Skip to main content

Articles

Page 3 of 4

  1. Side-channel resistance is nowadays widely accepted as a crucial factor in deciding the security assurance level of cryptographic implementations. In most cases, non-linear components (e.g. S-Boxes) of cryptog...

    Authors: Huizhong Li, Guang Yang, Jingdian Ming, Yongbin Zhou and Chengbin Jin
    Citation: Cybersecurity 2021 4:35
  2. In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and pri...

    Authors: Junpeng Xu, Haixia Chen, Xu Yang, Wei Wu and Yongcheng Song
    Citation: Cybersecurity 2021 4:34
  3. Performance/security trade-off is widely noticed in CFI research, however, we observe that not every CFI scheme is subject to the trade-off. Motivated by the key observation, we ask three questions: ➊ does tra...

    Authors: Zhilong Wang and Peng Liu
    Citation: Cybersecurity 2021 4:33
  4. Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or thr...

    Authors: Sabarathinam Chockalingam, Wolter Pieters, André Teixeira and Pieter van Gelder
    Citation: Cybersecurity 2021 4:29
  5. Gradual increase in the number of successful attacks against Industrial Control Systems (ICS) has led to an urgent need to create defense mechanisms for accurate and timely detection of the resulting process a...

    Authors: Gauthama Raman M. R., Chuadhry Mujeeb Ahmed and Aditya Mathur
    Citation: Cybersecurity 2021 4:27
  6. The quantum security of lightweight block ciphers is receiving more and more attention. However, the existing quantum attacks on lightweight block ciphers only focused on the quantum exhaustive search, while t...

    Authors: Hui Liu and Li Yang
    Citation: Cybersecurity 2021 4:23
  7. SOHO (small office/home office) routers provide services for end devices to connect to the Internet, playing an important role in cyberspace. Unfortunately, security vulnerabilities pervasively exist in these ...

    Authors: Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Longquan Liu, Yanyan Zou, Chao Zhang and Baoxu Liu
    Citation: Cybersecurity 2021 4:24
  8. While consumers use the web to perform routine activities, they are under the constant threat of attack from malicious websites. Even when visiting ‘trusted’ sites, there is always a risk that site is compromi...

    Authors: Jonah Burgess, Philip O’Kane, Sakir Sezer and Domhnall Carlin
    Citation: Cybersecurity 2021 4:25
  9. In recent years, the widespread applications of open-source software (OSS) have brought great convenience for software developers. However, it is always facing unavoidable security risks, such as open-source c...

    Authors: Yuhang Zhao, Ruigang Liang, Xiang Chen and Jing Zou
    Citation: Cybersecurity 2021 4:20
  10. Malware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static...

    Authors: Roee S. Leon, Michael Kiperberg, Anat Anatey Leon Zabag and Nezer Jacob Zaidenberg
    Citation: Cybersecurity 2021 4:19
  11. Outside the explosive successful applications of deep learning (DL) in natural language processing, computer vision, and information retrieval, there have been numerous Deep Neural Networks (DNNs) based altern...

    Authors: Chun Yang, Jinghui Xu, Shuangshuang Liang, Yanna Wu, Yu Wen, Boyang Zhang and Dan Meng
    Citation: Cybersecurity 2021 4:16
  12. Keystroke-based behavioral biometrics have been proven effective for continuous user authentication. Current state-of-the-art algorithms have achieved outstanding results in long text or short text collected b...

    Authors: Lulu Yang, Chen Li, Ruibang You, Bibo Tu and Linghui Li
    Citation: Cybersecurity 2021 4:13
  13. Cyber-physical systems (CPSs) in critical infrastructure face serious threats of attack, motivating research into a wide variety of defence mechanisms such as those that monitor for violations of invariants, i.e....

    Authors: Cheah Huei Yoong, Venkata Reddy Palleti, Rajib Ranjan Maiti, Arlindo Silva and Christopher M Poskitt
    Citation: Cybersecurity 2021 4:6
  14. Reading text in images automatically has become an attractive research topic in computer vision. Specifically, end-to-end spotting of scene text has attracted significant research attention, and relatively ide...

    Authors: Jianguo Jiang, Baole Wei, Min Yu, Gang Li, Boquan Li, Chao Liu, Min Li and Weiqing Huang
    Citation: Cybersecurity 2021 4:7
  15. The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made I...

