- 2024
- Jacques Bou Abdo, Sherali Zeadally:
Disposable identities: Solving web tracking. J. Inf. Secur. Appl. 84: 103821 (2024) - Saurabh Agarwal, Ki-Hyun Jung:
Digital image steganalysis using entropy driven deep neural network. J. Inf. Secur. Appl. 84: 103799 (2024) - Ijaz Ahmad, Chen Yao, Lin Li, Yan Chen, Zhenzhen Liu, Inam Ullah, Mohammad Shabaz, Xin Wang, Kaiyang Huang, Guanglin Li, Guoru Zhao, Oluwarotimi Williams Samuel, Shixiong Chen:
An efficient feature selection and explainable classification method for EEG-based epileptic seizure detection. J. Inf. Secur. Appl. 80: 103654 (2024) - Poopak Alaeifar, Shantanu Pal, Zahra Jadidi, Mukhtar Hussain, Ernest Foo:
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey. J. Inf. Secur. Appl. 83: 103786 (2024) - Moatsum Alawida:
Enhancing logistic chaotic map for improved cryptographic security in random number generation. J. Inf. Secur. Appl. 80: 103685 (2024) - Moatsum Alawida:
A novel DNA tree-based chaotic image encryption algorithm. J. Inf. Secur. Appl. 83: 103791 (2024) - Marco Arazzi, Serena Nicolazzo, Antonino Nocera:
A deep reinforcement learning approach for security-aware service acquisition in IoT. J. Inf. Secur. Appl. 85: 103856 (2024) - Kanneboina Ashok, S. Gopikrishnan:
A Hybrid Secure Signcryption Algorithm for data security in an internet of medical things environment. J. Inf. Secur. Appl. 85: 103836 (2024) - Ali Ismail Awad, Aiswarya Babu, Ezedin Barka, Khaled Shuaib:
AI-powered biometrics for Internet of Things security: A review and future vision. J. Inf. Secur. Appl. 82: 103748 (2024) - Yaser Baseri, Abdelhakim Hafid, Mahdi Daghmehchi Firoozjaei, Soumaya Cherkaoui, Indrakshi Ray:
Statistical privacy protection for secure data access control in cloud. J. Inf. Secur. Appl. 84: 103823 (2024) - Nikhil Reddy Billa, Bibhash Pran Das, Mrutyunjay Biswal, Manish Okade:
CNN based image resizing forensics for double compressed JPEG images. J. Inf. Secur. Appl. 81: 103693 (2024) - Abdelhak Bouayad, Mohammed Akallouch, Abdelkader El Mahdaouy, Hamza Alami, Ismail Berrada:
On the atout ticket learning problem for neural networks and its application in securing federated learning exchanges. J. Inf. Secur. Appl. 86: 103891 (2024) - Giampaolo Bovenzi, Davide Di Monda, Antonio Montieri, Valerio Persico, Antonio Pescapè:
Classifying attack traffic in IoT environments via few-shot learning. J. Inf. Secur. Appl. 83: 103762 (2024) - Mario Alejandro Bravo-Ortiz, Esteban Mercado Ruiz, Juan Pablo Villa Pulgarin, Carlos Angel Hormaza-Cardona, Sebastián Quiñones Arredondo, Harold Brayan Arteaga-Arteaga, Simon Orozco-Arias, Oscar Cardona-Morales, Reinel Tabares-Soto:
CVTStego-Net: A convolutional vision transformer architecture for spatial image steganalysis. J. Inf. Secur. Appl. 81: 103695 (2024) - Rongsheng Cai, Lanxiang Chen, Yizhao Zhu:
Using private set intersection to achieve privacy-preserving authorization for IoT systems. J. Inf. Secur. Appl. 83: 103759 (2024) - Javad Chaharlang, Mohammad Mosleh, Saeed Rasouli Heikalabad:
Quantum Reversible Audio Steganalysis Using Quantum Schmidt Decomposition and Quantum Support Vector Machine. J. Inf. Secur. Appl. 82: 103755 (2024) - Abhilash Chakraborty, Anupam Biswas, Ajoy Kumar Khan:
SRIJAN: Secure Randomized Internally Joined Adjustable Network for one-way hashing. J. Inf. Secur. Appl. 81: 103717 (2024) - Xuanming Chang, Beijing Chen, Weiping Ding, Xin Liao:
A DNN robust video watermarking method in dual-tree complex wavelet transform domain. J. Inf. Secur. Appl. 85: 103868 (2024) - Guoqin Chang, Haichang Gao, Ge Pei, Sainan Luo, Yang Zhang, Nuo Cheng, Yiwen Tang, Qianwen Guo:
The robustness of behavior-verification-based slider CAPTCHAs. J. Inf. Secur. Appl. 81: 103711 (2024) - Avinash Kumar Chaurasia, Matin Fallahi, Thorsten Strufe, Philipp Terhörst, Patricia Arias Cabarcos:
NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research. J. Inf. Secur. Appl. 85: 103832 (2024) - Hong-Bin Chen, Hsiang-Chun Hsu, Cang-Wei Huang, Justie Su-Tzu Juan:
An easy-to-implement construction for (k,n)-threshold progressive visual secret sharing schemes. J. Inf. Secur. Appl. 83: 103757 (2024) - Rui Chen, Yongcong Mou, Wei Li:
A provably secure multi-server authentication scheme based on Chebyshev chaotic map. J. Inf. Secur. Appl. 83: 103788 (2024) - Yanli Chen, Asad Malik, Hongxia Wang, Ben He, Yonghui Zhou, Hanzhou Wu:
Enhancing robustness in video data hiding against recompression with a wide parameter range. J. Inf. Secur. Appl. 83: 103796 (2024) - Xiao Chen, Baocheng Wang, Haibin Li:
A privacy-preserving multi-factor authentication scheme for cloud-assisted IoMT with post-quantum security. J. Inf. Secur. Appl. 81: 103708 (2024) - Jinliang Chen, Tianqi Zhou, Sai Ji, Haowen Tan, Wenying Zheng:
Efficient public auditing scheme for non-administrator group with secure user revocation. J. Inf. Secur. Appl. 80: 103676 (2024) - Venkata Bhikshapathi Chenam, Syed Taqi Ali:
A Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption for cloud storage. J. Inf. Secur. Appl. 83: 103801 (2024) - Haotian Cheng, Xiaofeng Li, He Zhao, Tong Zhou, Bin Yu, Nianzu Sheng:
S-Cred: An accountable anonymous credential scheme with decentralized verification and flexible revocation. J. Inf. Secur. Appl. 82: 103735 (2024) - Chit-Jie Chew, Yu-Cheng Lin, Ying-Chin Chen, Yun-Yi Fan, Jung-San Lee:
Preserving manipulated and synthetic Deepfake detection through face texture naturalness. J. Inf. Secur. Appl. 83: 103798 (2024) - Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo:
Automatic decision tree-based NIDPS ruleset generation for DoS/DDoS attacks. J. Inf. Secur. Appl. 82: 103736 (2024) - Vivek Dabra, Saru Kumari, Anju Bala, Sonam Yadav:
SL3PAKE: Simple Lattice-based Three-party Password Authenticated Key Exchange for post-quantum world. J. Inf. Secur. Appl. 84: 103826 (2024)