All Stories

  1. A Secure Blockchain-Based MFA Dynamic Mechanism
  2. Intelligent Security Operation Centre Services for Critical National Infrastructures
  3. ExplainableDetector: exploring transformer-based language modeling approach for SMS spam detection with explainability analysis
  4. (Poster) ARSecure: A Novel End-to-End Encryption Messaging System using Augmented Reality
  5. A Blockchain-Powered Defence System Against DDos Attacks with Incentivised Collaboration
  6. Ransomware: Analysis and Evaluation of Live Forensic Techniques and Impact on Linux-Based IoT Systems
  7. JamShield: A Machine Learning Detection System for Over-the-Air Jamming Attacks
  8. Post-Quantum ZKP for Privacy-Preserving Authentication and Model Verification in Decentralized CAV
  9. Digital Twin-Enabled Lightweight Attack Detection for Software-Defined Edge Networks
  10. Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities
  11. A Novel TLS-Based Fingerprinting Approach That Combines Feature Expansion and Similarity Mapping
  12. Adversarial Attacks on Supervised Energy-Based Anomaly Detection in Clean Water Systems
  13. End-to-End Encryption: Technological and Human Factor Perspectives
  14. Black Hole Prediction in Backbone Networks: A Comprehensive and Type-Independent Forecasting Model
  15. SA-FLIDS: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare
  16. EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit
  17. Autonomous Queue Management System in Software-defined Routers for Sensor Networks
  18. Misconduct, Mishaps, and Misranking in Bibliometric Databases: Inflating the Production and Impact of Scientists
  19. ETHACA - A Container-Based Cyber Range for Research and Education
  20. An IoT Architecture for Enhancing Safety in Supply Chain Systems
  21. A Blockchain-based Multi-Factor Honeytoken Dynamic Authentication Mechanism
  22. Broker-Less OPC UA PubSub Communication Model Performance Analysis
  23. APOLLO: a proximity-oriented, low-layer orchestration algorithm for resources optimization in mist computing
  24. Cyber-Twin: Digital Twin-Boosted Autonomous Attack Detection for Vehicular Ad-Hoc Networks
  25. Automated Sensor Node Malicious Activity Detection with Explainability Analysis
  26. Enhancing Cybersecurity Training Efficacy: A Comprehensive Analysis of Gamified Learning, Behavioral Strategies and Digital Twins
  27. Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects
  28. Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario
  29. Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records
  30. PULRAS: A Novel PUF-based Lightweight Robust Authentication Scheme
  31. Distance-Only Task Orchestration Algorithm for Energy Efficiency in Satellite-Based Mist Computing
  32. APOLLO: A Proximity-Oriented Low-Level Orchestration Algorithm for Performance Optimization in Mist Computing
  33. Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing
  34. Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing
  35. MalAware: A Tabletop Game for Security Awareness and Incident Response Training.
  36. Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns
  37. Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper
  38. MalAware: A tabletop exercise for malware security awareness education and incident response training
  39. Proximity-Driven, Load-Balancing Task Offloading Algorithm for Enhanced Performance in Satellite-Enabled Mist Computing
