All Stories

  1. Stabilized quantum-enhanced SIEM architecture and speed-up through Hoeffding tree algorithms enable quantum cybersecurity analytics in botnet detection
  2. TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving framework
  3. An omnidirectional approach to touch-based continuous authentication
  4. A framework for live host-based Bitcoin wallet forensics and triage
  5. A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder
  6. Attacking Windows Hello for Business: Is It What We Were Promised?
  7. Using Social Media & Sentiment Analysis to Make Investment Decisions
  8. Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification
  9. Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform
  10. GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture
  11. NapierOne: A modern mixed file data set alternative to Govdocs1
  12. HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles
  13. Ransomware: Analysing the Impact on Windows Active Directory Domain Services
  14. GLASS: Towards Secure and Decentralized eGovernance Services Using IPFS
  15. A privacy-preserving distributed platform for COVID-19 vaccine passports
  16. Browsers’ Private Mode: Is It What We Were Promised?
  17. Exploring the Need For an Updated Mixed File Research Data Set
  18. Review of Current Ransomware Detection Techniques
  19. Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure
  20. A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT
  21. Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems
  22. Differential area analysis for ransomware attack detection within mixed file datasets
  23. A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions
  24. A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data
  25. PyDentity: A playground for education and experimentation with the Hyperledger verifiable information exchange platform
  26. A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations
  27. Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
  28. A Comparative Analysis of Honeypots on Different Cloud Platforms
  29. Privacy and Trust Redefined in Federated Machine Learning
  30. BeepTrace: Blockchain-Enabled Privacy-Preserving Contact Tracing for COVID-19 Pandemic and Beyond
  31. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks
  32. A Blockchain Framework in Post-Quantum Decentralization
  33. Launching Adversarial Label Contamination Attacks Against Malicious URL Detection
  34. LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments
  35. FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures
  36. PoNW
  37. A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric
  38. Fast Probabilistic Consensus with Weighted Votes
  39. Decentralized accessibility of e-commerce products through blockchain technology
  40. Privacy-Preserving Passive DNS
  41. Towards Continuous User Authentication Using Personalised Touch-Based Behaviour
  42. A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption
  43. TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies
  44. A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos
  45. Evaluation of live forensic techniques in ransomware attack mitigation
  46. Trust-based Ecosystem to Combat Fake News
  47. Energy demand forecasting of buildings using random neural networks
  48. Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication
  49. SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain
  50. Scenario-based creation and digital investigation of ethereum ERC20 tokens
  51. A Novel Multi-Chaos Based Compressive Sensing Encryption Technique
  52. An authentication protocol based on chaos and zero knowledge proof
  53. 5G-FOG: Freezing of Gait Identification in Multi-class Softmax Neural Network Exploiting 5G Spectrum
  54. A Distributed Trust Framework for Privacy-Preserving Machine Learning
  55. A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect
  56. CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure
  57. Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution
  58. DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption
  59. Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning
  60. Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL)
