Error reduction of SRAM-based physically unclonable function for chip authentication Moon-Seok KimSungho KimYang-Kyu Choi SURVEY 20 February 2023 Pages: 1087 - 1098
Real-time detection of deception attacks in cyber-physical systems Feiyang CaiXenofon Koutsoukos Special Issue Paper 29 March 2023 Pages: 1099 - 1114
SFCGDroid: android malware detection based on sensitive function call graph Sibo ShiShengwei TianGuanxin Chen Regular Contribution 01 May 2023 Pages: 1115 - 1124
A systematic literature review for network intrusion detection system (IDS) Oluwadamilare Harazeem AbdulganiyuTaha Ait TchakouchtYakub Kayode Saheed Regular Contribution 27 March 2023 Pages: 1125 - 1162
A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT Reza Mohammadi Regular Contribution 25 March 2023 Pages: 1163 - 1175
A novel hybrid hunger games algorithm for intrusion detection systems based on nonlinear regression modeling Shahriar MohammadiMehdi Babagoli Regular Contribution 11 April 2023 Pages: 1177 - 1195
Protection of centralized SDN control plane from high-rate Packet-In messages Suhail AhmadAjaz Hussain Mir Regular Contribution 11 April 2023 Pages: 1197 - 1206
Malicious website identification using design attribute learning Or NaimDoron CohenIrad Ben-Gal Regular Contribution 24 March 2023 Pages: 1207 - 1217
A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems Wenjuan LiYu WangJin Li Regular Contribution 06 April 2023 Pages: 1219 - 1230
Analyzing and comparing the security of self-sovereign identity management systems through threat modeling Andreas GrünerAlexander MühleChristoph Meinel Regular Contribution Open access 08 April 2023 Pages: 1231 - 1248
An interpretability security framework for intelligent decision support systems based on saliency map Denghui ZhangZhaoquan GuMuhammad Shafiq Regular Contribution 10 April 2023 Pages: 1249 - 1260
Secure access privilege delegation using attribute-based encryption Suryakanta PandaSamrat MondalWilly Susilo Regular Contribution 06 April 2023 Pages: 1261 - 1276
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes Sara BaradaranMahdi HeidariMaryam Mouzarani Regular Contribution 07 May 2023 Pages: 1277 - 1290
Recommendation of secure group communication schemes using multi-objective optimization Thomas PrantlAndré BauerSamuel Kounev Regular Contribution Open access 25 May 2023 Pages: 1291 - 1332
AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition Alexandros ZacharisConstantinos Patsakis Regular Contribution Open access 19 April 2023 Pages: 1333 - 1354
cFEM: a cluster based feature extraction method for network intrusion detection Md. Mumtahin Habib Ullah MazumderMd. Eusha KadirMuhammad Mahbub Alam Regular contribution 05 May 2023 Pages: 1355 - 1369
A defensive framework for deepfake detection under adversarial settings using temporal and spatial features S. AshaP. VinodVarun G. Menon Regular contribution 03 May 2023 Pages: 1371 - 1382
Correction: Real-time detection of deception attacks in cyber-physical systems Feiyang CaiXenofon Koutsoukos Correction 19 April 2023 Pages: 1383 - 1383
A method for insider threat assessment by modeling the internal employee interactions Hamed Sepehrzadeh Regular Contribution 15 April 2023 Pages: 1385 - 1393
OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.0 Cristina AlcarazJesus CumplidoAlicia Trivin̄o Special Issue Paper Open access 05 May 2023 Pages: 1395 - 1421
AIHGAT: A novel method of malware detection and homology analysis using assembly instruction heterogeneous graph Runzheng WangJian GaoShuhua Huang Regular contribution 14 May 2023 Pages: 1423 - 1443
Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus Mar Gimenez-AguilarJose Maria de FuentesLorena Gonzalez-Manzano Regular Contribution Open access 12 May 2023 Pages: 1445 - 1480
An effective attack scenario construction model based on identification of attack steps and stages Taqwa Ahmed AlhajMaheyzah Md SirajTasneem Darwish Regular contribution 28 May 2023 Pages: 1481 - 1496
Analysis of OSPU security effect and data assembly verification under semi-network OS architecture Yin Sheng Zhang Regular Contribution 18 May 2023 Pages: 1497 - 1509
An autoML network traffic analyzer for cyber threat detection Alexandros PapanikolaouAggelos AlevizopoulosKonstantinos Rantos Regular Contribution 21 May 2023 Pages: 1511 - 1530