Skip to main content

Articles

Page 1 of 4

  1. In MILCOM 2015, Kelly et al. proposed the authentication encryption algorithm MK-3, which applied the 16-bit S-box. This paper aims to implement the 16-bit S-box with less circuit area. First, we classified th...

    Authors: Yanjun Li, Weiguo Zhang, Yiping Lin, Jian Zou and Jian Liu
    Citation: Cybersecurity 2024 7:17
  2. The rapid expansion of intra-vehicle networks has increased the number of threats to such networks. Most modern vehicles implement various physical and data-link layer technologies. Vehicles are becoming incre...

    Authors: Vinayak Tanksale
    Citation: Cybersecurity 2024 7:4
  3. Lightweight block ciphers are the essential encryption algorithm for devices with limited resources. Its goal is to ensure the security of data transmission through resource-constrained devices. Impossible dif...

    Authors: Yuting Liu, Yongqiang Li, Huiqin Chen and Mingsheng Wang
    Citation: Cybersecurity 2023 6:52
  4. Federated Learning (FL) suffers from the Non-IID problem in practice, which poses a challenge for efficient and accurate model training. To address this challenge, prior research has introduced clustered FL (C...

    Authors: Jie Yuan, Rui Qian, Tingting Yuan, Mingliang Sun, Jirui Li and Xiaoyong Li
    Citation: Cybersecurity 2023 6:39
  5. In today’s interconnected world, network traffic is replete with adversarial attacks. As technology evolves, these attacks are also becoming increasingly sophisticated, making them even harder to detect. Fortu...

    Authors: Fikirte Ayalke Demmese, Ajaya Neupane, Sajad Khorsandroo, May Wang, Kaushik Roy and Yu Fu
    Citation: Cybersecurity 2023 6:32
  6. In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the overall network and ignore the attributes of individual nodes,...

    Authors: Jun Cui, Changqi Huang, Huan Meng and Ran Wei
    Citation: Cybersecurity 2023 6:55
  7. Vulnerability reports are essential for improving software security since they record key information on vulnerabilities. In a report, CWE denotes the weakness of the vulnerability and thus helps quickly under...

    Authors: Peng Liu, Wenzhe Ye, Haiying Duan, Xianxian Li, Shuyi Zhang, Chuanjian Yao and Yongnan Li
    Citation: Cybersecurity 2023 6:29
  8. Bitcoin is a decentralized P2P cryptocurrency. It supports users to use pseudonyms instead of network addresses to send and receive transactions at the data layer, hiding users’ real network identities. Tradit...

    Authors: Huashuang Yang, Jinqiao Shi, Yue Gao, Xuebin Wang, Yanwei Sun, Ruisheng Shi and Dongbin Wang
    Citation: Cybersecurity 2023 6:50
  9. Ethereum’s high attention, rich business, certain anonymity, and untraceability have attracted a group of attackers. Cybercrime on it has become increasingly rampant, among which scam behavior is convenient, c...

    Authors: Chuyi Yan, Chen Zhang, Meng Shen, Ning Li, Jinhao Liu, Yinhao Qi, Zhigang Lu and Yuling Liu
    Citation: Cybersecurity 2023 6:46
  10. It is not uncommon for malicious sellers to collude with fake reviewers (also called spammers) to write fake reviews for multiple products to either demote competitors or promote their products’ reputations, f...

    Authors: Qi Zhang, Zhixiang Liang, Shujuan Ji, Benyong Xing and Dickson K. W. Chiu
    Citation: Cybersecurity 2023 6:26
  11. In recent years, many researchers focused on unsupervised learning for network anomaly detection in edge devices to identify attacks. The deployment of the unsupervised autoencoder model is computationally exp...

    Authors: B S Sharmila and Rohini Nagapadma
    Citation: Cybersecurity 2023 6:41
  12. The Learning With Errors (LWE) problem is widely used in lattice-based cryptography, which is the most promising post-quantum cryptography direction. There are a variety of LWE-solving methods, which can be cl...

    Authors: Yu Wei, Lei Bi, Xianhui Lu and Kunpeng Wang
    Citation: Cybersecurity 2023 6:24
  13. Intrusion detection systems are increasingly using machine learning. While machine learning has shown excellent performance in identifying malicious traffic, it may increase the risk of privacy leakage. This p...

    Authors: Kaisheng Fan, Weizhe Zhang, Guangrui Liu and Hui He
    Citation: Cybersecurity 2023 6:35
  14. Publish/subscribe(pub/sub) systems are widely used in large-scale messaging systems due to their asynchronous and decoupled nature. With the population of pub/sub cloud services, the privacy protection problem...

    Authors: Jinglei Pei, Yuyang Shi, Qingling Feng, Ruisheng Shi, Lina Lan, Shui Yu, Jinqiao Shi and Zhaofeng Ma
    Citation: Cybersecurity 2023 6:34
  15. Virtual personal assistants (VPAs), such as Amazon Alexa and Google Assistant, are software agents designed to perform tasks or provide services to individuals in response to user commands. VPAs extend their f...

    Authors: Zhixiu Guo, Ruigang Liang, Guozhu Meng and Kai Chen
    Citation: Cybersecurity 2023 6:13

Affiliated with

  • The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

    IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

    IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

    Read more..

The journal is indexed by

  • EI Compendex
  • Emerging Sources Citation Index
  • DBLP
  • DOAJ
  • SCOPUS
  • EBSCO Discovery Service
  • Gale
  • INSPEC
  • Institute of Scientific and Technical Information of China
  • Google Scholar
  • Dimensions
  • CNKI
  • Naver
  • Norwegian Register for Scientific Journals and Series
  • OCLC WorldCat Discovery Service
  • ProQuest-ExLibris Primo
  • ProQuest-ExLibris Summon
  • TD Net Discovery Service
  • UGC-CARE List (India)

Annual Journal Metrics

  • 2022 Citation Impact
    3.1 - 2-year Impact Factor
    4.8 - 5-year Impact Factor
    2.071 - SNIP (Source Normalized Impact per Paper)
    1.266 - SJR (SCImago Journal Rank)

    2022 Speed
    9 days submission to first editorial decision for all manuscripts (Median)
    113 days submission to accept (Median)

    2022 Usage 
    284,555 downloads
    41 Altmetric mentions