CINXE.COM
Journal of Computer Security - Volume Pre-press, issue Pre-press - Journals - IOS Press
<!doctype html> <!--[if lte IE 8]> <html class="no-js oldie" xmlns:mml="http://www.w3.org/1998/Math/MathML" lang="en"> <![endif]--> <!--[if gt IE 8]><!--> <html class="no-js" xmlns:mml="http://www.w3.org/1998/Math/MathML" lang="en"> <!--<![endif]--> <head> <meta charset="utf-8"> <title>Journal of Computer Security - Volume Pre-press, issue Pre-press - Journals - IOS Press</title> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <!-- These tags have been added for Google Scholar. --> <!-- see: http://scholar.google.com/intl/en/scholar/inclusion.html --> <!-- Three fields are required at a minimum: title, at least one author, publication date --> <meta name="citation_title" content="Journal of Computer Security - Volume Pre-press, issue Pre-press - Journals"> <meta name="citation_journal_title" content="Journal of Computer Security"> <meta name="citation_issn" content="0926-227X"/> <meta name="citation_volume" content="Preprint"/> <meta name="citation_issue" content="Preprint"/> <meta name="citation_publisher" content="IOS Press"> <meta name="format-detection" content="telephone=no" /> <link rel="search" href="/opensearch.xml?title=Scolaris&autocompletePath=%2Fautocomplete%3Fq%3D%7BsearchTerms%7D" type="application/opensearchdescription+xml" title="Scolaris" /> <link href='//fonts.googleapis.com/css?family=PT+Sans:400,700%7CPT+Serif:400,700' rel='stylesheet' type='text/css'> <link rel="stylesheet" href="https://content.iospress.com:443/static/less/journals.less.css@2.6.8-2-gb19ff93" /> <script src="https://content.iospress.com:443/static/js/libs/modernizr-2.5.3.min.js@2.6.8-2-gb19ff93"></script> <link rel="shortcut icon" href="https://content.iospress.com:443/static/img/favicon.ico@2.6.8-2-gb19ff93" /> <!-- Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-PJ8NZ9C');</script> <!-- End Google Tag Manager --> </head> <body class="page-journals loading" data-baseurl="https://content.iospress.com:443/" data-git="@2.6.8-2-gb19ff93" data-p13n="no" data-saved-alerts="true" data-ecommerce="true" data-shibboleth="true" data-default-counter="true" > <div class="no-js-message"> <i class="icon-warning-sign" role="presentation"></i> You are viewing a javascript disabled version of the site. Please enable Javascript for this site to function properly. </div> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-PJ8NZ9C" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <script> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'GTM-PJ8NZ9C', 'auto'); ga('send', 'pageview'); </script> <!-- End Google Tag Manager (noscript) --> <a href="#header-skiplink" class="skiplinks">Go to header</a><a href="#nav-skiplink" class="skiplinks">Go to navigation</a><a href="#search-bar" class="skiplinks">Go to search</a><a href="#content" class="skiplinks">Go to contents</a><a href="#footer-skiplink" class="skiplinks">Go to footer</a> <div class="header-block"> <header id="header" class="header block"> <a href="#nav-skiplink" class="skiplinks" id="header-skiplink">In header section. Select this link to jump to navigation</a> <div class="container"> <div class="logo" style="width: 35%"> <a href="https://content.iospress.com:443/" title="Home" class="header-home-link"> <img src="https://content.iospress.com:443/static/img/latest_header_img.png@2.6.8-2-gb19ff93" alt="IOS Press" style="max-width: 80%"/> </a> </div> <div class="header-menu clearfix"> <ul class=""> <li class=""><a href="https://content.iospress.com:443/page/help">Help</a></li> <li class=""><a href="https://content.iospress.com:443/page/about">About us</a></li> <li class=""><a href="https://content.iospress.com:443/page/contact">Contact us</a></li> </ul> </div> </div> </header> <nav id="nav" class="nav"> <a href="#content" class="skiplinks" id="nav-skiplink">In navigation section. Select this link to jump to content</a> <div class="menu-mobile js-toggle-handle"> <a class="menu-mobile-text" href="#" title="Main menu"> Menu</a> </div> <div class="container nav-menu-dropdown toggle-section clearfix"> <ul class="nav-item nav-main"> <!--Add selected class if you want to display the nav for the current page as selected --> <li class="nav-item"><a href="https://content.iospress.com:443/">Home</a></li> <li class="nav-item selected"><a href="https://content.iospress.com:443/journals/">Journals</a></li> </ul> <ul class="nav-item nav-sp-side nav-sub clearfix"> <li> <form class="getCartForm" id="getCart" method="get" action="https://content.iospress.com:443/cart"> <button class="getCartButton"> <i class="icon-shopping-cart"></i> Cart <span class="shopping-cart"> </span> </button> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/Pre-press/Pre-press" /> <span class="currency-section"> <span class="selected-currency">€</span> <button class="currency-change" data-currency="US_DOLLAR"><span class="visuallyhidden">title="Change currency to USD - US Dollar"</span>$</button> </span> </form> </li> <li> <a id="p13n-menu" href="/login?dest=https://content.iospress.com:443/" data-recaptchasitekey="6LfnJVIUAAAAAE-bUOMg0MJGki4lqSvDmhJp19fN"> Log in / Register </a> <div id="p13n-dd" class="p13n-dd"></div> <div class="p13n-modal-overlay"></div> <div id="p13n-history" data-uri="https://content.iospress.com:443/checkout/purchase-history"></div> </li> </ul> </div> </nav> <div id="search" class="search-complex" role="search"> <div class="container"> <form id="search-form" action="https://content.iospress.com:443/search" class="search-form block clearfix"> <div class="wrap-input clearfix"> <i role="presentation" class="icon-search"></i> <label for="search-bar" class="visuallyhidden">Search</label> <input id="search-bar" type="search" name="q" placeholder="Search" class="search-query search-input focused" value="" required="required"> <button type="submit" class="search-btn btn">Search</button> <input name="published_between" type="hidden" /> <input name="from_year" type="hidden" /> <input name="to_year" type="hidden"/> </div> </form> <div class="search-row second-search-row clearfix"> <form id="peer-review-form"> <label class="search-label published-label" for="published-between"> <input id="published-between" name="published_between" type="checkbox" /> Published between: </label> <label class="visuallyhidden" for="from-year">Published from year:</label> <input class="tinput search-year search-year-from" id="from-year" name="from_year" type="text" placeholder="YYYY" pattern="\d{4,4}" /> <span>and</span> <label class="visuallyhidden" for="to-year">Published to year:</label> <input class="tinput search-year" id="to-year" name="to_year" type="text" placeholder="YYYY" pattern="\d{4,4}" /> <a class="search-syntax" href="#">Search syntax help</a> </form> </div> <div id="search-syntax" class="search-helptext"> <div class='container'> <div class="search-row search-syntax-row clearfix"> <div class="search-syntax-content"> <p class='intro'>Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.