Current Issue
November 2021, Volume 13, Number 6
Detection Method for Classifying Malicious Firmware David Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA |
Malicious Javascript Detection based on Clustering Techniques Nguyen Hong Son1 and Ha Thanh Dung2, 1Faculty of Information Technology Posts and Telecommunications Institute of Technology, Vietnam, 2Saigon University, Vietnam |
Understanding Traffic Patterns of Covid-19 IoC in Huge Academic Backbone Network SINET Ruo Ando1, Youki Kadobayashi2, Hiroki Takakura1 and Hiroshi Itoh3, 1National Institute of Informatics, Japan, 2Nara Institute of Science and Technology, Japan, 3National Institute of Information and Communications Technology, Japan |
Improving Security and Fairness in Federated Learning Systems Andrew R. Short1, Τheofanis G. Orfanoudakis2 and Helen C. Leligou1, 1University of West Attica, Greece, 2Hellenic Open University, Greece |
Improve Security in Smart Cities Based on IoT, Solve Cyber Electronic Attacks with Technology by using Packet Tracer Raed Al-hamarneh, University of Almaarefa, Kingdom of Saudi Arabia |
System End-User Actions as a Threat to Information System Security Paulus Kautwima, Titus Haiduwa, Kundai Sai, Valerianus Hashiyana and Nalina Suresh, University of Namibia, Namibia |
Information and Communication Security Mechanisms For Microservices-based Systems Lenin Leines-Vite, Juan Carlos Pérez-Arriaga and Xavier Limón, Universidad Veracruzana, Mexico |
Comparative Review of Malware Analysis Methodologies Ioannis G. Kiachidis and Dimitrios A. Baltatzis, International Hellenic University, Greece |
Can Blockchain be a Solution to IoT Technical and Security Issues Adanma Cecilia Eberendu1, Titus Ifeanyi Chinebu2, 1Madonna University, Nigeria, 2Federal College of Dental Technology and Therapy, Nigeria |
September 2021, Volume 13, Number 5
Evaluation of a Blockchain-Enabled Resource Management Mechanism for NGNs Michael Xevgenis, Dimitrios G. Kogias, Ioannis Christidis, Charalampos Patrikakis and Helen C. Leligou, University of West Attica, Greece |
Secure Blockchain Decentralized Voting for Verified Users Piotr Pospiech, Aleksander Marianski and Michal Kedziora, Wroclaw University of Science and Technology, Poland |
July 2021, Volume 13, Number 4
Use of MARKOV Chain for Early Detecting DDoS Attacks
Chin-Ling Chen1 and Jian-Ming Chen2, 1National Pingtung University, Taiwan, 2Genesis Technology, Inc., Taiwan |
Constructing the 2-Element AGDS Protocol based on the Discrete Logarithm Problem Tuan Nguyen Kim1, Duy Ho Ngoc2 and Nikolay A. Moldovyan3, 1Duy Tan University, Vietnam, 2Ha Noi, Vietnam, 3St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia |
Proof-of-Reputation: An Alternative Consensus Mechanism for Blockchain Systems Oladotun Aluko1 and Anton Kolonin2, 1Novosibirsk State University, Russia, 2Aigents Group, Russia |
Critical Infrastructure Cybersecurity Challenges: IoT in Perspective Akwetey Henry Matey1, Paul Danquah2, Godfred Yaw Koi-Akrofi1 and Isaac Asampana1, 1University of Professional Studies Accra, 2Heritage Christian University |
Collective Signature Protocols for Signing Groups based on Problem of Finding Roots Modulo Large Prime Number Tuan Nguyen Kim1, Duy Ho Ngoc2 and Nikolay A. Moldovyan3, 1Duy Tan University, Vietnam, 2Ha Noi, Vietnam, 3St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia |
May 2021, Volume 13, Number 3
Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks David A. Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA |
Effect Man-In the Middle on the Network Performance in Various Attack Strategies Iyas Alodat, Jerash University, Jordan |
Information-Centric Blockchain Technology for the Smart Grid
Lanqin Sang and Henry Hexmoor, Southern Illinois University, USA |
A Survey on Federated Identity Management Systems Limitation and Solutions Maha Aldosary and Norah Alqahtani, Imam Mohammad Ibn Saud Islamic University, KSA |
March 2021, Volume 13, Number 2
Comparison of Malware Classification Methods using Convolutional Neural Network based on API Call Stream Matthew Schofield, Gulsum Alicioglu, Bo Sun, Russell Binaco, Paul Turner, Cameron Thatcher, Alex Lam and Anthony Breitzman, Rowan University, USA |
Performance Evaluation of Machine Learning Techniques for DOS Detection in Wireless Sensor Network Lama Alsulaiman and Saad Al-Ahmadi, King Saud University, Saudi Arabia |
Applying the Health Belief Model to Cardiac Implanted Medical Device Patients
George W. Jackson1 and Shawon Rahman2, 1Capella University, USA, 2University of HawaiiHilo, USA |
A Literature Survey and Analysis on Social Engineering Defense Mechanisms and Infosec Policies Dalal Alharthi and Amelia Regan, University of California Irvine, USA |
Phishing Mitigation Techniques: A Literature Survey
Wosah Peace Nmachi and Thomas Win, School of Computing & Engineering University of Gloucestershire, United Kingdom |
January 2021, Volume 13, Number 1
Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms William R. Simpson and Kevin E. Foltz, The Institute for Defense Analyses (IDA), USA |
Analysis of Machine Learning Algorithms with Feature Selection
for Intrusion Detection using UNSW-NB15 Dataset Geeta Kocher1 and Gulshan Kumar2, 1MRSPTU, India, 2SBSSTC, India |
Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis Anna Georgiadou, Spiros Mouzakitis and Dimitris Askounis, National Technical University of Athens, Greece |
Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys Cheman Shaik, VISH Consulting Services Inc, USA |
Game Theory Application Resources Management and Distribution in Blockchain Network Cong Hung Tran1, Dien Tam Le1, 2, Thanh Hieu Huynh3, 1Posts and Telecommunications Institute of Technology, Vietnam, 2Thu Duc Technology College, Vietnam, 3Saigon University, Vietnam |