Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware Shun YonamineYuzo TaenakaDaisuke Miyamoto Invited Paper 02 May 2023 Pages: 149 - 163
Application of the SAMA methodology to Ryuk malware Ander Granado MasidJavier Bermejo HigueraJuan Antonio Sicilia Montalvo Original Paper 22 June 2022 Pages: 165 - 198
RETRACTED ARTICLE: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry Liqin Zhang Original Paper 22 August 2022 Pages: 199 - 215
XAI for intrusion detection system: comparing explanations based on global and local scope Swetha HariharanR. R. Rejimol RobinsonN. Balakrishnan Original Paper 31 July 2022 Pages: 217 - 239
RETRACTED ARTICLE: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM Mundlamuri Venkata RaoDivya MidhunchakkaravarthySujatha Dandu Original Paper 10 August 2022 Pages: 241 - 255
RETRACTED ARTICLE: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation Feilu HangLinjiang XieHanruo Li Original Paper 06 August 2022 Pages: 257 - 269
IFMD: image fusion for malware detection Hashem HashemiMohammad Ebrahim SamieAli Hamzeh Original Paper 16 August 2022 Pages: 271 - 286
A comprehensive review of the security flaws of hashing algorithms Alireza Sadeghi-NasabVahid Rafe Original Paper 19 October 2022 Pages: 287 - 302
Time dependency: an efficient biometric-based authentication for secure communication in wireless healthcare sensor networks Meysam GhahramaniReza Javidan Original Paper 09 September 2022 Pages: 303 - 317
Improving binary diffing speed and accuracy using community detection and locality-sensitive hashing: an empirical study Chariton KaramitasAthanasios Kehagias Original Paper Open access 18 October 2022 Pages: 319 - 337