All Stories

  1. Intelligent Security Operation Centre Services for Critical National Infrastructures
  2. ExplainableDetector: exploring transformer-based language modeling approach for SMS spam detection with explainability analysis
  3. (Poster) ARSecure: A Novel End-to-End Encryption Messaging System using Augmented Reality
  4. A Blockchain-Powered Defence System Against DDos Attacks with Incentivised Collaboration
  5. Ransomware: Analysis and Evaluation of Live Forensic Techniques and Impact on Linux-Based IoT Systems
  6. JamShield: A Machine Learning Detection System for Over-the-Air Jamming Attacks
  7. Post-Quantum ZKP for Privacy-Preserving Authentication and Model Verification in Decentralized CAV
  8. Digital Twin-Enabled Lightweight Attack Detection for Software-Defined Edge Networks
  9. Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities
  10. A Novel TLS-Based Fingerprinting Approach That Combines Feature Expansion and Similarity Mapping
  11. Adversarial Attacks on Supervised Energy-Based Anomaly Detection in Clean Water Systems
  12. End-to-End Encryption: Technological and Human Factor Perspectives
  13. Black Hole Prediction in Backbone Networks: A Comprehensive and Type-Independent Forecasting Model
  14. SA-FLIDS: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare
  15. EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit
  16. Autonomous Queue Management System in Software-defined Routers for Sensor Networks
  17. Misconduct, Mishaps, and Misranking in Bibliometric Databases: Inflating the Production and Impact of Scientists
  18. ETHACA - A Container-Based Cyber Range for Research and Education
  19. An IoT Architecture for Enhancing Safety in Supply Chain Systems
  20. A Blockchain-based Multi-Factor Honeytoken Dynamic Authentication Mechanism
  21. Broker-Less OPC UA PubSub Communication Model Performance Analysis
  22. APOLLO: a proximity-oriented, low-layer orchestration algorithm for resources optimization in mist computing
  23. Cyber-Twin: Digital Twin-Boosted Autonomous Attack Detection for Vehicular Ad-Hoc Networks
  24. Automated Sensor Node Malicious Activity Detection with Explainability Analysis
  25. Enhancing Cybersecurity Training Efficacy: A Comprehensive Analysis of Gamified Learning, Behavioral Strategies and Digital Twins
  26. Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects
  27. Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario
  28. Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records
  29. PULRAS: A Novel PUF-based Lightweight Robust Authentication Scheme
  30. Distance-Only Task Orchestration Algorithm for Energy Efficiency in Satellite-Based Mist Computing
  31. APOLLO: A Proximity-Oriented Low-Level Orchestration Algorithm for Performance Optimization in Mist Computing
  32. Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing
  33. Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing
  34. MalAware: A Tabletop Game for Security Awareness and Incident Response Training.
  35. Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns
  36. Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper
  37. MalAware: A tabletop exercise for malware security awareness education and incident response training
  38. Proximity-Driven, Load-Balancing Task Offloading Algorithm for Enhanced Performance in Satellite-Enabled Mist Computing
