Skip to main content

Articles

Page 1 of 2

  1. This paper studies known indexing structures from a new point of view: minimisation of data exchange between an IoT device acting as a blockchain client and the blockchain server running a protocol suite that ...

    Authors: Alex Shafarenko

    Citation: Cybersecurity 2021 4:36

    Content type: Research

    Published on:

  2. Side-channel resistance is nowadays widely accepted as a crucial factor in deciding the security assurance level of cryptographic implementations. In most cases, non-linear components (e.g. S-Boxes) of cryptog...

    Authors: Huizhong Li, Guang Yang, Jingdian Ming, Yongbin Zhou and Chengbin Jin

    Citation: Cybersecurity 2021 4:35

    Content type: Research

    Published on:

  3. In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and pri...

    Authors: Junpeng Xu, Haixia Chen, Xu Yang, Wei Wu and Yongcheng Song

    Citation: Cybersecurity 2021 4:34

    Content type: Research

    Published on:

  4. Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or thr...

    Authors: Sabarathinam Chockalingam, Wolter Pieters, André Teixeira and Pieter van Gelder

    Citation: Cybersecurity 2021 4:29

    Content type: Research

    Published on:

  5. Gradual increase in the number of successful attacks against Industrial Control Systems (ICS) has led to an urgent need to create defense mechanisms for accurate and timely detection of the resulting process a...

    Authors: Gauthama Raman M. R., Chuadhry Mujeeb Ahmed and Aditya Mathur

    Citation: Cybersecurity 2021 4:27

    Content type: Research

    Published on:

  6. The quantum security of lightweight block ciphers is receiving more and more attention. However, the existing quantum attacks on lightweight block ciphers only focused on the quantum exhaustive search, while t...

    Authors: Hui Liu and Li Yang

    Citation: Cybersecurity 2021 4:23

    Content type: Research

    Published on:

  7. SOHO (small office/home office) routers provide services for end devices to connect to the Internet, playing an important role in cyberspace. Unfortunately, security vulnerabilities pervasively exist in these ...

    Authors: Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Longquan Liu, Yanyan Zou, Chao Zhang and Baoxu Liu

    Citation: Cybersecurity 2021 4:24

    Content type: Research

    Published on:

  8. While consumers use the web to perform routine activities, they are under the constant threat of attack from malicious websites. Even when visiting ‘trusted’ sites, there is always a risk that site is compromi...

    Authors: Jonah Burgess, Philip O’Kane, Sakir Sezer and Domhnall Carlin

    Citation: Cybersecurity 2021 4:25

    Content type: Research

    Published on:

  9. In recent years, the widespread applications of open-source software (OSS) have brought great convenience for software developers. However, it is always facing unavoidable security risks, such as open-source c...

    Authors: Yuhang Zhao, Ruigang Liang, Xiang Chen and Jing Zou

    Citation: Cybersecurity 2021 4:20

    Content type: Survey

    Published on:

  10. Malware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static...

    Authors: Roee S. Leon, Michael Kiperberg, Anat Anatey Leon Zabag and Nezer Jacob Zaidenberg

    Citation: Cybersecurity 2021 4:19

    Content type: Research

    Published on:

  11. Outside the explosive successful applications of deep learning (DL) in natural language processing, computer vision, and information retrieval, there have been numerous Deep Neural Networks (DNNs) based altern...

    Authors: Chun Yang, Jinghui Xu, Shuangshuang Liang, Yanna Wu, Yu Wen, Boyang Zhang and Dan Meng

    Citation: Cybersecurity 2021 4:16

    Content type: Research

    Published on:

  12. Keystroke-based behavioral biometrics have been proven effective for continuous user authentication. Current state-of-the-art algorithms have achieved outstanding results in long text or short text collected b...

    Authors: Lulu Yang, Chen Li, Ruibang You, Bibo Tu and Linghui Li

    Citation: Cybersecurity 2021 4:13

    Content type: Research

    Published on:

  13. Cyber-physical systems (CPSs) in critical infrastructure face serious threats of attack, motivating research into a wide variety of defence mechanisms such as those that monitor for violations of invariants, i.e....

