Skip to main content

Articles

Page 2 of 5

  1. Bitcoin is a decentralized P2P cryptocurrency. It supports users to use pseudonyms instead of network addresses to send and receive transactions at the data layer, hiding users’ real network identities. Tradit...

    Authors: Huashuang Yang, Jinqiao Shi, Yue Gao, Xuebin Wang, Yanwei Sun, Ruisheng Shi and Dongbin Wang
    Citation: Cybersecurity 2023 6:50
  2. Ethereum’s high attention, rich business, certain anonymity, and untraceability have attracted a group of attackers. Cybercrime on it has become increasingly rampant, among which scam behavior is convenient, c...

    Authors: Chuyi Yan, Chen Zhang, Meng Shen, Ning Li, Jinhao Liu, Yinhao Qi, Zhigang Lu and Yuling Liu
    Citation: Cybersecurity 2023 6:46
  3. It is not uncommon for malicious sellers to collude with fake reviewers (also called spammers) to write fake reviews for multiple products to either demote competitors or promote their products’ reputations, f...

    Authors: Qi Zhang, Zhixiang Liang, Shujuan Ji, Benyong Xing and Dickson K. W. Chiu
    Citation: Cybersecurity 2023 6:26
  4. In recent years, many researchers focused on unsupervised learning for network anomaly detection in edge devices to identify attacks. The deployment of the unsupervised autoencoder model is computationally exp...

    Authors: B S Sharmila and Rohini Nagapadma
    Citation: Cybersecurity 2023 6:41
  5. The Learning With Errors (LWE) problem is widely used in lattice-based cryptography, which is the most promising post-quantum cryptography direction. There are a variety of LWE-solving methods, which can be cl...

    Authors: Yu Wei, Lei Bi, Xianhui Lu and Kunpeng Wang
    Citation: Cybersecurity 2023 6:24
  6. Intrusion detection systems are increasingly using machine learning. While machine learning has shown excellent performance in identifying malicious traffic, it may increase the risk of privacy leakage. This p...

    Authors: Kaisheng Fan, Weizhe Zhang, Guangrui Liu and Hui He
    Citation: Cybersecurity 2023 6:35
  7. Publish/subscribe(pub/sub) systems are widely used in large-scale messaging systems due to their asynchronous and decoupled nature. With the population of pub/sub cloud services, the privacy protection problem...

    Authors: Jinglei Pei, Yuyang Shi, Qingling Feng, Ruisheng Shi, Lina Lan, Shui Yu, Jinqiao Shi and Zhaofeng Ma
    Citation: Cybersecurity 2023 6:34
  8. Virtual personal assistants (VPAs), such as Amazon Alexa and Google Assistant, are software agents designed to perform tasks or provide services to individuals in response to user commands. VPAs extend their f...

    Authors: Zhixiu Guo, Ruigang Liang, Guozhu Meng and Kai Chen
    Citation: Cybersecurity 2023 6:13
  9. Applications such as autonomous vehicles and medical screening use deep learning models to localize and identify hundreds of objects in a single frame. In the past, it has been shown how an attacker can fool t...

    Authors: Yisroel Mirsky
    Citation: Cybersecurity 2023 6:18
  10. Time Sensitive Networking (TSN) will be an integral component of industrial networking. Time synchronization in TSN is provided by the IEEE-1588, Precision Time Protocol (PTP) protocol. The standard, dating ba...

    Authors: Davide Berardi, Nils O. Tippenhauer, Andrea Melis, Marco Prandini and Franco Callegati
    Citation: Cybersecurity 2023 6:8
  11. The continuous increase of electric vehicles is being facilitating the large-scale distributed charging-pile deployment. It is crucial to guarantee normal operation of charging piles, resulting in the importan...

    Authors: Wen Wang, Jianhua Wang, Xiaofeng Peng, Ye Yang, Chun Xiao, Shuai Yang, Mingcai Wang, Lingfei Wang, Lin Li and Xiaolin Chang
    Citation: Cybersecurity 2023 6:7
  12. The handy biometric data is a double-edged sword, paving the way of the prosperity of biometric authentication systems but bringing the personal privacy concern. To alleviate the concern, various biometric tem...