</p> <dl> <dt>Boolean operators</dt> <dd>This <strong>OR</strong> that<br />This <strong>AND</strong> that<br />This <strong>NOT</strong> that</dd> <dt>Must include "This" and "That"</dt> <dd>This That</dd> <dt class="grouped">Must not include "That"</dt> <dd class="grouped">This -That</dd> <dt class="grouped">"This" is optional</dt> <dd class="grouped">This +That</dd> <dt>Exact phrase "This That"</dt> <dd>"This That"</dd> <dt>Grouping</dt> <dd>(this <strong>AND</strong> that) <strong>OR</strong> (that <strong>AND</strong> other)</dd> </dl> </div> </div> </div> </div> </div> </div> </div> <div class="container main-container"> <a href="#nav-skiplink" class="skiplinks" id="content">In content section. Select this link to jump to navigation</a> <script> ga('set', 'dimension3',"Journal of Computer Security"); ga('set', 'metric2', 1 ); ga('set', 'dimension4',"Volume Preprint"); ga('set', 'metric3', 1 ); ga('set', 'metric4', 1 ); ga('set', 'dimension5',"Issue Preprint"); ga('send', 'pageview', "/Journal of Computer Security/"); </script> <script>window.latestLoadTimestamp=1732634936631;</script> <div class="block journal-overview shadow border"> <div class="journal-overview-header block"> <div class="main col"><h1>Journal of Computer Security - Volume Pre-press, issue Pre-press</h1></div> <span class="main col"><div class="pricing-journal"> <p>Purchase individual online access for 1 year to this journal.</p> <strong>Price: EUR 260.00</strong> <form class="add-to-cart-form" id="add-JournalId_jcs" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/Pre-press/Pre-press" /> <input type="hidden" name="id" value="JournalId_jcs" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div></span> <span class="sidebar col" data-toc="Journal of Computer Security" data-toc-url="q=s2_parent_title_id%3Ajournal-of-computer-security" data-toc-journal-uri="journals/journal-of-computer-security" data-toc-q="s2_parent_title_id:journal-of-computer-security" data-toc-journal-name="Journal of Computer Security"> <span class="p13n-toc"> <button class="btn btn-p13n save-toc open-p13n-modal">Enable new issue alert</button> </span> </span> </div> <div class="journal-info block"> <div class="main col"> <div class="journal-cover col col-1by4"> <div class="journal-cover-img"> <img id="journal-of-computer-security-image" data-mercury="image" src="/fragr/images/JCS_21.jpg" /> </div> <div id="journal-of-computer-security-data" data-mercury="full" class="journals-data">ISSN 0926-227X (P) <br />ISSN 1875-8924 (E) <dl> </dl></div> </div> <div class="journal-details col col-3by4"> <div id="journal-of-computer-security-above-fold" data-mercury="full" class="clearfix above-fold details"><p><b>Impact Factor 2024: 0.9</b></p> <p>The <i>Journal of Computer Security</i> presents research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems. It also provides a forum for ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community.</p></div> <div id="journal-of-computer-security-below-fold" data-mercury="full" class="clearfix below-fold details toggle-section"><p>The journal provides an opportunity to publish articles of greater depth and length than is possible in the proceedings of various existing conferences, while addressing an audience of researchers in computer security who can be assumed to have a more specialized background than the readership of other archival publications. The journal welcomes contributions on all aspects of computer security: confidentiality, integrity, and assurance of service - that is, protection against unauthorized disclosure or modification of sensitive information, or denial of service. Of interest is a precise understanding of security policies through modelling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware systems implementing them.</p></div> <button class="btn btn-link js-toggle-handle"><span class="toggle-text-handle">Show more</span><span class="toggle-text-handle toggle-text-hide">Show less</span></button> </div> </div> <div class="sidebar col"> <div id="journal-of-computer-security-action-links" data-mercury="full" class="action-links"><a target="_blank" href="http://www.iospress.nl/recommend-this-title/?title=Journal%20of%20Computer%20Security&url=www.iospress.nl/journal/journal-of-computer-security/"></a> <a href="https://www.iospress.nl/catalog/journals/journal-of-computer-security" target="_blank">Recommend this journal </a> <a target="_blank" href="http://www.iospress.nl/journal/journal-of-computer-security/?tab=editorial-board"></a> <a href="https://www.iospress.nl/catalog/journals/journal-of-computer-security#editorial-board" target="_blank">Editorial board </a> <a href="https://www.iospress.nl/catalog/journals/journal-of-computer-security#author-guidelines" target="_blank">Submissions</a> <a href="https://www.iospress.nl/catalog/journals/journal-of-computer-security" target="_blank">Subscribe</a> <br /> <a href="http://www.iospress.nl/journal/journal-of-computer-security/?tab=submission-of-manuscripts"></a></div> </div> </div> </div> <div class="volume-listing main col"> <div class="col-spacing"> <div class="search-content border shadow"> <div class="search-result-header clearfix"> <div class="search-results-bulk-action bulk-action clearfix"> <button id="mark-toggle" class="btn-link mark-toggle"><i class="icon-check-empty" id="mark-all"></i><span> Mark all</span></button> <form class="add-to-cart-form add-marked-to-cart" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/Pre-press/Pre-press" /> <button class="btn btn-link btn-cart add-multiple disabled" disabled>Add marked to cart</button> </form> <form class="add-marked get-citation" method="post"> <button class="btn btn-link cite-multiple disabled" disabled>Export marked citations</button> </form> </div> </div> <div