Found: 40
Select item for more details and to access through your institution.
Cashing out crypto: state of practice in ransom payments.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 699, doi. 10.1007/s10207-023-00766-z
- By:
- Publication type:
- Article
Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 713, doi. 10.1007/s10207-023-00765-0
- By:
- Publication type:
- Article
Evaluating the impact of filter-based feature selection in intrusion detection systems.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 759, doi. 10.1007/s10207-023-00767-y
- By:
- Publication type:
- Article
A systematic mapping study on security for systems of systems.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 787, doi. 10.1007/s10207-023-00757-0
- By:
- Publication type:
- Article
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 819, doi. 10.1007/s10207-023-00768-x
- By:
- Publication type:
- Article
Network intrusion detection and mitigation in SDN using deep learning models.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 849, doi. 10.1007/s10207-023-00771-2
- By:
- Publication type:
- Article
The rise of "security and privacy": bibliometric analysis of computer privacy research.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 863, doi. 10.1007/s10207-023-00761-4
- By:
- Publication type:
- Article
A survey on run-time packers and mitigation techniques.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 887, doi. 10.1007/s10207-023-00759-y
- By:
- Publication type:
- Article
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 915, doi. 10.1007/s10207-023-00763-2
- By:
- Publication type:
- Article
An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 935, doi. 10.1007/s10207-023-00770-3
- By:
- Publication type:
- Article
A survey and characterization of Close Access Cyberspace Operations.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 963, doi. 10.1007/s10207-023-00772-1
- By:
- Publication type:
- Article
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 981, doi. 10.1007/s10207-023-00774-z
- By:
- Publication type:
- Article
Locating collaborative attack targets based on physical invariants toward cyber-physical systems.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 999, doi. 10.1007/s10207-023-00773-0
- By:
- Publication type:
- Article
Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
Olympus: a GDPR compliant blockchain system.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1021, doi. 10.1007/s10207-023-00782-z
- By:
- Publication type:
- Article
An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1037, doi. 10.1007/s10207-023-00777-w
- By:
- Publication type:
- Article
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1055, doi. 10.1007/s10207-023-00778-9
- By:
- Publication type:
- Article
Generating adversarial examples with collaborative generative models.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1077, doi. 10.1007/s10207-023-00780-1
- By:
- Publication type:
- Article
Integrating the edge computing paradigm into the development of IoT forensic methodologies.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1093, doi. 10.1007/s10207-023-00776-x
- By:
- Publication type:
- Article
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1117, doi. 10.1007/s10207-023-00783-y
- By:
- Publication type:
- Article
Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1131, doi. 10.1007/s10207-023-00779-8
- By:
- Publication type:
- Article
De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1149, doi. 10.1007/s10207-023-00781-0
- By:
- Publication type:
- Article
A review on digital twins for power generation and distribution.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1171, doi. 10.1007/s10207-023-00784-x
- By:
- Publication type:
- Article
Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1197, doi. 10.1007/s10207-023-00786-9
- By:
- Publication type:
- Article
Generating ICS vulnerability playbooks with open standards.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1215, doi. 10.1007/s10207-023-00760-5
- By:
- Publication type:
- Article
Blockchain-based multi-organizational cyber risk management framework for collaborative environments.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1231, doi. 10.1007/s10207-023-00788-7
- By:
- Publication type:
- Article
TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1251, doi. 10.1007/s10207-023-00787-8
- By:
- Publication type:
- Article
Cyberattack defense mechanism using deep learning techniques in software-defined networks.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1279, doi. 10.1007/s10207-023-00785-w
- By:
- Publication type:
- Article
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1293, doi. 10.1007/s10207-023-00790-z
- By:
- Publication type:
- Article
Intrusion detection for power grid: a review.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1317, doi. 10.1007/s10207-023-00789-6
- By:
- Publication type:
- Article
A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1331, doi. 10.1007/s10207-023-00794-9
- By:
- Publication type:
- Article
Security bug reports classification using fasttext.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1347, doi. 10.1007/s10207-023-00793-w
- By:
- Publication type:
- Article
Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1359, doi. 10.1007/s10207-023-00796-7
- By:
- Publication type:
- Article
Radio frequency fingerprinting techniques for device identification: a survey.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1389, doi. 10.1007/s10207-023-00801-z
- By:
- Publication type:
- Article
Maritime cybersecurity: protecting digital seas.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1429, doi. 10.1007/s10207-023-00800-0
- By:
- Publication type:
- Article
Information security and privacy challenges of cloud computing for government adoption: a systematic review.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1459, doi. 10.1007/s10207-023-00797-6
- By:
- Publication type:
- Article
A modular cyber security training programme for the maritime domain.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1477, doi. 10.1007/s10207-023-00799-4
- By:
- Publication type:
- Article
Vulnerability discovery based on source code patch commit mining: a systematic literature review.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1513, doi. 10.1007/s10207-023-00795-8
- By:
- Publication type:
- Article
Cybersecurity training and healthcare: the AERAS approach.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1527, doi. 10.1007/s10207-023-00802-y
- By:
- Publication type:
- Article
A deep learning approach based on multi-view consensus for SQL injection detection.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1541, doi. 10.1007/s10207-023-00791-y
- By:
- Publication type:
- Article