Search dblp for Publications

export results for "toc:db/journals/jocsap/jocsap2.bht:"

 download as .bib file

@article{DBLP:journals/jocsap/AhmedSN22,
  author       = {Mohammed A. Ahmed and
                  Hatem F. Sindi and
                  Majid Kamal A. Nour},
  title        = {Cybersecurity in Hospitals: An Evaluation Model},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {4},
  pages        = {853--861},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2040043},
  doi          = {10.3390/JCP2040043},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocsap/AhmedSN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/AhsanNGCRC22,
  author       = {Mostofa Ahsan and
                  Kendall E. Nygard and
                  Rahul Gomes and
                  Md Minhaz Chowdhury and
                  Nafiz Rifat and
                  Jayden F. Connolly},
  title        = {Cybersecurity Threats and Their Mitigation Approaches Using Machine
                  Learning - {A} Review},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {527--555},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2030027},
  doi          = {10.3390/JCP2030027},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/AhsanNGCRC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/AlAboosiBA22,
  author       = {Abdullah F. Al{-}Aboosi and
                  Matan Broner and
                  Fadhil Y. Al{-}Aboosi},
  title        = {Bingo: {A} Semi-Centralized Password Storage System},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {444--465},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2030023},
  doi          = {10.3390/JCP2030023},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/AlAboosiBA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/AlghawaziAA22,
  author       = {Maha Alghawazi and
                  Daniyal M. Alghazzawi and
                  Suaad Alarifi},
  title        = {Detection of {SQL} Injection Attack Using Machine Learning Techniques:
                  {A} Systematic Literature Review},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {4},
  pages        = {764--777},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2040039},
  doi          = {10.3390/JCP2040039},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocsap/AlghawaziAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/AmeriHSLP22,
  author       = {Kimia Ameri and
                  Michael Hempel and
                  Hamid Sharif and
                  Juan Lopez Jr. and
                  Kalyan Perumalla},
  title        = {An Accuracy-Maximization Approach for Claims Classifiers in Document
                  Content Analytics for Cybersecurity},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {2},
  pages        = {418--443},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2020022},
  doi          = {10.3390/JCP2020022},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/AmeriHSLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/BoatengB22,
  author       = {Emmanuel Aboah Boateng and
                  Jerry W. Bruce},
  title        = {Unsupervised Machine Learning Techniques for Detecting {PLC} Process
                  Control Anomalies},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {2},
  pages        = {220--244},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2020012},
  doi          = {10.3390/JCP2020012},
  timestamp    = {Sat, 20 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocsap/BoatengB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/ChenC22,
  author       = {Niusen Chen and
                  Bo Chen},
  title        = {Defending against OS-Level Malware in Mobile Devices via Real-Time
                  Malware Detection and Storage Restoration},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {2},
  pages        = {311--328},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2020017},
  doi          = {10.3390/JCP2020017},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocsap/ChenC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/ChowdhuryI22,
  author       = {A. M. Mahmud Chowdhury and
                  Masudul Haider Imtiaz},
  title        = {Contactless Fingerprint Recognition Using Deep Learning - {A} Systematic
                  Review},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {714--730},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2030036},
  doi          = {10.3390/JCP2030036},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/ChowdhuryI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/FuhrWT22,
  author       = {Jessil Fuhr and
                  Feng Wang and
                  Yongning Tang},
  title        = {{MOCA:} {A} Network Intrusion Monitoring and Classification System},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {629--639},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2030032},
  doi          = {10.3390/JCP2030032},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/FuhrWT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/GengaAZ22,
  author       = {Laura Genga and
                  Luca Allodi and
                  Nicola Zannone},
  title        = {Association Rule Mining Meets Regression Analysis: An Automated Approach
                  to Unveil Systematic Biases in Decision-Making Processes},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {191--219},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2010011},
  doi          = {10.3390/JCP2010011},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/GengaAZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/GoncalvesPC22,
  author       = {Maria Jos{\'{e}} Ang{\'{e}}lico Gon{\c{c}}alves and
                  Rui Humberto R. Pereira and
                  Marta Alexandra Guerra Magalh{\~{a}}es Coelho},
  title        = {User Reputation on E-Commerce: Blockchain-Based Approaches},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {4},
  pages        = {907--923},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2040046},
  doi          = {10.3390/JCP2040046},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/GoncalvesPC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/HerathKA22,
