Skip to main content


Page 2 of 4

  1. The cybersecurity report provides unstructured actionable cyber threat intelligence (CTI) with detailed threat attack procedures and indicators of compromise (IOCs), e.g., malware hash or URL (uniform resource...

    Authors: Jian Liu, Junjie Yan, Jun Jiang, Yitong He, Xuren Wang, Zhengwei Jiang, Peian Yang and Ning Li
    Citation: Cybersecurity 2022 5:8
  2. During the initial stages of software development, the primary goal is to define precise and detailed requirements without concern for software realizations. Security constraints should be introduced then and ...

    Authors: Eduardo B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki and Joseph Yoder
    Citation: Cybersecurity 2022 5:7
  3. With the wide application and development of blockchain technology in various fields such as finance, government affairs and medical care, security incidents occur frequently on it, which brings great threats ...

    Authors: Chuyi Yan, Chen Zhang, Zhigang Lu, Zehui Wang, Yuling Liu and Baoxu Liu
    Citation: Cybersecurity 2022 5:5
  4. TTPs (Tactics, Techniques, and Procedures), which represent an attacker’s goals and methods, are the long period and essential feature of the attacker. Defenders can use TTP intelligence to perform the penetra...

    Authors: Yizhe You, Jun Jiang, Zhengwei Jiang, Peian Yang, Baoxu Liu, Huamin Feng, Xuren Wang and Ning Li
    Citation: Cybersecurity 2022 5:3
  5. To protect the network, resources, and sensitive data, the intrusion detection system (IDS) has become a fundamental component of organizations that prevents cybercriminal activities. Several approaches have b...

    Authors: Raisa Abedin Disha and Sajjad Waheed
    Citation: Cybersecurity 2022 5:1
  6. This paper studies known indexing structures from a new point of view: minimisation of data exchange between an IoT device acting as a blockchain client and the blockchain server running a protocol suite that ...

    Authors: Alex Shafarenko
    Citation: Cybersecurity 2021 4:36
  7. Side-channel resistance is nowadays widely accepted as a crucial factor in deciding the security assurance level of cryptographic implementations. In most cases, non-linear components (e.g. S-Boxes) of cryptog...

    Authors: Huizhong Li, Guang Yang, Jingdian Ming, Yongbin Zhou and Chengbin Jin
    Citation: Cybersecurity 2021 4:35
  8. In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and pri...

    Authors: Junpeng Xu, Haixia Chen, Xu Yang, Wei Wu and Yongcheng Song
    Citation: Cybersecurity 2021 4:34
  9. Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or thr...

    Authors: Sabarathinam Chockalingam, Wolter Pieters, André Teixeira and Pieter van Gelder
    Citation: Cybersecurity 2021 4:29
  10. Gradual increase in the number of successful attacks against Industrial Control Systems (ICS) has led to an urgent need to create defense mechanisms for accurate and timely detection of the resulting process a...

    Authors: Gauthama Raman M. R., Chuadhry Mujeeb Ahmed and Aditya Mathur
    Citation: Cybersecurity 2021 4:27
  11. The quantum security of lightweight block ciphers is receiving more and more attention. However, the existing quantum attacks on lightweight block ciphers only focused on the quantum exhaustive search, while t...

    Authors: Hui Liu and Li Yang
    Citation: Cybersecurity 2021 4:23
  12. SOHO (small office/home office) routers provide services for end devices to connect to the Internet, playing an important role in cyberspace. Unfortunately, security vulnerabilities pervasively exist in these ...

    Authors: Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Longquan Liu, Yanyan Zou, Chao Zhang and Baoxu Liu
    Citation: Cybersecurity 2021 4:24
  13. While consumers use the web to perform routine activities, they are under the constant threat of attack from malicious websites. Even when visiting ‘trusted’ sites, there is always a risk that site is compromi...

    Authors: Jonah Burgess, Philip O’Kane, Sakir Sezer and Domhnall Carlin
    Citation: Cybersecurity 2021 4:25
  14. In recent years, the widespread applications of open-source software (OSS) have brought great convenience for software developers. However, it is always facing unavoidable security risks, such as open-source c...

