Most Cited & Viewed

Most Cited & Viewed Papers

Citations Article
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
by Anastasios Giannaros, Aristeidis Karras, Leonidas Theodorakopoulos, Christos Karras, Panagiotis Kranias, Nikolaos Schizas, Gerasimos Kalogeratos and Dimitrios Tsolis
 
Cyberattacks in Smart Grids: Challenges and Solving the Multi-Criteria Decision-Making for Cybersecurity Options, Including Ones That Incorporate Artificial Intelligence, Using an Analytical Hierarchy Process
by Ayat-Allah Bouramdane
 
Image Encryption Algorithms: A Survey of Design and Evaluation Metrics
by Yousef Alghamdi and Arslan Munir
 
Security in Cloud-Native Services: A Survey
by Theodoros Theodoropoulos, Luis Rosa, Chafika Benzaid, Peter Gray, Eduard Marin, Antonios Makris, Luis Cordeiro, Ferran Diego, Pavel Sorokin, Marco Di Girolamo, Paolo Barone, Tarik Taleb and Konstantinos Tserpes
 
A Dynamic and Adaptive Cybersecurity Governance Framework
by Henock Mulugeta Melaku
 
Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review
by Abdul Majeed
 
Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication
by Sara Kokal, Mounika Vanamala and Rushit Dave
 
Potential of Homomorphic Encryption for Cloud Computing Use Cases in Manufacturing
by Raphael Kiesel, Marvin Lakatsch, Alexander Mann, Karl Lossie, Felix Sohnius and Robert H. Schmitt
 
Cybersecurity for AI Systems: A Survey
by Raghvinder S. Sangwan, Youakim Badr and Satish M. Srinivasan
 
Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures—A Perspective on the Greek Landscape
by Anastasios Papathanasiou, George Liontos, Vasiliki Liagkou and Euripidis Glavas
Views Article
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
by Anastasios Giannaros, Aristeidis Karras, Leonidas Theodorakopoulos, Christos Karras, Panagiotis Kranias, Nikolaos Schizas, Gerasimos Kalogeratos and Dimitrios Tsolis
Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations
by Vedran Dakić, Zlatan Morić, Ana Kapulica and Damir Regvart
Protection of Personal Data in the Context of E-Commerce
by Zlatan Morić, Vedran Dakic, Daniela Djekic and Damir Regvart
Cyberattacks in Smart Grids: Challenges and Solving the Multi-Criteria Decision-Making for Cybersecurity Options, Including Ones That Incorporate Artificial Intelligence, Using an Analytical Hierarchy Process
by Ayat-Allah Bouramdane
A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies
by Khalid Bennouk, Nawal Ait Aali, Younès El Bouzekri El Idrissi, Bechir Sebai, Abou Zakaria Faroukhi and Dorra Mahouachi
Data Privacy and Ethical Considerations in Database Management
by Eduardo Pina, José Ramos, Henrique Jorge, Paulo Váz, José Silva, Cristina Wanzeller, Maryam Abbasi and Pedro Martins
Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures—A Perspective on the Greek Landscape
by Anastasios Papathanasiou, George Liontos, Vasiliki Liagkou and Euripidis Glavas
A Dynamic and Adaptive Cybersecurity Governance Framework
by Henock Mulugeta Melaku
Image Encryption Algorithms: A Survey of Design and Evaluation Metrics
by Yousef Alghamdi and Arslan Munir
Cybersecurity for AI Systems: A Survey
by Raghvinder S. Sangwan, Youakim Badr and Satish M. Srinivasan
Downloads Article
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
by Anastasios Giannaros, Aristeidis Karras, Leonidas Theodorakopoulos, Christos Karras, Panagiotis Kranias, Nikolaos Schizas, Gerasimos Kalogeratos and Dimitrios Tsolis
A Dynamic and Adaptive Cybersecurity Governance Framework
by Henock Mulugeta Melaku
Cyberattacks in Smart Grids: Challenges and Solving the Multi-Criteria Decision-Making for Cybersecurity Options, Including Ones That Incorporate Artificial Intelligence, Using an Analytical Hierarchy Process
by Ayat-Allah Bouramdane
Cybersecurity for AI Systems: A Survey
by Raghvinder S. Sangwan, Youakim Badr and Satish M. Srinivasan
Protection of Personal Data in the Context of E-Commerce
by Zlatan Morić, Vedran Dakic, Daniela Djekic and Damir Regvart
Security in Cloud-Native Services: A Survey
by Theodoros Theodoropoulos, Luis Rosa, Chafika Benzaid, Peter Gray, Eduard Marin, Antonios Makris, Luis Cordeiro, Ferran Diego, Pavel Sorokin, Marco Di Girolamo, Paolo Barone, Tarik Taleb and Konstantinos Tserpes
Image Encryption Algorithms: A Survey of Design and Evaluation Metrics
by Yousef Alghamdi and Arslan Munir
Data Privacy and Ethical Considerations in Database Management
by Eduardo Pina, José Ramos, Henrique Jorge, Paulo Váz, José Silva, Cristina Wanzeller, Maryam Abbasi and Pedro Martins
Cybersecurity in Hospitals: An Evaluation Model
by Mohammed A. Ahmed, Hatem F. Sindi and Majid Nour
A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies
by Khalid Bennouk, Nawal Ait Aali, Younès El Bouzekri El Idrissi, Bechir Sebai, Abou Zakaria Faroukhi and Dorra Mahouachi
Back to TopTop