Volume 29, Number 6, 2021
A graph-based framework for malicious software detection and classification utilizing temporal-graphs.

Helen-Maria Dounavi Anna Mpanti Stavros D. Nikolopoulos Iosif Polenakis

Privacy-preserving policy evaluation in multi-party access control.

Mina Sheikhalishahi Ischa Stork Nicola Zannone

Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios.

Ben Smyth


Volume 29, Number 5, 2021
Video interframe forgery detection: Classification, technique & new dataset.

Himani Sharma Navdeep Kanwal

Advances in spam detection for email spam, web spam, social network spam, and review spam: ML-based and nature-inspired-based techniques.

Andronicus Ayobami Akinyelu

Deep learning algorithms for cyber security applications: A survey.

Guangjun Li Preetpal Sharma Lei Pan Sutharshan Rajasegarar Chandan K. Karmakar Nicholas Charles Patterson


Volume 29, Number 4, 2021
A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement.

Md. Morshed Alam Weichao Wang

FakeFilter: A cross-distribution Deepfake detection system with domain adaptation.

Jianguo Jiang Boquan Li Baole Wei Gang Li Chao Liu Weiqing Huang Meimei Li Min Yu

Permissive runtime information flow control in the presence of exceptions.

Abhishek Bichhawat Vineet Rajani Deepak Garg Christian Hammer


Volume 29, Number 3, 2021
Research perspectives on fully homomorphic encryption models for cloud sector.

Sonam Mittal K. R. Ramkumar

A new approach for detecting violation of data plane integrity in Software Defined Networks.

Ghandi Hessam Ghassan Saba M. Iyad Alkhayat

Resource and timing aspects of security protocols.

Abraão Aires Urquiza Musab A. Alturki Tajana Ban Kirigin Max I. Kanovich Vivek Nigam Andre Scedrov Carolyn L. Talcott

Lattice-based remote user authentication from reusable fuzzy signature.

Yangguang Tian Yingjiu Li Robert H. Deng Binanda Sengupta Guomin Yang


Volume 29, Number 2, 2021
Publicly auditable conditional blind signatures.

Panagiotis Grontas Aris Pagourtzis Alexandros Zacharakis Bingsheng Zhang

A permission-dependent type system for secure information flow analysis.

Zhiwu Xu Hongxu Chen Alwen Tiu Yang Liu Kunal Sareen

Research perspectives on fully homomorphic encryption models for cloud sector.

Sonam Mittal K. R. Ramkumar


Volume 29, Number 1, 2021
FWS: Analyzing, maintaining and transcompiling firewalls.

Chiara Bodei Lorenzo Ceragioli Pierpaolo Degano Riccardo Focardi Letterio Galletta Flaminia L. Luccio Mauro Tempesta Lorenzo Veronese

USBCaptchaIn: Preventing (un)conventional attacks from promiscuously used USB devices in industrial control systems.

Federico Griscioli Maurizio Pizzonia

A large-scale analysis of HTTPS deployments: Challenges, solutions, and recommendations.

Qinwen Hu Muhammad Rizwan Asghar Nevil Brownlee

Directed adversarial sampling attacks on phishing detection.

Hossein Shirazi Bruhadeshwar Bezawada Indrakshi Ray Chuck Anderson