Skip to main content


Page 4 of 5

  1. Anomaly detection has been an essential and dynamic research area in the data mining. A wide range of applications including different social medias have adopted different state-of-the-art methods to identify ...

    Authors: Md. Shafiur Rahman, Sajal Halder, Md. Ashraf Uddin and Uzzal Kumar Acharjee
    Citation: Cybersecurity 2021 4:10
  2. Energy forecasting using Renewable energy sources (RESs) is gradually gaining weight in the research field due to the benefits it presents to the modern-day environment. Not only does energy forecasting using ...

    Authors: Raphael Anaadumba, Qi Liu, Bockarie Daniel Marah, Francis Mawuli Nakoty, Xiaodong Liu and Yonghong Zhang
    Citation: Cybersecurity 2021 4:1
  3. Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performanc...

    Authors: Yixiang Wang, Shaohua lv, Jiqiang Liu, Xiaolin Chang and Jinqiang Wang
    Citation: Cybersecurity 2020 3:23
  4. The functional encryption scheme designed using the lattice can realize fine-grained encryption and it can resist quantum attacks. Unfortunately, the sizes of the keys and ciphertexts in cryptographic applicat...

    Authors: Shisen Fang, Shaojun Yang and Yuexin Zhang
    Citation: Cybersecurity 2020 3:22
  5. Threat modeling is of increasing importance to IT security, and it is a complex and resource demanding task. The aim of automating threat modeling is to simplify model creation by using data that are already a...

    Authors: Margus Välja, Fredrik Heiding, Ulrik Franke and Robert Lagerström
    Citation: Cybersecurity 2020 3:19
  6. Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the...

    Authors: Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou and Qingtian Zou
    Citation: Cybersecurity 2020 3:15
  7. The state of the cyberspace portends uncertainty for the future Internet and its accelerated number of users. New paradigms add more concerns with big data collected through device sensors divulging large amou...

    Authors: Ayei E. Ibor, Florence A. Oladeji, Olusoji B. Okunoye and Obeten O. Ekabua
    Citation: Cybersecurity 2020 3:14
  8. Digital technologies have changed the way supply chain operations are structured. In this article, we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the relat...

    Authors: Petar Radanliev, David De Roure, Kevin Page, Jason R. C. Nurse, Rafael Mantilla Montalvo, Omar Santos, La’Treall Maddox and Pete Burnap
    Citation: Cybersecurity 2020 3:13
  9. Stories of cyber attacks are becoming a routine in which cyber attackers show new levels of intention by sophisticated attacks on networks. Unfortunately, cybercriminals have figured out profitable business mo...

    Authors: Rachid Ait Maalem Lahcen, Bruce Caulkins, Ram Mohapatra and Manish Kumar
    Citation: Cybersecurity 2020 3:10
  10. In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other...

    Authors: Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice and Stefan Mangard
    Citation: Cybersecurity 2020 3:2
  11. Humans are commonly seen as the weakest link in corporate information security. This led to a lot of effort being put into security training and awareness campaigns, which resulted in employees being less like...

    Authors: Manfred Vielberth, Florian Menges and Günther Pernul
    Citation: Cybersecurity 2019 2:23

    The Correction to this article has been published in Cybersecurity 2019 2:24

  12. Many real world attacks often target the implementation of a cryptographic scheme, rather than the algorithm itself, and a system designer has to consider new models that can capture these attacks. For example...

    Authors: Yuejun Liu, Rui Zhang and Yongbin Zhou
    Citation: Cybersecurity 2019 2:22
  13. The group signature scheme is an important primitive in cryptography, it allows members in a group to generate signatures anonymously on behalf of the whole group. In view of the practical application of such ...

    Authors: Yiru Sun, Yanyan Liu and Bo Wu
    Citation: Cybersecurity 2019 2:21
  14. Role-Based Access Control (RBAC) policies are at the core of Cybersecurity as they ease the enforcement of basic security principles, e.g., Least Privilege and Separation of Duties. As ICT systems and business pr...

    Authors: Marco Benedetti and Marco Mori
    Citation: Cybersecurity 2019 2:19
  15. As one of the most notorious programming errors, memory access errors still hurt modern software security. Particularly, they are hidden deeply in important software systems written in memory unsafe languages ...

    Authors: Wenjie Li, Dongpeng Xu, Wei Wu, Xiaorui Gong, Xiaobo Xiang, Yan Wang, Fangming gu and Qianxiang Zeng
    Citation: Cybersecurity 2019 2:17
  16. Exploitability assessment of vulnerabilities is important for both defenders and attackers. The ultimate way to assess the exploitability is crafting a working exploit. However, it usually takes tremendous hou...

    Authors: Yan Wang, Wei Wu, Chao Zhang, Xinyu Xing, Xiaorui Gong and Wei Zou
    Citation: Cybersecurity 2019 2:12
  17. Web crawlers have been misused for several malicious purposes such as downloading server data without permission from the website administrator. Moreover, armoured crawlers are evolving against new anti-crawle...

    Authors: Shengye Wan, Yue Li and Kun Sun
    Citation: Cybersecurity 2019 2:9
  18. The interaction between gene loci, namely epistasis, is a widespread biological genetic phenomenon. In genome-wide association studies(GWAS), epistasis detection of complex diseases is a major challenge. Altho...

    Authors: Qingfeng Chen, Xu Zhang and Ruchang Zhang
    Citation: Cybersecurity 2019 2:7
  19. A main challenge of attribute-based access control (ABAC) is the handling of missing information. Several studies have shown that the way standard ABAC mechanisms, e.g. based on XACML, handle missing informati...

    Authors: Charles Morisset, Tim A. C. Willemse and Nicola Zannone
    Citation: Cybersecurity 2019 2:6

Affiliated with

  • The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

    IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

    IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

    Read more..

The journal is indexed by

  • EI Compendex
  • Emerging Sources Citation Index
  • DBLP
  • DOAJ
  • EBSCO Discovery Service
  • Gale
  • Institute of Scientific and Technical Information of China
  • Google Scholar
  • Dimensions
  • CNKI
  • Naver
  • Norwegian Register for Scientific Journals and Series
  • OCLC WorldCat Discovery Service
  • ProQuest-ExLibris Primo
  • ProQuest-ExLibris Summon
  • TD Net Discovery Service
  • UGC-CARE List (India)

Annual Journal Metrics

  • Citation Impact 2023
    Journal Impact Factor: 3.9
    5-year Journal Impact Factor: 4.9
    Source Normalized Impact per Paper (SNIP): 1.587
    SCImago Journal Rank (SJR): 1.136

    Speed 2023
    Submission to first editorial decision (median days): 8
    Submission to acceptance (median days): 95

    Usage 2023
    Downloads: 408,523
    Altmetric mentions: 15