id="article-list"> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs230091"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs230091" data-itemid="ArticleId_jcs230091"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs230091" data-p13n-articleid="journal-of-computer-security/jcs230091" data-p13n-title=" Practical multi-party private set intersection cardinality and intersection-sum protocols under arbitrary collusion <sup>1</sup> " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs230091"> Practical multi-party private set intersection cardinality and intersection-sum protocols under arbitrary collusion <sup>1</sup> </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Chen%2C+You%22%29">Chen, You</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Ding%2C+Ning%22%29">Ding, Ning</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Gu%2C+Dawu%22%29">Gu, Dawu</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Bian%2C+Yang%22%29">Bian, Yang</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>Private set intersection cardinality (PSI-CA) and private intersection-sum with cardinality (PSI-CA-sum) are two primitives that enable data owners to learn the intersection cardinality of their data sets, with the difference that PSI-CA-sum additionally outputs the sum of the associated integer values of all the data that belongs to the intersection (i.e., intersection-sum). However, to the best of our knowledge, all existing multi-party PSI-CA (MPSI-CA) protocols are either limited by high computational cost or face security challenges under arbitrary collusion. As for multi-party PSI-CA-sum (MPSI-CA-sum), there is even no formalization for this notion at present, not to mention secure constructions for</span> <span class="fold-elip">…</span><span class="below-fold hidden" >it. In this paper, we first present an efficient MPSI-CA protocol with two non-colluding parties. This protocol significantly decreases the number of parties involved in expensive interactive procedures, leading to a significant enhancement in runtime efficiency. Our numeric results demonstrate that the running time of this protocol is merely one-quarter of the time required by our proposed MPSI-CA protocol that is secure against arbitrary collusion. Therefore, in scenarios where performance is a priority, this protocol stands out as an excellent choice. Second, we successfully construct the first MPSI-CA protocol that achieves simultaneous practicality and security against arbitrary collusion. Additionally, we also conduct implementation to verify its practicality (while the previous results under arbitrary collusion only present theoretical analysis of performance, lacking real implementation). Numeric results show that by shifting the costly operations to an offline phase, the online computation can be completed in just 12.805 seconds, even in the dishonest majority setting, where 15 parties each hold a set of size 2 16 . Third, we formalize the concept of MPSI-CA-sum and present the first realization that ensures simultaneous practicality and security against arbitrary collusion. The computational complexity of this protocol is roughly twice that of our MPSI-CA protocol. Besides the main results, we introduce the concepts and efficient constructions of two novel building blocks: multi-party secret-shared shuffle and multi-party oblivious zero-sum check, which may be of independent interest. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> Multi-party PSI-CA, multi-party PSI-CA-sum, secure multi-party computation, privacy </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-230091 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. Pre-press, no. Pre-press, pp. 1-41, 2024 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs230091" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/Pre-press/Pre-press" /> <input type="hidden" name="id" value="ArticleId_jcs230091" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs230145"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs230145" data-itemid="ArticleId_jcs230145"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs230145" data-p13n-articleid="journal-of-computer-security/jcs230145" data-p13n-title=" Evaluating the stealth of reinforcement learning-based cyber attacks against unknown scenarios using knowledge transfer techniques " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs230145"> Evaluating the stealth of reinforcement learning-based cyber attacks against unknown scenarios using knowledge transfer techniques </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Horta+Neto%2C+Antonio+Jose%22%29">Horta Neto, Antonio Jose</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22dos+Santos%2C+Anderson+Fernandes+Pereira%22%29">dos Santos, Anderson Fernandes Pereira</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Goldschmidt%2C+Ronaldo+Ribeiro%22%29">Goldschmidt, Ronaldo Ribeiro</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>Organizations are vulnerable to cyber attacks as they rely on computer networks and the internet for communication and data storage. While Reinforcement Learning (RL) is a widely used strategy to simulate and learn from these attacks, RL-guided offensives against unknown scenarios often lead to early exposure due to low stealth resulting from mistakes during the training phase. To address this issue, this work evaluates if the use of Knowledge Transfer Techniques (KTT), such as Transfer Learning and Imitation Learning, reduces the probability of early exposure by smoothing mistakes during training. This study developed a laboratory platform and a method to</span> <span class="fold-elip">…</span><span class="below-fold hidden" >compare RL-based cyber attacks using KTT for unknown scenarios. The experiments simulated 2 unknown scenarios using 4 traditional RL algorithms and 4 KTT. In the results, although some algorithms using KTT obtained superior results, they were not so significant for stealth during the initial epochs of training. Nevertheless, experiments also revealed that throughout the entire learning cycle, Trust Region Policy Optimization (TRPO) is a promising algorithm for conducting cyber offensives based on Reinforcement Learning. