Detection Methods of Hardware Trojans Based on DBN and QPSO-OCSVM Anomalous Behavior Analysis
Privacy-Preserving Byzantine-Resilient Swarm Learning for E-healthcare
Software Vulnerability Detection under Poisoning Attacks using CNN-based Image Processing
An Intrinsic Evaluator for Embedding Methods in Malicious URL Detection
Gaming the system: Tetromino-based covert channels and their impact on mobile security
A Framework to Quantify the Quality of Source Code Obfuscation
Applications of LLMs for Generating Cyber Security Exercise Scenarios
A Compact Multi-Step Framework for Packing Identification in Portable Executable Files for Malware Analysis
Bluetooth Vulnerabilities in General and Intimate Health IoT Devices and Apps: the Case of Female-oriented Technologies
An Improved and Efficient Coercion-resistant Measure for Electronic Voting System
Learn more about International Journal of Information Security