default search action
Journal of Cyber Security and Mobility, Volume 10
Volume 10, Number 1, 2021
- Niklas Bunzel, Martin Steinebach, Huajian Liu:
Cover-aware Steganalysis. 1-26 - Ludwig Englbrecht, Günther Pernul:
A Combined Approach for a Privacy-Aware Digital Forensic Investigation in Enterprises. 27-64 - Zhen Li, Qi Liao:
Game Theory of Data-selling Ransomware. 65-96 - Uwe Breidenbach, Martin Steinebach, Huajian Liu:
Privacy-Enhanced Robust Image Hashing with Bloom Filters. 97-132 - Florian Platzer, Marcel Schäfer, Martin Steinebach:
Critical Traffic Analysis on the Tor Network. 133-160 - Joo Yeon Cho, Andrew Sergeev:
Post-quantum MACsec in Ethernet Networks. 161-176
- Shymalagowri Selvaganapathy, G. Sudha Sadasivam, Vinayakumar Ravi:
A Review on Android Malware: Attacks, Countermeasures and Challenges Ahead. 177-230 - Charu Negi, Preeti Mishra, Pooja Chaudhary, Harsh Vardhan:
A Review and Case Study on Android Malware: Threat Model, Attacks, Techniques and Tools. 231-260 - Zainab Rashid Alkindi, Mohamed Sarrab, Nasser Alzeidi:
User Privacy and Data Flow Control for Android Apps: Systematic Literature Review. 261-304
Volume 10, Number 2, 2021
- Stéphane Mocanu, Jean-Marc Thiriet:
Real-Time Performance and Security of IEC 61850 Process Bus Communications. 305-346 - Emeline Marechal, Benoit Donnet:
Targeted Attack through Network Fingerprinting. 347-376
- Sihem Baccari, Mohamed Hadded, Haifa Touati, Paul Mühlethaler:
A Secure Trust-aware Cross-layer Routing Protocol for Vehicular Ad hoc Networks. 377-402 - Rupali M. Chopade, Vinod Keshaorao Pachghare:
Database Security Enhancement by Eliminating the Redundant and Incorrect Spelled Data Entries. 403-420 - Rupali M. Chopade, Vinod Keshaorao Pachghare:
Data Tamper Detection from NoSQL Database in Forensic Environment. 421-450
- Yuji Sakurai, Takuya Watanabe, Tetsuya Okuda, Mitsuaki Akiyama, Tatsuya Mori:
Identifying the Phishing Websites Using the Patterns of TLS Certificates. 451-486
Volume 10, Number 3, 2021
- M. Raviraja Holla, Alwyn R. Pais, Suma D.:
An Accelerator-based Logistic Map Image Cryptosystems for Grayscale Images. 487-510
Volume 10, Number 4, 2021
- Rajeev Singh, Sukhwinder Singh:
A Lightweight Security Scheme (LSS) for Wireless Node Communication for Border Surveillance System. 641-662 - Adarsh Anand, Navneet Bhatt, Jasmine Kaur, Yoshinobu Tamura:
Time Lag-Based Modelling for Software Vulnerability Exploitation Process. 663-678 - Nupur Goyal, Tanuja Joshi, Mangey Ram:
Evaluating and Improving a Content Delivery Network (CDN) Workflow using Stochastic Modelling. 679-698
- Bayisa Kune Mamade, Diriba Mangasha Dabala:
Exploring The Correlation between Cyber Security Awareness, Protection Measures and the State of Victimhood: The Case Study of Ambo University's Academic Staffs. 699-724
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.