default search action
Journal of Cyber Security and Mobility, Volume 8
Volume 8, Number 1, January 2019
- Abdullah Ahmed Bahashwan, Selvakumar Manickam:
A Brief Review of Messaging Protocol Standards for Internet of Things (IoT). 1-14 - Duc C. Le, Nur Zincir-Heywood, Malcolm I. Heywood:
Unsupervised Monitoring of Networkand Service Behaviour Using SelfOrganizing Maps. 15-52 - Abubakar Bello, Venkatesh Mahadevan:
A Cloud Based Conceptual IdentityManagement Model for Secured Internetof Things Operation. 53-74 - Arash Habibi Lashkari, Min Chen, Ali A. Ghorbani:
A Survey on User Profiling Model forAnomaly Detection in Cyberspace. 75-112 - Gonzalo P. Suárez, Lazaros K. Gallos, Nina H. Fefferman:
A Case Study in Tailoring a Bio-InspiredCyber-Security Algorithm: DesigningAnomaly Detection for Multilayer Networks. 113-132
Volume 8, Number 2, April 2019
- Esraa M. Ghourab, Effat Samir, Mohamed Azab, Mohamed Eltoweissy:
Trustworthy Vehicular CommunicationEmploying Multidimensional Diversificationfor Moving-target Defense. 133-164 - Marek Rychlý, Ondrej Rysavý:
Big Data Security Analysis withTARZAN Platform. 165-188 - R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran, Vysakh S. Mohan, Amara Dinesh Kumar:
ScaleNet: Scalable and Hybrid Frameworkfor Cyber Threat Situational AwarenessBased on DNS, URL, and Email Data Analysis. 189-240 - Ondrej Dolezal, Hana Tomásková:
Czech Cyber Security Systemfrom a view of System Dynamics. 241-260 - Jyostna Devi Bodapati, Veeranjaneyulu Naralasetti:
Feature Extraction and Classification UsingDeep Convolutional Neural Networks. 261-276 - V. Arun, R. Sudhakar:
User Behavioral Analysis Using MarkovChain and Steady-State in Tracer andChecker Model. 277-294
Volume 8, Number 3, July 2019
- P. P. Amritha, M. Sethumadhavan, Ramakrishnan Krishnan, Saibal Kumar Pal:
Anti-forensic Approach to Remove StegoContent from Images and Videos. 295-320 - Lionel Metongnon, Ramin Sadre:
Prevalence of IoT Protocols in Telescopeand Honeypot Measurements. 321-340 - Daichi Hasumi, Shigeyoshi Shima, Hiroki Takakura:
SPINZ: A Speculating Incident Zone Systemfor Incident Handling. 341-364 - Martin Steinebach, Huajian Liu, Andre Ester:
The Need for Steganalysis in ImageDistribution Channels. 365-392 - R. Revathy, Saminathan Balamurali, R. Lawrance:
Classifying Agricultural Crop PestData Using Hadoop MapReduceBased C5.0 Algorithm. 393-408
Volume 8, Number 4, October 2019
- D. Indhumathi Devi, S. Chithra, M. Sethumadhavan:
Hardware Random Number GeneratorUsing FPGA. 409-418 - Gilles Roudière, Philippe Owezarski:
Evaluating the Impact of Traffic Sampling onAATAC's DDoS Detection. 419-438 - Damjan Fujs, Anze Mihelic, Simon Vrhovec:
Social Network Self-Protection Model: What Motivates Users to Self-Protect? 467-492 - Arpita Jadhav Bhatt, Chetna Gupta, Sangeeta Mittal:
iShield: A Framework for Preserving Privacyof iOS App User. 493-536
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.