Skip to main content

Advertisement

Articles

Page 1 of 1

  1. Content type: Research

    Many real world attacks often target the implementation of a cryptographic scheme, rather than the algorithm itself, and a system designer has to consider new models that can capture these attacks. For example...

    Authors: Yuejun Liu, Rui Zhang and Yongbin Zhou

    Citation: Cybersecurity 2019 2:22

    Published on:

  2. Content type: Research

    The group signature scheme is an important primitive in cryptography, it allows members in a group to generate signatures anonymously on behalf of the whole group. In view of the practical application of such ...

    Authors: Yiru Sun, Yanyan Liu and Bo Wu

    Citation: Cybersecurity 2019 2:21

    Published on:

  3. Content type: Research

    Role-Based Access Control (RBAC) policies are at the core of Cybersecurity as they ease the enforcement of basic security principles, e.g., Least Privilege and Separation of Duties. As ICT systems and business pr...

    Authors: Marco Benedetti and Marco Mori

    Citation: Cybersecurity 2019 2:19

    Published on:

  4. Content type: Research

    As one of the most notorious programming errors, memory access errors still hurt modern software security. Particularly, they are hidden deeply in important software systems written in memory unsafe languages ...

    Authors: Wenjie Li, Dongpeng Xu, Wei Wu, Xiaorui Gong, Xiaobo Xiang, Yan Wang, Fangming gu and Qianxiang Zeng

    Citation: Cybersecurity 2019 2:17

    Published on:

  5. Content type: Research

    Exploitability assessment of vulnerabilities is important for both defenders and attackers. The ultimate way to assess the exploitability is crafting a working exploit. However, it usually takes tremendous hou...

    Authors: Yan Wang, Wei Wu, Chao Zhang, Xinyu Xing, Xiaorui Gong and Wei Zou

    Citation: Cybersecurity 2019 2:12

    Published on:

  6. Content type: Research

    Web crawlers have been misused for several malicious purposes such as downloading server data without permission from the website administrator. Moreover, armoured crawlers are evolving against new anti-crawle...

    Authors: Shengye Wan, Yue Li and Kun Sun

    Citation: Cybersecurity 2019 2:9

    Published on:

  7. Content type: Research

    The interaction between gene loci, namely epistasis, is a widespread biological genetic phenomenon. In genome-wide association studies(GWAS), epistasis detection of complex diseases is a major challenge. Altho...

    Authors: Qingfeng Chen, Xu Zhang and Ruchang Zhang

    Citation: Cybersecurity 2019 2:7

    Published on:

  8. Content type: Research

    A main challenge of attribute-based access control (ABAC) is the handling of missing information. Several studies have shown that the way standard ABAC mechanisms, e.g. based on XACML, handle missing informati...

    Authors: Charles Morisset, Tim A. C. Willemse and Nicola Zannone

    Citation: Cybersecurity 2019 2:6

    Published on:

  9. Content type: Research

    The ever-increasing amount of major security incidents has led to an emerging interest in cooperative approaches to encounter cyber threats. To enable cooperation in detecting and preventing attacks it is an i...

    Authors: Fabian Böhm, Florian Menges and Günther Pernul

    Citation: Cybersecurity 2018 1:16

    Published on:

  10. Content type: Research

    The popularity of cloud hosting services also brings in new security chal- lenges: it has been reported that these services are increasingly utilized by miscreants for their malicious online activities. Mitiga...

    Authors: Xiaojing Liao, Sumayah Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao and Raheem Beyah

    Citation: Cybersecurity 2018 1:14

    Published on:

  11. Content type: Research

    Fully data using only public information. So far, most FHE schemes are CPA secure. In PKC 2017, Canetti et al. extended the generic transformation of Boneh, Canetti, Halevi and Katz to turn any multi-key ident...

    Authors: Biao Wang, Xueqing Wang and Rui Xue

    Citation: Cybersecurity 2018 1:11

    Published on:

  12. Content type: Research

    Malware detection has become mission sensitive as its threats spread from computer systems to Internet of things systems. Modern malware variants are generally equipped with sophisticated packers, which allow ...

    Authors: Jixin Zhang, Kehuan Zhang, Zheng Qin, Hui Yin and Qixin Wu

    Citation: Cybersecurity 2018 1:10

    Published on:

  13. Content type: Survey

    Adversarial examples revealed the weakness of machine learning techniques in terms of robustness, which moreover inspired adversaries to make use of the weakness to attack systems employing machine learning. E...

    Authors: Lu Sun, Mingtian Tan and Zhe Zhou

    Citation: Cybersecurity 2018 1:9

    Published on:

  14. Content type: Survey

    Security vulnerability is one of the root causes of cyber-security threats. To discover vulnerabilities and fix them in advance, researchers have proposed several techniques, among which fuzzing is the most wi...

    Authors: Jun Li, Bodong Zhao and Chao Zhang

    Citation: Cybersecurity 2018 1:6

    Published on:

  15. Content type: Survey

    It is fundamentally challenging to build a secure system atop the current computer architecture. The complexity in software, hardware and ASIC manufacture has reached beyond the capability of existing verifica...

    Authors: Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia and Peng Liu

    Citation: Cybersecurity 2018 1:2

    Published on:

  • Affiliated with
  • The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

    IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

    IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

    Read more..

Annual Journal Metrics

  • Speed
    58 days to first decision for reviewed manuscripts only
    51 days to first decision for all manuscripts
    103 days from submission to acceptance
    36 days from acceptance to publication

    Usage 
    12,469 downloads
    23 Altmetric mentions

The journal is indexing by

  • EBSCO Discovery Service
  • DOAJ
  • OCLC WorldCat Discovery Service
  • ProQuest-ExLibris Summon
  • INSPEC
  • Institute of Scientific and Technical Information of China
  • Naver
  • CSCD

Advertisement