ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN Abdelmadjid BenarfaMuhammad HassanMauro Conti Regular Contribution 08 May 2020 Pages: 269 - 285
Cyber security in New Space M. ManulisC. P. BridgesA. Davis Regular contribution Open access 12 May 2020 Pages: 287 - 311
A wrinkle in time: a case study in DNS poisoning Harel BergerAmit Z. DvirMoti Geva regular contribution 15 May 2020 Pages: 313 - 329
Evaluating visualization approaches to detect abnormal activities in network traffic data Soo-Yeon JiBong-Keun JeongDong Hyun Jeong Regular Contribution 22 May 2020 Pages: 331 - 345
Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts Georgios SpathoulasGeorgios TheodoridisGeorgios-Paraskevas Damiris regular contribution 13 June 2020 Pages: 347 - 370
MalFamAware: automatic family identification and malware classification through online clustering Gregorio PitolliGiuseppe LaurenzaRoberto Baldoni regular contribution 16 June 2020 Pages: 371 - 386
A novel scalable intrusion detection system based on deep learning Soosan Naderi MighanMohsen Kahani regular contribution 15 June 2020 Pages: 387 - 403
Anonymity in traceable cloud data broadcast system with simultaneous individual messaging Mriganka Mandal Regular Contribution 16 June 2020 Pages: 405 - 430
Efficient attribute-based encryption with repeated attributes optimization Fawad KhanHui LiTahreem Yaqoob Regular contribution 24 June 2020 Pages: 431 - 444
Anti-BlUFf: towards counterfeit mitigation in IC supply chains using blockchain and PUF Leonardo AnielloBasel HalakAdrian Wilczynski Regular contribution Open access 25 June 2020 Pages: 445 - 460