  author       = {Thilini B. G. Herath and
                  Prashant Khanna and
                  Monjur Ahmed},
  title        = {Cybersecurity Practices for Social Media Users: {A} Systematic Literature
                  Review},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {1--18},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2010001},
  doi          = {10.3390/JCP2010001},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/HerathKA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/HirecheMP22,
  author       = {Rachida Hireche and
                  Houssem Mansouri and
                  Al{-}Sakib Khan Pathan},
  title        = {Security and Privacy Management in Internet of Medical Things (IoMT):
                  {A} Synthesis},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {640--661},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2030033},
  doi          = {10.3390/JCP2030033},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/HirecheMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/IoulianouVS22,
  author       = {Philokypros P. Ioulianou and
                  Vassilios G. Vassilakis and
                  Siamak F. Shahandashti},
  title        = {A Trust-Based Intrusion Detection System for {RPL} Networks: Detecting
                  a Combination of Rank and Blackhole Attacks},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {124--152},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2010009},
  doi          = {10.3390/JCP2010009},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/IoulianouVS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/JongKK22,
  author       = {Jins de Jong and
                  Bart Kamphorst and
                  Shannon Kroes},
  title        = {Differentially Private Block Coordinate Descent for Linear Regression
                  on Vertically Partitioned Data},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {4},
  pages        = {862--881},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2040044},
  doi          = {10.3390/JCP2040044},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/JongKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/KalogeropoulosPK22,
  author       = {Panayiotis Kalogeropoulos and
                  Dimitrios Papanikas and
                  Panayiotis Kotzanikolaou},
  title        = {A Distributed Model for Privacy Preserving {V2I} Communication with
                  Strong Unframeability and Efficient Revocation},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {4},
  pages        = {778--799},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2040040},
  doi          = {10.3390/JCP2040040},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/KalogeropoulosPK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/KashmarAI22,
  author       = {Nadine Kashmar and
                  Mehdi Adda and
                  Hussein Ibrahim},
  title        = {{HEAD} Access Control Metamodel: Distinct Design, Advanced Features,
                  and New Opportunities},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {42--64},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2010004},
  doi          = {10.3390/JCP2010004},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/KashmarAI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/McCarthyGAL22,
  author       = {Andrew McCarthy and
                  Essam Ghadafi and
                  Panagiotis Andriotis and
                  Phil Legg},
  title        = {Functionality-Preserving Adversarial Machine Learning for Robust Classification
                  in Cybersecurity and Intrusion Detection Domains: {A} Survey},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {154--190},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2010010},
  doi          = {10.3390/JCP2010010},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/McCarthyGAL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/McRee22,
  author       = {Griffith Russell McRee},
  title        = {Improved Detection and Response via Optimized Alerts: Usability Study},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {2},
  pages        = {379--401},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2020020},
  doi          = {10.3390/JCP2020020},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/McRee22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/Mohammad22,
  author       = {Abdulghafour Mohammad},
  title        = {Distributed Authentication and Authorization Models in Cloud Computing
                  Systems: {A} Literature Review},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {107--123},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2010008},
  doi          = {10.3390/JCP2010008},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/Mohammad22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/MohammadVC22,
  author       = {Abdulghafour Mohammad and
                  Sergio Vargas and
                  Pavel Cerm{\'{a}}k},
  title        = {Using Blockchain for Data Collection in the Automotive Industry Sector:
                  {A} Literature Review},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {2},
  pages        = {257--275},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2020014},
  doi          = {10.3390/JCP2020014},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/MohammadVC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/MooreSS22,
  author       = {Hunter D. Moore and
                  Andrew Stephens and
                  William Scherer},
  title        = {An Understanding of the Vulnerability of Datasets to Disparate Membership
                  Inference Attacks},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {4},
  pages        = {882--906},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2040045},
  doi          = {10.3390/JCP2040045},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/MooreSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/NoceraT22,
  author       = {Francesco Di Nocera and
                  Giorgia Tempestini},
  title        = {Getting Rid of the Usability/Security Trade-Off: {A} Behavioral Approach},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {2},
