Skip to main content

Articles

Page 5 of 5

  1. The ever-increasing amount of major security incidents has led to an emerging interest in cooperative approaches to encounter cyber threats. To enable cooperation in detecting and preventing attacks it is an i...

    Authors: Fabian Böhm, Florian Menges and Günther Pernul
    Citation: Cybersecurity 2018 1:16
  2. The popularity of cloud hosting services also brings in new security chal- lenges: it has been reported that these services are increasingly utilized by miscreants for their malicious online activities. Mitiga...

    Authors: Xiaojing Liao, Sumayah Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao and Raheem Beyah
    Citation: Cybersecurity 2018 1:14
  3. Fully data using only public information. So far, most FHE schemes are CPA secure. In PKC 2017, Canetti et al. extended the generic transformation of Boneh, Canetti, Halevi and Katz to turn any multi-key ident...

    Authors: Biao Wang, Xueqing Wang and Rui Xue
    Citation: Cybersecurity 2018 1:11
  4. Malware detection has become mission sensitive as its threats spread from computer systems to Internet of things systems. Modern malware variants are generally equipped with sophisticated packers, which allow ...

    Authors: Jixin Zhang, Kehuan Zhang, Zheng Qin, Hui Yin and Qixin Wu
    Citation: Cybersecurity 2018 1:10
  5. Adversarial examples revealed the weakness of machine learning techniques in terms of robustness, which moreover inspired adversaries to make use of the weakness to attack systems employing machine learning. E...

    Authors: Lu Sun, Mingtian Tan and Zhe Zhou
    Citation: Cybersecurity 2018 1:9
  6. Wearing smartwatches becomes increasingly popular in people’s lives. This paper shows that a smartwatch can help its bearer authenticate to a login system effectively and securely even if the bearer’s password...

    Authors: Bing Chang, Yingjiu Li, Qiongxiao Wang, Wen-Tao Zhu and Robert H. Deng
    Citation: Cybersecurity 2018 1:7
  7. Security vulnerability is one of the root causes of cyber-security threats. To discover vulnerabilities and fix them in advance, researchers have proposed several techniques, among which fuzzing is the most wi...

    Authors: Jun Li, Bodong Zhao and Chao Zhang
    Citation: Cybersecurity 2018 1:6
  8. It is fundamentally challenging to build a secure system atop the current computer architecture. The complexity in software, hardware and ASIC manufacture has reached beyond the capability of existing verifica...

    Authors: Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia and Peng Liu
    Citation: Cybersecurity 2018 1:2

Affiliated with

  • The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

    IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

    IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

    Read more..

The journal is indexed by

  • EI Compendex
  • Emerging Sources Citation Index
  • DBLP
  • DOAJ
  • SCOPUS
  • EBSCO Discovery Service
  • Gale
  • INSPEC
  • Institute of Scientific and Technical Information of China
  • Google Scholar
  • Dimensions
  • CNKI
  • Naver
  • Norwegian Register for Scientific Journals and Series
  • OCLC WorldCat Discovery Service
  • ProQuest-ExLibris Primo
  • ProQuest-ExLibris Summon
  • TD Net Discovery Service
  • UGC-CARE List (India)

Annual Journal Metrics

  • Citation Impact 2023
    Journal Impact Factor: 3.9
    5-year Journal Impact Factor: 4.9
    Source Normalized Impact per Paper (SNIP): 1.587
    SCImago Journal Rank (SJR): 1.136

    Speed 2023
    Submission to first editorial decision (median days): 8
    Submission to acceptance (median days): 95

    Usage 2023
    Downloads: 408,523
    Altmetric mentions: 15