All Stories

  1. Misconduct, Mishaps, and Misranking in Bibliometric Databases: Inflating the Production and Impact of Scientists
  2. A Blockchain-based Multi-Factor Honeytoken Dynamic Authentication Mechanism
  3. Broker-Less OPC UA PubSub Communication Model Performance Analysis
  4. APOLLO: a proximity-oriented, low-layer orchestration algorithm for resources optimization in mist computing
  5. Cyber-Twin: Digital Twin-Boosted Autonomous Attack Detection for Vehicular Ad-Hoc Networks
  6. Automated Sensor Node Malicious Activity Detection with Explainability Analysis
  7. Enhancing Cybersecurity Training Efficacy: A Comprehensive Analysis of Gamified Learning, Behavioral Strategies and Digital Twins
  8. Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects
  9. Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario
  10. Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records
  11. PULRAS: A Novel PUF-based Lightweight Robust Authentication Scheme
  12. Distance-Only Task Orchestration Algorithm for Energy Efficiency in Satellite-Based Mist Computing
  13. APOLLO: A Proximity-Oriented Low-Level Orchestration Algorithm for Performance Optimization in Mist Computing
  14. Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing
  15. Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing
  16. MalAware: A Tabletop Game for Security Awareness and Incident Response Training.
  17. Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns
  18. Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper
  19. MalAware: A tabletop exercise for malware security awareness education and incident response training
  20. Proximity-Driven, Load-Balancing Task Offloading Algorithm for Enhanced Performance in Satellite-Enabled Mist Computing