  61. Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach
  62. Privacy-preserving Surveillance Methods using Homomorphic Encryption
  63. Guest Editorial Special Issue on Blockchain-Based Secure and Trusted Computing for IoT
  64. Corrigendum to “Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment”
  65. Deriving ChaCha20 key streams from targeted memory analysis
  66. IoT Forensics: Amazon Echo as a Use Case
  67. A Forensic Audit of the Tor Browser Bundle
  68. Decrypting live SSH traffic in virtual environments
  69. Next Generation Lightweight Cryptography for Smart IoT Devices: : Implementation, Challenges and Applications
  70. A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks
  71. MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features
  72. The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime
  73. Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier
  74. Mitigating Disaster using Secure Threshold-Cloud Architecture
  75. Impact of cyberattacks on stock performance: a comparative study
  76. Requirements for 5G based telemetric cardiac monitoring
  77. Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device
  78. Privacy Parameter Variation Using RAPPOR on a Malware Dataset
  79. Applications of Blockchain Within Healthcare
  80. Machine learning and semantic analysis of in-game chat for cyberbullying
  81. Detection of Algorithmically Generated Malicious Domain Using Frequency Analysis
  82. Forensics study of IMO call and chat app
  83. Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study
  84. Distance Measurement Methods for Improved Insider Threat Detection
  85. Experimental High Speed Data Encryption via SDM-CV-QKD Signaling for High-Capacity Access Network
  86. A methodology for the security evaluation within third-party Android Marketplaces
  87. Analysis of the Adoption of Security Headers in HTTP
  88. Lightweight cryptography methods
  89. Sticky policies approach within cloud computing
  90. An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack
  91. Employing machine learning techniques for detection and classification of phishing emails
  92. Mining malware command and control traces
  93. Cryptography across industry sectors
  94. Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption
  95. Performance evaluation of a fragmented secret share system
  96. Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention
  97. Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment
  98. Security for Cyber-Physical Systems in Healthcare
  99. Towards Trust and Governance in Integrated Health and Social Care Platforms
  100. Protecting documents with sticky policies and identity-based encryption
  101. Will quantum computers be the end of public key encryption?
  102. Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)
  103. A RAM triage methodology for Hadoop HDFS forensics
  104. HI-risk: A method to analyse health information risk intelligence
  105. Sticky policy enabled authenticated OOXML
  106. Numerical encoding to Tame SQL injection attacks
  107. Evaluation of TFTP DDoS amplification attack
  108. The Future Internet: A World of Secret Shares
  109. Analytics for Improving Patient Outcome by Utilising Comprehensive IoRN Assessment Scoring Metrics
  110. Sticky-Policy enabled authenticated OOXML for Health Care
  111. Secret shares to protect health records in Cloud-based infrastructures
  112. RESCUE: Resilient Secret Sharing Cloud-Based Architecture
  113. Fast contraband detection in large capacity disk drives
  114. “I am Spartacus”: privacy enhancing technologies, collaborative obfuscation and privacy as a public good
  115. Approaches to the classification of high entropy file fragments
  116. Norms and standards in modular medical architectures
  117. Monitoring information security risks within health care
  118. Conducting Performance Evaluation of an e-Health Platform
  119. Modelling of Integrated Trust, Governance and Access
  120. Plugging the Gaps
  121. A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services
  122. A new efficient distributed route discovery for wireless mobile ad hoc networks
  123. Formal security policy implementations in network firewalls
  124. An Integrated Cloud-based Healthcare Infrastructure
  125. DACAR Platform for eHealth Services Cloud
  126. Minimising Collateral Damage
  127. Ad hocrouting metrics and applied weighting for QoS support
  128. Special issue: Performance evaluation and optimization of ubiquitous computing and networked systems
  129. Privacy-preserving data acquisition protocol
  130. A new adaptive broadcasting approach for mobile ad hoc networks
  131. Modelling infection spread using location tracking
  132. Protecting mobile agents from external replay attacks
  133. Radio frequency identification (RFID) in pervasive healthcare
  134. Ad-hoc Routing Metrics and Applied Weighting for QoS support
  135. 7th international workshop on Performance Modeling, Evaluation, and Optimization of Ubiquitous Computing and Networked Systems (PMEO-UCNS’08)
  136. Setting safety standards by designing a low-budget and compatible patient identification system based on passive RFID technology
  137. NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data
  138. Analysis of an agent-based metric-driven method for ad-hoc, on-demand routing
  139. An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing
  140. Correlation between academic and skills-based tests in computer networks
  141. Investigating False Positive Reduction in HTTP via Procedure Analysis
  142. NetHost-sensor: Monitoring a target host's application via system calls
  143. Critical analysis and error determination of locating-finding techniques in GSM
  144. We know where you are [cellular location tracking]
  145. Mastering Delphi Programming
  146. Computer Busses
  147. Handbook of Data Communications and Networks
  148. Mastering Networks
  149. Compression Techniques
  150. Java (Networking)
  151. Mastering Java
  152. Mastering Pascal and Delphi Programming
  153. Advanced Data Communications and Networks
  154. Anovel parallel processing synchronization method for observing electric fields in and around PCBs
  155. Mastering Global Information Systems
  156. Mastering the Internet
  157. Machine independent algorithm for concurrent finite-element problems
  158. Prediction of electric fields in and around PCBs — 3D finite-difference time-domain approach with parallel processing
  159. Parallel processing techniques in EMP propagation using 3D Finite-Difference Time-Domain (FDTD) method
  160. Enhanced methods of coursework provision in computer networks
  161. Migration of mobile agents in ad-hoc, wireless networks
  162. Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks
  163. An intelligent agent security intrusion system
  164. Towards reusable and reconfigurable models for the WWW