


default search action
Journal of Cybersecurity and Privacy, Volume 4
Volume 4, Number 1, March 2024
- Christian DeLozier

:
How Close Is Existing C/C++ Code to a Safe Subset? 1-22 - Mohamad Saalim Wani

, Michael Rademacher
, Thorsten Horstmann, Mathias Kretschmer
:
Security Vulnerabilities in 5G Non-Stand-Alone Networks: A Systematic Analysis and Attack Taxonomy. 23-40 - Anthony Overmars

, Sitalakshmi Venkatraman
:
Continued Fractions Applied to the One Line Factoring Algorithm for Breaking RSA. 41-54 - Elias Seid, Oliver Popov

, Fredrik Blix
:
Security Attack Behavioural Pattern Analysis for Critical Service Providers. 55-75 - Ioannis Paspatis, Aggeliki Tsohou:

Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement. 76-104 - Stefan Kutschera

, Wolfgang Slany
, Patrick Ratschiller
, Sarina Gursch
, Patrick Deininger
, Håvard D. Johansen
:
Incidental Data: A Survey towards Awareness on Privacy-Compromising Data Incidentally Shared on Social Media. 105-125 - Yousef Alghamdi

, Arslan Munir
:
Image Encryption Algorithms: A Survey of Design and Evaluation Metrics. 126-152
Volume 4, Number 2, June 2024
- Anthony J. Rose

, Scott R. Graham
, Christine M. Schubert-Kabban
, Jacob J. Krasnov
, Wayne C. Henry
:
ScriptBlock Smuggling: Uncovering Stealthy Evasion Techniques in PowerShell and .NET Environments. 153-166 - Jan Domnik

, Alexander Holland:
On Data Leakage Prevention Maturity: Adapting the C2M2 Framework. 167-195 - Ratna Halder, Dipanjan Das Roy, Dongwan Shin:

A Blockchain-Based Decentralized Public Key Infrastructure Using the Web of Trust. 196-222 - Arslan Munir

, Alexander J. Aved
, Khanh Pham, Joonho Kong
:
Trustworthiness of Situational Awareness: Significance and Quantification. 223-240 - Eric Muhati

, Danda B. Rawat
:
Data-Driven Network Anomaly Detection with Cyber Attack and Defense Visualization. 241-263 - Avi Shaked

:
Facilitating the Integrative Use of Security Knowledge Bases within a Modelling Environment. 264-277 - Tunde Oduguwa

, Abdullahi Arabo
:
Passwordless Authentication Using a Combination of Cryptography, Steganography, and Biometrics. 278-297 - Pankajeshwara Sharma, Michael Govorov

, Michael Martin:
A Usable Encryption Solution for File-Based Geospatial Data within a Database File System. 298-323 - Stanislav Abaimov:

Understanding and Classifying Permanent Denial-of-Service Attacks. 324-339 - Pete Burnap

, Eirini Anthi
, Philipp Reinecke, Lowri Williams
, Fengnian Cao, Rakan Aldmour, Kevin Jones:
Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals. 340-356 - Habib El Amin, Abed Ellatif Samhat

, Maroun Chamoun, Lina Oueidat, Antoine Feghali:
An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure. 357-381 - Feng Wang

, Yongning Tang:
Diverse Intrusion and Malware Detection: AI-Based and Non-AI-Based Solutions. 382-387
Volume 4, Number 3, September 2024
- Jack Laurie Tilbury, Stephen Flowerday

:
Humans and Automation: Augmenting Security Operation Centers. 388-409 - Paolo Modesti

, Lewis Golightly
, Louis Holmes, Chidimma Opara
, Marco Moscini
:
Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking Tools. 410-448 - Mamadou Kasse

, Rodolphe Charrier, Alexandre Berred
, Cyrille Bertelle
, Christophe Delpierre:
An Approach for Anomaly Detection in Network Communications Using k-Path Analysis. 449-467 - Abdelouadoud Stambouli

, Luigi Logrippo
:
Implementation of a Partial-Order Data Security Model for the Internet of Things (IoT) Using Software-Defined Networking (SDN). 468-493 - Eduardo Pina, José Ramos, Henrique Jorge, Paulo Váz, José Silva

, Cristina Wanzeller, Maryam Abbasi
, Pedro Martins
:
Data Privacy and Ethical Considerations in Database Management. 494-517 - Charalampos Bratsas

, Efstathios Konstantinos Anastasiadis
, Alexandros K. Angelidis
, Lazaros Ioannidis
, Rigas Kotsakis
, Stefanos Ougiaroglou
:
Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review. 518-545 - Jack Kolenbrander

