A personalized learning theory-based cyber-security training exercise Nabin ChowdhuryVasileios Gkioulos Regular Contribution Open access 02 June 2023 Pages: 1531 - 1546
BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks Ngoc T. LuongDoan Hoang Regular contribution 04 June 2023 Pages: 1547 - 1566
A technical characterization of APTs by leveraging public resources Lorena González-ManzanoJosé M. de FuentesCristina Ramos Regular Contribution Open access 15 June 2023 Pages: 1567 - 1584
Trust modeling in a distributed collaborative environment: application to a collaborative healthcare system Rabie BarhounMaryam Ed-daibouni Regular contribution 06 June 2023 Pages: 1585 - 1604
Fast but approximate homomorphic k-means based on masking technique Lorenzo Rovida Regular contribution Open access 17 June 2023 Pages: 1605 - 1619
A quantitative framework for security assurance evaluation and selection of cloud services: a case study Ankur ShuklaBasel KattMuhammad Mudassar Yamin Regular contribution Open access 19 June 2023 Pages: 1621 - 1650
A systematic review of privacy techniques in recommendation systems Taiwo Blessing OgunseyiCossi Blaise AvoussoukpoYiqiang Jiang Survey 05 June 2023 Pages: 1651 - 1664
Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques Christian LópezJesús SolanoMartín Ochoa Regular contribution 11 June 2023 Pages: 1665 - 1685
Malware classification approaches utilizing binary and text encoding of permissions Mo’ath ZyoutRaed ShatnawiHassan Najadat Regular Contribution 21 June 2023 Pages: 1687 - 1712
Yet another cybersecurity risk assessment framework Mathias EkstedtZeeshan AfzalRobert Lagerström Regular Contribution Open access 14 July 2023 Pages: 1713 - 1729
Accessible password strength assessment method for visually challenged users K. S. KuppusamyG. Balayogi Regular Contribution 14 June 2023 Pages: 1731 - 1741
Evading malware classifiers using RL agent with action-mask Saurabh PandeyNitesh KumarSandeep Kumar Shukla Regular Contribution 07 July 2023 Pages: 1743 - 1763
Adaptive hyperparameter optimization for black-box adversarial attack Zhenyu GuanLixin ZhangSong Bian Regular Contribution 05 July 2023 Pages: 1765 - 1779
Effective network intrusion detection using stacking-based ensemble approach Muhammad AliMansoor-ul- HaqueCarsten Maple Regular Contribution Open access 17 July 2023 Pages: 1781 - 1798
A survey of anomaly detection methods for power grids Srinidhi MadabhushiRinku Dewri Regular Contribution 08 July 2023 Pages: 1799 - 1832
Privacy-preserving continuous authentication using behavioral biometrics Ahmed Fraz BaigSigurd EskelandBian Yang Regular Contribution Open access 13 July 2023 Pages: 1833 - 1847
A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on android Pattern Unlock Nasir IbrahimHarin Sellahewa Regular Contribution 07 July 2023 Pages: 1849 - 1863
DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour Kristijan ŽižaPredrag TadićPavle Vuletić Regular Contribution 08 July 2023 Pages: 1865 - 1880
RADS: a real-time anomaly detection model for software-defined networks using machine learning M. SnehaA. Keerthan KumarG. Shobha Regular Contribution 07 July 2023 Pages: 1881 - 1891
On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs Christos SmiliotopoulosGeorgios KambourakisKonstantia Barbatsalou Regular Contribution Open access 19 July 2023 Pages: 1893 - 1919
Two-model active learning approach for inappropriate information classification in social networks Dmitry LevshunOlga TushkanovaAndrey Chechulin Regular Contribution 14 July 2023 Pages: 1921 - 1936
Federated learning-based intrusion detection system for Internet of Things Najet Hamdi Regular Contribution 14 July 2023 Pages: 1937 - 1948
Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review Sarabjeet KaurAmanpreet Kaur SandhuAbhinav Bhandari Regular Contribution 07 August 2023 Pages: 1949 - 1988
CADS-ML/DL: efficient cloud-based multi-attack detection system Saida FarhatManel AbdelkaderFaouzi Zarai Regular Contribution 13 July 2023 Pages: 1989 - 2013
Attribute disclosure risk for k-anonymity: the case of numerical data Vicenç TorraGuillermo Navarro-Arribas Regular Contribution Open access 25 July 2023 Pages: 2015 - 2024