Classification of return-oriented programming gadgets: a machine learning approach Pierre-François MaillardAvisek Gupta Original Paper 19 June 2024
On improved security bounds of one block ciphers mode of operation for protection of block-oriented system storage devices Georgii FirsovAlisa Koreneva Original Paper 03 June 2024
Antimalware applied to IoT malware detection based on softcore processor endowed with authorial sandbox Igor Pinheiro Henriques de AraújoLiosvaldo Mariano Santiago de AbreuSidney Marlon Lopes de Lima Original Paper 03 June 2024
Hypericum: a post-quantum digital signature for standardization in Russia Oleg TurchenkoSergey Grebnev Original Paper 25 May 2024
Searching linear structures of permutation groups with quantum computer Mikhail PolyakovPyotr Kluycharev Original Paper 24 May 2024
Crypto-anarchy: a paradigm shift for society and the legal system Alesia Zhuk Original Paper 23 May 2024
The distance-bounding protocol based on Russian cryptographic algorithms Vladimir BelskyAnastasiia ChichaevaKirill Tsaregorodtsev Original Paper 17 May 2024
A vehicle firmware security vulnerability: an IVI exploitation Gianpiero CostantinoMarco De VincenziIlaria Matteucci Original Paper Open access 08 May 2024
Social media bot detection using Dropout-GAN Anant ShuklaMartin JurečekMark Stamp Original Paper 02 May 2024
Sniping at web applications to discover input-handling vulnerabilities Ciro BrandiGaetano PerroneSimon Pietro Romano Original Paper Open access 12 April 2024
A comparison of adversarial malware generators Pavla LouthánováMatouš KozákFabio Di Troia Original Paper Open access 06 April 2024
Creating valid adversarial examples of malware Matouš KozákMartin JurečekFabio Di Troia Original Paper Open access 18 March 2024
Some remarks on how to hash faster onto elliptic curves Dmitrii Koshelev Original Paper 18 March 2024
Use of hybrid post-quantum key exchange in internet protocols Valery Smyslov Original Paper 16 March 2024
Classification and online clustering of zero-day malware Olha JurečkováMartin JurečekRóbert Lórencz Original Paper Open access 12 February 2024
An approach for designing fast public key encryption systems using white-box cryptography techniques D. Schelkunov Original Paper 10 February 2024
“Dirclustering”: a semantic clustering approach to optimize website structure discovery during penetration testing Diego AntonelliRoberta CascellaSimon Pietro Romano Original Paper 07 February 2024
Picker Blinder: a framework for automatic injection of malicious inter-app communication Rosangela CasolareStefano FagnanoAntonella Santone Original Paper 12 January 2024 Pages: 331 - 346
Faulty use of the CIC-IDS 2017 dataset in information security research Rohit Dube Original Paper 28 December 2023 Pages: 203 - 211
Partial key exposure attack on RSA using some private key blocks Santosh Kumar RavvaK. L. N. C. PrakashS. R. M. Krishna Original Paper 08 November 2023 Pages: 185 - 193
Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes R. Santosh KumarK. L. N. C. PrakashS. R. M. Krishna Original Paper 20 October 2023 Pages: 195 - 202
A natural language processing approach to Malware classification Ritik MehtaOlha JurečkováMark Stamp Original Paper 20 October 2023 Pages: 173 - 184
Using deep graph learning to improve dynamic analysis-based malware detection in PE files Minh Tu NguyenViet Hung NguyenNathan Shone Original Paper 20 October 2023 Pages: 153 - 172
Protection against adversarial attacks with randomization of recognition algorithm Grigory MarshalkoSvetlana Koreshkova Original Paper 05 October 2023 Pages: 127 - 133
Provably minimum data complexity integral distinguisher based on conventional division property Akram KhalesiZahra Ahmadian Original Paper 28 September 2023 Pages: 113 - 125
