All Articles

Sort by
Article Type
Articles Showing 54 results
Sort by
Certificateless signature and auditing schemes secure against super type adversaries without random oracle
Open Access Research Article 14 Apr 2025
Views: 157 Downloads: 137
Download PDF 0 2
Third-party data leaks on websites of medical condition support associations
Open Access Research Article 24 Jan 2025
Views: 200 Downloads: 276
Download PDF 0 1
VulnScan GPT: a new framework for smart contract vulnerability detection combining vector database and GPT model
Open Access Research Article 30 Dec 2024
Views: 342 Downloads: 521
Download PDF 0 1
Entropy harvest and key derivation from the image sensors in IP camera
Open Access Original Article 30 Dec 2024
Views: 245 Downloads: 252
Download PDF 0 1
Cloud-edge-end based key management for decentralized applications
Open Access Research Article 16 Dec 2024
Views: 223 Downloads: 159
Download PDF 0 1
A data privacy survey on personal identifiable information (PII) left on rental vehicle infotainment systems
Open Access Original Article 8 Nov 2024
Views: 291 Downloads: 161
Download PDF 0 4
Quantum-Secured Data Centre Interconnect in a field environment
Open Access Original Article 28 Sep 2024
Views: 687 Downloads: 370
Download PDF 0 15
Crafting organizational security policies for critical infrastructures: an architectural approach
Open Access Original Article 5 May 2024
Views: 657 Downloads: 336
Download PDF 0 3
A taxonomy for cybersecurity standards
Open Access Original Article 27 Apr 2024
Views: 1468 Downloads: 659
Download PDF 0 6
TENNER: intrusion detection models for industrial networks based on ensemble learning
Open Access Original Article 19 Apr 2024
Views: 409 Downloads: 339
Download PDF 0 2
Improved differential fault analysis of Grain-128AEAD
Open Access Original Article 29 Mar 2024
Views: 458 Downloads: 353
Download PDF 0 2
A survey on wireless-communication vulnerabilities of ERTMS in the railway sector
Open Access Original Article 24 Feb 2024
Views: 863 Downloads: 487
Download PDF 0 6
A TPRF-based pseudo-random number generator
Open Access Original Article 27 Jan 2024
Views: 479 Downloads: 423
Download PDF 0 16
Bias and fairness in software and automation tools in digital forensics
Open Access Original Article 25 Jan 2024
Views: 1212 Downloads: 619
Download PDF 0 16
Privacy preserving vertical distributed learning for health data
Open Access Original Article 31 Dec 2023
Views: 664 Downloads: 431
Download PDF 0 28
EFAW: a new mining attack model combining FAW attacks with the Eclipse attack
Open Access Original Article 20 Dec 2023
Views: 644 Downloads: 658
Download PDF 0 34
  • 1
  • 2
  • 3
Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/