International Journal of Information Security

Title Publication Date Language Citations
MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs2024/03/19English
A new approach for detecting process injection attacks using memory analysis2024/03/16English
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)2024/03/13English
Spatial de-correlation of generated keys from wireless channels using adversarial deep learning2024/03/15English
Random forest evaluation using multi-key homomorphic encryption and lookup tables2024/03/14English
International journal of information security: a bibliometric study, 2007–20232024/03/25English
Mastering data privacy: leveraging K-anonymity for robust health data sharing2024/03/26English
Business-layer client-side racer: dynamic security testing of the web application against client-side race condition in the business layer2023/03/20English
Anonymity and everlasting privacy in electronic voting2023/02/15English
An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction2024/01/23English
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns2024/01/29English
BLISS: blockchain-based integrated security system for internet of things (IoT) applications2024/01/25English
Accessible password strength assessment method for visually challenged users2023/06/14English
CADS-ML/DL: efficient cloud-based multi-attack detection system2023/07/13English
A survey of anomaly detection methods for power grids2023/07/08English
A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation2023/06/29English
A generic framework for blockchain-assisted on-chain auditing for off-chain storage2024/04/18English
Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard2024/04/13English
Validation and extension of two domain-specific information privacy competency models2024/04/22English
Enhancing security in QCA-based circuits using optimal key gate placement2024/04/17English
On private information retrieval supporting range queries2023/09/26English
Secure outsourcing of manufacturing compliance checks2023/09/25English
RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware2023/09/23English
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware2023/08/14English
An integrated deep learning model for Ethereum smart contract vulnerability detection2023/09/24English
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain2023/08/25English
Synthesizing differentially private location traces including co-locations2023/08/29English
Estimating vulnerability metrics with word embedding and multiclass classification methods2023/08/11English
A review on graph-based approaches for network security monitoring and botnet detection2023/08/30English
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks2023/08/26English