Most Cited & Viewed

Most Cited & Viewed Papers

Citations Article
 
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
by Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, Md Minhaz Chowdhury, Nafiz Rifat and Jayden F Connolly
 
Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis
by Rachida Hireche, Houssem Mansouri and Al-Sakib Khan Pathan
 
A Survey of the Recent Trends in Deep Learning Based Malware Detection
by Umm-e-Hani Tayyab, Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan and Yeon Soo Lee
 
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
by Anastasios Giannaros, Aristeidis Karras, Leonidas Theodorakopoulos, Christos Karras, Panagiotis Kranias, Nikolaos Schizas, Gerasimos Kalogeratos and Dimitrios Tsolis
 
Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review
by Maha Alghawazi, Daniyal Alghazzawi and Suaad Alarifi
 
Comparison of Deepfake Detection Techniques through Deep Learning
by Maryam Taeb and Hongmei Chi
 
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support
by Haozhe Zhou, Amin Milani Fard and Adetokunbo Makanju
 
Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey
by Andrew McCarthy, Essam Ghadafi, Panagiotis Andriotis and Phil Legg
 
Cybersecurity Practices for Social Media Users: A Systematic Literature Review
by Thilini B. G. Herath, Prashant Khanna and Monjur Ahmed
 
Cyberattacks in Smart Grids: Challenges and Solving the Multi-Criteria Decision-Making for Cybersecurity Options, Including Ones That Incorporate Artificial Intelligence, Using an Analytical Hierarchy Process
by Ayat-Allah Bouramdane
Views Article
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
by Anastasios Giannaros, Aristeidis Karras, Leonidas Theodorakopoulos, Christos Karras, Panagiotis Kranias, Nikolaos Schizas, Gerasimos Kalogeratos and Dimitrios Tsolis
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
by Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, Md Minhaz Chowdhury, Nafiz Rifat and Jayden F Connolly
Comparison of Deepfake Detection Techniques through Deep Learning
by Maryam Taeb and Hongmei Chi
Cybersecurity Practices for Social Media Users: A Systematic Literature Review
by Thilini B. G. Herath, Prashant Khanna and Monjur Ahmed
Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review
by Maha Alghawazi, Daniyal Alghazzawi and Suaad Alarifi
Addressing Human Factors in Cybersecurity Leadership
by William J. Triplett
A Survey of the Recent Trends in Deep Learning Based Malware Detection
by Umm-e-Hani Tayyab, Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan and Yeon Soo Lee
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support
by Haozhe Zhou, Amin Milani Fard and Adetokunbo Makanju
Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising
by Shadi Sadeghpour and Natalija Vlajic
Contactless Fingerprint Recognition Using Deep Learning—A Systematic Review
by A M Mahmud Chowdhury and Masudul Haider Imtiaz
Downloads Article
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
by Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, Md Minhaz Chowdhury, Nafiz Rifat and Jayden F Connolly
Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review
by Maha Alghawazi, Daniyal Alghazzawi and Suaad Alarifi
A Distributed Model for Privacy Preserving V2I Communication with Strong Unframeability and Efficient Revocation
by Panayiotis Kalogeropoulos, Dimitris Papanikas and Panayiotis Kotzanikolaou
Addressing Human Factors in Cybersecurity Leadership
by William J. Triplett
Cybersecurity Practices for Social Media Users: A Systematic Literature Review
by Thilini B. G. Herath, Prashant Khanna and Monjur Ahmed
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support
by Haozhe Zhou, Amin Milani Fard and Adetokunbo Makanju
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
by Anastasios Giannaros, Aristeidis Karras, Leonidas Theodorakopoulos, Christos Karras, Panagiotis Kranias, Nikolaos Schizas, Gerasimos Kalogeratos and Dimitrios Tsolis
A Survey of the Recent Trends in Deep Learning Based Malware Detection
by Umm-e-Hani Tayyab, Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan and Yeon Soo Lee
Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis
by Rachida Hireche, Houssem Mansouri and Al-Sakib Khan Pathan
Comparison of Deepfake Detection Techniques through Deep Learning
by Maryam Taeb and Hongmei Chi
Back to TopTop