Homomorphic encryption for data protection in cloud computing Anna EpishkinaVladislav Ermakov Research 25 April 2025 Article: 8
Use of Russian standardized crypto algorithms in QUIC Valery Smyslov Research 09 April 2025 Article: 7
RC4OK: an improvement of the RC4 stream cipher Oleg KhovaykoDmitriy Schelkunov Research 07 April 2025 Article: 6
Android malware detection based on feature fusion and the improved stacking ensemble model Jiahao ZhangZijiong XuLingru Cai Research 24 February 2025 Article: 5
Big data with machine learning enabled intrusion detection with honeypot intelligence system on apache Flink (BDML-IDHIS) Akshay MudgalShaveta Bhatia Original Paper 07 January 2025 Article: 4
Building a business email compromise research dataset with large language models Rohit Dube Original Paper 02 January 2025 Article: 3
Engineering graphics copyright protection via CAT and reversi-ble state loop maximum length cellular automata Xiaoyan ZhangShouxin LiuJianzhong Li Original Paper 13 December 2024 Article: 2
On the uniqueness of AntiVirus labels: How many labels do we need to fingerprint an AV? Marcus Botacin Research 22 November 2024 Article: 1
Experts still needed: boosting long-term android malware detection with active learning Alejandro Guerra-ManzanaresHayretdin Bahsi Original Paper Open access 03 October 2024 Pages: 901 - 918
Reducing overdefined systems of polynomial equations derived from small scale variants of the AES via data mining methods Jana BeruškováMartin JurečekOlha Jurečková Original Paper 30 September 2024 Pages: 885 - 900
RansomGuard: a framework for proactive detection and mitigation of cryptographic windows ransomware M Adnan AlviZunera Jalil Original Paper 27 September 2024 Pages: 867 - 884
The editorial for special issue “Russian Research in Artificial Intelligence for Cybersecurity” of Journal of Computer Virology and Hacking Techniques (JICV) highlights the studies of Russian researchers in the field of artificial intelligence to ensure cybersecurity Ekaterina PleshakovaAlisa Koreneva Editorial 27 September 2024 Pages: 347 - 348
Modular arithmetic optimization in Kyber KEM A. S. ZelenetskyP. G. Klyucharev Original Paper 14 September 2024 Pages: 857 - 865
Validating network attack concepts: A TCAV-driven approach R. R. Rejimol RobinsonRendhir R. PrasadN. Balakrishnan Original Paper 10 September 2024 Pages: 841 - 855
FloodKnight: an intelligent DDoS defense scheme to combat attacks near attack entry points Neelam DayalShashank Srivastava Original Paper 05 August 2024 Pages: 819 - 839
An Ultra-Lightweight Secure RFID Authentication Protocol for Low-Cost Tags Sanjeev KumarHaider BankaSurbhi Sharma Original Paper 02 August 2024 Pages: 803 - 818
Next gen cybersecurity paradigm towards artificial general intelligence: Russian market challenges and future global technological trends Ekaterina PleshakovaAleksey OsipovAthanasios Vasilakos Original Paper 23 July 2024 Pages: 429 - 440
Differences with high probability and impossible differentials for the KB-256 cipher R. AstrakhantsevA. ChuhnoI. Astrakhantseva Original Paper 08 July 2024 Pages: 525 - 531
Oblivion: an open-source system for large-scale analysis of macro-based office malware Alessandro SannaFabrizio CaraGiorgio Giacinto Original Paper Open access 02 July 2024 Pages: 783 - 802
On modular (CRT-based) secret sharing Nikolay N. Shenets Original Paper 01 July 2024 Pages: 765 - 782
Classification of return-oriented programming gadgets: a machine learning approach Pierre-François MaillardAvisek Gupta Original Paper 19 June 2024 Pages: 751 - 763
Design criteria of a new code-based KEM Victoria VysotskayaIvan Chizhov Original Paper 13 June 2024 Pages: 497 - 511
On improved security bounds of one block ciphers mode of operation for protection of block-oriented system storage devices Georgii FirsovAlisa Koreneva Original Paper 03 June 2024 Pages: 513 - 523
Antimalware applied to IoT malware detection based on softcore processor endowed with authorial sandbox Igor Pinheiro Henriques de AraújoLiosvaldo Mariano Santiago de AbreuSidney Marlon Lopes de Lima Original Paper 03 June 2024 Pages: 729 - 749
Hypericum: a post-quantum digital signature for standardization in Russia Oleg TurchenkoSergey Grebnev Original Paper 25 May 2024 Pages: 455 - 483
Searching linear structures of permutation groups with quantum computer Mikhail PolyakovPyotr Kluycharev Original Paper 24 May 2024 Pages: 725 - 728
Crypto-anarchy: a paradigm shift for society and the legal system Alesia Zhuk Original Paper 23 May 2024 Pages: 697 - 723
The distance-bounding protocol based on Russian cryptographic algorithms Vladimir BelskyAnastasiia ChichaevaKirill Tsaregorodtsev Original Paper 17 May 2024 Pages: 485 - 495
A vehicle firmware security vulnerability: an IVI exploitation Gianpiero CostantinoMarco De VincenziIlaria Matteucci Original Paper Open access 08 May 2024 Pages: 681 - 696
Social media bot detection using Dropout-GAN Anant ShuklaMartin JurečekMark Stamp Original Paper 02 May 2024 Pages: 669 - 680
Sniping at web applications to discover input-handling vulnerabilities Ciro BrandiGaetano PerroneSimon Pietro Romano Original Paper Open access 12 April 2024 Pages: 641 - 667
A comparison of adversarial malware generators Pavla LouthánováMatouš KozákFabio Di Troia Original Paper Open access 06 April 2024 Pages: 623 - 639
Creating valid adversarial examples of malware Matouš KozákMartin JurečekFabio Di Troia Original Paper Open access 18 March 2024 Pages: 607 - 621
Some remarks on how to hash faster onto elliptic curves Dmitrii Koshelev Original Paper 18 March 2024 Pages: 593 - 605
Use of hybrid post-quantum key exchange in internet protocols Valery Smyslov Original Paper 16 March 2024 Pages: 447 - 454
Classification and online clustering of zero-day malware Olha JurečkováMartin JurečekRóbert Lórencz Original Paper Open access 12 February 2024 Pages: 579 - 592
An approach for designing fast public key encryption systems using white-box cryptography techniques D. Schelkunov Original Paper 10 February 2024 Pages: 441 - 445
“Dirclustering”: a semantic clustering approach to optimize website structure discovery during penetration testing Diego AntonelliRoberta CascellaSimon Pietro Romano Original Paper 07 February 2024 Pages: 565 - 577
Picker Blinder: a framework for automatic injection of malicious inter-app communication Rosangela CasolareStefano FagnanoAntonella Santone Original Paper 12 January 2024 Pages: 331 - 346
Faulty use of the CIC-IDS 2017 dataset in information security research Rohit Dube Original Paper 28 December 2023 Pages: 203 - 211
Partial key exposure attack on RSA using some private key blocks Santosh Kumar RavvaK. L. N. C. PrakashS. R. M. Krishna Original Paper 08 November 2023 Pages: 185 - 193
Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes R. Santosh KumarK. L. N. C. PrakashS. R. M. Krishna Original Paper 20 October 2023 Pages: 195 - 202
A natural language processing approach to Malware classification Ritik MehtaOlha JurečkováMark Stamp Original Paper 20 October 2023 Pages: 173 - 184
Using deep graph learning to improve dynamic analysis-based malware detection in PE files Minh Tu NguyenViet Hung NguyenNathan Shone Original Paper 20 October 2023 Pages: 153 - 172
Protection against adversarial attacks with randomization of recognition algorithm Grigory MarshalkoSvetlana Koreshkova Original Paper 05 October 2023 Pages: 127 - 133
Provably minimum data complexity integral distinguisher based on conventional division property Akram KhalesiZahra Ahmadian Original Paper 28 September 2023 Pages: 113 - 125
Explainable Ransomware Detection with Deep Learning Techniques Giovanni CiaramellaGiacomo IadarolaAntonella Santone Invited Paper 27 September 2023 Pages: 317 - 330
Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights Omid KargarnovinAmir Mahdi SadeghzadehRasool Jalili Original Paper 27 September 2023 Pages: 95 - 111
Use of cryptography in malware obfuscation Hassan Jameel AsgharBenjamin Zi Hao ZhaoDaniel Coscia Original Paper 25 September 2023 Pages: 135 - 152
Machine learning methods for speech emotion recognition on telecommunication systems Alexey OsipovEkaterina PleshakovaSergey Gataullin Original Paper 16 September 2023 Pages: 415 - 428