Skip Content
You are currently on the new version of our website. Access the old version .

101 Results Found

  • Review
  • Open Access
20 Citations
6,012 Views
35 Pages

A Review of Federated Meta-Learning and Its Application in Cyberspace Security

  • Fengchun Liu,
  • Meng Li,
  • Xiaoxiao Liu,
  • Tao Xue,
  • Jing Ren and
  • Chunying Zhang

In recent years, significant progress has been made in the application of federated learning (FL) in various aspects of cyberspace security, such as intrusion detection, privacy protection, and anomaly detection. However, the robustness of federated...

  • Article
  • Open Access
5 Citations
2,532 Views
23 Pages

21 November 2022

Protection against a growing number of increasingly sophisticated and complex cyberattacks requires the real-time acquisition of up-to-date information on identified threats and their potential impact on an enterprise’s operation. However, the...

  • Article
  • Open Access
65 Citations
14,212 Views
27 Pages

10 November 2021

In many developed countries, the usage of artificial intelligence (AI) and machine learning (ML) has become important in paving the future path in how data is managed and secured in the small and medium enterprises (SMEs) sector. SMEs in these develo...

  • Article
  • Open Access
2 Citations
3,173 Views
21 Pages

Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace

  • Muhammad Nadeem,
  • Ali Arshad,
  • Saman Riaz,
  • Syeda Wajiha Zahra,
  • Ashit Kumar Dutta,
  • Abdulrahman Alruban,
  • Badr Almutairi and
  • Sultan Almotairi

27 September 2022

The ratio at which the number of users is increasing in cloud computing, the same as the number of data destruction, has doubled. Various algorithms have been designed to secure cloud servers to prevent an attacker from attacking, but they cannot pro...

  • Article
  • Open Access
17 Citations
16,072 Views
15 Pages

2 February 2022

North Korea’s economic and technological backwardness does not seem to allow Pyongyang to possess proficient cyberwarfare capabilities. Yet, North Korea’s cyber offensive capabilities are a major security threat in a new convergence space...

  • Article
  • Open Access
6 Citations
5,958 Views
21 Pages

22 August 2024

Detecting phishing webpages is a critical task in the field of cybersecurity, with significant implications for online safety and data protection. Traditional methods have primarily relied on analyzing URL features, which can be limited in capturing...

  • Article
  • Open Access
4 Citations
2,955 Views
18 Pages

Fake User Detection Based on Multi-Model Joint Representation

  • Jun Li,
  • Wentao Jiang,
  • Jianyi Zhang,
  • Yanhua Shao and
  • Wei Zhu

The existing deep learning-based detection of fake information focuses on the transient detection of news itself. Compared to user category profile mining and detection, transient detection is prone to higher misjudgment rates due to the limitations...

  • Article
  • Open Access
1 Citations
2,258 Views
28 Pages

MTTEGDM: A Moving Target Evolutionary Game Defense Model Based on Three-Way Decisions

  • Zhihua Zhang,
  • Lu Liu,
  • Chunying Zhang,
  • Jing Ren,
  • Jiang Ma,
  • Liya Wang and
  • Bin Liu

11 February 2024

Aiming at the fact that the moving target defense game model fails to accurately portray attack and defense gains, resulting in bias in attack and defense games and the inability to select effective defense strategies, we construct the moving target...

  • Article
  • Open Access
5,804 Views
15 Pages

4 May 2015

Physical memory acquisition has been an import facet for digital forensics (DF) specialists due to its volatile characteristics. Nowadays, thousands of millions of global participants utilize online social networking (OSN) mechanisms to expand their...

  • Article
  • Open Access
6 Citations
9,518 Views
22 Pages

Analysis of Dynamic Complexity of the Cyber Security Ecosystem of Colombia

  • Angélica Flórez,
  • Lenin Serrano,
  • Urbano Gómez,
  • Luis Suárez,
  • Alejandro Villarraga and
  • Hugo Rodríguez

This paper presents two proposals for the analysis of the complexity of the Cyber security Ecosystem of Colombia (CEC). This analysis shows the available knowledge about entities engaged in cyber security in Colombia and the relationships between the...

  • Meeting Report
  • Open Access
3 Citations
3,949 Views
12 Pages

Report of the 2017 IEEE Cyber Science and Technology Congress

  • Wenbing Zhao,
  • Jianhua Ma,
  • Kevin I-Kai Wang and
  • Jun Wang

14 December 2017

The modern digitized world has led to the emergence of a new paradigm on global information networks and infrastructures known as Cyberspace and the studies of Cybernetics, which bring seamless integration of physical, social and mental spaces. Cyber...

  • Article
  • Open Access
3 Citations
3,386 Views
17 Pages

High-Fidelity Router Emulation Technologies Based on Multi-Scale Virtualization

  • He Song,
  • Xiaofeng Wang,
  • Mengdong Zhai and
  • Guangjie Zhang

16 January 2020

Virtualization has the advantages of strong scalability and high fidelity in host node emulation. It can effectively meet the requirements of network emulation, including large scale, high fidelity, and flexible construction. However, for router emul...

  • Article
  • Open Access
377 Views
19 Pages

POS: A Recognition Method for Packed Software in Opened-Set Scenario

  • Zhenghao Qian,
  • Fengzheng Liu,
  • Mingdong He,
  • Bo Li,
  • Xuewu Li,
  • Chuangye Zhao,
  • Gehua Fu,
  • Yifan Hu and
  • Hao Liu

14 November 2025

Malware plays a critical role in network attacks, making its analysis essential for ensuring network security. To evade detection, malware developers often use packing techniques to hide malicious code, making it difficult for analysts to identify th...

  • Article
  • Open Access
2 Citations
3,979 Views
12 Pages

29 March 2023

Digital technology is now a fundamental and indispensable component of daily life. While the great opportunities offered by cyberspace are undoubted, the growing security challenges and threats it brings should not be overlooked. Cyberspace, by its n...

  • Article
  • Open Access
6 Citations
3,309 Views
14 Pages

A Cybersecurity Knowledge Graph Completion Method for Penetration Testing

  • Peng Wang,
  • Jingju Liu,
  • Xiaofeng Zhong and
  • Shicheng Zhou

Penetration testing is an effective method of making computers secure. When conducting penetration testing, it is necessary to fully understand the various elements in the cyberspace. Prediction of future cyberspace state through perception and under...

  • Article
  • Open Access
16 Citations
3,324 Views
19 Pages

8 September 2023

Water project and watershed management is currently being reengineered under digital twin schemes in China through pilot projects. An evaluation on pilot reengineering is important for its further implementation and improvement. This paper investigat...

  • Review
  • Open Access
16 Citations
10,516 Views
36 Pages

A Comprehensive Survey on Generative AI Solutions in IoT Security

  • Juan Luis López Delgado and
  • Juan Antonio López Ramos

17 December 2024

The influence of Artificial Intelligence in our society is becoming important due to the possibility of carrying out analysis of the large amount of data that the increasing number of interconnected devices capture and send as well as making autonomo...

  • Feature Paper
  • Article
  • Open Access
6 Citations
4,506 Views
36 Pages

Utilisation of Embodied Agents in the Design of Smart Human–Computer Interfaces—A Case Study in Cyberspace Event Visualisation Control

  • Wojciech Szynkiewicz,
  • Włodzimierz Kasprzak,
  • Cezary Zieliński,
  • Wojciech Dudek,
  • Maciej Stefańczyk,
  • Artur Wilkowski and
  • Maksym Figat

The goal of the research reported here was to investigate whether the design methodology utilising embodied agents can be applied to produce a multi-modal human–computer interface for cyberspace events visualisation control. This methodology re...

  • Communication
  • Open Access
2 Citations
2,963 Views
12 Pages

The novelty of this work lies in examining how 5G, blockchain-based public key infrastructure (PKI), near field communication (NFC), and zero trust architecture securely provide not only a trusted digital identity for telework but also a trusted digi...

  • Article
  • Open Access
8 Citations
4,803 Views
16 Pages

4 November 2022

Cybercrime is one of the most significant security challenges of the 21st century. However, official statistics do not provide insights into its prevalence and nature. Representative cross-sectional field studies may help fill this gap, focusing on d...

  • Article
  • Open Access
17 Citations
5,941 Views
13 Pages

SAWIT—Security Awareness Improvement Tool in the Workplace

  • Ana Kovačević and
  • Sonja D. Radenković

28 April 2020

Cyberattacks are becoming increasingly sophisticated and severe, and an organization’s protection depends on its weakest member. Although users are aware of the risks in cyberspace, most of them do not follow best practices, and there is a need...

  • Article
  • Open Access
22 Citations
17,395 Views
31 Pages

A Highly Interactive Honeypot-Based Approach to Network Threat Management

  • Xingyuan Yang,
  • Jie Yuan,
  • Hao Yang,
  • Ya Kong,
  • Hao Zhang and
  • Jinyu Zhao

28 March 2023

In this paper, considering the problem that the common defensive means in the current cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn reactive into proactive to deal with the increasingly serious cyberspace se...

  • Concept Paper
  • Open Access
36 Citations
50,583 Views
20 Pages

27 February 2019

This article is a theoretical treatment of the ways in which local worldviews on wealth acquisition give rise to contemporary manifestations of spirituality in cyberspace. It unpacks spiritual (occult) economies and wealth generation through a histor...

  • Article
  • Open Access
2 Citations
3,631 Views
20 Pages

29 September 2024

As cyberattacks become increasingly sophisticated with advancements in information and communication technology, the impact of cyberspace threats is growing in both civilian and defense sectors. The utilization of cyber capabilities in operations is...

  • Review
  • Open Access
4 Citations
2,190 Views
15 Pages

A Review of Endogenous Security Research

  • Xiaoyu Liu,
  • Haizhou Wang and
  • Cuixia Li

The development of society has deepened the application of the Internet in production and daily life. At the same time, network security risks are becoming increasingly severe. For the security problems faced in cyberspace, most of the traditional de...

  • Article
  • Open Access
1 Citations
3,625 Views
22 Pages

18 December 2024

In the 4th industrial era, the proliferation of interconnected smart devices and advancements in AI, particularly big data and machine learning, have integrated various industrial domains into cyberspace. This convergence brings novel security threat...

  • Article
  • Open Access
5 Citations
3,287 Views
19 Pages

GRAPH4: A Security Monitoring Architecture Based on Data Plane Anomaly Detection Metrics Calculated over Attack Graphs

  • Giacomo Gori,
  • Lorenzo Rinieri,
  • Amir Al Sadi,
  • Andrea Melis,
  • Franco Callegati and
  • Marco Prandini

15 November 2023

The correct and efficient measurement of security properties is key to the deployment of effective cyberspace protection strategies. In this work, we propose GRAPH4, which is a system that combines different security metrics to design an attack detec...

  • Article
  • Open Access
16 Citations
4,890 Views
15 Pages

31 October 2023

With the rapid development of Internet technology, the number of global Internet users is rapidly increasing, and the scale of the Internet is also expanding. The huge Internet system has accelerated the spread of bad information, including bad image...

  • Article
  • Open Access
88 Citations
14,742 Views
24 Pages

9 May 2019

Internet-of-Things (IoT) is a technology that is extensively being used in various fields. Companies like Samsung, LG, and Apple are launching home appliances that use IoT as a part of their smart home business. Currently, Intelligent Things which co...

  • Article
  • Open Access
3 Citations
4,059 Views
26 Pages

4 January 2023

With the rapid development of industrial automation technology, a large number of industrial control devices have emerged in cyberspace, but the security of open cyberspace is difficult to guarantee. Attacks on industrial control devices can directly...

  • Article
  • Open Access
57 Citations
12,515 Views
18 Pages

Intelligent Deep Machine Learning Cyber Phishing URL Detection Based on BERT Features Extraction

  • Muna Elsadig,
  • Ashraf Osman Ibrahim,
  • Shakila Basheer,
  • Manal Abdullah Alohali,
  • Sara Alshunaifi,
  • Haya Alqahtani,
  • Nihal Alharbi and
  • Wamda Nagmeldin

8 November 2022

Recently, phishing attacks have been a crucial threat to cyberspace security. Phishing is a form of fraud that attracts people and businesses to access malicious uniform resource locators (URLs) and submit their sensitive information such as password...

  • Article
  • Open Access
1 Citations
1,299 Views
21 Pages

Adversarial Hierarchical-Aware Edge Attention Learning Method for Network Intrusion Detection

  • Hao Yan,
  • Jianming Li,
  • Lei Du,
  • Binxing Fang,
  • Yan Jia and
  • Zhaoquan Gu

16 July 2025

The rapid development of information technology has made cyberspace security an increasingly critical issue. Network intrusion detection methods are practical approaches to protecting network systems from cyber attacks. However, cyberspace security t...

  • Article
  • Open Access
3 Citations
4,233 Views
28 Pages

A Security Analysis Method for Security Protocol Implementations Based on Message Construction

  • Jintian Lu,
  • Lili Yao,
  • Xudong He,
  • Chintser Huang,
  • Dejun Wang and
  • Bo Meng

8 December 2018

Security protocols are integral to the protection of cyberspace against malicious attacks. Therefore, it is important to be confident in the security of a security protocol. In previous years, people have worked on security of security protocol abstr...

  • Article
  • Open Access
18 Citations
25,229 Views
14 Pages

14 November 2018

Internet censorship remains one of the most common methods of state control over the media. Reasons for filtering cyberspace include ensuring the security of the current regime, attempts to limit all kinds of opposition movements, and the protection...

  • Review
  • Open Access
11 Citations
6,943 Views
16 Pages

Smart contracts, programs running on a blockchain, play a crucial role in driving Web 3.0 across a variety of domains, such as digital finance and future networks. However, they currently face significant security vulnerabilities that could result in...

  • Feature Paper
  • Article
  • Open Access
9 Citations
8,742 Views
12 Pages

As technology evolves, businesses face new threats and opportunities in the areas of information and information assets. These areas include information creation, refining, storage, and dissemination. Governments and other organizations around the wo...

  • Article
  • Open Access
5 Citations
2,890 Views
20 Pages

An SSL-PUF Based Access Authentication and Key Distribution Scheme for the Space–Air–Ground Integrated Network

  • Liwei Xu,
  • Han Wu,
  • Jianguo Xie,
  • Qiong Yuan,
  • Ying Sun,
  • Guozhen Shi and
  • Shoushan Luo

6 May 2023

The Space–Air–Ground Integrated Network (SAGIN) expands cyberspace greatly. Dynamic network architecture, complex communication links, limited resources, and diverse environments make SAGIN’s authentication and key distribution much...

  • Article
  • Open Access
1 Citations
1,869 Views
28 Pages

The Mechanism of Tendentious Information Dissemination in Cyberspace

  • Teng Zong,
  • Bing Chen,
  • Fengsi Wang,
  • Xin Wei,
  • Yibo Liu,
  • Zongmin Hu and
  • Taowei Li

18 October 2024

Cyberspace has evolved into a hub for the dissemination of large amounts of tendentious information, posing significant challenges to the role of mainstream value information. As netizens’ are the main recipients of tendentious information, the...

  • Feature Paper
  • Review
  • Open Access
271 Citations
20,439 Views
27 Pages

Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity

  • Kamran Shaukat,
  • Suhuai Luo,
  • Vijay Varadharajan,
  • Ibrahim A. Hameed,
  • Shan Chen,
  • Dongxi Liu and
  • Jiaming Li

15 May 2020

Cyberspace has become an indispensable factor for all areas of the modern world. The world is becoming more and more dependent on the internet for everyday living. The increasing dependency on the internet has also widened the risks of malicious thre...

  • Article
  • Open Access
28 Citations
3,155 Views
17 Pages

Energy-Aware UAV Based on Blockchain Model Using IoE Application in 6G Network-Driven Cybertwin

  • Atul B. Kathole,
  • Jayashree Katti,
  • Dharmesh Dhabliya,
  • Vivek Deshpande,
  • Anand Singh Rajawat,
  • S. B. Goyal,
  • Maria Simona Raboaca,
  • Traian Candin Mihaltan,
  • Chaman Verma and
  • George Suciu

7 November 2022

Several advanced features exist in fifth-generation (5G) correspondence than in fourth-generation (4G) correspondence. Centric cloud-computing architecture achieves resource sharing and effectively handles big data explosion. For data security proble...

  • Article
  • Open Access
5 Citations
5,062 Views
11 Pages

15 June 2022

Although religious freedom significantly affects certain people, the guarantees for its observance also have implications for the quality of social life and the security of the state. Polarization and conflict between religious groups is not only a c...

  • Article
  • Open Access
3 Citations
2,424 Views
13 Pages

22 February 2025

The explosive development of artificial intelligence technology is profoundly affecting the strategic landscape of cyberspace security, demonstrating enormous potential in the field of intrusion detection. Recent research has found that machine learn...

  • Article
  • Open Access
26 Citations
19,216 Views
26 Pages

Applications of Neural Network-Based AI in Cryptography

  • Abderrahmane Nitaj and
  • Tajjeeddine Rachidi

Artificial intelligence (AI) is a modern technology that allows plenty of advantages in daily life, such as predicting weather, finding directions, classifying images and videos, even automatically generating code, text, and videos. Other essential t...

  • Article
  • Open Access
1 Citations
4,950 Views
15 Pages

This paper examines the profitable digital afterlife industry (DAI), whose aim is to monetize the digital remains of departed internet users. Among the different services offered by such an industry, attention is drawn to AI and humanoid robots that...

  • Article
  • Open Access
4 Citations
4,729 Views
21 Pages

10 January 2024

Identifying potential system attacks that define security requirements is crucial to building secure cyber systems. Moreover, the attack frequency makes their subsequent analysis challenging and arduous in cyber–physical systems (CPS). Since CP...

  • Article
  • Open Access
5 Citations
8,273 Views
29 Pages

The Effect of Countermeasure Readability on Security Intentions

  • Tim Smit,
  • Max van Haastrecht and
  • Marco Spruit

19 November 2021

Human failure is a primary contributor to successful cyber attacks. For any cybersecurity initiative, it is therefore vital to motivate individuals to implement secure behavior. Research using protection motivation theory (PMT) has given insights int...

  • Article
  • Open Access
1 Citations
2,425 Views
22 Pages

SLACPSS: Secure Lightweight Authentication for Cyber–Physical–Social Systems

  • Ahmed Zedaan M. Abed,
  • Tamer Abdelkader and
  • Mohamed Hashem

9 September 2024

The concept of Cyber–Physical–Social Systems (CPSSs) has emerged as a response to the need to understand the interaction between Cyber–Physical Systems (CPSs) and humans. This shift from CPSs to CPSSs is primarily due to the widespr...

  • Review
  • Open Access
350 Citations
37,092 Views
29 Pages

4 March 2019

In recent years, artificial intelligence technologies have been widely used in computer vision, natural language processing, automatic driving, and other fields. However, artificial intelligence systems are vulnerable to adversarial attacks, which li...

  • Review
  • Open Access
2 Citations
890 Views
14 Pages

24 September 2025

As cyberattacks grow increasingly sophisticated, advanced Network Intrusion Detection Systems (NIDS) have become essential for securing cyberspace. While Machine Learning (ML) is foundational to modern NIDS, its effectiveness is often hampered by a r...

of 3