  pages        = {245--256},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2020013},
  doi          = {10.3390/JCP2020013},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/NoceraT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/NyholmMLGDDT22,
  author       = {Hannah Nyholm and
                  Kristine Monteith and
                  Seth Lyles and
                  Micaela Gallegos and
                  Mark Desantis and
                  John Donaldson and
                  Claire Taylor},
  title        = {The Evolution of Volatile Memory Forensics},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {556--572},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2030028},
  doi          = {10.3390/JCP2030028},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/NyholmMLGDDT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/OnshusBHJLMOPW22,
  author       = {Tor Onshus and
                  Lars Bodsberg and
                  Stein Hauge and
                  Martin Gilje Jaatun and
                  Mary Ann Lundteigen and
                  Thor Myklebust and
                  Maria Vatshaug Ottermo and
                  Stig Petersen and
                  Egil Wille},
  title        = {Security and Independence of Process Safety and Control Systems in
                  the Petroleum Industry},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {20--41},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2010003},
  doi          = {10.3390/JCP2010003},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/OnshusBHJLMOPW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/OwenZP22,
  author       = {Harry Owen and
                  Javad Zarrin and
                  Shahrzad M. Pour},
  title        = {A Survey on Botnets, Issues, Threats, Methods, Detection and Prevention},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {74--88},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2010006},
  doi          = {10.3390/JCP2010006},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/OwenZP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/PangaMN22,
  author       = {Rosemary Cosmas Tlatlaa Panga and
                  Janeth Marwa and
                  Jema David Ndibwile},
  title        = {A Game or Notes? The Use of a Customized Mobile Game to Improve Teenagers'
                  Phishing Knowledge, Case of Tanzania},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {466--489},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2030024},
  doi          = {10.3390/JCP2030024},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/PangaMN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/PhibbsR22,
  author       = {Christina L. Phibbs and
                  Shawon S. M. Rahman},
  title        = {A Synopsis of "The Impact of Motivation, Price, and Habit on Intention
                  to Use IoT-Enabled Technology: {A} Correlational Study"},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {662--699},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2030034},
  doi          = {10.3390/JCP2030034},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/PhibbsR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/PosaG22,
  author       = {Tibor P{\'{o}}sa and
                  Jens Grossklags},
  title        = {Work Experience as a Factor in Cyber-Security Risk Awareness: {A}
                  Survey Study with University Students},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {490--515},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2030025},
  doi          = {10.3390/JCP2030025},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/PosaG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/PuderRGS22,
  author       = {Andreas Puder and
                  Marcel Rumez and
                  Daniel Grimm and
                  Eric Sax},
  title        = {Generic Patterns for Intrusion Detection Systems in Service-Oriented
                  Automotive and Medical Architectures},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {731--749},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2030037},
  doi          = {10.3390/JCP2030037},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/PuderRGS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/SalinL22,
  author       = {Hannes Salin and
                  Martin Lundgren},
  title        = {Towards Agile Cybersecurity Risk Management for Autonomous Software
                  Engineering Teams},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {2},
  pages        = {276--291},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2020015},
  doi          = {10.3390/JCP2020015},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/SalinL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/SchwarzSchillingLT22,
  author       = {Caspar Schwarz{-}Schilling and
                  Sheng{-}Nan Li and
                  Claudio J. Tessone},
  title        = {Stochastic Modelling of Selfish Mining in Proof-of-Work Protocols},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {2},
  pages        = {292--310},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2020016},
  doi          = {10.3390/JCP2020016},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/SchwarzSchillingLT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/SousaPP22,
  author       = {Pedro Sousa and
                  Ant{\'{o}}nio Pinto and
                  Pedro Pinto},
  title        = {Exploiting Online Services to Enable Anonymous and Confidential Messaging},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {700--713},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2030035},
  doi          = {10.3390/JCP2030035},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/SousaPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/SpiekermannK22,
  author       = {Daniel Spiekermann and
                  J{\"{o}}rg Keller},
  title        = {Requirements for Crafting Virtual Network Packet Captures},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {516--526},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2030026},
