacy-aware agent swarm optimization
Vicenç Torra, Edgar Galván, Guillermo Navarro-Arribas
Security analysis and improvement of a privacy-preserving authentication scheme in VANET
Xiaodong Yang, Wenjia Wang, Caifen Wang
LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment
Mohammad Abdussami, Ruhul Amin, Satyanarayana Vollala
A security protocol for D2D communications in 5G networks using elliptic curve cryptography
R. Kishore, I. Ioannou, C. Christophorou, N. Prabagarane, V. Vassiliou, S. Vignesh, H. Vinayak, S. Venkatesh, A. Pitsillides
A study of machine learning-based models for detection, control, and mitigation of cyberbullying in online social media
Raju Kumar, Aruna Bhat