Most Cited & Viewed

Most Cited & Viewed Papers

Citations Article
 
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
by Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas and William J. Buchanan
 
Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis
by Rachida Hireche, Houssem Mansouri and Al-Sakib Khan Pathan
 
A Survey of the Recent Trends in Deep Learning Based Malware Detection
by Umm-e-Hani Tayyab, Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan and Yeon Soo Lee
 
Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review
by Maha Alghawazi, Daniyal Alghazzawi and Suaad Alarifi
 
Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal
by Mário Antunes, Marisa Maximiano, Ricardo Gomes and Daniel Pinto
 
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
by Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, Md Minhaz Chowdhury, Nafiz Rifat and Jayden F Connolly
 
Cybersecurity Practices for Social Media Users: A Systematic Literature Review
by Thilini B. G. Herath, Prashant Khanna and Monjur Ahmed
 
Comparison of Deepfake Detection Techniques through Deep Learning
by Maryam Taeb and Hongmei Chi
 
CyBERT: Cybersecurity Claim Classification by Fine-Tuning the BERT Language Model
by Kimia Ameri, Michael Hempel, Hamid Sharif, Juan Lopez Jr. and Kalyan Perumalla
 
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support
by Haozhe Zhou, Amin Milani Fard and Adetokunbo Makanju
Views Article
An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors
by George Karantzas and Constantinos Patsakis
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
by Anastasios Giannaros, Aristeidis Karras, Leonidas Theodorakopoulos, Christos Karras, Panagiotis Kranias, Nikolaos Schizas, Gerasimos Kalogeratos and Dimitrios Tsolis
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
by Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, Md Minhaz Chowdhury, Nafiz Rifat and Jayden F Connolly
Comparison of Deepfake Detection Techniques through Deep Learning
by Maryam Taeb and Hongmei Chi
Cybersecurity Practices for Social Media Users: A Systematic Literature Review
by Thilini B. G. Herath, Prashant Khanna and Monjur Ahmed
Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal
by Mário Antunes, Marisa Maximiano, Ricardo Gomes and Daniel Pinto
Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions
by Cecelia Horan and Hossein Saiedian
Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review
by Maha Alghawazi, Daniyal Alghazzawi and Suaad Alarifi
Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies
by Faisal Quader and Vandana P. Janeja
Tor Hidden Services: A Systematic Literature Review
by Diana L. Huete Trujillo and Antonio Ruiz-Martínez
Downloads Article
An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors
by George Karantzas and Constantinos Patsakis
Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal
by Mário Antunes, Marisa Maximiano, Ricardo Gomes and Daniel Pinto
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
by Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, Md Minhaz Chowdhury, Nafiz Rifat and Jayden F Connolly
A Distributed Model for Privacy Preserving V2I Communication with Strong Unframeability and Efficient Revocation
by Panayiotis Kalogeropoulos, Dimitris Papanikas and Panayiotis Kotzanikolaou
Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review
by Maha Alghawazi, Daniyal Alghazzawi and Suaad Alarifi
Cybersecurity Practices for Social Media Users: A Systematic Literature Review
by Thilini B. G. Herath, Prashant Khanna and Monjur Ahmed
Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies
by Faisal Quader and Vandana P. Janeja
Addressing Human Factors in Cybersecurity Leadership
by William J. Triplett
Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions
by Cecelia Horan and Hossein Saiedian
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support
by Haozhe Zhou, Amin Milani Fard and Adetokunbo Makanju
Back to TopTop