Skip to main content

Articles

Page 3 of 5

  1. Fuzzing has become one of the best-established methods to uncover software bugs. Meanwhile, the market of embedded systems, which binds the software execution tightly to the very hardware architecture, has gro...

    Authors: Max Eisele, Marcello Maugeri, Rachna Shriwas, Christopher Huth and Giampaolo Bella
    Citation: Cybersecurity 2022 5:18
  2. Grey-box fuzzing techniques have been widely used in software bug finding. In general, there are many decisions to make in the fuzzing process, including which code block in the target program should be explor...

    Authors: Ji Shi, Wei Zou, Chao Zhang, Lingxiao Tan, Yanyan Zou, Yue Peng and Wei Huo
    Citation: Cybersecurity 2022 5:17
  3. As the smartphone market leader, Android has been a prominent target for malware attacks. The number of malicious applications (apps) identified for it has increased continually over the past decade, creating ...

    Authors: Masoud Mehrabi Koushki, Ibrahim AbuAlhaol, Anandharaju Durai Raju, Yang Zhou, Ronnie Salvador Giagone and Huang Shengqiang
    Citation: Cybersecurity 2022 5:16
  4. In this paper, we study the hybrid dual attack over learning with errors (LWE) problems for any secret distribution. Prior to our work, hybrid attacks are only considered for sparse and/or small secrets. A new an...

    Authors: Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang and Zhenfei Zhang
    Citation: Cybersecurity 2022 5:15
  5. The current development toward quantum attack has shocked our confidence on classical digital signature schemes. As one of the mainstreams of post quantum cryptography primitives, hash-based signature has attr...

    Authors: Lingyun Li, Xianhui Lu and Kunpeng Wang
    Citation: Cybersecurity 2022 5:13
  6. The cybersecurity report provides unstructured actionable cyber threat intelligence (CTI) with detailed threat attack procedures and indicators of compromise (IOCs), e.g., malware hash or URL (uniform resource...

    Authors: Jian Liu, Junjie Yan, Jun Jiang, Yitong He, Xuren Wang, Zhengwei Jiang, Peian Yang and Ning Li
    Citation: Cybersecurity 2022 5:8
  7. During the initial stages of software development, the primary goal is to define precise and detailed requirements without concern for software realizations. Security constraints should be introduced then and ...

    Authors: Eduardo B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki and Joseph Yoder
    Citation: Cybersecurity 2022 5:7
  8. With the wide application and development of blockchain technology in various fields such as finance, government affairs and medical care, security incidents occur frequently on it, which brings great threats ...

    Authors: Chuyi Yan, Chen Zhang, Zhigang Lu, Zehui Wang, Yuling Liu and Baoxu Liu
    Citation: Cybersecurity 2022 5:5
  9. TTPs (Tactics, Techniques, and Procedures), which represent an attacker’s goals and methods, are the long period and essential feature of the attacker. Defenders can use TTP intelligence to perform the penetra...

    Authors: Yizhe You, Jun Jiang, Zhengwei Jiang, Peian Yang, Baoxu Liu, Huamin Feng, Xuren Wang and Ning Li
    Citation: Cybersecurity 2022 5:3
  10. To protect the network, resources, and sensitive data, the intrusion detection system (IDS) has become a fundamental component of organizations that prevents cybercriminal activities. Several approaches have b...

    Authors: Raisa Abedin Disha and Sajjad Waheed
    Citation: Cybersecurity 2022 5:1
  11. This paper studies known indexing structures from a new point of view: minimisation of data exchange between an IoT device acting as a blockchain client and the blockchain server running a protocol suite that ...

    Authors: Alex Shafarenko
    Citation: Cybersecurity 2021 4:36
  12. Side-channel resistance is nowadays widely accepted as a crucial factor in deciding the security assurance level of cryptographic implementations. In most cases, non-linear components (e.g. S-Boxes) of cryptog...

    Authors: Huizhong Li, Guang Yang, Jingdian Ming, Yongbin Zhou and Chengbin Jin
    Citation: Cybersecurity 2021 4:35
  13. In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and pri...

    Authors: Junpeng Xu, Haixia Chen, Xu Yang, Wei Wu and Yongcheng Song
    Citation: Cybersecurity 2021 4:34
  14. Performance/security trade-off is widely noticed in CFI research, however, we observe that not every CFI scheme is subject to the trade-off. Motivated by the key observation, we ask three questions: ➊ does tra...

    Authors: Zhilong Wang and Peng Liu
    Citation: Cybersecurity 2021 4:33
  15. Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or thr...

    Authors: Sabarathinam Chockalingam, Wolter Pieters, André Teixeira and Pieter van Gelder
    Citation: Cybersecurity 2021 4:29
  16. Gradual increase in the number of successful attacks against Industrial Control Systems (ICS) has led to an urgent need to create defense mechanisms for accurate and timely detection of the resulting process a...