  40. AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet-of-Vehicles Networks
  41. Machine Learning for Smart Healthcare Management Using IoT
  42. Cyber Malware
  43. Machine Learning Approaches in Financial Analytics
  44. Optimizing AI System Security: An Ecosystem Recommendation to Socio-Technical Risk Management
  45. Wireless Internet
  46. Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks
  47. Static Radio Transmission Power-Changing in Fog Computing: The Quick Energy-Draining Case Problem
  48. Reliability Analysis of Fault Tolerant Memory Systems
  49. Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations
  50. Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis
  51. Scalable Multi-domain Trust Infrastructures for Segmented Networks
  52. Cyberwarfare and Cyberterrorism
  53. Cyberwarfare in the Modern World
  54. From Rules to Retribution
  55. Hybrid Threats, Cyberterrorism and Cyberwarfare
  56. A novel autonomous container-based platform for cybersecurity training and research
  57. A Novel Authentication Method That Combines Honeytokens and Google Authenticator
  58. Malware Mitigation in Cloud Computing Architecture
  59. Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things
  60. Review of the NIST Light-Weight Cryptography Finalists
  61. The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System
  62. Blockchain and Artificial Intelligence as Enablers of Cyber Security in the Era of IoT and IIoT Applications
  63. Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise
  64. Digitization of healthcare sector: A study on privacy and security concerns
  65. A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing
  66. IoT: Communication protocols and security threats
  67. Inferring Probabilistic Boolean Networks from Steady-State Gene Data Samples
  68. From Mean Time to Failure to Mean Time to Attack/Compromise: Incorporating Reliability into Cybersecurity
  69. Internet of drones security: Taxonomies, open issues, and future directions
  70. Combining Security and Reliability of Critical Infrastructures: The Concept of Securability
  71. Security Revisited: Honeytokens meet Google Authenticator
  72. ESIKE: An Efficient and Secure Internet Key Exchange Protocol
  73. Reliability, Security, and Privacy in Power Grids
  74. Digital Agriculture Security: Aspects, Threats, Mitigation Strategies, and Future Trends
  75. Transforming Points of Single Contact Data into Linked Data
  76. FFDA: A novel Four-Factor Distributed Authentication mechanism
  77. Cybersecurity of Critical Infrastructures: Challenges and Solutions
  78. Enhancing Privacy of Online Chat Apps Utilising Secure Node End-to-End Encryption (SNE2EE)
  79. Re-configuration from the Edge: alternative Software Models for time-sensitive IoT Applications
  80. Cyber Threats in the Healthcare Sector and Countermeasures
  81. Transforming Points of Single Contact Data into Linked Data
  82. The end of Eavesdropping Attacks through the Use of Advanced End to End Encryption Mechanisms
  83. FELIDS: Federated Learning-based Intrusion Detection System for Agricultural Internet of Things
  84. Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure
  85. Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning
  86. A multiplayer game model to detect insiders in wireless sensor networks
  87. IoT: Communication Protocols and Security Threats
  88. SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles
  89. Artificial Intelligence: Practical and Ethical Challenges
  90. Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning
  91. DSMAC: Privacy-aware Decentralized Self-Management of data Access Control based on blockchain for health data
  92. An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks
  93. Blockchain Technology: A case study in supply chain management
  94. Uncuffed: A Blockchain-based Secure Messaging System
  95. IoT: Communication Protocols and Security Threats
  96. A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks
  97. Digital Twins and Cyber Security – solution or challenge?
  98. Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia
  99. Digital Transformation and Cybersecurity of Critical Infrastructures
  100. Intrusion Detection in Critical Infrastructures: A Literature Review
  101. Cybersecurity Issues in Emerging Technologies
  102. Agile Incident Response in Industrial Control Environments
  103. Smart Cars and Over-the-Air Updates
  104. RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks
  105. ESIKE: An efficient and secure internet key  exchange protocol
  106. A Tutorial on Cross-Site Scripting Attack
  107. Quantum Cryptography in Maritime Telecommunications
  108. A novel Two-Factor HoneyToken Authentication Mechanism
  109. Artificial Intelligence as Enabler for Sustainable Development
  110. EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles
  111. WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles
  112. Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies
  113. Cyber Ranges and TestBeds for Education, Training, and Research
  114. Between Location protection and Overthrowing: A Contrariness Framework Study for Smart Vehicles
  115. Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis
  116. A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems
  117. Blockchain Technology: Security and Privacy Issues
  118. Preserving the Location Privacy of Drivers Using Transmission Range Changing Techniques in Internet of Vehicles
  119. A Tutorial on Cross Site Scripting Attack - Defense
  120. Cybersecurity in the Era of Digital Transformation: The case of Greece
  121. From Cyber Terrorism to Cyber Peacekeeping: Are we there yet?
  122. The Insider Threat: Reasons, Effects and Mitigation Techniques
  123. Assessment of Machine Learning Techniques for Building an Efficient IDS
  124. Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks
  125. Introduction to the special issue of the journal of information security and applications on” cyber security in ICS & SCADA systems”
  126. On the conference key distribution system with user anonymity
  127. The Impact of the Adversary’s Eavesdropping Stations on the Location Privacy Level in Internet of Vehicles
  128. A NIS Directive Compliant Cybersecurity Maturity Assessment Framework
  129. Blockchain Based Voting Systems
  130. Security of Systems on Chip
  131. A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom
  132. The Security Aspects of Automotive Over-the-Air Updates
  133. RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks
  134. A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles
  135. Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems
  136. Security and Privacy Issues and Solutions for Fog
  137. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
  138. A Prediction - Communication P2V Framework for Enhancing Vulnerable Road Users’ Safety
  139. Cyber Threats in the Healthcare Sector and Countermeasures
  140. Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges
  141. Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks
  142. Security and privacy challenges in the field of iOS device forensics
  143. Developing Cyber Buffer Zones
  144. Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems
