Need Help?
Most Cited & Viewed
Most Cited & Viewed Papers
Citations | Article |
---|---|
D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities
by
Mohamed Chahine Ghanem, Patrick Mulvihill, Karim Ouazzane, Ramzi Djemai and Dipo Dunsin
|
Views | Article |
---|---|
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
by
Anastasios Giannaros, Aristeidis Karras, Leonidas Theodorakopoulos, Christos Karras, Panagiotis Kranias, Nikolaos Schizas, Gerasimos Kalogeratos and Dimitrios Tsolis
|
|
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
by
Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, Md Minhaz Chowdhury, Nafiz Rifat and Jayden F Connolly
|
|
Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review
by
Maha Alghawazi, Daniyal Alghazzawi and Suaad Alarifi
|
|
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support
by
Haozhe Zhou, Amin Milani Fard and Adetokunbo Makanju
|
|
Addressing Human Factors in Cybersecurity Leadership
by
William J. Triplett
|
|
A Survey of the Recent Trends in Deep Learning Based Malware Detection
by
Umm-e-Hani Tayyab, Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan and Yeon Soo Lee
|
|
A Distributed Model for Privacy Preserving V2I Communication with Strong Unframeability and Efficient Revocation
by
Panayiotis Kalogeropoulos, Dimitris Papanikas and Panayiotis Kotzanikolaou
|
|
Contactless Fingerprint Recognition Using Deep Learning—A Systematic Review
by
A M Mahmud Chowdhury and Masudul Haider Imtiaz
|
|
Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis
by
Rachida Hireche, Houssem Mansouri and Al-Sakib Khan Pathan
|
|
The Evolution of Volatile Memory Forensics
by
Hannah Nyholm, Kristine Monteith, Seth Lyles, Micaela Gallegos, Mark DeSantis, John Donaldson and Claire Taylor
|
Views | Article |
---|---|
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
by
Anastasios Giannaros, Aristeidis Karras, Leonidas Theodorakopoulos, Christos Karras, Panagiotis Kranias, Nikolaos Schizas, Gerasimos Kalogeratos and Dimitrios Tsolis
|
|
Cybersecurity for AI Systems: A Survey
by
Raghvinder S. Sangwan, Youakim Badr and Satish M. Srinivasan
|
|
Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures—A Perspective on the Greek Landscape
by
Anastasios Papathanasiou, George Liontos, Vasiliki Liagkou and Euripidis Glavas
|
|
A Dynamic and Adaptive Cybersecurity Governance Framework
by
Henock Mulugeta Melaku
|
|
Security in Cloud-Native Services: A Survey
by
Theodoros Theodoropoulos, Luis Rosa, Chafika Benzaid, Peter Gray, Eduard Marin, Antonios Makris, Luis Cordeiro, Ferran Diego, Pavel Sorokin, Marco Di Girolamo, Paolo Barone, Tarik Taleb and Konstantinos Tserpes
|
|
Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS
by
Shinelle Hutchinson, Miloš Stanković, Samuel Ho, Shiva Houshmand and Umit Karabiyik
|
|
Assessing the Security and Privacy of Baby Monitor Apps
by
Lukas Schmidt, Henry Hosseini and Thomas Hupperich
|
|
A Deep Learning Approach for Network Intrusion Detection Using a Small Features Vector
by
Humera Ghani, Bal Virdee and Shahram Salekzamankhani
|
|
Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication
by
Sara Kokal, Mounika Vanamala and Rushit Dave
|
Downloads | Article |
---|---|
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
by
Anastasios Giannaros, Aristeidis Karras, Leonidas Theodorakopoulos, Christos Karras, Panagiotis Kranias, Nikolaos Schizas, Gerasimos Kalogeratos and Dimitrios Tsolis
|
|
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics
by
Jennifer Bellizzi, Eleonora Losiouk, Mauro Conti, Christian Colombo and Mark Vella
|
|
Cybersecurity for AI Systems: A Survey
by
Raghvinder S. Sangwan, Youakim Badr and Satish M. Srinivasan
|
|
A Dynamic and Adaptive Cybersecurity Governance Framework
by
Henock Mulugeta Melaku
|
|
Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures—A Perspective on the Greek Landscape
by
Anastasios Papathanasiou, George Liontos, Vasiliki Liagkou and Euripidis Glavas
|
|
Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication
by
Sara Kokal, Mounika Vanamala and Rushit Dave
|
|
Security in Cloud-Native Services: A Survey
by
Theodoros Theodoropoulos, Luis Rosa, Chafika Benzaid, Peter Gray, Eduard Marin, Antonios Makris, Luis Cordeiro, Ferran Diego, Pavel Sorokin, Marco Di Girolamo, Paolo Barone, Tarik Taleb and Konstantinos Tserpes
|
|
Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS
by
Shinelle Hutchinson, Miloš Stanković, Samuel Ho, Shiva Houshmand and Umit Karabiyik
|
|
Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review
by
Turki Al lelah, George Theodorakopoulos, Philipp Reinecke, Amir Javed and Eirini Anthi
|
Downloads | Article |
---|---|
Security in Cloud-Native Services: A Survey
by
Theodoros Theodoropoulos, Luis Rosa, Chafika Benzaid, Peter Gray, Eduard Marin, Antonios Makris, Luis Cordeiro, Ferran Diego, Pavel Sorokin, Marco Di Girolamo, Paolo Barone, Tarik Taleb and Konstantinos Tserpes
|
|
Security Vulnerabilities in 5G Non-Stand-Alone Networks: A Systematic Analysis and Attack Taxonomy
by
Mohamad Saalim Wani, Michael Rademacher, Thorsten Horstmann and Mathias Kretschmer
|
|
D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities
by
Mohamed Chahine Ghanem, Patrick Mulvihill, Karim Ouazzane, Ramzi Djemai and Dipo Dunsin
|
|
Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis
by
Clay Carper, Stone Olguin, Jarek Brown, Caylie Charlton and Mike Borowczak
|
|
Security Attack Behavioural Pattern Analysis for Critical Service Providers
by
Elias Seid, Oliver Popov and Fredrik Blix
|
|
A Framework for Synthetic Agetech Attack Data Generation
by
Noel Khaemba, Issa Traoré and Mohammad Mamun
|
|
Image Encryption Algorithms: A Survey of Design and Evaluation Metrics
by
Yousef Alghamdi and Arslan Munir
|
|
Anomaly Detection for Modbus over TCP in Control Systems Using Entropy and Classification-Based Analysis
by
Tirthankar Ghosh, Sikha Bagui, Subhash Bagui, Martin Kadzis and Jackson Bare
|
|
On Data Leakage Prevention Maturity: Adapting the C2M2 Framework
by
Jan Domnik and Alexander Holland
|
|
A Hybrid Dimensionality Reduction for Network Intrusion Detection
by
Humera Ghani, Shahram Salekzamankhani and Bal Virdee
|