    Authors: Gauthama Raman M. R., Chuadhry Mujeeb Ahmed and Aditya Mathur
    Citation: Cybersecurity 2021 4:27
  17. The quantum security of lightweight block ciphers is receiving more and more attention. However, the existing quantum attacks on lightweight block ciphers only focused on the quantum exhaustive search, while t...

    Authors: Hui Liu and Li Yang
    Citation: Cybersecurity 2021 4:23
  18. SOHO (small office/home office) routers provide services for end devices to connect to the Internet, playing an important role in cyberspace. Unfortunately, security vulnerabilities pervasively exist in these ...

    Authors: Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Longquan Liu, Yanyan Zou, Chao Zhang and Baoxu Liu
    Citation: Cybersecurity 2021 4:24
  19. While consumers use the web to perform routine activities, they are under the constant threat of attack from malicious websites. Even when visiting ‘trusted’ sites, there is always a risk that site is compromi...

    Authors: Jonah Burgess, Philip O’Kane, Sakir Sezer and Domhnall Carlin
    Citation: Cybersecurity 2021 4:25
  20. In recent years, the widespread applications of open-source software (OSS) have brought great convenience for software developers. However, it is always facing unavoidable security risks, such as open-source c...

    Authors: Yuhang Zhao, Ruigang Liang, Xiang Chen and Jing Zou
    Citation: Cybersecurity 2021 4:20
  21. Malware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static...

    Authors: Roee S. Leon, Michael Kiperberg, Anat Anatey Leon Zabag and Nezer Jacob Zaidenberg
    Citation: Cybersecurity 2021 4:19
  22. Outside the explosive successful applications of deep learning (DL) in natural language processing, computer vision, and information retrieval, there have been numerous Deep Neural Networks (DNNs) based altern...

    Authors: Chun Yang, Jinghui Xu, Shuangshuang Liang, Yanna Wu, Yu Wen, Boyang Zhang and Dan Meng
    Citation: Cybersecurity 2021 4:16
  23. Keystroke-based behavioral biometrics have been proven effective for continuous user authentication. Current state-of-the-art algorithms have achieved outstanding results in long text or short text collected b...

    Authors: Lulu Yang, Chen Li, Ruibang You, Bibo Tu and Linghui Li
    Citation: Cybersecurity 2021 4:13
  24. Cyber-physical systems (CPSs) in critical infrastructure face serious threats of attack, motivating research into a wide variety of defence mechanisms such as those that monitor for violations of invariants, i.e....

    Authors: Cheah Huei Yoong, Venkata Reddy Palleti, Rajib Ranjan Maiti, Arlindo Silva and Christopher M Poskitt
    Citation: Cybersecurity 2021 4:6
  25. Reading text in images automatically has become an attractive research topic in computer vision. Specifically, end-to-end spotting of scene text has attracted significant research attention, and relatively ide...

    Authors: Jianguo Jiang, Baole Wei, Min Yu, Gang Li, Boquan Li, Chao Liu, Min Li and Weiqing Huang
    Citation: Cybersecurity 2021 4:7
  26. The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made I...

    Authors: Ansam Khraisat and Ammar Alazab
    Citation: Cybersecurity 2021 4:18
  27. Decompilation aims to analyze and transform low-level program language (PL) codes such as binary code or assembly code to obtain an equivalent high-level PL. Decompilation plays a vital role in the cyberspace ...

    Authors: Ruigang Liang, Ying Cao, Peiwei Hu and Kai Chen
    Citation: Cybersecurity 2021 4:5

Affiliated with

  • The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

    IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

    IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

    Read more..

The journal is indexed by

  • EI Compendex
  • Emerging Sources Citation Index
  • DBLP
  • DOAJ
  • SCOPUS
  • EBSCO Discovery Service
  • Gale
  • INSPEC
  • Institute of Scientific and Technical Information of China
  • Google Scholar
  • Dimensions
  • CNKI
  • Naver
  • Norwegian Register for Scientific Journals and Series
  • OCLC WorldCat Discovery Service
  • ProQuest-ExLibris Primo
  • ProQuest-ExLibris Summon
  • TD Net Discovery Service
  • UGC-CARE List (India)

Annual Journal Metrics

  • Citation Impact 2023
    Journal Impact Factor: 3.9
    5-year Journal Impact Factor: 4.9
    Source Normalized Impact per Paper (SNIP): 1.587
    SCImago Journal Rank (SJR): 1.136

    Speed 2023
    Submission to first editorial decision (median days): 8
    Submission to acceptance (median days): 95

    Usage 2023
    Downloads: 408,523
    Altmetric mentions: 15