  145. The Cost Perspective of Password Security
  146. A Detailed Analysis of Using Supervised Machine Learning for Intrusion Detection
  147. Taxonomy of Supervised Machine Learning for Intrusion Detection Systems
  148. Estimating the Relative Speed of RF Jammers in VANETs
  149. Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed
  150. Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues
  151. Intrusion Detection System for Platooning Connected Autonomous Vehicles
  152. DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services
  153. Stochastic Optimization of Electric Vehicle Charging Stations
  154. Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security
  155. Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends
  156. A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models
  157. Evaluating Information Security Core Human Error Causes (IS-CHEC) Technique in Public Sector and Comparison with the Private Sector
  158. Blockchain Technologies for the Internet of Things: Research Issues and Challenges
  159. DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids
  160. Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique
  161. Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form
  162. Protecting Civilians from Cyber Warfare with Cyber Buffer Zones
  163. Blockchain and Its Role in the Internet of Things
  164. Cyber Security: From Regulations and Policies to Practice
  165. Developing cyber peacekeeping: Observation, monitoring and reporting
  166. Trace-Based Verification of Rule-Based Service Choreographies
  167. Privacy-preserving Schemes for Fog-based IoT Applications: Threat models, Solutions, and Challenges
  168. Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices
  169. HEART-IS: A Novel Technique for Evaluating Human Error-Related Information Security Incidents
  170. An introduction to cyber peacekeeping
  171. Convergence of detection probability, computational gains, and asymptotic analysis of an algorithm for physical-layer intrusion detection system
  172. A systematic review of data protection and privacy preservation schemes for smart grid communications
  173. Electronic medical records and risk management in hospitals of Saudi Arabia
  174. Vulnerability Analysis of Network Scanning on SCADA Systems
  175. Cyber security of critical infrastructures
  176. Defence Mechanisms for Public Systems
  177. Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
  178. Managing incident response in the industrial internet of things
  179. Route Optimization of Electric Vehicles Based on Dynamic Wireless Charging
  180. A Novel Method for Calculating Customer Reviews Ratings
  181. CYRAN
  182. SCIPS
  183. Internet of Cloud: Security and Privacy Issues
  184. A Framework for Minimizing Data Leakage from Nonproduction Systems
  185. Editorial: Industrial Internet of Things (I2oT)
  186. Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems
  187. On data leakage from non-production systems
  188. Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
  189. The industrial control system cyber defence triage process
  190. Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
  191. Introduction to the special issue of the journal of information security and applications on “ICS & SCADA cyber security”
  192. SCIPS
  193. Social Clustering of Vehicles
  194. Authentication Protocols for Internet of Things: A Comprehensive Survey
  195. A security architectural pattern for risk management of industry control systems within critical national infrastructure
  196. An assessment of the application of IT security mechanisms to industrial control systems
  197. Effect of Network Architecture Changes on OCSVM Based Intrusion Detection System
  198. Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey
  199. Security and Privacy in Fog Computing: Challenges
  200. Security Visualization: Detecting Denial of Service
  201. Personalized Students’ Profile Based On Ontology and Rule-based Reasoning
  202. Human behaviour as an aspect of cybersecurity assurance
  203. Cyberterrorism targeting the general public through social media
  204. Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems
  205. A Security Evaluation Framework for U.K. E-Government Services Agile Software Development
  206. Social Internet of Vehicles for Smart Cities
  207. Social Clustering of Vehicles Based on Semi-Markov Processes
  208. A Cyber Security Detection Framework for Supervisory Control and Data Acquisition Systems
  209. MIMO Techniques for Jamming Threat Suppression in Vehicular Networks
  210. Improved Security Performance for VANET Simulations
  211. SSH Honeypot: Building, Deploying and Analysis
  212. A novel adaptive learning management system using ontology
  213. A Robust Eco-Routing Protocol against Malicious Data in Vehicular Networks
  214. An Industrial Control Systems incident response decision framework
  215. Coupling of the synchronization stations of an Extended Kanban system
  216. Social Aspect of Vehicular Communications
  217. A novel intrusion detection method based on OCSVM and K-means recursive clustering
  218. Integrated OCSVM mechanism for intrusion detection in SCADA systems
  219. interview
  220. Delay Efficient Backpressure Routing in Wireless Ad Hoc Networks
  221. OCSVM model combined with K-means recursive clustering for intrusion detection in SCADA systems
  222. Intrusion detection in SCADA systems using machine learning techniques
  223. Optimization and prediction of dielectric behavior of small air gaps stressed by DC voltages
  224. Cooperative approaches for dymanic wireless charging of Electric Vehicles in a smart city
  225. A Distributed IDS for Industrial Control Systems
  226. Exploiting vehicular communications for reducing CO2 emissions in urban environments
  227. Optimization of Corona onset and breakdown voltage of small air gaps stressed by DC and impulse voltages
  228. Enhanced Spring Clustering in VANETs with Obstruction Considerations
  229. Control and optimization of the Corona effects and breakdown of small rod-plate air gaps stressed by dc and impulse voltages
  230. Clustering in Urban environments: Virtual forces applied to vehicles
  231. Optimization of Corona Effects in Small Air Gaps Stressed by DC Voltages
  232. Distributed clustering in vehicular networks
  233. Distributed Skip Air Index for smart broadcasting in intelligent transportation systems
  234. New measures for characterizing the significance of nodes in wireless ad hoc networks via localized path-based neighborhood analysis
  235. Layered backpressure scheduling for delay reduction in ad hoc networks
  236. A CLUSTERING – BASED METHOD FOR GENE EXPRESSION COMPARISON IN EMBRYONIC STEM CELL DERIVED HEAMNGIOBLASTS AND ADULT BONE MARROW STROMAL CELLS
  237. New Metrics for Characterizing the Significance of Nodes in Wireless Networks via Path-Based Neighborhood Analysis
  238. INFLUENCE OF NACL CONCENTRATION IN THE IRRIGATION WATER ON SALT ACCUMULATION IN THE ROOT ZONE AND YIELD IN A CUCUMBER CROP GROWN IN A CLOSED HYDROPONIC SYSTEM
  239. CYRAN
  240. Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems
  241. OSNs as Cyberterrorist Weapons against the General Public