    Authors: Yubing Jiang, Peisong Shen, Li Zeng, Xiaojie Zhu, Di Jiang and Chi Chen
    Citation: Cybersecurity 2023 6:4
  13. Internet security has become a major concern with the growing use of the Internet of Things (IoT) and edge computing technologies. Even though data processing is handled by the edge server, sensitive data is g...

    Authors: Sohel Rana, M. Rubaiyat Hossain Mondal and Joarder Kamruzzaman
    Citation: Cybersecurity 2023 6:3
  14. Robust 3D mesh watermarking is a traditional research topic in computer graphics, which provides an efficient solution to the copyright protection for 3D meshes. Traditionally, researchers need manually design wa...

    Authors: Feng Wang, Hang Zhou, Han Fang, Weiming Zhang and Nenghai Yu
    Citation: Cybersecurity 2022 5:24
  15. Feather weight (FeW) cipher is a lightweight block cipher proposed by Kumar et al. in 2019, which takes 64 bits plaintext as input and produces 64 bits ciphertext. As Kumar et al. said, FeW is a software orien...

    Authors: Haiyan Xiao, Lifang Wang and Jinyong Chang
    Citation: Cybersecurity 2022 5:28
  16. Network function virtualization provides programmable in-network middlewares by leveraging virtualization technologies and commodity hardware and has gained popularity among all mainstream network device manuf...

    Authors: Yu Zhang, Nanyu Zhong, Wei You, Yanyan Zou, Kunpeng Jian, Jiahuan Xu, Jian Sun, Baoxu Liu and Wei Huo
    Citation: Cybersecurity 2022 5:21
  17. Software-defined networking (SDN), a novel network paradigm, separates the control plane and data plane into different network equipment to realize the flexible control of network traffic. Its excellent progra...

    Authors: Kun Jia, Chaoge Liu, Qixu Liu, Junnan Wang, Jiazhi Liu and Feng Liu
    Citation: Cybersecurity 2022 5:27
  18. A forward-secure group signature (FSGS) ensures the unforgeability of signatures in the past time period despite signing secret key is leaked in the current time period. As we know, traditional FSGS schemes ar...

    Authors: Zhijian Liao, Qiong Huang and Xinjian Chen
    Citation: Cybersecurity 2022 5:20
  19. Domain name system (DNS), as one of the most critical internet infrastructure, has been abused by various cyber attacks. Current malicious domain detection capabilities are limited by insufficient credible lab...

    Authors: Zhaoshan Fan, Qing Wang, Haoran Jiao, Junrong Liu, Zelin Cui, Song Liu and Yuling Liu
    Citation: Cybersecurity 2022 5:19

Affiliated with

  • The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

    IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

    IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

    Read more..

The journal is indexed by

  • EI Compendex
  • Emerging Sources Citation Index
  • DBLP
  • DOAJ
  • SCOPUS
  • EBSCO Discovery Service
  • Gale
  • INSPEC
  • Institute of Scientific and Technical Information of China
  • Google Scholar
  • Dimensions
  • CNKI
  • Naver
  • Norwegian Register for Scientific Journals and Series
  • OCLC WorldCat Discovery Service
  • ProQuest-ExLibris Primo
  • ProQuest-ExLibris Summon
  • TD Net Discovery Service
  • UGC-CARE List (India)

Annual Journal Metrics

  • Citation Impact 2023
    Journal Impact Factor: 3.9
    5-year Journal Impact Factor: 4.9
    Source Normalized Impact per Paper (SNIP): 1.587
    SCImago Journal Rank (SJR): 1.136

    Speed 2023
    Submission to first editorial decision (median days): 8
    Submission to acceptance (median days): 95

    Usage 2023
    Downloads: 408,523
    Altmetric mentions: 15