Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches Gulab SahSubhasish BanerjeeSweety Singh Regular contribution 06 October 2022 Pages: 1 - 27
Gridchain: an investigation of privacy for the future local distribution grid Pablo Picazo-SanchezMagnus Almgren Regular contribution Open access 11 October 2022 Pages: 29 - 46
A deep learner model for multi-language webshell detection Abdelhakim HannousseMohamed Cherif Nait-HamoudSalima Yahiouche Regular contribution 18 October 2022 Pages: 47 - 61
Modeling reporting delays in cyber incidents: an industry-level comparison Seema SangariEric DallalMichael Whitman Regular contribution 21 October 2022 Pages: 63 - 76
Early web application attack detection using network traffic analysis Branislav RajićŽarko StanisavljevićPavle Vuletić Regular contribution 26 October 2022 Pages: 77 - 91
Restricting data-leakage using fine-grained access control on OSN objects Nemi Chandra RathoreSomanath Tripathy regular contribution 01 November 2022 Pages: 93 - 106
Malicious code detection in android: the role of sequence characteristics and disassembling methods Pinar G. BalikciogluMelih SirlanciCengiz Acarturk regular contribution Open access 06 November 2022 Pages: 107 - 118
A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network Amit SharmaBrij B. GuptaV. K. Saraswat Regular contribution 10 November 2022 Pages: 119 - 135
Mobile botnet detection: a comprehensive survey Sajad HamzenejadiMahdieh GhazviniSeyedamiryousef Hosseini Survey 15 November 2022 Pages: 137 - 175
A review on fake news detection 3T’s: typology, time of detection, taxonomies Shubhangi RastogiDivya Bansal Survey 15 November 2022 Pages: 177 - 212
PatrIoT: practical and agile threat research for IoT Emre SürenFredrik HeidingRobert Lagerström Regular contribution Open access 18 November 2022 Pages: 213 - 233
Deep SARSA-based reinforcement learning approach for anomaly network intrusion detection system Safa MohamedRidha Ejbali Regular contribution 19 November 2022 Pages: 235 - 247
Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth Ahmed AmroVasileios Gkioulos Regular contribution Open access 23 November 2022 Pages: 249 - 288
User identification using deep learning and human activity mobile sensor data Luay AlawnehMohammad Al-ZinatiMahmoud Al-Ayyoub Regular contribution 22 November 2022 Pages: 289 - 301
Correction to: A decentralized honeypot for IoT Protocols based on Android devices Irini LygerouShreyas SrinivasaDimitris Gritzalis Correction 29 October 2022 Pages: 303 - 303