An effective intrusion detection approach based on ensemble learning for IIoT edge computing Mouaad Mohy-eddineAzidine GuezzazMourade Azrour Original Paper 14 December 2022 Pages: 469 - 481
Forced continuation of malware execution beyond exceptions Yoshihiro OyamaHirotaka Kokubo Original Paper 15 December 2022 Pages: 483 - 501
Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation Enrique Soriano-SalvadorGorka Guardiola-Múzquiz Original Paper 17 December 2022 Pages: 503 - 513
Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits Mahdi MahdaviOliaeeZahra Ahmadian Original Paper 28 December 2022 Pages: 515 - 528
Performance evaluation of learning models for intrusion detection system using feature selection Baijnath KaushikReya SharmaSurbhi Sharma Original Paper 03 January 2023 Pages: 529 - 548
Identifying bot infection using neural networks on DNS traffic Manmeet SinghManinder SinghSanmeet Kaur Original Paper 24 January 2023 Pages: 549 - 563
CamDec: Advancing Axis P1435-LE video camera security using honeypot-based deception Leslie F. SikosCraig ValliNickson M. Karie Original Paper Open access 10 February 2023 Pages: 565 - 577
Generative adversarial networks and image-based malware classification Huy NguyenFabio Di TroiaMark Stamp Original Paper 13 February 2023 Pages: 579 - 595
Detecting and mitigating DHCP attacks in OpenFlow-based SDN networks: a comprehensive approach Manar AldaoudDawood Al-AbriFirdous Kausar Original Paper 21 February 2023 Pages: 597 - 614
A security vulnerability predictor based on source code metrics Puya PakshadAlireza Shameli-SendiBehzad Khalaji Emamzadeh Abbasi Original Paper 17 February 2023 Pages: 615 - 633
Retraction Note: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation Feilu HangLinjiang XieHanruo Li Retraction Note 29 May 2023 Pages: 635 - 635
Retraction Note: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM Mundlamuri Venkata RaoDivya MidhunchakkaravarthySujatha Dandu Retraction Note 20 June 2023 Pages: 637 - 637
Retraction Note: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry Liqin Zhang Retraction Note 12 July 2023 Pages: 639 - 639