  39. AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet-of-Vehicles Networks
  40. Machine Learning for Smart Healthcare Management Using IoT
  41. Cyber Malware
  42. Machine Learning Approaches in Financial Analytics
  43. Optimizing AI System Security: An Ecosystem Recommendation to Socio-Technical Risk Management
  44. Wireless Internet
  45. Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks
  46. Static Radio Transmission Power-Changing in Fog Computing: The Quick Energy-Draining Case Problem
  47. Reliability Analysis of Fault Tolerant Memory Systems
  48. Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations
  49. Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis
  50. Scalable Multi-domain Trust Infrastructures for Segmented Networks
  51. Cyberwarfare and Cyberterrorism
  52. Cyberwarfare in the Modern World
  53. From Rules to Retribution
  54. Hybrid Threats, Cyberterrorism and Cyberwarfare
  55. A novel autonomous container-based platform for cybersecurity training and research
  56. A Novel Authentication Method That Combines Honeytokens and Google Authenticator
  57. Malware Mitigation in Cloud Computing Architecture
  58. Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things
  59. Review of the NIST Light-Weight Cryptography Finalists
  60. The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System
  61. Blockchain and Artificial Intelligence as Enablers of Cyber Security in the Era of IoT and IIoT Applications
  62. Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise
  63. Digitization of healthcare sector: A study on privacy and security concerns
  64. A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing
  65. IoT: Communication protocols and security threats
  66. Inferring Probabilistic Boolean Networks from Steady-State Gene Data Samples
  67. From Mean Time to Failure to Mean Time to Attack/Compromise: Incorporating Reliability into Cybersecurity
  68. Internet of drones security: Taxonomies, open issues, and future directions
  69. Combining Security and Reliability of Critical Infrastructures: The Concept of Securability
  70. Security Revisited: Honeytokens meet Google Authenticator
  71. ESIKE: An Efficient and Secure Internet Key Exchange Protocol
  72. Reliability, Security, and Privacy in Power Grids
  73. Digital Agriculture Security: Aspects, Threats, Mitigation Strategies, and Future Trends
  74. Transforming Points of Single Contact Data into Linked Data
  75. FFDA: A novel Four-Factor Distributed Authentication mechanism
  76. Cybersecurity of Critical Infrastructures: Challenges and Solutions
  77. Enhancing Privacy of Online Chat Apps Utilising Secure Node End-to-End Encryption (SNE2EE)
  78. Re-configuration from the Edge: alternative Software Models for time-sensitive IoT Applications
  79. Cyber Threats in the Healthcare Sector and Countermeasures
  80. Transforming Points of Single Contact Data into Linked Data
  81. The end of Eavesdropping Attacks through the Use of Advanced End to End Encryption Mechanisms
  82. FELIDS: Federated Learning-based Intrusion Detection System for Agricultural Internet of Things
  83. Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure
  84. Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning
  85. A multiplayer game model to detect insiders in wireless sensor networks
  86. IoT: Communication Protocols and Security Threats
  87. SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles
  88. Artificial Intelligence: Practical and Ethical Challenges
  89. Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning
  90. DSMAC: Privacy-aware Decentralized Self-Management of data Access Control based on blockchain for health data
  91. An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks
  92. Blockchain Technology: A case study in supply chain management
  93. Uncuffed: A Blockchain-based Secure Messaging System
  94. IoT: Communication Protocols and Security Threats
  95. A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks
  96. Digital Twins and Cyber Security – solution or challenge?
  97. Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia
  98. Digital Transformation and Cybersecurity of Critical Infrastructures
  99. Intrusion Detection in Critical Infrastructures: A Literature Review
  100. Cybersecurity Issues in Emerging Technologies
  101. Agile Incident Response in Industrial Control Environments
  102. Smart Cars and Over-the-Air Updates
  103. RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks
  104. ESIKE: An efficient and secure internet key  exchange protocol
  105. A Tutorial on Cross-Site Scripting Attack
  106. Quantum Cryptography in Maritime Telecommunications
  107. A novel Two-Factor HoneyToken Authentication Mechanism
  108. Artificial Intelligence as Enabler for Sustainable Development
  109. EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles
  110. WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles
  111. Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies
  112. Cyber Ranges and TestBeds for Education, Training, and Research
  113. Between Location protection and Overthrowing: A Contrariness Framework Study for Smart Vehicles
  114. Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis
  115. A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems
  116. Blockchain Technology: Security and Privacy Issues
  117. Preserving the Location Privacy of Drivers Using Transmission Range Changing Techniques in Internet of Vehicles
  118. A Tutorial on Cross Site Scripting Attack - Defense
  119. Cybersecurity in the Era of Digital Transformation: The case of Greece
  120. From Cyber Terrorism to Cyber Peacekeeping: Are we there yet?
  121. The Insider Threat: Reasons, Effects and Mitigation Techniques
  122. Assessment of Machine Learning Techniques for Building an Efficient IDS
  123. Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks
  124. Introduction to the special issue of the journal of information security and applications on” cyber security in ICS & SCADA systems”
  125. On the conference key distribution system with user anonymity
  126. The Impact of the Adversary’s Eavesdropping Stations on the Location Privacy Level in Internet of Vehicles
  127. A NIS Directive Compliant Cybersecurity Maturity Assessment Framework
  128. Blockchain Based Voting Systems
  129. Security of Systems on Chip
  130. A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom
  131. The Security Aspects of Automotive Over-the-Air Updates
  132. RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks
  133. A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles
  134. Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems
  135. Security and Privacy Issues and Solutions for Fog
  136. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
  137. A Prediction - Communication P2V Framework for Enhancing Vulnerable Road Users’ Safety
  138. Cyber Threats in the Healthcare Sector and Countermeasures
  139. Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges
  140. Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks
  141. Security and privacy challenges in the field of iOS device forensics
  142. Developing Cyber Buffer Zones
  143. Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems
