Skip to main content

Articles

Page 2 of 5

  1. Publish/subscribe(pub/sub) systems are widely used in large-scale messaging systems due to their asynchronous and decoupled nature. With the population of pub/sub cloud services, the privacy protection problem...

    Authors: Jinglei Pei, Yuyang Shi, Qingling Feng, Ruisheng Shi, Lina Lan, Shui Yu, Jinqiao Shi and Zhaofeng Ma
    Citation: Cybersecurity 2023 6:34
  2. Virtual personal assistants (VPAs), such as Amazon Alexa and Google Assistant, are software agents designed to perform tasks or provide services to individuals in response to user commands. VPAs extend their f...

    Authors: Zhixiu Guo, Ruigang Liang, Guozhu Meng and Kai Chen
    Citation: Cybersecurity 2023 6:13
  3. Applications such as autonomous vehicles and medical screening use deep learning models to localize and identify hundreds of objects in a single frame. In the past, it has been shown how an attacker can fool t...

    Authors: Yisroel Mirsky
    Citation: Cybersecurity 2023 6:18
  4. Time Sensitive Networking (TSN) will be an integral component of industrial networking. Time synchronization in TSN is provided by the IEEE-1588, Precision Time Protocol (PTP) protocol. The standard, dating ba...

    Authors: Davide Berardi, Nils O. Tippenhauer, Andrea Melis, Marco Prandini and Franco Callegati
    Citation: Cybersecurity 2023 6:8
  5. The continuous increase of electric vehicles is being facilitating the large-scale distributed charging-pile deployment. It is crucial to guarantee normal operation of charging piles, resulting in the importan...

    Authors: Wen Wang, Jianhua Wang, Xiaofeng Peng, Ye Yang, Chun Xiao, Shuai Yang, Mingcai Wang, Lingfei Wang, Lin Li and Xiaolin Chang
    Citation: Cybersecurity 2023 6:7
  6. The handy biometric data is a double-edged sword, paving the way of the prosperity of biometric authentication systems but bringing the personal privacy concern. To alleviate the concern, various biometric tem...

    Authors: Yubing Jiang, Peisong Shen, Li Zeng, Xiaojie Zhu, Di Jiang and Chi Chen
    Citation: Cybersecurity 2023 6:4
  7. Internet security has become a major concern with the growing use of the Internet of Things (IoT) and edge computing technologies. Even though data processing is handled by the edge server, sensitive data is g...

    Authors: Sohel Rana, M. Rubaiyat Hossain Mondal and Joarder Kamruzzaman
    Citation: Cybersecurity 2023 6:3
  8. Robust 3D mesh watermarking is a traditional research topic in computer graphics, which provides an efficient solution to the copyright protection for 3D meshes. Traditionally, researchers need manually design wa...

    Authors: Feng Wang, Hang Zhou, Han Fang, Weiming Zhang and Nenghai Yu
    Citation: Cybersecurity 2022 5:24
  9. Feather weight (FeW) cipher is a lightweight block cipher proposed by Kumar et al. in 2019, which takes 64 bits plaintext as input and produces 64 bits ciphertext. As Kumar et al. said, FeW is a software orien...

    Authors: Haiyan Xiao, Lifang Wang and Jinyong Chang
    Citation: Cybersecurity 2022 5:28
  10. Network function virtualization provides programmable in-network middlewares by leveraging virtualization technologies and commodity hardware and has gained popularity among all mainstream network device manuf...

    Authors: Yu Zhang, Nanyu Zhong, Wei You, Yanyan Zou, Kunpeng Jian, Jiahuan Xu, Jian Sun, Baoxu Liu and Wei Huo
    Citation: Cybersecurity 2022 5:21
  11. Software-defined networking (SDN), a novel network paradigm, separates the control plane and data plane into different network equipment to realize the flexible control of network traffic. Its excellent progra...

    Authors: Kun Jia, Chaoge Liu, Qixu Liu, Junnan Wang, Jiazhi Liu and Feng Liu
    Citation: Cybersecurity 2022 5:27
  12. A forward-secure group signature (FSGS) ensures the unforgeability of signatures in the past time period despite signing secret key is leaked in the current time period. As we know, traditional FSGS schemes ar...

    Authors: Zhijian Liao, Qiong Huang and Xinjian Chen
    Citation: Cybersecurity 2022 5:20
  13. Domain name system (DNS), as one of the most critical internet infrastructure, has been abused by various cyber attacks. Current malicious domain detection capabilities are limited by insufficient credible lab...