  21. AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet-of-Vehicles Networks
  22. Machine Learning for Smart Healthcare Management Using IoT
  23. Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks
  24. Static Radio Transmission Power-Changing in Fog Computing: The Quick Energy-Draining Case Problem
  25. Reliability Analysis of Fault Tolerant Memory Systems
  26. Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations
  27. Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis
  28. Scalable Multi-domain Trust Infrastructures for Segmented Networks
  29. Cyberwarfare and Cyberterrorism
  30. Cyberwarfare in the Modern World
  31. From Rules to Retribution
  32. Hybrid Threats, Cyberterrorism and Cyberwarfare
  33. A novel autonomous container-based platform for cybersecurity training and research
  34. A Novel Authentication Method That Combines Honeytokens and Google Authenticator
  35. Malware Mitigation in Cloud Computing Architecture
  36. Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things
  37. Review of the NIST Light-Weight Cryptography Finalists
  38. The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System
  39. Blockchain and Artificial Intelligence as Enablers of Cyber Security in the Era of IoT and IIoT Applications
  40. Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise
  41. Digitization of healthcare sector: A study on privacy and security concerns
  42. A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing
  43. IoT: Communication protocols and security threats
  44. Inferring Probabilistic Boolean Networks from Steady-State Gene Data Samples
  45. From Mean Time to Failure to Mean Time to Attack/Compromise: Incorporating Reliability into Cybersecurity
  46. Internet of drones security: Taxonomies, open issues, and future directions
  47. Combining Security and Reliability of Critical Infrastructures: The Concept of Securability
  48. Security Revisited: Honeytokens meet Google Authenticator
  49. ESIKE: An Efficient and Secure Internet Key Exchange Protocol
  50. Reliability, Security, and Privacy in Power Grids
  51. Digital Agriculture Security: Aspects, Threats, Mitigation Strategies, and Future Trends
  52. Transforming Points of Single Contact Data into Linked Data
  53. FFDA: A novel Four-Factor Distributed Authentication mechanism
  54. Cybersecurity of Critical Infrastructures: Challenges and Solutions
  55. Enhancing Privacy of Online Chat Apps Utilising Secure Node End-to-End Encryption (SNE2EE)
  56. Re-configuration from the Edge: alternative Software Models for time-sensitive IoT Applications
  57. Cyber Threats in the Healthcare Sector and Countermeasures
  58. Transforming Points of Single Contact Data into Linked Data
  59. The end of Eavesdropping Attacks through the Use of Advanced End to End Encryption Mechanisms
  60. FELIDS: Federated Learning-based Intrusion Detection System for Agricultural Internet of Things
  61. Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure
  62. Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning
  63. A multiplayer game model to detect insiders in wireless sensor networks
  64. IoT: Communication Protocols and Security Threats
  65. SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles
  66. Artificial Intelligence: Practical and Ethical Challenges
  67. Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning
  68. DSMAC: Privacy-aware Decentralized Self-Management of data Access Control based on blockchain for health data
  69. An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks
  70. Blockchain Technology: A case study in supply chain management
  71. Uncuffed: A Blockchain-based Secure Messaging System
  72. IoT: Communication Protocols and Security Threats
  73. A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks
  74. Digital Twins and Cyber Security – solution or challenge?
  75. Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia
  76. Digital Transformation and Cybersecurity of Critical Infrastructures
  77. Intrusion Detection in Critical Infrastructures: A Literature Review
  78. Cybersecurity Issues in Emerging Technologies
  79. Agile Incident Response in Industrial Control Environments
  80. Smart Cars and Over-the-Air Updates
  81. RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks
  82. ESIKE: An efficient and secure internet key  exchange protocol
  83. A Tutorial on Cross-Site Scripting Attack
  84. Quantum Cryptography in Maritime Telecommunications
  85. A novel Two-Factor HoneyToken Authentication Mechanism
  86. Artificial Intelligence as Enabler for Sustainable Development
  87. EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles
  88. WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles
  89. Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies
  90. Cyber Ranges and TestBeds for Education, Training, and Research
  91. Between Location protection and Overthrowing: A Contrariness Framework Study for Smart Vehicles
  92. Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis
  93. A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems
  94. Blockchain Technology: Security and Privacy Issues
  95. Preserving the Location Privacy of Drivers Using Transmission Range Changing Techniques in Internet of Vehicles
  96. A Tutorial on Cross Site Scripting Attack - Defense
  97. Cybersecurity in the Era of Digital Transformation: The case of Greece
  98. From Cyber Terrorism to Cyber Peacekeeping: Are we there yet?
  99. The Insider Threat: Reasons, Effects and Mitigation Techniques
  100. Assessment of Machine Learning Techniques for Building an Efficient IDS
  101. Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks
  102. Introduction to the special issue of the journal of information security and applications on” cyber security in ICS & SCADA systems”
  103. On the conference key distribution system with user anonymity
  104. The Impact of the Adversary’s Eavesdropping Stations on the Location Privacy Level in Internet of Vehicles
  105. A NIS Directive Compliant Cybersecurity Maturity Assessment Framework
  106. Blockchain Based Voting Systems
  107. Security of Systems on Chip
  108. A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom
  109. The Security Aspects of Automotive Over-the-Air Updates
  110. RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks
  111. Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems
  112. Security and Privacy Issues and Solutions for Fog
  113. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
  114. A Prediction - Communication P2V Framework for Enhancing Vulnerable Road Users’ Safety
  115. Cyber Threats in the Healthcare Sector and Countermeasures
  116. Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges
  117. Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks
  118. Security and privacy challenges in the field of iOS device forensics
  119. Developing Cyber Buffer Zones
