International Journal of Information Security

Title Publication Date Language Citations
Hate speech, toxicity detection in online social media: a recent survey of state of the art and opportunities2023/09/25English
Simulation extractable versions of Groth’s zk-SNARK revisited2023/09/05English
Improving spam email classification accuracy using ensemble techniques: a stacking approach2023/09/20English
BASPED: Blockchain assisted searchable public key encryption over outsourced data2023/09/20English
Enhancing attack resilience of cyber-physical systems through state dependency graph models2023/07/22English
Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents2023/08/10English
Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review2023/08/07English
Blockchain-based multi-diagnosis deep learning application for various diseases classification2023/08/07English
RADS: a real-time anomaly detection model for software-defined networks using machine learning2023/07/07English
A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on android Pattern Unlock2023/07/07English
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks2024/04/29English
BitCracker: BitLocker meets GPUs2022/05/03English
IntentAuth: Securing Android’s Intent-based inter-process communication2022/04/22English
A Digital Asset Inheritance Model to Convey Online Persona Posthumously2022/04/30English
An effective attack scenario construction model based on identification of attack steps and stages2023/05/28English
Analysis of OSPU security effect and data assembly verification under semi-network OS architecture2023/05/18English
Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques2023/06/11English
cFEM: a cluster based feature extraction method for network intrusion detection2023/05/05English
Mobile botnet detection: a comprehensive survey2022/11/15English
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment2022/12/30English
Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device2022/12/05English
Value-utilized taint propagation: toward precise detection of apps’ information flows across Android API calls2022/08/06English
Robust password security: a genetic programming approach with imbalanced dataset handling2024/02/07English
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks2023/11/21English
A review on digital twins for power generation and distribution2023/12/01English
A survey and characterization of Close Access Cyberspace Operations2023/11/03English
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks2023/11/02English
A method for insider threat assessment by modeling the internal employee interactions2023/04/15English
Cyber range design framework for cyber security education and training2023/03/18English
A novel two-level secure access control approach for blockchain platform in healthcare2023/02/10English