Explainable Ransomware Detection with Deep Learning Techniques Giovanni CiaramellaGiacomo IadarolaAntonella Santone Invited Paper 27 September 2023 Pages: 317 - 330
Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights Omid KargarnovinAmir Mahdi SadeghzadehRasool Jalili Original Paper 27 September 2023 Pages: 95 - 111
Use of cryptography in malware obfuscation Hassan Jameel AsgharBenjamin Zi Hao ZhaoDaniel Coscia Original Paper 25 September 2023 Pages: 135 - 152
Machine learning methods for speech emotion recognition on telecommunication systems Alexey OsipovEkaterina PleshakovaSergey Gataullin Original Paper 16 September 2023
Machine learning methods for the industrial robotic systems security Dmitry TsapinKirill PitelinskiySergey Gataullin Original Paper 02 September 2023
Android ransomware detection using a novel hamming distance based feature selection Hashida Haidros Rahima ManzilS. Manohar Naik Original Paper 22 August 2023 Pages: 71 - 93
Comparison of the effectiveness of cepstral coefficients for Russian speech synthesis detection Dmitry EfanovPavel AleksandrovIlia Mironov Original Paper 13 August 2023
Correction to: Parametric study of hand dorsal vein biometric recognition vulnerability to spoofing attacks Pavel V. MizinovNatalia S. KonnovaEkaterina S. Pleshakova Correction 12 August 2023
Correction to: Potential cyber threats of adversarial attacks on autonomous driving models Eldar Boltachev Correction 10 August 2023 Pages: 315 - 315
Networking and cryptography library with a non-repudiation flavor for blockchain Mohamed RasslanMahmoud M. NasreldinHeba Aslan Original Paper Open access 05 August 2023 Pages: 1 - 14
Editorial special issue: Russian research in cybersecurity Vladimir FomichevAlisa Koreneva Editorial 02 August 2023 Pages: 339 - 340
A comparison of graph neural networks for malware classification Vrinda MalhotraKaterina PotikaMark Stamp Original Paper 26 July 2023 Pages: 53 - 69
Demonstration of new attacks on three healthcare network protocols in a lab environment Guillaume DupontDaniel dos SantosSandro Etalle Original Paper Open access 24 July 2023 Pages: 301 - 314
Exploiting number theory for dynamic software watermarking Mila Dalla PredaMichele Ianni Original Paper Open access 20 July 2023 Pages: 41 - 51
Parametric study of hand dorsal vein biometric recognition vulnerability to spoofing attacks Pavel V. MizinovNatalia S. KonnovaEkaterina S. Pleshakova Original Paper 20 July 2023
Retraction Note: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry Liqin Zhang Retraction Note 12 July 2023 Pages: 639 - 639
Persistent MobileApp-in-the-Middle (MAitM) attack Christian CatalanoFranco Tommasi Original Paper Open access 30 June 2023 Pages: 27 - 39
Full round impossible differentials for Feistel ciphers D. ZakharovM. Pudovkina Original Paper 24 June 2023 Pages: 295 - 300
Retraction Note: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM Mundlamuri Venkata RaoDivya MidhunchakkaravarthySujatha Dandu Retraction Note 20 June 2023 Pages: 637 - 637
Potential cyber threats of adversarial attacks on autonomous driving models Eldar Boltachev Original Paper 05 June 2023
DHCP DoS and starvation attacks on SDN controllers and their mitigation Hafiz Usama IshtiaqAreeb Ahmed BhuttaAdnan Noor Mian Original Paper 30 May 2023 Pages: 15 - 25
Retraction Note: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation Feilu HangLinjiang XieHanruo Li Retraction Note 29 May 2023 Pages: 635 - 635
iOS mobile malware analysis: a state-of-the-art Madihah Mohd SaudiMuhammad Afif HusainiamerMohd Yamani Idna Idris Original Paper 18 May 2023
Historical notes on Russian cryptography Anna EpishkinaSergey ZapechnikovAnna Belozubova Original Paper 15 May 2023 Pages: 277 - 293