    Authors: Zhaoshan Fan, Qing Wang, Haoran Jiao, Junrong Liu, Zelin Cui, Song Liu and Yuling Liu
    Citation: Cybersecurity 2022 5:19
  14. Fuzzing has become one of the best-established methods to uncover software bugs. Meanwhile, the market of embedded systems, which binds the software execution tightly to the very hardware architecture, has gro...

    Authors: Max Eisele, Marcello Maugeri, Rachna Shriwas, Christopher Huth and Giampaolo Bella
    Citation: Cybersecurity 2022 5:18
  15. Grey-box fuzzing techniques have been widely used in software bug finding. In general, there are many decisions to make in the fuzzing process, including which code block in the target program should be explor...

    Authors: Ji Shi, Wei Zou, Chao Zhang, Lingxiao Tan, Yanyan Zou, Yue Peng and Wei Huo
    Citation: Cybersecurity 2022 5:17
  16. As the smartphone market leader, Android has been a prominent target for malware attacks. The number of malicious applications (apps) identified for it has increased continually over the past decade, creating ...

    Authors: Masoud Mehrabi Koushki, Ibrahim AbuAlhaol, Anandharaju Durai Raju, Yang Zhou, Ronnie Salvador Giagone and Huang Shengqiang
    Citation: Cybersecurity 2022 5:16
  17. In this paper, we study the hybrid dual attack over learning with errors (LWE) problems for any secret distribution. Prior to our work, hybrid attacks are only considered for sparse and/or small secrets. A new an...

    Authors: Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang and Zhenfei Zhang
    Citation: Cybersecurity 2022 5:15
  18. The current development toward quantum attack has shocked our confidence on classical digital signature schemes. As one of the mainstreams of post quantum cryptography primitives, hash-based signature has attr...

    Authors: Lingyun Li, Xianhui Lu and Kunpeng Wang
    Citation: Cybersecurity 2022 5:13
  19. The cybersecurity report provides unstructured actionable cyber threat intelligence (CTI) with detailed threat attack procedures and indicators of compromise (IOCs), e.g., malware hash or URL (uniform resource...

    Authors: Jian Liu, Junjie Yan, Jun Jiang, Yitong He, Xuren Wang, Zhengwei Jiang, Peian Yang and Ning Li
    Citation: Cybersecurity 2022 5:8
  20. During the initial stages of software development, the primary goal is to define precise and detailed requirements without concern for software realizations. Security constraints should be introduced then and ...

    Authors: Eduardo B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki and Joseph Yoder
    Citation: Cybersecurity 2022 5:7
  21. With the wide application and development of blockchain technology in various fields such as finance, government affairs and medical care, security incidents occur frequently on it, which brings great threats ...

    Authors: Chuyi Yan, Chen Zhang, Zhigang Lu, Zehui Wang, Yuling Liu and Baoxu Liu
    Citation: Cybersecurity 2022 5:5
  22. TTPs (Tactics, Techniques, and Procedures), which represent an attacker’s goals and methods, are the long period and essential feature of the attacker. Defenders can use TTP intelligence to perform the penetra...

    Authors: Yizhe You, Jun Jiang, Zhengwei Jiang, Peian Yang, Baoxu Liu, Huamin Feng, Xuren Wang and Ning Li
    Citation: Cybersecurity 2022 5:3

Affiliated with

  • The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

    IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

    IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

    Read more..

The journal is indexed by

  • EI Compendex
  • Emerging Sources Citation Index
  • DBLP
  • DOAJ
  • SCOPUS
  • EBSCO Discovery Service
  • Gale
  • INSPEC
  • Institute of Scientific and Technical Information of China
  • Google Scholar
  • Dimensions
  • CNKI
  • Naver
  • Norwegian Register for Scientific Journals and Series
  • OCLC WorldCat Discovery Service
  • ProQuest-ExLibris Primo
  • ProQuest-ExLibris Summon
  • TD Net Discovery Service
  • UGC-CARE List (India)

Annual Journal Metrics

  • 2022 Citation Impact
    3.1 - 2-year Impact Factor
    4.8 - 5-year Impact Factor
    2.071 - SNIP (Source Normalized Impact per Paper)
    1.266 - SJR (SCImago Journal Rank)

    2023 Speed
    8 days submission to first editorial decision for all manuscripts (Median)
    95 days submission to accept (Median)

    2023 Usage 
    408,523 downloads
    15 Altmetric mentions