Pub Date : 2024-06-13DOI: 10.1007/s10207-024-00871-7
Sanjeev Shukla, Manoj Misra, G. Varshney
{"title":"Email bombing attack detection and mitigation using machine learning","authors":"Sanjeev Shukla, Manoj Misra, G. Varshney","doi":"10.1007/s10207-024-00871-7","DOIUrl":"https://doi.org/10.1007/s10207-024-00871-7","url":null,"abstract":"","PeriodicalId":503009,"journal":{"name":"International Journal of Information Security","volume":"42 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141348812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-25DOI: 10.1007/s10207-023-00792-x
N. Patel, B. Mehtre, R. Wankar
{"title":"A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection","authors":"N. Patel, B. Mehtre, R. Wankar","doi":"10.1007/s10207-023-00792-x","DOIUrl":"https://doi.org/10.1007/s10207-023-00792-x","url":null,"abstract":"","PeriodicalId":503009,"journal":{"name":"International Journal of Information Security","volume":"3 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140653537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-29DOI: 10.1007/s10207-024-00826-y
E. Kwarteng, Mumin Cebe
{"title":"MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives","authors":"E. Kwarteng, Mumin Cebe","doi":"10.1007/s10207-024-00826-y","DOIUrl":"https://doi.org/10.1007/s10207-024-00826-y","url":null,"abstract":"","PeriodicalId":503009,"journal":{"name":"International Journal of Information Security","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140366848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-28DOI: 10.1007/s10207-024-00821-3
David C. Micale, Ilaria Matteucci, Florian Fenzl, Roland Rieke, G. Patanè
{"title":"A context-aware on-board intrusion detection system for smart vehicles","authors":"David C. Micale, Ilaria Matteucci, Florian Fenzl, Roland Rieke, G. Patanè","doi":"10.1007/s10207-024-00821-3","DOIUrl":"https://doi.org/10.1007/s10207-024-00821-3","url":null,"abstract":"","PeriodicalId":503009,"journal":{"name":"International Journal of Information Security","volume":"57 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140371347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-26DOI: 10.1007/s10207-024-00838-8
Stylianos Karagiannis, Christoforos Ntantogian, E. Magkos, A. Tsohou, L. L. Ribeiro
{"title":"Mastering data privacy: leveraging K-anonymity for robust health data sharing","authors":"Stylianos Karagiannis, Christoforos Ntantogian, E. Magkos, A. Tsohou, L. L. Ribeiro","doi":"10.1007/s10207-024-00838-8","DOIUrl":"https://doi.org/10.1007/s10207-024-00838-8","url":null,"abstract":"","PeriodicalId":503009,"journal":{"name":"International Journal of Information Security","volume":"106 43","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140379761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-29DOI: 10.1007/s10207-023-00809-5
Giddeon N. Angafor, Iryna Yevseyeva, L. Maglaras
{"title":"Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns","authors":"Giddeon N. Angafor, Iryna Yevseyeva, L. Maglaras","doi":"10.1007/s10207-023-00809-5","DOIUrl":"https://doi.org/10.1007/s10207-023-00809-5","url":null,"abstract":"","PeriodicalId":503009,"journal":{"name":"International Journal of Information Security","volume":"40 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140488444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}