Most Cited & Viewed
Most Cited & Viewed Papers
Citations | Article |
---|---|
Views | Article |
---|---|
Downloads | Article |
---|---|
You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.
All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess.
Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.
Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.
Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.
Original Submission Date Received: .
Citations | Article |
---|---|
No cited articles available for this period. |
Views | Article |
---|---|
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
by
Anastasios Giannaros, Aristeidis Karras, Leonidas Theodorakopoulos, Christos Karras, Panagiotis Kranias, Nikolaos Schizas, Gerasimos Kalogeratos and Dimitrios Tsolis
|
|
Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures—A Perspective on the Greek Landscape
by
Anastasios Papathanasiou, George Liontos, Vasiliki Liagkou and Euripidis Glavas
|
|
A Dynamic and Adaptive Cybersecurity Governance Framework
by
Henock Mulugeta Melaku
|
|
Security in Cloud-Native Services: A Survey
by
Theodoros Theodoropoulos, Luis Rosa, Chafika Benzaid, Peter Gray, Eduard Marin, Antonios Makris, Luis Cordeiro, Ferran Diego, Pavel Sorokin, Marco Di Girolamo, Paolo Barone, Tarik Taleb and Konstantinos Tserpes
|
|
A Deep Learning Approach for Network Intrusion Detection Using a Small Features Vector
by
Humera Ghani, Bal Virdee and Shahram Salekzamankhani
|
|
Assessing the Security and Privacy of Baby Monitor Apps
by
Lukas Schmidt, Henry Hosseini and Thomas Hupperich
|
|
Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication
by
Sara Kokal, Mounika Vanamala and Rushit Dave
|
|
Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review
by
Turki Al lelah, George Theodorakopoulos, Philipp Reinecke, Amir Javed and Eirini Anthi
|
|
Deploying Secure Distributed Systems: Comparative Analysis of GNS3 and SEED Internet Emulator
by
Lewis Golightly, Paolo Modesti and Victor Chang
|
Downloads | Article |
---|---|
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
by
Anastasios Giannaros, Aristeidis Karras, Leonidas Theodorakopoulos, Christos Karras, Panagiotis Kranias, Nikolaos Schizas, Gerasimos Kalogeratos and Dimitrios Tsolis
|
|
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics
by
Jennifer Bellizzi, Eleonora Losiouk, Mauro Conti, Christian Colombo and Mark Vella
|
|
A Dynamic and Adaptive Cybersecurity Governance Framework
by
Henock Mulugeta Melaku
|
|
Security in Cloud-Native Services: A Survey
by
Theodoros Theodoropoulos, Luis Rosa, Chafika Benzaid, Peter Gray, Eduard Marin, Antonios Makris, Luis Cordeiro, Ferran Diego, Pavel Sorokin, Marco Di Girolamo, Paolo Barone, Tarik Taleb and Konstantinos Tserpes
|
|
Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures—A Perspective on the Greek Landscape
by
Anastasios Papathanasiou, George Liontos, Vasiliki Liagkou and Euripidis Glavas
|
|
Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication
by
Sara Kokal, Mounika Vanamala and Rushit Dave
|
|
Security Vulnerabilities in 5G Non-Stand-Alone Networks: A Systematic Analysis and Attack Taxonomy
by
Mohamad Saalim Wani, Michael Rademacher, Thorsten Horstmann and Mathias Kretschmer
|
|
Deploying Secure Distributed Systems: Comparative Analysis of GNS3 and SEED Internet Emulator
by
Lewis Golightly, Paolo Modesti and Victor Chang
|
|
Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review
by
Turki Al lelah, George Theodorakopoulos, Philipp Reinecke, Amir Javed and Eirini Anthi
|