Most Cited Papers In Last Two Years

Search Filter

Sort by
Article Type
Special Issue Article
Countries/Regions
Search for
Articles Showing 20 results
Sort by
EFAW: a new mining attack model combining FAW attacks with the Eclipse attack
Open Access Original Article 20 Dec 2023
Views: Downloads:
Download PDF
Zero knowledge registration of PKI authentication for symbiotic security in FIDO IoT
Open Access Original Article 14 Dec 2023
Views: Downloads:
Download PDF
Towards a cryptography encyclopedia: a survey on attribute-based encryption
Open Access Survey 12 Dec 2023
Views: Downloads:
Download PDF
Blockchain distributed identity management model for cross-border data privacy protection
Open Access Original Article 10 Dec 2023
Views: Downloads:
Download PDF
On the additive differential probability of ARX construction
Open Access Original Article 28 Nov 2023
Views: Downloads:
Download PDF
Split keys for station-to-station (STS) protocols
Open Access Original Article 21 Sep 2023
Views: Downloads:
Download PDF
Graph neural network based function call graph embedding for malware classification
Open Access Original Article 29 Jun 2023
Views: Downloads:
Download PDF
Resist the type of BWH attack: through introducing discount factor and withdrawal threshold into Bitcoin
Open Access Original Article 10 May 2023
Views: Downloads:
Download PDF
Adaptive mining difficulty for blockchain to resist selfish mining attack
Open Access Original Article 8 May 2023
Views: Downloads:
Download PDF
Towards the creation of the future fish farm
Open Access Original Article 31 Dec 2022
Views: Downloads:
Download PDF
Anatomy of attacks on IoT systems: review of attacks, impacts and countermeasures
Open Access Original Article 4 Dec 2022
Views: Downloads:
Download PDF
Risk assessment and control selection for cyber-physical systems: a case study on supply chain tracking systems
Open Access Original Article 27 Oct 2022
Views: Downloads:
Download PDF
Evaluating the performance of post-quantum secure algorithms in the TLS protocol
Open Access Original Article 28 Sep 2022
Views: Downloads:
Download PDF
A comparison study to detect seam carving forgery in JPEG images with deep learning models
Open Access Original Article 23 Aug 2022
Views: Downloads:
Download PDF
Advanced fault-tolerant visual multi-secret sharing scheme
Open Access Original Article 19 May 2022
Views: Downloads:
Download PDF
Aviation attacks based on ILS and VOR vulnerabilities
Open Access Original Article 29 Apr 2022
Views: Downloads:
Download PDF
Multi-level storage based auditing scheme for 5G and beyond defined edge computing
Open Access Original Article 30 Mar 2022
Views: Downloads:
Download PDF
  • 1
  • 2
Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/