Abstract is missing.
- Ephemeral Elliptic Curve Diffie-Hellman to Secure Data Exchange in Internet of Medical ThingsOsman Salem, Ahmed Mehaoua. 3-20 [doi]
- End-to-End Security for IoT Communications: A Practical ImplementationSairath Bhattacharjya, Hossein Saiedian. 21-43 [doi]
- A Novel Transfer Learning Model for Intrusion Detection Systems in IoT NetworksLy Vu, Quang Uy Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Eryk Dutkiewicz. 45-65 [doi]
- An Approach to Guide Users Towards Less Revealing Internet BrowsersFadi Mohsen, Adel Shtayyeh, Marten Struijk, Riham Naser, Lena Mohammad. 69-94 [doi]
- Analysing the Threat Landscape Inside the Dark WebSelahattin Hürol Türen, Md. Rafiqul Islam 0001, Kenneth Eustace. 95-122 [doi]
- A Secured 5G Network Slices Auction BrokerJoão Marques-Silva, Nuno Souto. 123-136 [doi]
- Applying Zero Trust Architecture and Probability-Based Authentication to Preserve Security and Privacy of Data in the CloudYvette Colomb, Peter White, Rafiqul Islam, Abeer Alsadoon. 137-169 [doi]
- DataCookie: Sorting Cookies Using Data Mining for Prevention of Cross-Site Scripting (XSS)Germán E. Rodríguez, Jenny G. Torres, Eduardo Benavides-Astudillo. 171-188 [doi]
- Analysing Cyber Attacks and Risks in V2X-Assisted Autonomous Highway MergingChao Chen, Ugur-Ilker Atmaca, Konstantinos Koufos, Mehrdad Dianati, Carsten Maple. 191-208 [doi]
- A Machine Learning Framework for Intrusion Detection in VANET CommunicationsNourhene Ben Rabah, Hanen Idoudi. 209-227 [doi]
- The Implementation of Uncertainty Models for Fraud Detection on Mobile AdvertisingJinming Ma, Tianbing Xia, Janusz R. Getta. 231-249 [doi]
- Improving Android Application Quality Through Extendable, Automated Security TestingNuno Realista, Francisco Palma, Carlos Serrão, Luís Nunes, Ana de Almeida 0002. 251-274 [doi]
- A Provably Secure Data Sharing Scheme for Smart Gas Grid in Fog Computing EnvironmentRachana Y. Patil, Yogesh H. Patil, Aparna Bannore, Arijit Karati, Renu Kachhoriya, Manjiri Ranjanikar. 277-299 [doi]
- Preserving the Privacy and Cybersecurity of Home Energy DataRichard Bean 0001, Yanjun Zhang, Ryan K. L. Ko, Xinyu Mao, Guangdong Bai. 301-322 [doi]
- Preserving the Privacy and Cybersecurity of Home Energy DataRichard Bean 0001, Yanjun Zhang, Ryan K. L. Ko, Xinyu Mao, Guangdong Bai. 323-343 [doi]
- Non-stationary Watermark-Based Attack Detection to Protect Cyber-Physical Control SystemsJose Rubio-Hernan, Luca De Cicco, Joaquén García-Alfaro. 347-370 [doi]
- Cybersecurity Applications in Software: Data-Driven Software Vulnerability Assessment and ManagementJiao Yin 0003, MingJian Tang 0001, Jinli Cao, Mingshan You, Hua Wang 0002. 371-389 [doi]
- Application of Homomorphic Encryption in Machine LearningYulliwas Ameur, Samia Bouzefrane 0001, Vincent Audigier. 391-410 [doi]
- The Design of Ethical Service-Level Agreements to Protect Cyber Attackers and AttackeesCathryn Peoples, Adrian Moore 0001, Nektarios Georgalas. 413-440 [doi]
- Defense Against Adversarial Attack on Knowledge Graph EmbeddingYuxiao Zhang, Qingfeng Chen, Xinkun Hao, Haiming Pan, Qian Yu, Kexin Huang. 441-461 [doi]