All Stories

  1. Federated learning for anomaly detection on Internet of Medical Things: A survey
  2. BIAS: A Body-Based Interpretable Active Speaker Approach
  3. Framework and Roadmap for Secure Design and Development of Applications in the Cloud and Mobile Ecosystem
  4. Classification of Anomalies in Microservices Using an XGBoost-Based Approach With Data Balancing and Hyperparameter Tuning
  5. Analysis of the Capability and Training of Chat Bots in the Generation of Rules for Firewall or Intrusion Detection Systems
  6. Expediting the design and development of secure cloud-based mobile apps
  7. Detection of Slowloris Attacks using Machine Learning Algorithms
  8. How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
  9. WASD: A Wilder Active Speaker Detection Dataset
  10. Peaches Detection Using a Deep Learning Technique—A Contribution to Yield Estimation, Resources Management, and Circular Economy
  11. A Complete Review on the Application of Statistical Methods for Evaluating Internet Traffic Usage
  12. A System for the Promotion of Traceability and Ownership of Health Data Using Blockchain
  13. Detection and Mitigation of Low-Rate Denial-of-Service Attacks: A Survey
  14. Predicting CVSS Metric via Description Interpretation
  15. Performance of Machine Learning-Based Intrusion Detection for Containerized Applications
  16. Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms
  17. Towards the Use of Blockchain in Mobile Health Services and Applications
  18. Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems
  19. IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space
  20. IoT-HarPSecA
  21. Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions
  22. Societal risks of the end of physical cash
  23. Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains
  24. Approaches for optimizing virtual machine placement and migration in cloud environments: A survey
  25. Applications of artificial immune systems to computer security: A survey
  26. CloudSim Plus: A cloud computing simulation framework pursuing software engineering principles for improved modularity, extensibility and correctness
  27. Security Challenges of the Internet of Things
  28. Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases
  29. Fractal Beauty in Text
  30. A Quick Perspective on the Current State in Cybersecurity
  31. Randomness in Virtual Machines
  32. Secure user authentication in cloud computing management interfaces
  33. Identification of Peer-to-Peer VoIP Sessions Using Entropy and Codec Properties
  34. Security issues in cloud environments: a survey
  35. Detection and classification of peer-to-peer traffic
  36. Real-time traffic classification based on statistical tests for matching signatures with packet length distributions
  37. Corrigendum: Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic
  38. Fast synthesis of persistent fractional Brownian motion
  39. Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic
  40. On-line Detection of Encrypted Traffic Generated by Mesh-Based Peer-to-Peer Live Streaming Applications: The Case of GoalBit
  41. Source traffic analysis
  42. NetOdyssey - A New Tool for Real-Time Analysis of Network Traffic
  43. Preface
  44. The design and evaluation of the Simple Self-Similar Sequences Generator
  45. The Nature of Peer-to-Peer Traffic
  46. Analysis of Peer-to-Peer Traffic Using a Behavioural Method Based on Entropy
  47. Analysis of the Impact of Intensive Attacks on the Self-Similarity Degree of the Network Traffic
  48. 10G EPON Standardization in IEEE 802.3av Project
  49. Zombie Identification Port
  50. On EPON security issues