How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates Qin AnWilson Cheong Hin HongKimberly Kolletar-Zhu Regular Contribution 24 November 2022 Pages: 305 - 317
Adversarial security mitigations of mmWave beamforming prediction models using defensive distillation and adversarial retraining Murat KuzluFerhat Ozgur CatakOzgur Guler Regular contribution 29 November 2022 Pages: 319 - 332
Design and analysis of DDoS mitigating network architecture SwatiSangita RoyJimson Mathew Regular contribution 30 November 2022 Pages: 333 - 345
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study Efstratios ChatzoglouVasileios KouliaridisGeorgios Kambourakis Regular contribution Open access 02 December 2022 Pages: 347 - 365
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN Reza MohammadiChhagan LalMauro Conti Regular Contribution 03 December 2022 Pages: 367 - 379
Bu-Dash: a universal and dynamic graphical password scheme (extended version) Panagiotis AndriotisMyles KirbyAtsuhiro Takasu Regular contribution Open access 04 December 2022 Pages: 381 - 401
A simple and secure user authentication scheme using Map Street View with usability analysis based on ISO/IEC 25022 Kailash Chandra MishraSubrata Dutta Regular contribution 05 December 2022 Pages: 403 - 415
Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device Kapilan Kulayan Arumugam GandhiChamundeswari Arumugam Regular Contribution 05 December 2022 Pages: 417 - 431
An intrusion detection approach based on incremental long short-term memory Hanxun ZhouLongyu KangYong Feng Regular Contribution 06 December 2022 Pages: 433 - 446
SealFSv2: combining storage-based and ratcheting for tamper-evident logging Gorka Guardiola-MúzquizEnrique Soriano-Salvador Regular contribution Open access 06 December 2022 Pages: 447 - 466
Distributed access control for information-centric networking architectures using verifiable credentials Bander AlzahraniNikos FotiouKhalid Alsubhi Regular contribution 07 December 2022 Pages: 467 - 478
Authentication-enabled attribute-based access control for smart homes Melike Burakgazi BilgenOsman AbulKemal Bicakci Regular Contribution 16 December 2022 Pages: 479 - 495
Defense against membership inference attack in graph neural networks through graph perturbation Kai WangJinxia WuYing Hong Regular contribution 16 December 2022 Pages: 497 - 509
Trends in publishing blockchain surveys: a bibliometric perspective Hira AhmadMuhammad Ahtazaz AhsanAdnan Noor Mian Regular contribution 20 December 2022 Pages: 511 - 523
Evaluation of neural networks defenses and attacks using NDCG and reciprocal rank metrics Haya BramaLihi DeryTal Grinshpoun Regular Contribution 21 December 2022 Pages: 525 - 540