Cashing out crypto: state of practice in ransom payments Constantinos PatsakisEugenia PolitouJulio Hernandez-Castro Regular Contribution Open access 13 October 2023 Pages: 699 - 712
Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures Ahlem HamdiLamia FouratiSamiha Ayed Special Issue Paper 14 October 2023 Pages: 713 - 757
Evaluating the impact of filter-based feature selection in intrusion detection systems Houssam ZouhriAli IdriAhmed Ratnani Regular Contribution 17 October 2023 Pages: 759 - 785
A systematic mapping study on security for systems of systems Miguel Angel OliveroAntonia BertolinoIlaria Matteucci Special Issue Paper Open access 18 October 2023 Pages: 787 - 817
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy Richa GoenkaMeenu ChawlaNamita Tiwari Regular Contribution 19 October 2023 Pages: 819 - 848
Network intrusion detection and mitigation in SDN using deep learning models Mamatha MadduYamarthi Narasimha Rao Regular Contribution 29 October 2023 Pages: 849 - 862
The rise of “security and privacy”: bibliometric analysis of computer privacy research Auwal Shehu AliZarul Fitri ZaabaManmeet Mahinderjit Singh Survey 31 October 2023 Pages: 863 - 885
A survey on run-time packers and mitigation techniques Ehab AlkhateebAli GhorbaniArash Habibi Lashkari Special Issue Paper 01 November 2023 Pages: 887 - 913
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks Pradeepkumar BhaleSantosh BiswasSukumar Nandi Regular Contribution 02 November 2023 Pages: 915 - 934
An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function Gaurav TyagiRahul Kumar Regular Contribution 02 November 2023 Pages: 935 - 962
A survey and characterization of Close Access Cyberspace Operations Antonio Villalón-HuertaIsmael Ripoll-RipollHector Marco-Gisbert Regular Contribution 03 November 2023 Pages: 963 - 980
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems Ehsan ToreiniMaryam MehrnezhadAad van Moorsel Regular Contribution Open access 07 November 2023 Pages: 981 - 997
Locating collaborative attack targets based on physical invariants toward cyber-physical systems Peng XunZiyu YangZhu Tang Regular Contribution 08 November 2023 Pages: 999 - 1017
Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks Muralidhara Rao PatruniAbdul Gaffar Humayun Publisher Correction 11 November 2023 Pages: 1019 - 1019
Olympus: a GDPR compliant blockchain system Ricardo Martins GonçalvesMiguel Mira da SilvaPaulo Rupino da Cunha Regular Contribution Open access 17 November 2023 Pages: 1021 - 1036
An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152 Jalaiah SaikamKoteswararao Ch Regular Contribution 21 November 2023 Pages: 1037 - 1054
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks Subhash AriyadasaShantha FernandoSubha Fernando Regular Contribution 21 November 2023 Pages: 1055 - 1076
Generating adversarial examples with collaborative generative models Lei XuJunhai Zhai Regular Contribution 21 November 2023 Pages: 1077 - 1091
Integrating the edge computing paradigm into the development of IoT forensic methodologies Juan Manuel Castelo GómezSergio Ruiz-Villafranca Regular Contribution 22 November 2023 Pages: 1093 - 1116
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT Kenan Ince Regular Contribution 22 November 2023 Pages: 1117 - 1130
Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication Firas HamilaMohammad HamadSebastian Steinhorst Regular Contribution Open access 25 November 2023 Pages: 1131 - 1148
De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem Thomas PrantlLukas HornSamuel Kounev Regular Contribution Open access 27 November 2023 Pages: 1149 - 1169
A review on digital twins for power generation and distribution Jessica B. HeluanyVasileios Gkioulos Regular Contribution Open access 01 December 2023 Pages: 1171 - 1195
Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees Rao Faizan AliP. D. D. DominicSheraz Naseer Regular Contribution 08 December 2023 Pages: 1197 - 1213
Generating ICS vulnerability playbooks with open standards Philip EmplDaniel SchletteGünther Pernul Regular Contribution Open access 11 December 2023 Pages: 1215 - 1230
Blockchain-based multi-organizational cyber risk management framework for collaborative environments Habib El AminLina OueidatAntoine Feghali Regular Contribution 13 December 2023 Pages: 1231 - 1249
TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment Himanshu NandanwarRahul Katarya Regular Contriburtion 14 December 2023 Pages: 1251 - 1277
Cyberattack defense mechanism using deep learning techniques in software-defined networks Dimmiti Srinivasa RaoAjith Jubilson Emerson Regular Contribution 15 December 2023 Pages: 1279 - 1291
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition Sepideh NiktabeArash Habibi LashkariDilli Prasad Sharma Regular Contribution 15 December 2023 Pages: 1293 - 1316
Intrusion detection for power grid: a review Rupshali DasguptaMeghabriti PramanikDipanwita Roy Chowdhury Regular Contribution 20 December 2023 Pages: 1317 - 1329
A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems H. AsadS. AdhikariIlir Gashi Regular Contribution Open access 20 December 2023 Pages: 1331 - 1346
Security bug reports classification using fasttext Sultan S. Alqahtani Regular Contribution 22 December 2023 Pages: 1347 - 1358
Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning Fatna El MendiliMohammed FattahYounès El Bouzekri El Idrissi Regular Contribution 27 December 2023 Pages: 1359 - 1388
Radio frequency fingerprinting techniques for device identification: a survey Sohail AbbasManar Abu TalibAli Mohamed Regular Contribution 28 December 2023 Pages: 1389 - 1427
Maritime cybersecurity: protecting digital seas Ferney MartínezLuis Enrique SànchezEduardo Fernàndez-Medina Regular Contribution 02 January 2024 Pages: 1429 - 1457
Information security and privacy challenges of cloud computing for government adoption: a systematic review Ndukwe UkejeJairo GutierrezKrassie Petrova Regular Contribition 03 January 2024 Pages: 1459 - 1475
A modular cyber security training programme for the maritime domain Aybars OrucNabin ChowdhuryVasileios Gkioulos Regular Contribution Open access 03 January 2024 Pages: 1477 - 1512
Vulnerability discovery based on source code patch commit mining: a systematic literature review Fei ZuoJunghwan Rhee Regular Contribution 06 January 2024 Pages: 1513 - 1526
Cybersecurity training and healthcare: the AERAS approach Fulvio FratiGeorgiana DarauMichael Sirivianos Regular Contribution 06 January 2024 Pages: 1527 - 1539
A deep learning approach based on multi-view consensus for SQL injection detection Arzu Gorgulu Kakisim Regular Contribution Open access 09 January 2024 Pages: 1541 - 1556