International Journal of Information Security

Titel Veröffentlichungsdatum Sprache Zitate
A systematic review of privacy techniques in recommendation systems2023/06/05English
AIHGAT: A novel method of malware detection and homology analysis using assembly instruction heterogeneous graph2023/05/14English
Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus2023/05/12English
A personalized learning theory-based cyber-security training exercise2023/06/02English
Abuse-freeness in contract signing: a blockchain-based proposal2024/03/10English
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network2024/03/07English
Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies2024/03/07English
RAMA: a risk assessment solution for healthcare organizations2024/03/01English
Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack2024/04/04English
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network2024/04/12English
Trustworthy machine learning in the context of security and privacy2024/04/03English
Attribute inference privacy protection for pre-trained models2024/04/02English
Selfish mining attack in blockchain: a systematic literature review2024/04/10English
Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees2023/12/08English
Generating ICS vulnerability playbooks with open standards2023/12/11English
Maritime cybersecurity: protecting digital seas2024/01/02English
Cyberattack defense mechanism using deep learning techniques in software-defined networks2023/12/15English
A modular cyber security training programme for the maritime domain2024/01/03English
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT2023/11/22English
Integrating the edge computing paradigm into the development of IoT forensic methodologies2023/11/22English
Blockchain-based multi-organizational cyber risk management framework for collaborative environments2023/12/13English
TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment2023/12/14English
Locating collaborative attack targets based on physical invariants toward cyber-physical systems2023/11/08English
Generating adversarial examples with collaborative generative models2023/11/21English
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems2023/11/07English
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives2024/03/29English
A context-aware on-board intrusion detection system for smart vehicles2024/03/28English
Generative AI for pentesting: the good, the bad, the ugly2024/03/15English
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards2024/03/14English
Dynamic authentication for intelligent sensor clouds in the Internet of Things2024/03/13English