    Authors: Cheah Huei Yoong, Venkata Reddy Palleti, Rajib Ranjan Maiti, Arlindo Silva and Christopher M Poskitt

    Citation: Cybersecurity 2021 4:6

    Content type: Research

    Published on:

  14. Reading text in images automatically has become an attractive research topic in computer vision. Specifically, end-to-end spotting of scene text has attracted significant research attention, and relatively ide...

    Authors: Jianguo Jiang, Baole Wei, Min Yu, Gang Li, Boquan Li, Chao Liu, Min Li and Weiqing Huang

    Citation: Cybersecurity 2021 4:7

    Content type: Research

    Published on:

  15. The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made I...

    Authors: Ansam Khraisat and Ammar Alazab

    Citation: Cybersecurity 2021 4:18

    Content type: Survey

    Published on:

  16. Decompilation aims to analyze and transform low-level program language (PL) codes such as binary code or assembly code to obtain an equivalent high-level PL. Decompilation plays a vital role in the cyberspace ...

    Authors: Ruigang Liang, Ying Cao, Peiwei Hu and Kai Chen

    Citation: Cybersecurity 2021 4:5

    Content type: Research

    Published on:

  17. Anomaly detection has been an essential and dynamic research area in the data mining. A wide range of applications including different social medias have adopted different state-of-the-art methods to identify ...

    Authors: Md. Shafiur Rahman, Sajal Halder, Md. Ashraf Uddin and Uzzal Kumar Acharjee

    Citation: Cybersecurity 2021 4:10

    Content type: Research

    Published on:

  18. Energy forecasting using Renewable energy sources (RESs) is gradually gaining weight in the research field due to the benefits it presents to the modern-day environment. Not only does energy forecasting using ...

    Authors: Raphael Anaadumba, Qi Liu, Bockarie Daniel Marah, Francis Mawuli Nakoty, Xiaodong Liu and Yonghong Zhang

    Citation: Cybersecurity 2021 4:1

    Content type: Research

    Published on:

  19. Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performanc...

    Authors: Yixiang Wang, Shaohua lv, Jiqiang Liu, Xiaolin Chang and Jinqiang Wang

    Citation: Cybersecurity 2020 3:23

    Content type: Research

    Published on:

  20. The functional encryption scheme designed using the lattice can realize fine-grained encryption and it can resist quantum attacks. Unfortunately, the sizes of the keys and ciphertexts in cryptographic applicat...

    Authors: Shisen Fang, Shaojun Yang and Yuexin Zhang

    Citation: Cybersecurity 2020 3:22

    Content type: Research

    Published on:

  21. Threat modeling is of increasing importance to IT security, and it is a complex and resource demanding task. The aim of automating threat modeling is to simplify model creation by using data that are already a...

    Authors: Margus Välja, Fredrik Heiding, Ulrik Franke and Robert Lagerström

    Citation: Cybersecurity 2020 3:19

    Content type: Research

    Published on:

  22. Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the...

    Authors: Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou and Qingtian Zou

    Citation: Cybersecurity 2020 3:15

    Content type: Survey

    Published on:

  23. The state of the cyberspace portends uncertainty for the future Internet and its accelerated number of users. New paradigms add more concerns with big data collected through device sensors divulging large amou...

    Authors: Ayei E. Ibor, Florence A. Oladeji, Olusoji B. Okunoye and Obeten O. Ekabua

    Citation: Cybersecurity 2020 3:14

    Content type: Research

    Published on:

  24. Digital technologies have changed the way supply chain operations are structured. In this article, we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the relat...

    Authors: Petar Radanliev, David De Roure, Kevin Page, Jason R. C. Nurse, Rafael Mantilla Montalvo, Omar Santos, La’Treall Maddox and Pete Burnap

    Citation: Cybersecurity 2020 3:13

    Content type: Review

    Published on:

Affiliated with

  • The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

    IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

    IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

    Read more..

The journal is indexed by

  • EI Compendex
  • Emerging Sources Citation Index
  • DBLP
  • DOAJ
  • SCOPUS
  • EBSCO Discovery Service
  • Gale
  • INSPEC
  • Institute of Scientific and Technical Information of China
  • Google Scholar
  • Dimensions
  • CNKI
  • Naver
  • Norwegian Register for Scientific Journals and Series
  • OCLC WorldCat Discovery Service
  • ProQuest-ExLibris Primo
  • ProQuest-ExLibris Summon
  • TD Net Discovery Service
  • UGC-CARE List (India)

Annual Journal Metrics