All Stories

  1. Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing
  2. Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing
  3. Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns
  4. Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper
  5. MalAware: A tabletop exercise for malware security awareness education and incident response training
  6. Static Radio Transmission Power-Changing in Fog Computing: The Quick Energy-Draining Case Problem
  7. A novel autonomous container-based platform for cybersecurity training and research
  8. A Novel Authentication Method That Combines Honeytokens and Google Authenticator
  9. Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things
  10. Review of the NIST Light-Weight Cryptography Finalists
  11. The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System
  12. Blockchain and Artificial Intelligence as Enablers of Cyber Security in the Era of IoT and IIoT Applications
  13. Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise
  14. Digitization of healthcare sector: A study on privacy and security concerns
  15. A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing
  16. IoT: Communication protocols and security threats
  17. Inferring Probabilistic Boolean Networks from Steady-State Gene Data Samples
  18. From Mean Time to Failure to Mean Time to Attack/Compromise: Incorporating Reliability into Cybersecurity
  19. Internet of drones security: Taxonomies, open issues, and future directions
  20. Combining Security and Reliability of Critical Infrastructures: The Concept of Securability
  21. Security Revisited: Honeytokens meet Google Authenticator
  22. ESIKE: An Efficient and Secure Internet Key Exchange Protocol
  23. Reliability, Security, and Privacy in Power Grids
  24. Transforming Points of Single Contact Data into Linked Data
  25. FFDA: A novel Four-Factor Distributed Authentication mechanism
  26. Cybersecurity of Critical Infrastructures: Challenges and Solutions
  27. Enhancing Privacy of Online Chat Apps Utilising Secure Node End-to-End Encryption (SNE2EE)
  28. Re-configuration from the Edge: alternative Software Models for time-sensitive IoT Applications
  29. Cyber Threats in the Healthcare Sector and Countermeasures
  30. Transforming Points of Single Contact Data into Linked Data
  31. The end of Eavesdropping Attacks through the Use of Advanced End to End Encryption Mechanisms
  32. FELIDS: Federated Learning-based Intrusion Detection System for Agricultural Internet of Things
  33. Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure
  34. Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning
  35. A multiplayer game model to detect insiders in wireless sensor networks
  36. IoT: Communication Protocols and Security Threats
  37. SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles
  38. Artificial Intelligence: Practical and Ethical Challenges
  39. Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning
  40. DSMAC: Privacy-aware Decentralized Self-Management of data Access Control based on blockchain for health data
  41. An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks
  42. Blockchain Technology: A case study in supply chain management
  43. Uncuffed: A Blockchain-based Secure Messaging System
  44. IoT: Communication Protocols and Security Threats
  45. A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks
  46. Digital Twins and Cyber Security – solution or challenge?
  47. Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia
  48. Digital Transformation and Cybersecurity of Critical Infrastructures
  49. Intrusion Detection in Critical Infrastructures: A Literature Review
  50. RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks
  51. ESIKE: An efficient and secure internet key  exchange protocol
  52. Quantum Cryptography in Maritime Telecommunications
  53. A novel Two-Factor HoneyToken Authentication Mechanism
  54. Artificial Intelligence as Enabler for Sustainable Development
  55. EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles
  56. WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles
  57. Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies
  58. Cyber Ranges and TestBeds for Education, Training, and Research
  59. Between Location protection and Overthrowing: A Contrariness Framework Study for Smart Vehicles
  60. Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis
  61. A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems
  62. Blockchain Technology: Security and Privacy Issues
  63. Preserving the Location Privacy of Drivers Using Transmission Range Changing Techniques in Internet of Vehicles
  64. Cybersecurity in the Era of Digital Transformation: The case of Greece
  65. From Cyber Terrorism to Cyber Peacekeeping: Are we there yet?
  66. The Insider Threat: Reasons, Effects and Mitigation Techniques
  67. Assessment of Machine Learning Techniques for Building an Efficient IDS
  68. Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks
  69. Introduction to the special issue of the journal of information security and applications on” cyber security in ICS & SCADA systems”
  70. On the conference key distribution system with user anonymity
  71. The Impact of the Adversary’s Eavesdropping Stations on the Location Privacy Level in Internet of Vehicles
  72. A NIS Directive Compliant Cybersecurity Maturity Assessment Framework
  73. Blockchain Based Voting Systems
  74. Security of Systems on Chip
  75. A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom
  76. The Security Aspects of Automotive Over-the-Air Updates
  77. RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks
  78. Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems
  79. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
  80. A Prediction - Communication P2V Framework for Enhancing Vulnerable Road Users’ Safety
  81. Cyber Threats in the Healthcare Sector and Countermeasures
  82. Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges
  83. Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks
  84. Security and privacy challenges in the field of iOS device forensics
  85. Developing Cyber Buffer Zones
  86. Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems
  87. The Cost Perspective of Password Security
  88. A Detailed Analysis of Using Supervised Machine Learning for Intrusion Detection
