Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture Sairath BhattacharjyaHossein Saiedian regular contribution 28 August 2021 Pages: 427 - 436
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures Aaron SpenceShaun Bangay Regular Contribution 28 August 2021 Pages: 437 - 453
Evaluating differentially private decision tree model over model inversion attack Cheolhee ParkDowon HongChangho Seo Regular Contribution 31 August 2021 Pages: 1 - 14
Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud Saleh A. Alghamdi regular contribution 09 September 2021 Pages: 469 - 488
Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain Amal GhorbelMahmoud GhorbelMohamed Jmaiel Regular contribution 13 September 2021 Pages: 489 - 508
A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces Lu ZhangArie TaalPaola Grosso regular contribution Open access 14 September 2021 Pages: 509 - 525
Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology Jaya SinghAyush SinhaOm Prakash Vyas Regular Contribution 21 September 2021 Pages: 527 - 546
A content-based deep intrusion detection system Mahdi SoltaniMahdi Jafari SiavoshaniAmir Hossein Jahangir regular contribution 23 September 2021 Pages: 547 - 562
Narrow privacy and desynchronization in Vaudenay’s RFID model Ferucio Laurenţiu Ţiplea Regular Contribution 05 October 2021 Pages: 563 - 575
Pragmatic authenticated key agreement for IEEE Std 802.15.6 Haibat KhanBenjamin DowlingKeith M. Martin regular contribution Open access 27 October 2021 Pages: 577 - 595
Data space randomization for securing cyber-physical systems Bradley PotteigerFeiyang CaiXenofon Koutsoukos regular contribution 06 November 2021 Pages: 597 - 610
Anomalous behavior detection-based approach for authenticating smart home system users Noureddine AmraouiBelhassen Zouari Regular contribution 20 November 2021 Pages: 611 - 636
Maintaining the level of operational effectiveness of a CSOC under adverse conditions Ankit ShahRajesh GanesanHasan Cam regular contribution 22 November 2021 Pages: 637 - 651
Tracking adoption of revocation and cryptographic features in X.509 certificates Maryam ZulfiqarMuhammad Umar JanjuaJack W. Stokes regular contribution 24 November 2021 Pages: 653 - 668
Gossamer: weaknesses and performance P. D’ArcoR. De PriscoR. Zaccagnino regular contribution 13 January 2022 Pages: 669 - 687
Defeating traffic analysis via differential privacy: a case study on streaming traffic Xiaokuan ZhangJihun HammYinqian Zhang regular contribution 30 January 2022 Pages: 689 - 706