It has reached the top

Most Cited Papers In Last Two Years

Search Filter

Sort by
Article Type
Special Issue Article
Countries/Regions
Search for
Articles Showing 18 results
Sort by
Open Access Original Article
Open Access Original Article

Anatomy of attacks on IoT systems: review of attacks, impacts and countermeasures

This article belongs to the Special Issue Topic: Security of Cyber-Physical Systems
Open Access Original Article
Open Access Original Article

Risk assessment and control selection for cyber-physical systems: a case study on supply chain tracking systems

This article belongs to the Special Issue Topic: Security of Cyber-Physical Systems
Open Access Original Article
Open Access Original Article

Evaluating the performance of post-quantum secure algorithms in the TLS protocol

Open Access Original Article
Open Access Original Article

A comparison study to detect seam carving forgery in JPEG images with deep learning models

Open Access Original Article
Open Access Original Article

A data-centric approach to the study of system-level prognostics for cyber physical systems: application to safe UAV operations

Open Access Original Article
Open Access Original Article

Advanced fault-tolerant visual multi-secret sharing scheme

Open Access Original Article
Open Access Original Article

Aviation attacks based on ILS and VOR vulnerabilities

Open Access Original Article
Open Access Original Article

Multi-level storage based auditing scheme for 5G and beyond defined edge computing

Open Access Original Article
Open Access Original Article

Android App Antiforensics

Open Access Editorial
Open Access Editorial

Acknowledgment to reviewers of Journal of Surveillance, Security and Safety in 2021

Open Access Editorial
Open Access Editorial

Inaugural editorial: an honour and a great challenge

Open Access Review
Open Access Review

A comprehensive survey of fingerprint presentation attack detection

Open Access Original Article
Open Access Original Article

Residual energy-based clustering in UAV-aided wireless sensor networks for surveillance and monitoring applications

Open Access Original Article
Open Access Original Article

Information theoretic-based privacy risk evaluation for data anonymization

Open Access Review
Open Access Review

Revisiting three anonymous two-factor authentication schemes for roaming service in global mobility networks

Open Access Original Article
Open Access Original Article

Rethinking the adversary and operational characteristics of deniable storage

Open Access Original Article
Open Access Original Article

A security study of Bluetooth-powered robot toy

Open Access Original Article
Open Access Original Article

Unsupervised detection of security threats in cyberphysical system and IoT devices based on power fingerprints and RBM autoencoders

Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/