It has reached the top

All Articles

Search Filter

Sort by
Article Type
Special Issue Article
Countries/Regions
Search for
Time
Between
to
Articles Showing 33 results
Sort by
Open Access Research Article
Open Access Research Article

On the additive differential probability of ARX construction

Open Access Original Article
Open Access Original Article

Split keys for station-to-station (STS) protocols

This article belongs to the Special Issue Topic: Key Management and Key Recovery
Open Access Original Article
Open Access Original Article

Graph neural network based function call graph embedding for malware classification

This article belongs to the Special Issue Topic: Post-Quantum Cryptography and AI Privacy (PQAP)
Open Access Original Article
Open Access Original Article

Resist the type of BWH attack: through introducing discount factor and withdrawal threshold into Bitcoin

Open Access Original Article
Open Access Original Article

Adaptive mining difficulty for blockchain to resist selfish mining attack

Open Access Original Article
Open Access Original Article

Towards the creation of the future fish farm

This article belongs to the Special Issue Topic: Security of Cyber-Physical Systems
Open Access Original Article
Open Access Original Article

Anatomy of attacks on IoT systems: review of attacks, impacts and countermeasures

This article belongs to the Special Issue Topic: Security of Cyber-Physical Systems
Open Access Original Article
Open Access Original Article

Risk assessment and control selection for cyber-physical systems: a case study on supply chain tracking systems

This article belongs to the Special Issue Topic: Security of Cyber-Physical Systems
Open Access Original Article
Open Access Original Article

Evaluating the performance of post-quantum secure algorithms in the TLS protocol

Open Access Original Article
Open Access Original Article

A comparison study to detect seam carving forgery in JPEG images with deep learning models

Open Access Original Article
Open Access Original Article

A data-centric approach to the study of system-level prognostics for cyber physical systems: application to safe UAV operations

Open Access Original Article
Open Access Original Article

Advanced fault-tolerant visual multi-secret sharing scheme

Open Access Original Article
Open Access Original Article

Aviation attacks based on ILS and VOR vulnerabilities

Open Access Original Article
Open Access Original Article

Multi-level storage based auditing scheme for 5G and beyond defined edge computing

Open Access Original Article
Open Access Original Article

Android App Antiforensics

Open Access Editorial
Open Access Editorial

Acknowledgment to reviewers of Journal of Surveillance, Security and Safety in 2021

Open Access Editorial
Open Access Editorial

Inaugural editorial: an honour and a great challenge

Open Access Review
Open Access Review

A comprehensive survey of fingerprint presentation attack detection

Open Access Original Article
Open Access Original Article

Residual energy-based clustering in UAV-aided wireless sensor networks for surveillance and monitoring applications

Open Access Original Article
Open Access Original Article

Information theoretic-based privacy risk evaluation for data anonymization

  • 1
  • 2
Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/