All Articles

Sort by
Article Type
Articles Showing 54 results
Sort by
Certificateless signature and auditing schemes secure against super type adversaries without random oracle
Open Access Research Article 14 Apr 2025
Views: 167 Downloads: 182
Download PDF 0 2
Third-party data leaks on websites of medical condition support associations
Open Access Research Article 24 Jan 2025
Views: 208 Downloads: 302
Download PDF 0 1
VulnScan GPT: a new framework for smart contract vulnerability detection combining vector database and GPT model
Open Access Research Article 30 Dec 2024
Views: 364 Downloads: 598
Download PDF 0 1
Entropy harvest and key derivation from the image sensors in IP camera
Open Access Original Article 30 Dec 2024
Views: 257 Downloads: 294
Download PDF 0 1
Cloud-edge-end based key management for decentralized applications
Open Access Research Article 16 Dec 2024
Views: 236 Downloads: 200
Download PDF 0 1
A data privacy survey on personal identifiable information (PII) left on rental vehicle infotainment systems
Open Access Original Article 8 Nov 2024
Views: 307 Downloads: 174
Download PDF 0 4
Quantum-Secured Data Centre Interconnect in a field environment
Open Access Original Article 28 Sep 2024
Views: 725 Downloads: 385
Download PDF 0 15
Crafting organizational security policies for critical infrastructures: an architectural approach
Open Access Original Article 5 May 2024
Views: 670 Downloads: 364
Download PDF 0 3
A taxonomy for cybersecurity standards
Open Access Original Article 27 Apr 2024
Views: 1527 Downloads: 704
Download PDF 0 6
TENNER: intrusion detection models for industrial networks based on ensemble learning
Open Access Original Article 19 Apr 2024
Views: 419 Downloads: 354
Download PDF 0 2
Improved differential fault analysis of Grain-128AEAD
Open Access Original Article 29 Mar 2024
Views: 469 Downloads: 365
Download PDF 0 2
A survey on wireless-communication vulnerabilities of ERTMS in the railway sector
Open Access Original Article 24 Feb 2024
Views: 878 Downloads: 507
Download PDF 0 6
A TPRF-based pseudo-random number generator
Open Access Original Article 27 Jan 2024
Views: 496 Downloads: 446
Download PDF 0 16
Bias and fairness in software and automation tools in digital forensics
Open Access Original Article 25 Jan 2024
Views: 1248 Downloads: 644
Download PDF 0 16
Privacy preserving vertical distributed learning for health data
Open Access Original Article 31 Dec 2023
Views: 676 Downloads: 444
Download PDF 0 28
EFAW: a new mining attack model combining FAW attacks with the Eclipse attack
Open Access Original Article 20 Dec 2023
Views: 654 Downloads: 671
Download PDF 0 34
  • 1
  • 2
  • 3
Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/