  144. The Cost Perspective of Password Security
  145. A Detailed Analysis of Using Supervised Machine Learning for Intrusion Detection
  146. Taxonomy of Supervised Machine Learning for Intrusion Detection Systems
  147. Estimating the Relative Speed of RF Jammers in VANETs
  148. Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed
  149. Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues
  150. Intrusion Detection System for Platooning Connected Autonomous Vehicles
  151. DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services
  152. Stochastic Optimization of Electric Vehicle Charging Stations
  153. Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security
  154. Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends
  155. A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models
  156. Evaluating Information Security Core Human Error Causes (IS-CHEC) Technique in Public Sector and Comparison with the Private Sector
  157. Blockchain Technologies for the Internet of Things: Research Issues and Challenges
  158. DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids
  159. Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique
  160. Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form
  161. Protecting Civilians from Cyber Warfare with Cyber Buffer Zones
  162. Blockchain and Its Role in the Internet of Things
  163. Cyber Security: From Regulations and Policies to Practice
  164. Developing cyber peacekeeping: Observation, monitoring and reporting
  165. Trace-Based Verification of Rule-Based Service Choreographies
  166. Privacy-preserving Schemes for Fog-based IoT Applications: Threat models, Solutions, and Challenges
  167. Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices
  168. HEART-IS: A Novel Technique for Evaluating Human Error-Related Information Security Incidents
  169. An introduction to cyber peacekeeping
  170. Convergence of detection probability, computational gains, and asymptotic analysis of an algorithm for physical-layer intrusion detection system
  171. A systematic review of data protection and privacy preservation schemes for smart grid communications
  172. Electronic medical records and risk management in hospitals of Saudi Arabia
  173. Vulnerability Analysis of Network Scanning on SCADA Systems
  174. Cyber security of critical infrastructures
  175. Defence Mechanisms for Public Systems
  176. Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
  177. Managing incident response in the industrial internet of things
  178. Route Optimization of Electric Vehicles Based on Dynamic Wireless Charging
  179. A Novel Method for Calculating Customer Reviews Ratings
  180. CYRAN
  181. SCIPS
  182. Internet of Cloud: Security and Privacy Issues
  183. A Framework for Minimizing Data Leakage from Nonproduction Systems
  184. Editorial: Industrial Internet of Things (I2oT)
  185. Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems
  186. On data leakage from non-production systems
  187. Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
  188. The industrial control system cyber defence triage process
  189. Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
  190. Introduction to the special issue of the journal of information security and applications on “ICS & SCADA cyber security”
  191. SCIPS
  192. Social Clustering of Vehicles
  193. Authentication Protocols for Internet of Things: A Comprehensive Survey
  194. A security architectural pattern for risk management of industry control systems within critical national infrastructure
  195. An assessment of the application of IT security mechanisms to industrial control systems
  196. Effect of Network Architecture Changes on OCSVM Based Intrusion Detection System
  197. Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey
  198. Security and Privacy in Fog Computing: Challenges
  199. Security Visualization: Detecting Denial of Service
  200. Personalized Students’ Profile Based On Ontology and Rule-based Reasoning
  201. Human behaviour as an aspect of cybersecurity assurance
  202. Cyberterrorism targeting the general public through social media
  203. Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems
  204. A Security Evaluation Framework for U.K. E-Government Services Agile Software Development
  205. Social Internet of Vehicles for Smart Cities
  206. Social Clustering of Vehicles Based on Semi-Markov Processes
  207. A Cyber Security Detection Framework for Supervisory Control and Data Acquisition Systems
  208. MIMO Techniques for Jamming Threat Suppression in Vehicular Networks
  209. Improved Security Performance for VANET Simulations
  210. SSH Honeypot: Building, Deploying and Analysis
  211. A novel adaptive learning management system using ontology
  212. A Robust Eco-Routing Protocol against Malicious Data in Vehicular Networks
  213. An Industrial Control Systems incident response decision framework
  214. Coupling of the synchronization stations of an Extended Kanban system
  215. Social Aspect of Vehicular Communications
  216. A novel intrusion detection method based on OCSVM and K-means recursive clustering
  217. Integrated OCSVM mechanism for intrusion detection in SCADA systems
  218. interview
  219. Delay Efficient Backpressure Routing in Wireless Ad Hoc Networks
  220. OCSVM model combined with K-means recursive clustering for intrusion detection in SCADA systems
  221. Intrusion detection in SCADA systems using machine learning techniques
  222. Optimization and prediction of dielectric behavior of small air gaps stressed by DC voltages
  223. Cooperative approaches for dymanic wireless charging of Electric Vehicles in a smart city
  224. A Distributed IDS for Industrial Control Systems
  225. Exploiting vehicular communications for reducing CO2 emissions in urban environments
  226. Optimization of Corona onset and breakdown voltage of small air gaps stressed by DC and impulse voltages
  227. Enhanced Spring Clustering in VANETs with Obstruction Considerations
  228. Control and optimization of the Corona effects and breakdown of small rod-plate air gaps stressed by dc and impulse voltages
  229. Clustering in Urban environments: Virtual forces applied to vehicles
  230. Optimization of Corona Effects in Small Air Gaps Stressed by DC Voltages
  231. Distributed clustering in vehicular networks
  232. Distributed Skip Air Index for smart broadcasting in intelligent transportation systems
  233. New measures for characterizing the significance of nodes in wireless ad hoc networks via localized path-based neighborhood analysis
  234. Layered backpressure scheduling for delay reduction in ad hoc networks
  235. A CLUSTERING – BASED METHOD FOR GENE EXPRESSION COMPARISON IN EMBRYONIC STEM CELL DERIVED HEAMNGIOBLASTS AND ADULT BONE MARROW STROMAL CELLS
  236. New Metrics for Characterizing the Significance of Nodes in Wireless Networks via Path-Based Neighborhood Analysis
  237. INFLUENCE OF NACL CONCENTRATION IN THE IRRIGATION WATER ON SALT ACCUMULATION IN THE ROOT ZONE AND YIELD IN A CUCUMBER CROP GROWN IN A CLOSED HYDROPONIC SYSTEM
  238. CYRAN
  239. Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems
  240. OSNs as Cyberterrorist Weapons against the General Public