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> Reinforcement learning, transfer learning, imitation learning, knowledge transfer, cyber attacks, unknown scenarios </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-230145 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. Pre-press, no. Pre-press, pp. 1-19, 2024 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs230145" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/Pre-press/Pre-press" /> <input type="hidden" name="id" value="ArticleId_jcs230145" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs230092"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs230092" data-itemid="ArticleId_jcs230092"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs230092" data-p13n-articleid="journal-of-computer-security/jcs230092" data-p13n-title=" Log2Graph: A graph convolution neural network based method for insider threat detection " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs230092"> Log2Graph: A graph convolution neural network based method for insider threat detection </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Fei%2C+Kexiong%22%29">Fei, Kexiong</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Zhou%2C+Jiang%22%29">Zhou, Jiang</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Su%2C+Lin%22%29">Su, Lin</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Wang%2C+Weiping%22%29">Wang, Weiping</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Chen%2C+Yong%22%29">Chen, Yong</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>With the advancement of network security equipment, insider threats gradually replace external threats and become a critical contributing factor for cluster security threats. When detecting and combating insider threats, existing methods often concentrate on users’ behavior and analyze logs recording their operations in an information system. Traditional sequence-based method considers temporal relationships for user actions, but cannot represent complex logical relationships well between various entities and different behaviors. Current machine learning-based approaches, such as graph-based methods, can establish connections among log entries but have limitations in terms of complexity and identifying malicious behavior of user’s inherent intention. In this</span> <span class="fold-elip">…</span><span class="below-fold hidden" >paper, we propose Log2Graph, a novel insider threat detection method based on graph convolution neural network. To achieve efficient anomaly detection, Log2Graph first retrieves logs and corresponding features from log files through feature extraction. Specifically, we use an auxiliary feature of anomaly index to describe the relationship between entities, such as users and hosts, instead of establishing complex connections between them. Second, these logs and features are augmented through a combination of oversampling and downsampling, to prepare for the next-stage supervised learning process. Third, we use three elaborated rules to construct the graph of each user by connecting the logs according to chronological and logical relationships. At last, the dedicated built graph convolution neural network is used to detect insider threats. Our validation and extensive evaluation results confirm that Log2Graph can greatly improve the performance of insider threat detection compared to existing state-of-the-art methods. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> Insider threat detection, cluster security, advanced persistent threats, graph construction, graph convolution neural network </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-230092 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. Pre-press, no. Pre-press, pp. 1-24, 2024 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs230092" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/Pre-press/Pre-press" /> <input type="hidden" name="id" value="ArticleId_jcs230092" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs230218"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs230218" data-itemid="ArticleId_jcs230218"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs230218" data-p13n-articleid="journal-of-computer-security/jcs230218" data-p13n-title=" SMET: Semantic mapping of CTI reports and CVE to ATT&amp;CK for advanced threat intelligence " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs230218"> SMET: Semantic mapping of CTI reports and CVE to ATT&CK for advanced threat intelligence </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Abdeen%2C+Basel%22%29">Abdeen, Basel</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Al-Shaer%2C+Ehab%22%29">Al-Shaer, Ehab</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Singhal%2C+Anoop%22%29">Singhal, Anoop</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Khan%2C+Latifur%22%29">Khan, Latifur</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Hamlen%2C+Kevin+W.%22%29">Hamlen, Kevin W.</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>With the rapid increase in the robustness and impact of cyber-attacks, a counter-evolution in defense efforts is essential to ensure a safer cyberspace. A critical aspect of cyber defense is the experts’ ability to understand, analyze, and share knowledge of attacks and vulnerabilities in a timely and intelligible manner that facilitates the detection and mitigation of emerging threats. Cyber threat intelligence (CTI) reports, and Common Vulnerabilities and Exposures (CVEs) are two primary sources of information that security analysts use to defend against cyber attacks. Analyzing the tactics, techniques, and procedures (TTPs) of attackers from these sources by mapping them to</span> <span class="fold-elip">…</span><span class="below-fold hidden" >the ATT&CK framework provides valuable insights to defenders and aids them in countering various threats. Unfortunately, due to the complexity of this mapping and the rapid growth of these frameworks, mapping CTI reports and CVEs to ATT&CK is a daunting and time-intensive undertaking. Multiple studies have proposed models that automatically achieve this mapping. However, due to their reliance on annotated datasets, these models exhibit limitations in quality and coverage. To overcome these challenges, we present SMET – a tool that automatically maps text to ATT&CK techniques based on textual similarity. SMET achieves this mapping by leveraging ATT&CK BERT, a model we trained using the SIAMESE network to learn semantic similarity among attack actions. In inference, SMET utilizes semantic extraction, ATT&CK BERT, and a logistic regression model to achieve ATT&CK mapping. As a result, SMET has demonstrated superior performance compared to other state-of-the-art models. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> Cyber threat intelligence, MITRE ATT&CK, CVE, large langauge models, deep learning, contrastive learning, SIAMESE networks </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-230218 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. Pre-press, no. Pre-press, pp. 1-20, 2024 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs230218" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/Pre-press/Pre-press" /> <input type="hidden" name="id" value="ArticleId_jcs230218" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs230107"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs230107" data-itemid="ArticleId_jcs230107"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs230107" data-p13n-articleid="journal-of-computer-security/jcs230107" data-p13n-title=" Multi-hop sanitizable signature for collaborative edge computing " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs230107"> Multi-hop sanitizable signature for collaborative edge computing </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Yan%2C+Haotian%22%29">Yan, Haotian</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Hu%2C+Haibo%22%29">Hu, Haibo</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Ye%2C+Qingqing%22%29">Ye, Qingqing</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Xu%2C+Jianliang%22%29">Xu, Jianliang</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>Edge computing is a significant paradigm that can provide message aggregation and message verification with low time delay. To overcome the limitation of computation ability in one edge node, collaborative edge computing is proposed. Each edge node only needs to verify a subset of the message integrity, which is beneficial when incoming messages are large. In this paper, we propose an Elliptic Curve Based Multi-hop Sanitizable Signature (ECMSS), which can provide both signature aggregation and subset verification. The theoretical analysis shows that ECMSS can achieve unforgeability and non-transferability. Concurrently, the experimental results show that our proposed scheme achieves high efficiency</span> <span class="fold-elip">…</span><span class="below-fold hidden" >and guaranteed security. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> Collaborative edge computing, smart city, message integrity, Sanitizable Signature </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-230107 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. Pre-press, no. Pre-press, pp. 1-27, 2024 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs230107" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/Pre-press/Pre-press" /> <input type="hidden" name="id" value="ArticleId_jcs230107" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> <div class='result-item-wrapper'> <div class="result-item dc_type-journal-article " data-itemid="journal-of-computer-security/jcs230101"> <div class="result-item-header"> <button class="icon-check-empty toggle-selection" data-cite-id="journal-of-computer-security/jcs230101" data-itemid="ArticleId_jcs230101"><span class="visuallyhidden">Select this result for bulk action</span></button> <h2 class="result-item-title book-title" data-p13n="journal-article" data-p13n-uri="https://content.iospress.com:443/articles/journal-of-computer-security/jcs230101" data-p13n-articleid="journal-of-computer-security/jcs230101" data-p13n-title=" Securing Images using Bifid Cipher associated with Arnold Map " <!-- Link to view the article. Note that search parameters are carried on the --> <!--URL search query to allow next/previous article navigation, and return to the search list --> <a href="https://content.iospress.com:443/articles/journal-of-computer-security/jcs230101"> Securing Images using Bifid Cipher associated with Arnold Map </a> </h2> </div> <div class="front-meta-data"> <p class="metadata-entry"><span class="generated">Authors: </span> <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Kumar%2C+Sachin%22%29">Kumar, Sachin</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Suyal%2C+Swati%22%29">Suyal, Swati</a> | <a class="badge" href="https://content.iospress.com:443/search?q=author%3A%28%22Kumar%2C+Ashok%22%29">Kumar, Ashok</a> </p> <p class="metadata-entry"><span class="generated">Article Type:</span> Research Article </p> <p class="metadata-entry"> <span class="generated">Abstract: </span> <span>In this paper, a scheme for image data security is designed by using Bifid cipher and Arnold map. The conventional 2D-Bifid cipher is changed to handle the encryption and decryption of color images. Further, a block-based method is realized using Arnold map to encrypt and decrypt the image data of square as well as non-square sizes. The proposed scheme is constructed on a widely adopted cryptographic framework, i.e., substitution-permutation design, where Bifid cipher-based scheme acts as a substitution layer and Arnold map-based scheme acts as a diffusion layer. The designed scheme has a huge key space with key sensitivity not</span> <span class="fold-elip">…</span><span class="below-fold hidden" >only to accurate keys but also to their accurate orders. The practicability and performance of the designed scheme is validated by conducting a detailed analysis along with a comparative study. This paper contributes to a simple, efficient and secure image encryption method, which outperforms to the related works. </span> <a class="view-more-abstract" href="#">Show more</a> </p> <p class="metadata-entry"><span class="generated">Keywords: </span> Image security, Image encryption, Image decryption, Bifid cipher, Arnold map </p> <p class="metadata-entry"> <span class="generated">DOI: </span>10.3233/JCS-230101 </p> <p class="metadata-entry"><span class="generated">Citation: </span> <a href="https://content.iospress.com:443/journals/journal-of-computer-security">Journal of Computer Security</a>, vol. Pre-press, no. Pre-press, pp. 1-24, 2024 </p> </div> <div class="pricing"> <strong>Price: EUR 27.50</strong> <form class="add-to-cart-form" id="add-ArticleId_jcs230101" action="https://content.iospress.com:443/cart/add" method="post"> <input type="hidden" name="dest" value="https://content.iospress.com/journals/journal-of-computer-security/Pre-press/Pre-press" /> <input type="hidden" name="id" value="ArticleId_jcs230101" /> <button class="btn btn-arrow btn-cart add-single"><i class="icon-shopping-cart" role="presentation"></i> Add to cart</button> </form> </div> </div> </div> </div> </div> <div class="pagination-bottom"> </div> <div class="citation-popup-container"></div> </div> </div> <div class="sidebar journal-sidebar col"> <div class="volume-list toc folded-section shadow border" id="table-of-content"> <ul> <li class="active"> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-minus"></i>Volume Pre-press </button> <ul class="toggle-section open"> <li class="active"><span><a href="https://content.iospress.com:443/journals/journal-of-computer-security/Pre-press/Pre-press">Issue Pre-press</a></span></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 32 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/32/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/32/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/32/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/32/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/32/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/32/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 31 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/31/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/31/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/31/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/31/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/31/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/31/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 30 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/30/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/30/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/30/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/30/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/30/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/30/1">Issue 1</a></li> </ul> </li> <li class=""> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 29 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/29/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/29/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/29/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/29/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/29/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/29/1">Issue 1</a></li> </ul> </li> </ul> <div class="below-fold hidden"> <ul> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 28 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/28/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/28/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/28/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/28/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/28/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/28/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 27 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/27/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/27/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/27/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/27/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/27/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/27/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 26 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/26/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/26/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/26/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/26/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/26/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/26/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 25 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/25/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/25/4-5">Issue 4-5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/25/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/25/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/25/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 24 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/24/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/24/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/24/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/24/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/24/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/24/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 23 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/23/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/23/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/23/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/23/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/23/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/23/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 22 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/22/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/22/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/22/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/22/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/22/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/22/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 21 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/21/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/21/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/21/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/21/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/21/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/21/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 20 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/20/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/20/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/20/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/20/2-3">Issue 2-3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/20/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 19 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/19/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/19/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/19/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/19/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/19/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/19/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 18 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/18/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/18/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/18/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/18/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/18/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/18/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 17 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/17/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/17/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/17/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/17/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/17/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/17/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 16 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/16/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/16/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/16/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/16/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/16/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/16/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 15 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/15/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/15/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/15/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/15/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/15/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/15/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 14 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/14/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/14/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/14/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/14/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/14/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/14/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 13 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/13/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/13/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/13/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/13/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/13/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/13/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 12 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/12/6">Issue 6</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/12/5">Issue 5</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/12/3-4">Issue 3-4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/12/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/12/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 11 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/11/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/11/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/11/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/11/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 10 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/10/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/10/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/10/1-2">Issue 1-2</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 9 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/9/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/9/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/9/1-2">Issue 1-2</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 8 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/8/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/8/2-3">Issue 2-3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/8/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 7 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/7/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/7/2-3">Issue 2-3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/7/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 6 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/6/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/6/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/6/1-2">Issue 1-2</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 5 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/5/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/5/3">Issue 3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/5/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/5/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 4 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/4/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/4/2-3">Issue 2-3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/4/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 3 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/3/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/3/2-3">Issue 2-3</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/3/1">Issue 1</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 2 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/2/4">Issue 4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/2/2-3">Issue 2-3</a></li> </ul> </li> <li> <button class="volume-no js-volume-toggle" title="Press to access issues within this volume"> <i class="icon icon-plus"></i>Volume 1 </button> <ul class="toggle-section"> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/1/3-4">Issue 3-4</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/1/2">Issue 2</a></li> <li><a href="https://content.iospress.com:443/journals/journal-of-computer-security/1/1">Issue 1</a></li> </ul> </li> </ul> </div> <div class="view-control-section"> <a class="view-more has-hidden-items" href="#">Show more</a> </div> </div> <div class="ad-block"> <div id="journal-sidebar-ad" data-mercury="full" class="sidebar-advert"><div> </div> <div> <br /> </div> <div> <a href="https://journals.sagepub.com/ios-press-info"><img src="/fragr/images/J24_4405 IOS Press Banner Ad Sage-IOS logo swap_moving_268x268.jpg" /></a> </div> <div> <br /> </div> <div> <a href="https://tiny.cc/LD-Connect2" target="_blank"><img src="https://www.iospress.com/sites/default/files/media/images/2021-09/LD_Connect_Contentsite_RHS_Banner_2021.png" /></a> </div></div> </div> </div> </div> <div class="citation-popup-container"></div> </div> <div id="footer" class="footer block"> <a href="#header-skiplink" class="skiplinks">Go to header</a><a href="#nav-skiplink" class="skiplinks">Go to navigation</a><a href="#search-bar" class="skiplinks">Go to search</a><a href="#content" class="skiplinks">Go to contents</a><a