no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A circuit for detecting IoT malware using signatures derived from processor information on LSI
|
Matunaka, Yutaro |
|
|
24 |
4 |
|
article |
2 |
A Comprehensive User Study on Medical Device Threat Modeling Methodologies and CyberLlama2 - MEDICALHARM Threat Modeling Assistant.
|
Kwarteng, Emmanuel |
|
|
24 |
4 |
|
article |
3 |
A formal technique for automatic resolution of OpenFlow anomalies
|
Aryan, Ramtin |
|
|
24 |
4 |
|
article |
4 |
A One-class variational autoencoder for smart contract vulnerability detection
|
Guan, Shaowei |
|
|
24 |
4 |
|
article |
5 |
A vulnerability assessment and exploitation analysis of a powerline communication HomePlug AV network adapter
|
Uwaezuoke, Emmanuel |
|
|
24 |
4 |
|
article |
6 |
A Webshell detection method based on feature fusion and federated learning
|
Qing-peng, Zeng |
|
|
24 |
4 |
|
article |
7 |
CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems
|
Barredo, Jorge |
|
|
24 |
4 |
|
article |
8 |
CI2P-MedHFDroid: a context-aware individual privacy preferences model for medical, health & fitness android apps
|
Phien, Nguyen Ngoc |
|
|
24 |
4 |
|
article |
9 |
Construction of network pentest-defense adversarial environment based on NASim
|
Huo, Yuanzhi |
|
|
24 |
4 |
|
article |
10 |
Correction: Maritime cybersecurity: protecting digital seas
|
Martínez, Ferney |
|
|
24 |
4 |
|
article |
11 |
Cross-Silo Federated Learning in Security Operations Centers for effective malware detection
|
Xenos, Georgios |
|
|
24 |
4 |
|
article |
12 |
Defending industrial internet of things against Modbus/TCP threats: A combined AI-based detection and SDN-based mitigation solution
|
Kotsiopoulos, Thanasis |
|
|
24 |
4 |
|
article |
13 |
Digital sovereignty in practice: analyzing the EU’s NIS2 directive
|
Kianpour, Mazaher |
|
|
24 |
4 |
|
article |
14 |
Enhancing software-defined perimeters with integrated identity solutions and threat detection for robust zero trust security
|
Paya, Antonio |
|
|
24 |
4 |
|
article |
15 |
Formal security analysis and improvement based on the ZLL touchlink commissioning protocol
|
Feng, Tao |
|
|
24 |
4 |
|
article |
16 |
Identifying Open-Source Threat Detection Resources on GitHub: A Scalable Machine Learning Approach
|
Kern, Manuel |
|
|
24 |
4 |
|
article |
17 |
Information security governance in the public sector: investigations, approaches, measures, and trends
|
Magnusson, Lars |
|
|
24 |
4 |
|
article |
18 |
Insights from field experience: digital forensics of event and voyage data recorders in transportation systems accident investigation
|
Cantelli-Forti, Alessandro |
|
|
24 |
4 |
|
article |
19 |
Investigating the cybersecurity risks of remote work: a systematic literature review of organizational vulnerabilities and mitigation strategies
|
Nizamuddin, Mohammad |
|
|
24 |
4 |
|
article |
20 |
MF2S-CID: A dynamic multi-model framework for scalable and interpretable intrusion detection
|
Farhat, Saida |
|
|
24 |
4 |
|
article |
21 |
Preparing IoT-enabled organisations for digital forensics: model for readiness and resilience
|
Kuku, Oyeyemi |
|
|
24 |
4 |
|
article |
22 |
Pseudonym shuffling-driven blockchain and Autoencoder-based secure E-healthcare data management
|
Chandela, Tanuj |
|
|
24 |
4 |
|
article |
23 |
Revisiting Cuckoo Hash-based Unbalanced Private Set Union: Leakage Analysis and Better Construction
|
Liu, Keyang |
|
|
24 |
4 |
|
article |
24 |
Securing air-gapped systems-review of covert techniques for data ex-filtration and a new clause proposal for ISO 27001
|
Saeed, Aamna |
|
|
24 |
4 |
|
article |
25 |
Securing financial systems through data sovereignty: a systematic review of approaches and regulations
|
Patil, Ayush |
|
|
24 |
4 |
|
article |
26 |
ShieldFlow: a novel framework for OT cybersecurity in the context of industry 4.0
|
Halawi Ghoson, Nourhan |
|
|
24 |
4 |
|
article |
27 |
StorjChain: overcoming the blockchain trilemma via decentralized storage and erasure-coded sharding
|
Reno, Saha |
|
|
24 |
4 |
|
article |
28 |
Synthetic data: revisiting the privacy-utility trade-off
|
Sarmin, Fatima Jahan |
|
|
24 |
4 |
|
article |
29 |
The impact of cyber threat intelligence (CTI) on employee behavior and skills and the implications for organizational cyber resilience
|
Avrahami, Zafrir |
|
|
24 |
4 |
|
article |
30 |
Threat detection in smart homes: A sociotechnical multimodal conversational approach for improved cyber situational awareness
|
McDermott, Christopher D. |
|
|
24 |
4 |
|
article |
31 |
Weighted quality criteria for cyber threat intelligence: assessment and prioritisation in the MISP data model
|
Chatziamanetoglou, Dimitrios |
|
|
24 |
4 |
|
article |
32 |
xT-STRIDE threat model for unmanned air vehicle security
|
Yerden, Aytac Ugur |
|
|
24 |
4 |
|
article |
33 |
Yellow training: a collaborative tCOFELET tabletop serious game for cybersecurity awareness and training
|
Katsantonis, Menelaos N. |
|
|
24 |
4 |
|
article |