    Authors: Yuhang Zhao, Ruigang Liang, Xiang Chen and Jing Zou
    Citation: Cybersecurity 2021 4:20
  15. Malware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static...

    Authors: Roee S. Leon, Michael Kiperberg, Anat Anatey Leon Zabag and Nezer Jacob Zaidenberg
    Citation: Cybersecurity 2021 4:19
  16. Outside the explosive successful applications of deep learning (DL) in natural language processing, computer vision, and information retrieval, there have been numerous Deep Neural Networks (DNNs) based altern...

    Authors: Chun Yang, Jinghui Xu, Shuangshuang Liang, Yanna Wu, Yu Wen, Boyang Zhang and Dan Meng
    Citation: Cybersecurity 2021 4:16
  17. Keystroke-based behavioral biometrics have been proven effective for continuous user authentication. Current state-of-the-art algorithms have achieved outstanding results in long text or short text collected b...

    Authors: Lulu Yang, Chen Li, Ruibang You, Bibo Tu and Linghui Li
    Citation: Cybersecurity 2021 4:13
  18. Cyber-physical systems (CPSs) in critical infrastructure face serious threats of attack, motivating research into a wide variety of defence mechanisms such as those that monitor for violations of invariants, i.e....

    Authors: Cheah Huei Yoong, Venkata Reddy Palleti, Rajib Ranjan Maiti, Arlindo Silva and Christopher M Poskitt
    Citation: Cybersecurity 2021 4:6
  19. Reading text in images automatically has become an attractive research topic in computer vision. Specifically, end-to-end spotting of scene text has attracted significant research attention, and relatively ide...

    Authors: Jianguo Jiang, Baole Wei, Min Yu, Gang Li, Boquan Li, Chao Liu, Min Li and Weiqing Huang
    Citation: Cybersecurity 2021 4:7
  20. The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made I...

    Authors: Ansam Khraisat and Ammar Alazab
    Citation: Cybersecurity 2021 4:18
  21. Decompilation aims to analyze and transform low-level program language (PL) codes such as binary code or assembly code to obtain an equivalent high-level PL. Decompilation plays a vital role in the cyberspace ...

    Authors: Ruigang Liang, Ying Cao, Peiwei Hu and Kai Chen
    Citation: Cybersecurity 2021 4:5
  22. Anomaly detection has been an essential and dynamic research area in the data mining. A wide range of applications including different social medias have adopted different state-of-the-art methods to identify ...

    Authors: Md. Shafiur Rahman, Sajal Halder, Md. Ashraf Uddin and Uzzal Kumar Acharjee
    Citation: Cybersecurity 2021 4:10
  23. Energy forecasting using Renewable energy sources (RESs) is gradually gaining weight in the research field due to the benefits it presents to the modern-day environment. Not only does energy forecasting using ...

    Authors: Raphael Anaadumba, Qi Liu, Bockarie Daniel Marah, Francis Mawuli Nakoty, Xiaodong Liu and Yonghong Zhang
    Citation: Cybersecurity 2021 4:1
  24. Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performanc...

    Authors: Yixiang Wang, Shaohua lv, Jiqiang Liu, Xiaolin Chang and Jinqiang Wang
    Citation: Cybersecurity 2020 3:23

Affiliated with

  • The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

    IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

    IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

    Read more..

The journal is indexed by

  • EI Compendex
  • Emerging Sources Citation Index
  • DBLP
  • DOAJ
  • EBSCO Discovery Service
  • Gale
  • Institute of Scientific and Technical Information of China
  • Google Scholar
  • Dimensions
  • CNKI
  • Naver
  • Norwegian Register for Scientific Journals and Series
  • OCLC WorldCat Discovery Service
  • ProQuest-ExLibris Primo
  • ProQuest-ExLibris Summon
  • TD Net Discovery Service
  • UGC-CARE List (India)

Annual Journal Metrics

  • 2022 Citation Impact
    3.1 - 2-year Impact Factor
    4.8 - 5-year Impact Factor
    2.071 - SNIP (Source Normalized Impact per Paper)
    1.266 - SJR (SCImago Journal Rank)

    2022 Speed
    9 days submission to first editorial decision for all manuscripts (Median)
    113 days submission to accept (Median)

    2022 Usage 
    41 Altmetric mentions