


default search action
Journal of Information Security and Applications, Volume 67
Volume 67, June 2022
- Qianhui Wang
, Quan Qian
:
Malicious code classification based on opcode sequences and textCNN network. 103151 - Peter Sabev, Milen Petrov
:
Android Password Managers and Vault Applications: Data Storage Security Issues Identification. 103152 - Arnau Erola
, Ioannis Agrafiotis, Michael Goldsmith
, Sadie Creese:
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations. 103167 - Waleed Bin Shahid
, Baber Aslam, Haider Abbas
, Hammad Afzal
, Saad Bin Khalid
:
A deep learning assisted personalized deception system for countering web application attacks. 103169 - Mounika Deverashetti, Ranjitha K., K. V. Pradeepthi
:
Security analysis of menstruation cycle tracking applications using static, dynamic and machine learning techniques. 103171 - Orieb AbuAlghanam, Mohammad Qatawneh, Wesam Almobaideen, Maha Saadeh:
A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities. 103173 - Dawood Shah, Tariq Shah, Yasir Naseer, Sajjad Shaukat Jamal, Sadam Hussain:
Cryptographically strong S-P boxes and their application in steganography. 103174 - Zi-Yuan Liu
, Yi-Fan Tseng, Raylin Tso, Peter Shaojui Wang
, Qin-Wen Su:
Extension of elliptic curve Qu-Vanstone certificates and their applications. 103176 - Yossi Peretz, Maya Dotan, Aytan Kamienny:
An algorithm for simultaneous nonsymmetric algebraic Riccati equations over finite fields. 103178 - Riya Kakkar, Rajesh Gupta
, Smita Agrawal
, Sudeep Tanwar
, Ravi Sharma
:
Blockchain-based secure and trusted data sharing scheme for autonomous vehicle underlying 5G. 103179 - Guojun Fan, Zhibin Pan, Quan Zhou, Jing Dong, Xiaoran Zhang:
Reversible data hiding in multispectral images for satellite communications. 103180 - Uk Hur, Myungseo Park, Jongsung Kim
:
A reused key attack on an encrypted mobile app database: Case study on KakaoTalk and ProtonMail. 103181 - Xiaojie Zhao, Shangping Wang
, Yaling Zhang, Yu Wang:
Attribute-based access control scheme for data sharing on hyperledger fabric. 103182 - Haw-Bin How, Swee-Huay Heng
:
Blockchain-Enabled Searchable Encryption in Clouds: A Review. 103183 - Eleni Veroni
, Christoforos Ntantogian, Christos Xenakis
:
A large-scale analysis of Wi-Fi passwords. 103190 - Alireza Abdellahi Khorasgani, Mahdi Sajadieh
, Mohammad Rouhollah Yazdani:
Novel lightweight RFID authentication protocols for inexpensive tags. 103191 - Anier Soria-Lorente, Stefan Berres
, Yenner J. Díaz Núñez, Ernesto Avila-Domenech:
Hiding data inside images using orthogonal moments. 103192 - Masoumeh Safkhani
, Samad Rostampour
, Ygal Bendavid
, Sadegh Sadeghi, Nasour Bagheri:
Improving RFID/IoT-based generalized ultra-lightweight mutual authentication protocols. 103194 - Alexandro de O. Paula
, Rodolfo Ipolito Meneguette
, Felipe T. Giuntini
, Maycon L. M. Peixoto
, Vinícius P. Gonçalves, Geraldo P. Rocha Filho
:
STRAYER: A Smart Grid adapted automation architecture against cyberattacks. 103195 - Rasheed Ahmad
, Izzat Alsmadi
, Wasim Alhamdani
, Lo'ai Tawalbeh
:
A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks. 103196 - Jani Suomalainen
, Jukka Julku
, Antti Heikkinen, Seppo J. Rantala
, Anastasia Yastrebova
:
Security-driven prioritization for tactical mobile networks. 103198 - Mahmoud Khaleghi
, Mohammad Reza Aref
, Mehdi Rasti
:
Context-Aware Ontology-based Security Measurement Model. 103199 - Yuhao Gu
, Yuebin Bai, Shubin Xu
:
CS-MIA: Membership inference attack based on prediction confidence series in federated learning. 103201 - Matthew Nunes
, Pete Burnap, Philipp Reinecke, Kaelon Lloyd:
Bane or Boon: Measuring the effect of evasive malware on system call classifiers. 103202 - Soumia Menasria
, Mingming Lu, Abdelghani Dahou
:
PGAN framework for synthesizing sensor data privately. 103204 - Haiyan Xiao, Lifang Wang:
The differential fault analysis on block cipher KLEIN-96. 103205 - Somaye Bahrami, Reza Ghasemi:
A new secure and searchable data outsourcing leveraging a Bucket-Chain index tree. 103206 - Jianyi Liu, Ying Liu, Jingwen Li, Wenxin Sun, Jie Cheng, Ru Zhang
, Xingjie Huang, Jin Pang:
Two statistical traffic features for certain APT group identification. 103207 - Md. Mijanur Rahman
, Tanjarul Islam Mishu
, Md. Al-Amin Bhuiyan:
Performance analysis of a parameterized minutiae-based approach for securing fingerprint templates in biometric authentication systems. 103209 - Aidong Chen, Chen Hong, Xinna Shang, Hongyuan Jing
, Sen Xu:
Timing leakage to break SM2 signature algorithm. 103210 - Tingting Chai
, Jiahui Li, Shitala Prasad
, Qi Lu, Zhaoxin Zhang:
Shape-driven lightweight CNN for finger-vein biometrics. 103211 - Kunchang Li
, Runhua Shi
, Mingxia Wu, Yi-Fei Li
, Xiaoxu Zhang:
A novel privacy-preserving multi-level aggregate signcryption and query scheme for Smart Grid via mobile fog computing. 103214 - Ahmad Zairi bin Zaidi
, Chun Yong Chong
, Rajendran Parthiban
, Ali Safaa Sadiq
:
A framework of dynamic selection method for user classification in touch-based continuous mobile device authentication. 103217

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.