Current Issue
May 2021, Volume 13, Number 3
Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks David A. Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA |
Effect Man-In the Middle on the Network Performance in Various Attack Strategies Iyas Alodat, Jerash University, Jordan |
Information-Centric Blockchain Technology for the Smart Grid
Lanqin Sang and Henry Hexmoor, Southern Illinois University, USA |
A Survey on Federated Identity Management Systems Limitation and Solutions Maha Aldosary and Norah Alqahtani, Imam Mohammad Ibn Saud Islamic University, KSA |
March 2021, Volume 13, Number 2
Comparison of Malware Classification Methods using Convolutional Neural Network based on API Call Stream Matthew Schofield, Gulsum Alicioglu, Bo Sun, Russell Binaco, Paul Turner, Cameron Thatcher, Alex Lam and Anthony Breitzman, Rowan University, USA |
Performance Evaluation of Machine Learning Techniques for DOS Detection in Wireless Sensor Network Lama Alsulaiman and Saad Al-Ahmadi, King Saud University, Saudi Arabia |
Applying the Health Belief Model to Cardiac Implanted Medical Device Patients
George W. Jackson1 and Shawon Rahman2, 1Capella University, USA, 2University of HawaiiHilo, USA |
A Literature Survey and Analysis on Social Engineering Defense Mechanisms and Infosec Policies Dalal Alharthi and Amelia Regan, University of California Irvine, USA |
Phishing Mitigation Techniques: A Literature Survey
Wosah Peace Nmachi and Thomas Win, School of Computing & Engineering University of Gloucestershire, United Kingdom |
January 2021, Volume 13, Number 1
Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms William R. Simpson and Kevin E. Foltz, The Institute for Defense Analyses (IDA), USA |
Analysis of Machine Learning Algorithms with Feature Selection
for Intrusion Detection using UNSW-NB15 Dataset Geeta Kocher1 and Gulshan Kumar2, 1MRSPTU, India, 2SBSSTC, India |
Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis Anna Georgiadou, Spiros Mouzakitis and Dimitris Askounis, National Technical University of Athens, Greece |
Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys Cheman Shaik, VISH Consulting Services Inc, USA |
Game Theory Application Resources Management and Distribution in Blockchain Network Cong Hung Tran1, Dien Tam Le1, 2, Thanh Hieu Huynh3, 1Posts and Telecommunications Institute of Technology, Vietnam, 2Thu Duc Technology College, Vietnam, 3Saigon University, Vietnam |