


default search action
Journal of Cybersecurity and Privacy, Volume 2
Volume 2, Number 1, January 2022
- Thilini B. G. Herath, Prashant Khanna

, Monjur Ahmed
:
Cybersecurity Practices for Social Media Users: A Systematic Literature Review. 1-18 - Acknowledgment to Reviewers of Journal of Cybersecurity and Privacy in 2021. 19

- Tor Onshus, Lars Bodsberg, Stein Hauge, Martin Gilje Jaatun

, Mary Ann Lundteigen
, Thor Myklebust
, Maria Vatshaug Ottermo, Stig Petersen
, Egil Wille
:
Security and Independence of Process Safety and Control Systems in the Petroleum Industry. 20-41 - Nadine Kashmar

, Mehdi Adda
, Hussein Ibrahim
:
HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New Opportunities. 42-64 - Lili Nemec Zlatolas

, Natasa Feher, Marko Hölbl
:
Security Perception of IoT Devices in Smart Homes. 65-74 - Harry Owen, Javad Zarrin

, Shahrzad M. Pour:
A Survey on Botnets, Issues, Threats, Methods, Detection and Prevention. 74-88 - Maryam Taeb

, Hongmei Chi
:
Comparison of Deepfake Detection Techniques through Deep Learning. 89-106 - Abdulghafour Mohammad

:
Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review. 107-123 - Philokypros P. Ioulianou

, Vassilios G. Vassilakis
, Siamak F. Shahandashti
:
A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks. 124-152 - Andrew McCarthy

, Essam Ghadafi
, Panagiotis Andriotis
, Phil Legg
:
Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey. 154-190 - Laura Genga

, Luca Allodi
, Nicola Zannone
:
Association Rule Mining Meets Regression Analysis: An Automated Approach to Unveil Systematic Biases in Decision-Making Processes. 191-219
Volume 2, Number 2, March 2022
- Emmanuel Aboah Boateng

, Jerry W. Bruce
:
Unsupervised Machine Learning Techniques for Detecting PLC Process Control Anomalies. 220-244 - Francesco Di Nocera

, Giorgia Tempestini:
Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach. 245-256 - Abdulghafour Mohammad

, Sergio Vargas
, Pavel Cermák
:
Using Blockchain for Data Collection in the Automotive Industry Sector: A Literature Review. 257-275 - Hannes Salin

, Martin Lundgren
:
Towards Agile Cybersecurity Risk Management for Autonomous Software Engineering Teams. 276-291 - Caspar Schwarz-Schilling

, Sheng-Nan Li
, Claudio J. Tessone
:
Stochastic Modelling of Selfish Mining in Proof-of-Work Protocols. 292-310 - Niusen Chen

, Bo Chen
:
Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration. 311-328 - Faiza Tazi

, Sunny Shrestha
, Junibel De La Cruz, Sanchari Das
:
SoK: An Evaluation of the Secure End User Experience on the Dark Net through Systematic Literature Review. 329-357 - Haozhe Zhou, Amin Milani Fard

, Adetokunbo Makanju:
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support. 358-378 - Griffith Russell McRee

:
Improved Detection and Response via Optimized Alerts: Usability Study. 379-401 - Michel Walrave

, Joris Van Ouytsel
, Kay Diederen, Koen Ponnet
:
Checked and Approved? Human Resources Managers' Uses of Social Media for Cybervetting. 402-417 - Kimia Ameri

, Michael Hempel
, Hamid Sharif
, Juan Lopez Jr.
, Kalyan Perumalla
:
An Accuracy-Maximization Approach for Claims Classifiers in Document Content Analytics for Cybersecurity. 418-443
Volume 2, Number 3, June 2022
- Abdullah F. Al-Aboosi

, Matan Broner, Fadhil Y. Al-Aboosi:
Bingo: A Semi-Centralized Password Storage System. 444-465 - Rosemary Cosmas Tlatlaa Panga