    Authors: Ansam Khraisat and Ammar Alazab
    Citation: Cybersecurity 2021 4:18
  16. Decompilation aims to analyze and transform low-level program language (PL) codes such as binary code or assembly code to obtain an equivalent high-level PL. Decompilation plays a vital role in the cyberspace ...

    Authors: Ruigang Liang, Ying Cao, Peiwei Hu and Kai Chen
    Citation: Cybersecurity 2021 4:5
  17. Anomaly detection has been an essential and dynamic research area in the data mining. A wide range of applications including different social medias have adopted different state-of-the-art methods to identify ...

    Authors: Md. Shafiur Rahman, Sajal Halder, Md. Ashraf Uddin and Uzzal Kumar Acharjee
    Citation: Cybersecurity 2021 4:10
  18. Energy forecasting using Renewable energy sources (RESs) is gradually gaining weight in the research field due to the benefits it presents to the modern-day environment. Not only does energy forecasting using ...

    Authors: Raphael Anaadumba, Qi Liu, Bockarie Daniel Marah, Francis Mawuli Nakoty, Xiaodong Liu and Yonghong Zhang
    Citation: Cybersecurity 2021 4:1
  19. Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performanc...

    Authors: Yixiang Wang, Shaohua lv, Jiqiang Liu, Xiaolin Chang and Jinqiang Wang
    Citation: Cybersecurity 2020 3:23
  20. The functional encryption scheme designed using the lattice can realize fine-grained encryption and it can resist quantum attacks. Unfortunately, the sizes of the keys and ciphertexts in cryptographic applicat...

    Authors: Shisen Fang, Shaojun Yang and Yuexin Zhang
    Citation: Cybersecurity 2020 3:22
  21. Threat modeling is of increasing importance to IT security, and it is a complex and resource demanding task. The aim of automating threat modeling is to simplify model creation by using data that are already a...

    Authors: Margus Välja, Fredrik Heiding, Ulrik Franke and Robert Lagerström
    Citation: Cybersecurity 2020 3:19
  22. Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the...

    Authors: Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou and Qingtian Zou
    Citation: Cybersecurity 2020 3:15
  23. The state of the cyberspace portends uncertainty for the future Internet and its accelerated number of users. New paradigms add more concerns with big data collected through device sensors divulging large amou...

    Authors: Ayei E. Ibor, Florence A. Oladeji, Olusoji B. Okunoye and Obeten O. Ekabua
    Citation: Cybersecurity 2020 3:14
  24. Digital technologies have changed the way supply chain operations are structured. In this article, we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the relat...

    Authors: Petar Radanliev, David De Roure, Kevin Page, Jason R. C. Nurse, Rafael Mantilla Montalvo, Omar Santos, La’Treall Maddox and Pete Burnap
    Citation: Cybersecurity 2020 3:13
  25. Stories of cyber attacks are becoming a routine in which cyber attackers show new levels of intention by sophisticated attacks on networks. Unfortunately, cybercriminals have figured out profitable business mo...

    Authors: Rachid Ait Maalem Lahcen, Bruce Caulkins, Ram Mohapatra and Manish Kumar
    Citation: Cybersecurity 2020 3:10

Affiliated with

  • The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

    IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

    IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

    Read more..

The journal is indexed by

  • EI Compendex
  • Emerging Sources Citation Index
  • DBLP
  • DOAJ
  • SCOPUS
  • EBSCO Discovery Service
  • Gale
  • INSPEC
  • Institute of Scientific and Technical Information of China
  • Google Scholar
  • Dimensions
  • CNKI
  • Naver
  • Norwegian Register for Scientific Journals and Series
  • OCLC WorldCat Discovery Service
  • ProQuest-ExLibris Primo
  • ProQuest-ExLibris Summon
  • TD Net Discovery Service
  • UGC-CARE List (India)

Annual Journal Metrics

  • 2022 Citation Impact
    3.1 - 2-year Impact Factor
    4.8 - 5-year Impact Factor
    2.071 - SNIP (Source Normalized Impact per Paper)
    1.266 - SJR (SCImago Journal Rank)

    2023 Speed
    8 days submission to first editorial decision for all manuscripts (Median)
    95 days submission to accept (Median)

    2023 Usage 
    408,523 downloads
    15 Altmetric mentions