Most Cited & Viewed

Most Cited & Viewed Papers

Citations Article
 
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
by Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, Md Minhaz Chowdhury, Nafiz Rifat and Jayden F Connolly
 
Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis
by Rachida Hireche, Houssem Mansouri and Al-Sakib Khan Pathan
 
Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review
by Maha Alghawazi, Daniyal Alghazzawi and Suaad Alarifi
 
A Survey of the Recent Trends in Deep Learning Based Malware Detection
by Umm-e-Hani Tayyab, Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan and Yeon Soo Lee
 
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
by Anastasios Giannaros, Aristeidis Karras, Leonidas Theodorakopoulos, Christos Karras, Panagiotis Kranias, Nikolaos Schizas, Gerasimos Kalogeratos and Dimitrios Tsolis
 
Comparison of Deepfake Detection Techniques through Deep Learning
by Maryam Taeb and Hongmei Chi
 
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support
by Haozhe Zhou, Amin Milani Fard and Adetokunbo Makanju
 
Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey
by Andrew McCarthy, Essam Ghadafi, Panagiotis Andriotis and Phil Legg
 
Cybersecurity Practices for Social Media Users: A Systematic Literature Review
by Thilini B. G. Herath, Prashant Khanna and Monjur Ahmed
 
CyBERT: Cybersecurity Claim Classification by Fine-Tuning the BERT Language Model
by Kimia Ameri, Michael Hempel, Hamid Sharif, Juan Lopez Jr. and Kalyan Perumalla
Views Article
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
by Anastasios Giannaros, Aristeidis Karras, Leonidas Theodorakopoulos, Christos Karras, Panagiotis Kranias, Nikolaos Schizas, Gerasimos Kalogeratos and Dimitrios Tsolis
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
by Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, Md Minhaz Chowdhury, Nafiz Rifat and Jayden F Connolly
Comparison of Deepfake Detection Techniques through Deep Learning
by Maryam Taeb and Hongmei Chi
Cybersecurity Practices for Social Media Users: A Systematic Literature Review
by Thilini B. G. Herath, Prashant Khanna and Monjur Ahmed
Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review
by Maha Alghawazi, Daniyal Alghazzawi and Suaad Alarifi
Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies
by Faisal Quader and Vandana P. Janeja
Addressing Human Factors in Cybersecurity Leadership
by William J. Triplett
A Survey of the Recent Trends in Deep Learning Based Malware Detection
by Umm-e-Hani Tayyab, Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan and Yeon Soo Lee
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support
by Haozhe Zhou, Amin Milani Fard and Adetokunbo Makanju
Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising
by Shadi Sadeghpour and Natalija Vlajic
Downloads Article
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
by Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, Md Minhaz Chowdhury, Nafiz Rifat and Jayden F Connolly
Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review
by Maha Alghawazi, Daniyal Alghazzawi and Suaad Alarifi
A Distributed Model for Privacy Preserving V2I Communication with Strong Unframeability and Efficient Revocation
by Panayiotis Kalogeropoulos, Dimitris Papanikas and Panayiotis Kotzanikolaou
Addressing Human Factors in Cybersecurity Leadership
by William J. Triplett
Cybersecurity Practices for Social Media Users: A Systematic Literature Review
by Thilini B. G. Herath, Prashant Khanna and Monjur Ahmed
Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies
by Faisal Quader and Vandana P. Janeja
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support
by Haozhe Zhou, Amin Milani Fard and Adetokunbo Makanju
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
by Anastasios Giannaros, Aristeidis Karras, Leonidas Theodorakopoulos, Christos Karras, Panagiotis Kranias, Nikolaos Schizas, Gerasimos Kalogeratos and Dimitrios Tsolis
A Survey of the Recent Trends in Deep Learning Based Malware Detection
by Umm-e-Hani Tayyab, Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan and Yeon Soo Lee
Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis
by Rachida Hireche, Houssem Mansouri and Al-Sakib Khan Pathan
Back to TopTop