, Ethan Husmann
, Christopher Henshaw
, Elliott Rheault, Madison G. Boswell, Alan J. Michaels
:
Use & Abuse of Personal Information, Part II: Robust Generation of Fake IDs for Privacy Experimentation. 546-571 - Elliott Rheault, Mary Nerayo, Jaden Leonard, Jack Kolenbrander

, Christopher Henshaw
, Madison G. Boswell, Alan J. Michaels
:
Use and Abuse of Personal Information, Part I: Design of a Scalable OSINT Collection Engine. 572-593 - Christopher R. Sears

, Daniel R. Cunningham:
Individual Differences in Psychological Stress Associated with Data Breach Experiences. 594-614 - Alan Mills

, Jonathan White
, Phil Legg
:
GoibhniUWE: A Lightweight and Modular Container-Based Cyber Range. 615-628 - Antonio Francesco Gentile

, Davide Macrì
, Emilio Greco
, Peppino Fazio
:
IoT IP Overlay Network Security Performance Analysis with Open Source Infrastructure Deployment. 629-649 - Chatphat Titiakarawongse, Sasiyaporn Taksin, Jidapa Ruangsawat, Kunthida Deeduangpan, Sirapat Boonkrong:

Comparative Vulnerability Analysis of Thai and Non-Thai Mobile Banking Applications. 650-662 - A. M. Mahmud Chowdhury

, Md Jahangir Alam Khondkar, Masudul Haider Imtiaz:
Advancements in Synthetic Generation of Contactless Palmprint Biometrics Using StyleGAN Models. 663-677 - Fahad Alotaibi, Ramesh K. Karne, Alexander L. Wijesinha, Nirmala Soundararajan, Abhishek Rangi:

An Evaluation of the Security of Bare Machine Computing (BMC) Systems against Cybersecurity Attacks. 678-730 - Zlatan Moric

, Vedran Dakic
, Daniela Djekic, Damir Regvart
:
Protection of Personal Data in the Context of E-Commerce. 731-761 - Erik William Tomlinson, Wolday Abrha, Seong Dae Kim

, Salvador A. Ortega:
Cybersecurity Access Control: Framework Analysis in a Healthcare Institution. 762-776
Volume 4, Number 4, 2024
- Samir Achraf Chamkar

, Yassine Maleh
, Noreddine Gherabi
:
Security Operations Centers: Use Case Best Practices, Coverage, and Gap Analysis Based on MITRE Adversarial Tactics, Techniques, and Common Knowledge. 777-793 - Justin Foreman

, Willie L. Waters, Charles A. Kamhoua, Ahmed H. Anwar
, Jaime C. Acosta, Blessing C. Dike:
Detection of Hacker Intention Using Deep Packet Inspection. 794-804 - Caleb Rother

, Bo Chen
:
Reversing File Access Control Using Disk Forensics on Low-Level Flash Memory. 805-822 - Sara Abbaspour Asadollah, Shamoona Imtiaz, Alireza Dehlaghi-Ghadim

, Mikael Sjödin, Marjan Sirjani:
Enhancing Cybersecurity through Comprehensive Investigation of Data Flow-Based Attack Scenarios. 823-852 - Khalid Bennouk

, Nawal Ait Aali
, Younès El Bouzekri El Idrissi
, Bechir Sebai, Abou Zakaria Faroukhi, Dorra Mahouachi:
A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies. 853-908 - RETRACTED: Alrubaiq, A.; Alharbi, T. Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia. J. Cybersecur. Priv. 2021, 1, 302-318. 909

- Van Joshua Abergos

, Faiza Medjek
:
A Risk Assessment Analysis to Enhance the Security of OT WAN with SD-WAN. 910-937 - Emil Eminov

, Stephen V. Flowerday
:
Suspicious Financial Activity in the Context of In-Game Asset Exchange Marketplace. 938-950 - Cristian Agredo, Tor J. Langehaug, Scott R. Graham

:
Inferring TLB Configuration with Performance Tools. 951-971 - Ioannis Vourganas

, Anna Lito Michala
:
Applications of Machine Learning in Cyber Security: A Review. 972-992 - Prudence M. Mavhemwa

, Marco Zennaro
, Philibert Nsengiyumva
, Frederic Nzanywayingoma
:
An Android-Based Internet of Medical Things Adaptive User Authentication and Authorization Model for the Elderly. 993-1017 - Swatisipra Das

, Rojalina Priyadarshini
, Minati Mishra
, Rabindra Kumar Barik
:
Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study. 1018-1043

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














