


default search action
Journal of Cybersecurity and Privacy, Volume 2
Volume 2, Number 1, January 2022
- Thilini B. G. Herath, Prashant Khanna
, Monjur Ahmed
:
Cybersecurity Practices for Social Media Users: A Systematic Literature Review. 1-18 - Acknowledgment to Reviewers of Journal of Cybersecurity and Privacy in 2021. 19
- Tor Onshus, Lars Bodsberg, Stein Hauge, Martin Gilje Jaatun
, Mary Ann Lundteigen
, Thor Myklebust, Maria Vatshaug Ottermo, Stig Petersen
, Egil Wille
:
Security and Independence of Process Safety and Control Systems in the Petroleum Industry. 20-41 - Nadine Kashmar
, Mehdi Adda
, Hussein Ibrahim
:
HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New Opportunities. 42-64 - Lili Nemec Zlatolas
, Natasa Feher, Marko Hölbl
:
Security Perception of IoT Devices in Smart Homes. 65-74 - Harry Owen, Javad Zarrin
, Shahrzad M. Pour:
A Survey on Botnets, Issues, Threats, Methods, Detection and Prevention. 74-88 - Maryam Taeb
, Hongmei Chi
:
Comparison of Deepfake Detection Techniques through Deep Learning. 89-106 - Abdulghafour Mohammad
:
Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review. 107-123 - Philokypros P. Ioulianou
, Vassilios G. Vassilakis
, Siamak F. Shahandashti
:
A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks. 124-152 - Andrew McCarthy
, Essam Ghadafi
, Panagiotis Andriotis
, Phil Legg
:
Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey. 154-190 - Laura Genga
, Luca Allodi
, Nicola Zannone
:
Association Rule Mining Meets Regression Analysis: An Automated Approach to Unveil Systematic Biases in Decision-Making Processes. 191-219
Volume 2, Number 2, March 2022
- Emmanuel Aboah Boateng
, Jerry W. Bruce
:
Unsupervised Machine Learning Techniques for Detecting PLC Process Control Anomalies. 220-244 - Francesco Di Nocera
, Giorgia Tempestini:
Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach. 245-256 - Abdulghafour Mohammad
, Sergio Vargas
, Pavel Cermák
:
Using Blockchain for Data Collection in the Automotive Industry Sector: A Literature Review. 257-275 - Hannes Salin
, Martin Lundgren
:
Towards Agile Cybersecurity Risk Management for Autonomous Software Engineering Teams. 276-291 - Caspar Schwarz-Schilling
, Sheng-Nan Li
, Claudio J. Tessone
:
Stochastic Modelling of Selfish Mining in Proof-of-Work Protocols. 292-310 - Niusen Chen
, Bo Chen
:
Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration. 311-328 - Faiza Tazi
, Sunny Shrestha
, Junibel De La Cruz, Sanchari Das
:
SoK: An Evaluation of the Secure End User Experience on the Dark Net through Systematic Literature Review. 329-357 - Haozhe Zhou, Amin Milani Fard
, Adetokunbo Makanju:
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support. 358-378 - Griffith Russell McRee
:
Improved Detection and Response via Optimized Alerts: Usability Study. 379-401 - Michel Walrave
, Joris Van Ouytsel
, Kay Diederen, Koen Ponnet
:
Checked and Approved? Human Resources Managers' Uses of Social Media for Cybervetting. 402-417 - Kimia Ameri
, Michael Hempel
, Hamid Sharif
, Juan Lopez Jr.