  doi          = {10.3390/JCP2030026},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/SpiekermannK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/StachBBGM22,
  author       = {Christoph Stach and
                  Michael Behringer and
                  Julia Br{\"{a}}cker and
                  Cl{\'{e}}mentine Gritti and
                  Bernhard Mitschang},
  title        = {{SMARTEN} - {A} Sample-Based Approach towards Privacy-Friendly Data
                  Refinement},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {606--628},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2030031},
  doi          = {10.3390/JCP2030031},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/StachBBGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/StankovicK22,
  author       = {Milos Stankovic and
                  Umit Karabiyik},
  title        = {Exploratory Study on Kali NetHunter Lite: {A} Digital Forensics Approach},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {750--763},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2030038},
  doi          = {10.3390/JCP2030038},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/StankovicK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/TaebC22,
  author       = {Maryam Taeb and
                  Hongmei Chi},
  title        = {Comparison of Deepfake Detection Techniques through Deep Learning},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {89--106},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2010007},
  doi          = {10.3390/JCP2010007},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/TaebC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/TayyabKDKL22,
  author       = {Umm{-}e{-}Hani Tayyab and
                  Faiza Babar Khan and
                  Muhammad Hanif Durad and
                  Asifullah Khan and
                  Yeon Soo Lee},
  title        = {A Survey of the Recent Trends in Deep Learning Based Malware Detection},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {4},
  pages        = {800--829},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2040041},
  doi          = {10.3390/JCP2040041},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/TayyabKDKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/TaziSCD22,
  author       = {Faiza Tazi and
                  Sunny Shrestha and
                  Junibel De La Cruz and
                  Sanchari Das},
  title        = {SoK: An Evaluation of the Secure End User Experience on the Dark Net
                  through Systematic Literature Review},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {2},
  pages        = {329--357},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2020018},
  doi          = {10.3390/JCP2020018},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/TaziSCD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/Triplett22,
  author       = {William Triplett},
  title        = {Addressing Human Factors in Cybersecurity Leadership},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {573--586},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2030029},
  doi          = {10.3390/JCP2030029},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/Triplett22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/UnsalO22,
  author       = {Ayse {\"{U}}nsal and
                  Melek {\"{O}}nen},
  title        = {Calibrating the Attack to Sensitivity in Differentially Private Mechanisms},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {4},
  pages        = {830--852},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2040042},
  doi          = {10.3390/JCP2040042},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/UnsalO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/WalraveODP22,
  author       = {Michel Walrave and
                  Joris Van Ouytsel and
                  Kay Diederen and
                  Koen Ponnet},
  title        = {Checked and Approved? Human Resources Managers' Uses of Social Media
                  for Cybervetting},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {2},
  pages        = {402--417},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2020021},
  doi          = {10.3390/JCP2020021},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/WalraveODP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/WenSK22,
  author       = {Shao{-}Fang Wen and
                  Ankur Shukla and
                  Basel Katt},
  title        = {Developing Security Assurance Metrics to Support Quantitative Security
                  Assurance Evaluation},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {587--605},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2030030},
  doi          = {10.3390/JCP2030030},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/WenSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/X22,
  title        = {Acknowledgment to Reviewers of Journal of Cybersecurity and Privacy
                  in 2021},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {19},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2010002},
  doi          = {10.3390/JCP2010002},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/X22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/ZhouFM22,
  author       = {Haozhe Zhou and
                  Amin Milani Fard and
                  Adetokunbo Makanju},
  title        = {The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures,
                  and Tool Support},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {2},
  pages        = {358--378},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2020019},
  doi          = {10.3390/JCP2020019},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/ZhouFM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/ZlatolasFH22,
  author       = {Lili Nemec Zlatolas and
                  Natasa Feher and
                  Marko H{\"{o}}lbl},
  title        = {Security Perception of IoT Devices in Smart Homes},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {65--74},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2010005},
  doi          = {10.3390/JCP2010005},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/ZlatolasFH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics