All Articles

Sort by
Article Type
Articles Showing 45 results
Sort by
Crafting organizational security policies for critical infrastructures: an architectural approach
Open Access Original Article 5 May 2024
Views: Downloads:
Download PDF
A taxonomy for cybersecurity standards
Open Access Original Article 27 Apr 2024
Views: Downloads:
Download PDF
TENNER: intrusion detection models for industrial networks based on ensemble learning
Open Access Original Article 19 Apr 2024
Views: Downloads:
Download PDF
Improved differential fault analysis of Grain-128AEAD
Open Access Original Article 29 Mar 2024
Views: Downloads:
Download PDF
A survey on wireless-communication vulnerabilities of ERTMS in the railway sector
Open Access Original Article 24 Feb 2024
Views: Downloads:
Download PDF
A TPRF-based pseudo-random number generator
Open Access Original Article 27 Jan 2024
Views: Downloads:
Download PDF
Bias and fairness in software and automation tools in digital forensics
Open Access Original Article 25 Jan 2024
Views: Downloads:
Download PDF
Privacy preserving vertical distributed learning for health data
Open Access Original Article 31 Dec 2023
Views: Downloads:
Download PDF
EFAW: a new mining attack model combining FAW attacks with the Eclipse attack
Open Access Original Article 20 Dec 2023
Views: Downloads:
Download PDF
Zero knowledge registration of PKI authentication for symbiotic security in FIDO IoT
Open Access Original Article 14 Dec 2023
Views: Downloads:
Download PDF
Towards a cryptography encyclopedia: a survey on attribute-based encryption
Open Access Survey 12 Dec 2023
Views: Downloads:
Download PDF
Blockchain distributed identity management model for cross-border data privacy protection
Open Access Original Article 10 Dec 2023
Views: Downloads:
Download PDF
On the additive differential probability of ARX construction
Open Access Original Article 28 Nov 2023
Views: Downloads:
Download PDF
Split keys for station-to-station (STS) protocols
Open Access Original Article 21 Sep 2023
Views: Downloads:
Download PDF
Graph neural network based function call graph embedding for malware classification
Open Access Original Article 29 Jun 2023
Views: Downloads:
Download PDF
Resist the type of BWH attack: through introducing discount factor and withdrawal threshold into Bitcoin
Open Access Original Article 10 May 2023
Views: Downloads:
Download PDF
Adaptive mining difficulty for blockchain to resist selfish mining attack
Open Access Original Article 8 May 2023
Views: Downloads:
Download PDF
Towards the creation of the future fish farm
Open Access Original Article 31 Dec 2022
Views: Downloads:
Download PDF
  • 1
  • 2
  • 3
Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/