href="#footer-skiplink" class="skiplinks">Go to footer</a> <a href="#content" class="skiplinks" id="footer-skiplink">In footer section. Select this link to jump to content</a> <div class="footer-primary container clearfix"> <div class="col-1by3 col"> <div class="spacing"> <ul> <li> <a href="https://content.iospress.com:443/sgk-login">Administrator log in</a> <p> <a href="https://shibboleth2sp.ios.semcs.net/shib?dest=https%3A%2F%2Fcontent.iospress.com%3A443%2FSHIBBOLETH%3Fdest%3Dhttps%253A%252F%252Fcontent.iospress.com%252Fjournals%252Fjournal-of-computer-security%252FPre-press%252FPre-press">Shibboleth log in</a> </p> </a> </li> <li> <a href="https://content.iospress.com:443/journals/">Journals</a> </li> <li> <a href="https://content.iospress.com:443/page/help">Help</a> </li> <li> <a href="https://content.iospress.com:443/page/about">About us</a> </li> <li> <a href="https://content.iospress.com:443/page/contact">Contact us</a> </li> </ul> </div> </div> <div class="col-1by3 col"> <div class="spacing"> <ul class="legal-links"> <li> <a href="https://content.iospress.com:443/page/terms" id="terms-of-use">Terms & conditions</a> </li> <li> <a href="https://content.iospress.com:443/page/privacy" id="cookies-hidden">Privacy policy</a> </li> <li> <span class="copy-right"> Copyright ©2024 IOS Press All rights reserved. </span> </li> </ul> </div> </div> <div class="col-1by3 col"> <div class="spacing last"> <ul class="social-media-tags"> <li><strong>Join our network: </strong></li> <li> <a href="https://twitter.com/iospress_stm" target="_blank"><i class="icon-twitter icon icon-big"></i>Twitter</a> </li> <li> <a href="https://www.facebook.com/publisheriospress" target="_blank"><i class="icon-facebook icon icon-big"></i>Facebook</a> </li> <li> <a href="https://www.linkedin.com/company/iospress" target="_blank"><i class="icon-linkedin icon icon-big"></i>LinkedIn</a> </li> </ul> </div> </div> </div><div class="footer-secondary"> <div class="container block"> <div class="col col-1by3"> <div class="spacing"> <h2>North America</h2> <p> IOS Press, Inc. <br/> 6751 Tepper Drive <br /> Clifton, VA 20124 <br /> USA <br /> </p> <p> Tel: +1 703 830 6300<br/> Fax: +1 703 830 2300 <br /> <a href="/cdn-cgi/l/email-protection#bac9dbd6dfc9fad3d5c9cac8dfc9c994d9d5d7"><span class="__cf_email__" data-cfemail="fa899b969f89ba9395898a889f8989d4999597">[email protected]</span></a> <br /> </p> <p class="info"> For editorial issues, like the status of your submitted paper or proposals, write to <a href="/cdn-cgi/l/email-protection#b8dddcd1ccd7cad1d9d4f8d1d7cbc8caddcbcb96d6d4"><span class="__cf_email__" data-cfemail="2a4f4e435e4558434b466a4345595a584f5959044446">[email protected]</span></a> </p> </div> </div> <div class="col col-1by3"> <div class="spacing"> <h2>Europe</h2> <p> IOS Press <br/> Nieuwe Hemweg 6B <br /> 1013 BG Amsterdam <br /> The Netherlands <br /> </p> <p> Tel: +31 20 688 3355 <br/> Fax: +31 20 687 0091 <br /> <a href="/cdn-cgi/l/email-protection#f990979f96b990968a898b9c8a8ad79795"><span class="__cf_email__" data-cfemail="dab3b4bcb59ab3b5a9aaa8bfa9a9f4b4b6">[email protected]</span></a> <br /> </p> <p> For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office <a href="/cdn-cgi/l/email-protection#761f181019361f1905060413050558181a"><span class="__cf_email__" data-cfemail="4920272f260920263a393b2c3a3a672725">[email protected]</span></a> <br /> </p> </div> </div> <div class="col col-1by3"> <div class="spacing last"> <h2>Asia</h2> <p> Inspirees International (China Office) <br /> Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901 <br /> 100025, Beijing <br /> China <br /> <br /> Free service line: 400 661 8717 <br /> Fax: +86 10 8446 7947<br/> <a href="/cdn-cgi/l/email-protection#96f5fefff8f7d6fff9e5e6e4f3e5e5b8f5f8"><span class="__cf_email__" data-cfemail="13707b7a7d72537a7c6063617660603d707d">[email protected]</span></a> <br /> </p> <p> For editorial issues, like the status of your submitted paper or proposals, write to <a href="/cdn-cgi/l/email-protection#4a2f2e233e2538232b260a2325393a382f3939642426"><span class="__cf_email__" data-cfemail="fb9e9f928f9489929a97bb9294888b899e8888d59597">[email protected]</span></a> </p> <p> 如果您在出版方面需要帮助或有任何建, 件至: <a href="/cdn-cgi/l/email-protection#e98c8d809d869b808885a980869a999b8c9a9ac78785"><span class="__cf_email__" data-cfemail="2b4e4f425f4459424a476b4244585b594e5858054547">[email protected]</span></a> <br /> </p> </div> </div> </div> </div><div class="container padded footer-credits block"> <div class="col col-1by2"> <img class="logo" src="https://content.iospress.com:443/static/img/mock_up_footer_new.png@2.6.8-2-gb19ff93" alt="IOS press, Impacting the world of science, Books & Journals, Online & Print"/> </div> <div class="col col-1by2 semantico-credits">Built on the Scolaris platform by: <a href="http://www.semantico.com"><img width="120" src="https://content.iospress.com:443/static/img/sem_logo.png@2.6.8-2-gb19ff93" alt="Semantico" /></a></div> </div> </div> <!--[if lt IE 8]> <script src="https://content.iospress.com:443/static/js/source/vendor/json3.js@2.6.8-2-gb19ff93" ></script> <script src="https://content.iospress.com:443/static/js/source/vendor/storage.js@2.6.8-2-gb19ff93" ></script> <!<![endif]--> <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="https://content.iospress.com:443/static/js/compiled/compiled.min.js@2.6.8-2-gb19ff93"></script> <script src="//cdn.mathjax.org/mathjax/latest/MathJax.js?config=MML_HTMLorMML" async></script> </body> </html> <!-- com.semantico.sgk.client.AuthInfoImpl@1df244d4[accountId=<null>,relatedAccountIds=[],accountType=<null>,authCredentials=[],roamingPassportCredentialType=<null>,roamingPassportCredentialValue=<null>,roamingPassportDateSet=<null>,roamingPassportDateExpires=<null>,roamingPassportUsed=false,baseUrl=<null>,contentUnits={},failOpen=false,organisation=<null>,preferences={},products=[],requestedUrl=<null>,siteId=<null>,secondarySiteIds=<null>,userId=<null>,subscribedProductUrls={},subscribedSiteIds=[],secondarySiteProducts={},secondarySiteContentUnitTypes={},subsIdContentUnits={},accIdSubsIds={},subsIdType={},subsIdPreferences={},subsIdConcurrencyType={}] --> <!-- mvn: 2.6.9-SNAPSHOT --> <!-- git: 2.6.8-2-gb19ff93 --> <!-- cspiosadmin30xa.cloud.ios.semcs.net --> <!-- loggedInP13n: java.lang.Boolean@2975e716[value=false] --> <!-- loggedInFragr: false --> <!-- client ip: 8.222.208.146 --> <!-- ecommerce: true --> <!-- shibboleth: true --> <!-- default-counter: true -->