, Janeth Marwa, Jema David Ndibwile
:
A Game or Notes? The Use of a Customized Mobile Game to Improve Teenagers' Phishing Knowledge, Case of Tanzania. 466-489 - Tibor Pósa, Jens Grossklags

:
Work Experience as a Factor in Cyber-Security Risk Awareness: A Survey Study with University Students. 490-515 - Daniel Spiekermann

, Jörg Keller
:
Requirements for Crafting Virtual Network Packet Captures. 516-526 - Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes

, Md Minhaz Chowdhury
, Nafiz Rifat, Jayden F. Connolly:
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning - A Review. 527-555 - Hannah Nyholm, Kristine Monteith, Seth Lyles, Micaela Gallegos, Mark Desantis, John Donaldson, Claire Taylor:

The Evolution of Volatile Memory Forensics. 556-572 - William Triplett

:
Addressing Human Factors in Cybersecurity Leadership. 573-586 - Shao-Fang Wen

, Ankur Shukla
, Basel Katt
:
Developing Security Assurance Metrics to Support Quantitative Security Assurance Evaluation. 587-605 - Christoph Stach

, Michael Behringer
, Julia Bräcker
, Clémentine Gritti
, Bernhard Mitschang:
SMARTEN - A Sample-Based Approach towards Privacy-Friendly Data Refinement. 606-628 - Jessil Fuhr, Feng Wang

, Yongning Tang:
MOCA: A Network Intrusion Monitoring and Classification System. 629-639 - Rachida Hireche, Houssem Mansouri, Al-Sakib Khan Pathan

:
Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis. 640-661 - Christina L. Phibbs

, Shawon S. M. Rahman
:
A Synopsis of "The Impact of Motivation, Price, and Habit on Intention to Use IoT-Enabled Technology: A Correlational Study". 662-699 - Pedro Sousa

, António Pinto
, Pedro Pinto
:
Exploiting Online Services to Enable Anonymous and Confidential Messaging. 700-713 - A. M. Mahmud Chowdhury, Masudul Haider Imtiaz:

Contactless Fingerprint Recognition Using Deep Learning - A Systematic Review. 714-730 - Andreas Puder

, Marcel Rumez
, Daniel Grimm
, Eric Sax:
Generic Patterns for Intrusion Detection Systems in Service-Oriented Automotive and Medical Architectures. 731-749 - Milos Stankovic

, Umit Karabiyik
:
Exploratory Study on Kali NetHunter Lite: A Digital Forensics Approach. 750-763
Volume 2, Number 4, September 2022
- Maha Alghawazi

, Daniyal M. Alghazzawi
, Suaad Alarifi
:
Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review. 764-777 - Panayiotis Kalogeropoulos, Dimitrios Papanikas, Panayiotis Kotzanikolaou

:
A Distributed Model for Privacy Preserving V2I Communication with Strong Unframeability and Efficient Revocation. 778-799 - Umm-e-Hani Tayyab, Faiza Babar Khan

, Muhammad Hanif Durad, Asifullah Khan
, Yeon Soo Lee:
A Survey of the Recent Trends in Deep Learning Based Malware Detection. 800-829 - Ayse Ünsal, Melek Önen

:
Calibrating the Attack to Sensitivity in Differentially Private Mechanisms. 830-852 - Mohammed A. Ahmed, Hatem F. Sindi

, Majid Kamal A. Nour
:
Cybersecurity in Hospitals: An Evaluation Model. 853-861 - Jins de Jong, Bart Kamphorst, Shannon Kroes:

Differentially Private Block Coordinate Descent for Linear Regression on Vertically Partitioned Data. 862-881 - Hunter D. Moore

, Andrew Stephens, William T. Scherer
:
An Understanding of the Vulnerability of Datasets to Disparate Membership Inference Attacks. 882-906 - Maria José Angélico Gonçalves

, Rui Humberto R. Pereira
, Marta Alexandra Guerra Magalhães Coelho:
User Reputation on E-Commerce: Blockchain-Based Approaches. 907-923

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