  120. Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems
  121. The Cost Perspective of Password Security
  122. A Detailed Analysis of Using Supervised Machine Learning for Intrusion Detection
  123. Taxonomy of Supervised Machine Learning for Intrusion Detection Systems
  124. Estimating the Relative Speed of RF Jammers in VANETs
  125. Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed
  126. Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues
  127. Intrusion Detection System for Platooning Connected Autonomous Vehicles
  128. DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services
  129. Stochastic Optimization of Electric Vehicle Charging Stations
  130. Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security
  131. Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends
  132. A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models
  133. Evaluating Information Security Core Human Error Causes (IS-CHEC) Technique in Public Sector and Comparison with the Private Sector
  134. Blockchain Technologies for the Internet of Things: Research Issues and Challenges
  135. DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids
  136. Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique
  137. Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form
  138. Protecting Civilians from Cyber Warfare with Cyber Buffer Zones
  139. Blockchain and Its Role in the Internet of Things
  140. Cyber Security: From Regulations and Policies to Practice
  141. Developing cyber peacekeeping: Observation, monitoring and reporting
  142. Trace-Based Verification of Rule-Based Service Choreographies
  143. Privacy-preserving Schemes for Fog-based IoT Applications: Threat models, Solutions, and Challenges
  144. Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices
  145. HEART-IS: A Novel Technique for Evaluating Human Error-Related Information Security Incidents
  146. An introduction to cyber peacekeeping
  147. Convergence of detection probability, computational gains, and asymptotic analysis of an algorithm for physical-layer intrusion detection system
  148. A systematic review of data protection and privacy preservation schemes for smart grid communications
  149. Electronic medical records and risk management in hospitals of Saudi Arabia
  150. Vulnerability Analysis of Network Scanning on SCADA Systems
  151. Cyber security of critical infrastructures
  152. Defence Mechanisms for Public Systems
  153. Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
  154. Managing incident response in the industrial internet of things
  155. Route Optimization of Electric Vehicles Based on Dynamic Wireless Charging
  156. A Novel Method for Calculating Customer Reviews Ratings
  157. CYRAN
  158. SCIPS
  159. Internet of Cloud: Security and Privacy Issues
  160. A Framework for Minimizing Data Leakage from Nonproduction Systems
  161. Editorial: Industrial Internet of Things (I2oT)
  162. Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems
  163. On data leakage from non-production systems
  164. Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
  165. The industrial control system cyber defence triage process
  166. Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
  167. Introduction to the special issue of the journal of information security and applications on “ICS & SCADA cyber security”
  168. SCIPS
  169. Social Clustering of Vehicles
  170. Authentication Protocols for Internet of Things: A Comprehensive Survey
  171. A security architectural pattern for risk management of industry control systems within critical national infrastructure
  172. An assessment of the application of IT security mechanisms to industrial control systems
  173. Effect of Network Architecture Changes on OCSVM Based Intrusion Detection System
  174. Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey
  175. Security and Privacy in Fog Computing: Challenges
  176. Security Visualization: Detecting Denial of Service
  177. Personalized Students’ Profile Based On Ontology and Rule-based Reasoning
  178. Human behaviour as an aspect of cybersecurity assurance
  179. Cyberterrorism targeting the general public through social media
  180. Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems
  181. A Security Evaluation Framework for U.K. E-Government Services Agile Software Development
  182. Social Internet of Vehicles for Smart Cities
  183. Social Clustering of Vehicles Based on Semi-Markov Processes
  184. A Cyber Security Detection Framework for Supervisory Control and Data Acquisition Systems
  185. MIMO Techniques for Jamming Threat Suppression in Vehicular Networks
  186. Improved Security Performance for VANET Simulations
  187. A novel adaptive learning management system using ontology
  188. A Robust Eco-Routing Protocol against Malicious Data in Vehicular Networks
  189. An Industrial Control Systems incident response decision framework
  190. Coupling of the synchronization stations of an Extended Kanban system
  191. Social Aspect of Vehicular Communications
  192. A novel intrusion detection method based on OCSVM and K-means recursive clustering
  193. Integrated OCSVM mechanism for intrusion detection in SCADA systems
  194. interview
  195. Delay Efficient Backpressure Routing in Wireless Ad Hoc Networks
  196. OCSVM model combined with K-means recursive clustering for intrusion detection in SCADA systems
  197. Intrusion detection in SCADA systems using machine learning techniques
  198. Optimization and prediction of dielectric behavior of small air gaps stressed by DC voltages
  199. Cooperative approaches for dymanic wireless charging of Electric Vehicles in a smart city
  200. A Distributed IDS for Industrial Control Systems
  201. Exploiting vehicular communications for reducing CO2 emissions in urban environments
  202. Optimization of Corona onset and breakdown voltage of small air gaps stressed by DC and impulse voltages
  203. Enhanced Spring Clustering in VANETs with Obstruction Considerations
  204. Control and optimization of the Corona effects and breakdown of small rod-plate air gaps stressed by dc and impulse voltages
  205. Clustering in Urban environments: Virtual forces applied to vehicles
  206. Optimization of Corona Effects in Small Air Gaps Stressed by DC Voltages
  207. Distributed clustering in vehicular networks
  208. Distributed Skip Air Index for smart broadcasting in intelligent transportation systems
  209. New measures for characterizing the significance of nodes in wireless ad hoc networks via localized path-based neighborhood analysis
  210. Layered backpressure scheduling for delay reduction in ad hoc networks
  211. New Metrics for Characterizing the Significance of Nodes in Wireless Networks via Path-Based Neighborhood Analysis
  212. CYRAN
  213. Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems
  214. OSNs as Cyberterrorist Weapons against the General Public