, Kalyan Perumalla
:
An Accuracy-Maximization Approach for Claims Classifiers in Document Content Analytics for Cybersecurity. 418-443
Volume 2, Number 3, June 2022
- Abdullah F. Al-Aboosi
, Matan Broner, Fadhil Y. Al-Aboosi:
Bingo: A Semi-Centralized Password Storage System. 444-465 - Rosemary Cosmas Tlatlaa Panga
, Janeth Marwa, Jema David Ndibwile
:
A Game or Notes? The Use of a Customized Mobile Game to Improve Teenagers' Phishing Knowledge, Case of Tanzania. 466-489 - Tibor Pósa, Jens Grossklags
:
Work Experience as a Factor in Cyber-Security Risk Awareness: A Survey Study with University Students. 490-515 - Daniel Spiekermann
, Jörg Keller
:
Requirements for Crafting Virtual Network Packet Captures. 516-526 - Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes
, Md Minhaz Chowdhury
, Nafiz Rifat, Jayden F. Connolly:
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning - A Review. 527-555 - Hannah Nyholm, Kristine Monteith, Seth Lyles, Micaela Gallegos, Mark Desantis, John Donaldson, Claire Taylor:
The Evolution of Volatile Memory Forensics. 556-572 - William Triplett
:
Addressing Human Factors in Cybersecurity Leadership. 573-586 - Shao-Fang Wen
, Ankur Shukla
, Basel Katt
:
Developing Security Assurance Metrics to Support Quantitative Security Assurance Evaluation. 587-605 - Christoph Stach
, Michael Behringer
, Julia Bräcker
, Clémentine Gritti
, Bernhard Mitschang:
SMARTEN - A Sample-Based Approach towards Privacy-Friendly Data Refinement. 606-628 - Jessil Fuhr, Feng Wang
, Yongning Tang:
MOCA: A Network Intrusion Monitoring and Classification System. 629-639 - Rachida Hireche, Houssem Mansouri, Al-Sakib Khan Pathan
:
Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis. 640-661 - Christina L. Phibbs
, Shawon S. M. Rahman
:
A Synopsis of "The Impact of Motivation, Price, and Habit on Intention to Use IoT-Enabled Technology: A Correlational Study". 662-699 - Pedro Sousa
, António Pinto
, Pedro Pinto
:
Exploiting Online Services to Enable Anonymous and Confidential Messaging. 700-713 - A. M. Mahmud Chowdhury, Masudul Haider Imtiaz:
Contactless Fingerprint Recognition Using Deep Learning - A Systematic Review. 714-730 - Andreas Puder
, Marcel Rumez
, Daniel Grimm
, Eric Sax:
Generic Patterns for Intrusion Detection Systems in Service-Oriented Automotive and Medical Architectures. 731-749 - Milos Stankovic
, Umit Karabiyik
:
Exploratory Study on Kali NetHunter Lite: A Digital Forensics Approach. 750-763
Volume 2, Number 4, September 2022
- Maha Alghawazi
, Daniyal M. Alghazzawi
, Suaad Alarifi
:
Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review. 764-777 - Panayiotis Kalogeropoulos, Dimitrios Papanikas, Panayiotis Kotzanikolaou
:
A Distributed Model for Privacy Preserving V2I Communication with Strong Unframeability and Efficient Revocation. 778-799 - Umm-e-Hani Tayyab, Faiza Babar Khan
, Muhammad Hanif Durad, Asifullah Khan
, Yeon Soo Lee:
A Survey of the Recent Trends in Deep Learning Based Malware Detection. 800-829 - Ayse Ünsal, Melek Önen
:
Calibrating the Attack to Sensitivity in Differentially Private Mechanisms. 830-852 - Mohammed A. Ahmed, Hatem F. Sindi
, Majid Kamal A. Nour
:
Cybersecurity in Hospitals: An Evaluation Model. 853-861 - Jins de Jong, Bart Kamphorst, Shannon Kroes:
Differentially Private Block Coordinate Descent for Linear Regression on Vertically Partitioned Data. 862-881 - Hunter D. Moore
, Andrew Stephens, William T. Scherer
:
An Understanding of the Vulnerability of Datasets to Disparate Membership Inference Attacks. 882-906 - Maria José Angélico Gonçalves
, Rui Humberto R. Pereira
, Marta Alexandra Guerra Magalhães Coelho:
User Reputation on E-Commerce: Blockchain-Based Approaches. 907-923

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.