  89. Taxonomy of Supervised Machine Learning for Intrusion Detection Systems
  90. Estimating the Relative Speed of RF Jammers in VANETs
  91. Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed
  92. Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues
  93. Intrusion Detection System for Platooning Connected Autonomous Vehicles
  94. DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services
  95. Stochastic Optimization of Electric Vehicle Charging Stations
  96. Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security
  97. Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends
  98. A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models
  99. Evaluating Information Security Core Human Error Causes (IS-CHEC) Technique in Public Sector and Comparison with the Private Sector
  100. Blockchain Technologies for the Internet of Things: Research Issues and Challenges
  101. DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids
  102. Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique
  103. Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form
  104. Protecting Civilians from Cyber Warfare with Cyber Buffer Zones
  105. Blockchain and Its Role in the Internet of Things
  106. Cyber Security: From Regulations and Policies to Practice
  107. Developing cyber peacekeeping: Observation, monitoring and reporting
  108. Trace-Based Verification of Rule-Based Service Choreographies
  109. Privacy-preserving Schemes for Fog-based IoT Applications: Threat models, Solutions, and Challenges
  110. Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices
  111. HEART-IS: A Novel Technique for Evaluating Human Error-Related Information Security Incidents
  112. An introduction to cyber peacekeeping
  113. Convergence of detection probability, computational gains, and asymptotic analysis of an algorithm for physical-layer intrusion detection system
  114. A systematic review of data protection and privacy preservation schemes for smart grid communications
  115. Electronic medical records and risk management in hospitals of Saudi Arabia
  116. Vulnerability Analysis of Network Scanning on SCADA Systems
  117. Cyber security of critical infrastructures
  118. Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
  119. Managing incident response in the industrial internet of things
  120. Route Optimization of Electric Vehicles Based on Dynamic Wireless Charging
  121. A Novel Method for Calculating Customer Reviews Ratings
  122. CYRAN
  123. SCIPS
  124. Internet of Cloud: Security and Privacy Issues
  125. Editorial: Industrial Internet of Things (I2oT)
  126. Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems
  127. On data leakage from non-production systems
  128. Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
  129. The industrial control system cyber defence triage process
  130. Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
  131. Introduction to the special issue of the journal of information security and applications on “ICS & SCADA cyber security”
  132. SCIPS
  133. Authentication Protocols for Internet of Things: A Comprehensive Survey
  134. A security architectural pattern for risk management of industry control systems within critical national infrastructure
  135. An assessment of the application of IT security mechanisms to industrial control systems
  136. Effect of Network Architecture Changes on OCSVM Based Intrusion Detection System
  137. Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey
  138. Security and Privacy in Fog Computing: Challenges
  139. Security Visualization: Detecting Denial of Service
  140. Human behaviour as an aspect of cybersecurity assurance
  141. Cyberterrorism targeting the general public through social media
  142. Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems
  143. Social Internet of Vehicles for Smart Cities
  144. Social Clustering of Vehicles Based on Semi-Markov Processes
  145. A Cyber Security Detection Framework for Supervisory Control and Data Acquisition Systems
  146. MIMO Techniques for Jamming Threat Suppression in Vehicular Networks
  147. Improved Security Performance for VANET Simulations
  148. A novel adaptive learning management system using ontology
  149. A Robust Eco-Routing Protocol against Malicious Data in Vehicular Networks
  150. An Industrial Control Systems incident response decision framework
  151. Coupling of the synchronization stations of an Extended Kanban system
  152. Social Aspect of Vehicular Communications
  153. A novel intrusion detection method based on OCSVM and K-means recursive clustering
  154. Integrated OCSVM mechanism for intrusion detection in SCADA systems
  155. interview
  156. Delay Efficient Backpressure Routing in Wireless Ad Hoc Networks
  157. OCSVM model combined with K-means recursive clustering for intrusion detection in SCADA systems
  158. Intrusion detection in SCADA systems using machine learning techniques
  159. Optimization and prediction of dielectric behavior of small air gaps stressed by DC voltages
  160. Cooperative approaches for dymanic wireless charging of Electric Vehicles in a smart city
  161. A Distributed IDS for Industrial Control Systems
  162. Exploiting vehicular communications for reducing CO2 emissions in urban environments
  163. Optimization of Corona onset and breakdown voltage of small air gaps stressed by DC and impulse voltages
  164. Enhanced Spring Clustering in VANETs with Obstruction Considerations
  165. Control and optimization of the Corona effects and breakdown of small rod-plate air gaps stressed by dc and impulse voltages
  166. Clustering in Urban environments: Virtual forces applied to vehicles
  167. Optimization of Corona Effects in Small Air Gaps Stressed by DC Voltages
  168. Distributed clustering in vehicular networks
  169. Distributed Skip Air Index for smart broadcasting in intelligent transportation systems
  170. New measures for characterizing the significance of nodes in wireless ad hoc networks via localized path-based neighborhood analysis
  171. Layered backpressure scheduling for delay reduction in ad hoc networks
  172. New Metrics for Characterizing the Significance of Nodes in Wireless Networks via Path-Based Neighborhood Analysis
  173. CYRAN
  174. Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems
  175. OSNs as Cyberterrorist Weapons against the General Public