Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jocsap/jocsap2.bht:"
@article{DBLP:journals/jocsap/AhmedSN22, author = {Mohammed A. Ahmed and Hatem F. Sindi and Majid Kamal A. Nour}, title = {Cybersecurity in Hospitals: An Evaluation Model}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {4}, pages = {853--861}, year = {2022}, url = {https://doi.org/10.3390/jcp2040043}, doi = {10.3390/JCP2040043}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocsap/AhmedSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/AhsanNGCRC22, author = {Mostofa Ahsan and Kendall E. Nygard and Rahul Gomes and Md Minhaz Chowdhury and Nafiz Rifat and Jayden F. Connolly}, title = {Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning - {A} Review}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {3}, pages = {527--555}, year = {2022}, url = {https://doi.org/10.3390/jcp2030027}, doi = {10.3390/JCP2030027}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/AhsanNGCRC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/AlAboosiBA22, author = {Abdullah F. Al{-}Aboosi and Matan Broner and Fadhil Y. Al{-}Aboosi}, title = {Bingo: {A} Semi-Centralized Password Storage System}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {3}, pages = {444--465}, year = {2022}, url = {https://doi.org/10.3390/jcp2030023}, doi = {10.3390/JCP2030023}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/AlAboosiBA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/AlghawaziAA22, author = {Maha Alghawazi and Daniyal M. Alghazzawi and Suaad Alarifi}, title = {Detection of {SQL} Injection Attack Using Machine Learning Techniques: {A} Systematic Literature Review}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {4}, pages = {764--777}, year = {2022}, url = {https://doi.org/10.3390/jcp2040039}, doi = {10.3390/JCP2040039}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocsap/AlghawaziAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/AmeriHSLP22, author = {Kimia Ameri and Michael Hempel and Hamid Sharif and Juan Lopez Jr. and Kalyan Perumalla}, title = {An Accuracy-Maximization Approach for Claims Classifiers in Document Content Analytics for Cybersecurity}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {2}, pages = {418--443}, year = {2022}, url = {https://doi.org/10.3390/jcp2020022}, doi = {10.3390/JCP2020022}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/AmeriHSLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/BoatengB22, author = {Emmanuel Aboah Boateng and Jerry W. Bruce}, title = {Unsupervised Machine Learning Techniques for Detecting {PLC} Process Control Anomalies}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {2}, pages = {220--244}, year = {2022}, url = {https://doi.org/10.3390/jcp2020012}, doi = {10.3390/JCP2020012}, timestamp = {Sat, 20 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocsap/BoatengB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/ChenC22, author = {Niusen Chen and Bo Chen}, title = {Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {2}, pages = {311--328}, year = {2022}, url = {https://doi.org/10.3390/jcp2020017}, doi = {10.3390/JCP2020017}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocsap/ChenC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/ChowdhuryI22, author = {A. M. Mahmud Chowdhury and Masudul Haider Imtiaz}, title = {Contactless Fingerprint Recognition Using Deep Learning - {A} Systematic Review}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {3}, pages = {714--730}, year = {2022}, url = {https://doi.org/10.3390/jcp2030036}, doi = {10.3390/JCP2030036}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/ChowdhuryI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/FuhrWT22, author = {Jessil Fuhr and Feng Wang and Yongning Tang}, title = {{MOCA:} {A} Network Intrusion Monitoring and Classification System}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {3}, pages = {629--639}, year = {2022}, url = {https://doi.org/10.3390/jcp2030032}, doi = {10.3390/JCP2030032}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/FuhrWT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/GengaAZ22, author = {Laura Genga and Luca Allodi and Nicola Zannone}, title = {Association Rule Mining Meets Regression Analysis: An Automated Approach to Unveil Systematic Biases in Decision-Making Processes}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {1}, pages = {191--219}, year = {2022}, url = {https://doi.org/10.3390/jcp2010011}, doi = {10.3390/JCP2010011}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/GengaAZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/GoncalvesPC22, author = {Maria Jos{\'{e}} Ang{\'{e}}lico Gon{\c{c}}alves and Rui Humberto R. Pereira and Marta Alexandra Guerra Magalh{\~{a}}es Coelho}, title = {User Reputation on E-Commerce: Blockchain-Based Approaches}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {4}, pages = {907--923}, year = {2022}, url = {https://doi.org/10.3390/jcp2040046}, doi = {10.3390/JCP2040046}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/GoncalvesPC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/HerathKA22, author = {Thilini B. G. Herath and Prashant Khanna and Monjur Ahmed}, title = {Cybersecurity Practices for Social Media Users: {A} Systematic Literature Review}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {1}, pages = {1--18}, year = {2022}, url = {https://doi.org/10.3390/jcp2010001}, doi = {10.3390/JCP2010001}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/HerathKA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/HirecheMP22, author = {Rachida Hireche and Houssem Mansouri and Al{-}Sakib Khan Pathan}, title = {Security and Privacy Management in Internet of Medical Things (IoMT): {A} Synthesis}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {3}, pages = {640--661}, year = {2022}, url = {https://doi.org/10.3390/jcp2030033}, doi = {10.3390/JCP2030033}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/HirecheMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/IoulianouVS22, author = {Philokypros P. Ioulianou and Vassilios G. Vassilakis and Siamak F. Shahandashti}, title = {A Trust-Based Intrusion Detection System for {RPL} Networks: Detecting a Combination of Rank and Blackhole Attacks}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {1}, pages = {124--152}, year = {2022}, url = {https://doi.org/10.3390/jcp2010009}, doi = {10.3390/JCP2010009}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/IoulianouVS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/JongKK22, author = {Jins de Jong and Bart Kamphorst and Shannon Kroes}, title = {Differentially Private Block Coordinate Descent for Linear Regression on Vertically Partitioned Data}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {4}, pages = {862--881}, year = {2022}, url = {https://doi.org/10.3390/jcp2040044}, doi = {10.3390/JCP2040044}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/JongKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/KalogeropoulosPK22, author = {Panayiotis Kalogeropoulos and Dimitrios Papanikas and Panayiotis Kotzanikolaou}, title = {A Distributed Model for Privacy Preserving {V2I} Communication with Strong Unframeability and Efficient Revocation}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {4}, pages = {778--799}, year = {2022}, url = {https://doi.org/10.3390/jcp2040040}, doi = {10.3390/JCP2040040}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/KalogeropoulosPK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/KashmarAI22, author = {Nadine Kashmar and Mehdi Adda and Hussein Ibrahim}, title = {{HEAD} Access Control Metamodel: Distinct Design, Advanced Features, and New Opportunities}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {1}, pages = {42--64}, year = {2022}, url = {https://doi.org/10.3390/jcp2010004}, doi = {10.3390/JCP2010004}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/KashmarAI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/McCarthyGAL22, author = {Andrew McCarthy and Essam Ghadafi and Panagiotis Andriotis and Phil Legg}, title = {Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: {A} Survey}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {1}, pages = {154--190}, year = {2022}, url = {https://doi.org/10.3390/jcp2010010}, doi = {10.3390/JCP2010010}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/McCarthyGAL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/McRee22, author = {Griffith Russell McRee}, title = {Improved Detection and Response via Optimized Alerts: Usability Study}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {2}, pages = {379--401}, year = {2022}, url = {https://doi.org/10.3390/jcp2020020}, doi = {10.3390/JCP2020020}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/McRee22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/Mohammad22, author = {Abdulghafour Mohammad}, title = {Distributed Authentication and Authorization Models in Cloud Computing Systems: {A} Literature Review}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {1}, pages = {107--123}, year = {2022}, url = {https://doi.org/10.3390/jcp2010008}, doi = {10.3390/JCP2010008}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/Mohammad22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/MohammadVC22, author = {Abdulghafour Mohammad and Sergio Vargas and Pavel Cerm{\'{a}}k}, title = {Using Blockchain for Data Collection in the Automotive Industry Sector: {A} Literature Review}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {2}, pages = {257--275}, year = {2022}, url = {https://doi.org/10.3390/jcp2020014}, doi = {10.3390/JCP2020014}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/MohammadVC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/MooreSS22, author = {Hunter D. Moore and Andrew Stephens and William Scherer}, title = {An Understanding of the Vulnerability of Datasets to Disparate Membership Inference Attacks}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {4}, pages = {882--906}, year = {2022}, url = {https://doi.org/10.3390/jcp2040045}, doi = {10.3390/JCP2040045}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/MooreSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/NoceraT22, author = {Francesco Di Nocera and Giorgia Tempestini}, title = {Getting Rid of the Usability/Security Trade-Off: {A} Behavioral Approach}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {2}, pages = {245--256}, year = {2022}, url = {https://doi.org/10.3390/jcp2020013}, doi = {10.3390/JCP2020013}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/NoceraT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/NyholmMLGDDT22, author = {Hannah Nyholm and Kristine Monteith and Seth Lyles and Micaela Gallegos and Mark Desantis and John Donaldson and Claire Taylor}, title = {The Evolution of Volatile Memory Forensics}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {3}, pages = {556--572}, year = {2022}, url = {https://doi.org/10.3390/jcp2030028}, doi = {10.3390/JCP2030028}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/NyholmMLGDDT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/OnshusBHJLMOPW22, author = {Tor Onshus and Lars Bodsberg and Stein Hauge and Martin Gilje Jaatun and Mary Ann Lundteigen and Thor Myklebust and Maria Vatshaug Ottermo and Stig Petersen and Egil Wille}, title = {Security and Independence of Process Safety and Control Systems in the Petroleum Industry}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {1}, pages = {20--41}, year = {2022}, url = {https://doi.org/10.3390/jcp2010003}, doi = {10.3390/JCP2010003}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/OnshusBHJLMOPW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/OwenZP22, author = {Harry Owen and Javad Zarrin and Shahrzad M. Pour}, title = {A Survey on Botnets, Issues, Threats, Methods, Detection and Prevention}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {1}, pages = {74--88}, year = {2022}, url = {https://doi.org/10.3390/jcp2010006}, doi = {10.3390/JCP2010006}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/OwenZP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/PangaMN22, author = {Rosemary Cosmas Tlatlaa Panga and Janeth Marwa and Jema David Ndibwile}, title = {A Game or Notes? The Use of a Customized Mobile Game to Improve Teenagers' Phishing Knowledge, Case of Tanzania}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {3}, pages = {466--489}, year = {2022}, url = {https://doi.org/10.3390/jcp2030024}, doi = {10.3390/JCP2030024}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/PangaMN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/PhibbsR22, author = {Christina L. Phibbs and Shawon S. M. Rahman}, title = {A Synopsis of "The Impact of Motivation, Price, and Habit on Intention to Use IoT-Enabled Technology: {A} Correlational Study"}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {3}, pages = {662--699}, year = {2022}, url = {https://doi.org/10.3390/jcp2030034}, doi = {10.3390/JCP2030034}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/PhibbsR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/PosaG22, author = {Tibor P{\'{o}}sa and Jens Grossklags}, title = {Work Experience as a Factor in Cyber-Security Risk Awareness: {A} Survey Study with University Students}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {3}, pages = {490--515}, year = {2022}, url = {https://doi.org/10.3390/jcp2030025}, doi = {10.3390/JCP2030025}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/PosaG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/PuderRGS22, author = {Andreas Puder and Marcel Rumez and Daniel Grimm and Eric Sax}, title = {Generic Patterns for Intrusion Detection Systems in Service-Oriented Automotive and Medical Architectures}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {3}, pages = {731--749}, year = {2022}, url = {https://doi.org/10.3390/jcp2030037}, doi = {10.3390/JCP2030037}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/PuderRGS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/SalinL22, author = {Hannes Salin and Martin Lundgren}, title = {Towards Agile Cybersecurity Risk Management for Autonomous Software Engineering Teams}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {2}, pages = {276--291}, year = {2022}, url = {https://doi.org/10.3390/jcp2020015}, doi = {10.3390/JCP2020015}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/SalinL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/SchwarzSchillingLT22, author = {Caspar Schwarz{-}Schilling and Sheng{-}Nan Li and Claudio J. Tessone}, title = {Stochastic Modelling of Selfish Mining in Proof-of-Work Protocols}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {2}, pages = {292--310}, year = {2022}, url = {https://doi.org/10.3390/jcp2020016}, doi = {10.3390/JCP2020016}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/SchwarzSchillingLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/SousaPP22, author = {Pedro Sousa and Ant{\'{o}}nio Pinto and Pedro Pinto}, title = {Exploiting Online Services to Enable Anonymous and Confidential Messaging}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {3}, pages = {700--713}, year = {2022}, url = {https://doi.org/10.3390/jcp2030035}, doi = {10.3390/JCP2030035}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/SousaPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/SpiekermannK22, author = {Daniel Spiekermann and J{\"{o}}rg Keller}, title = {Requirements for Crafting Virtual Network Packet Captures}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {3}, pages = {516--526}, year = {2022}, url = {https://doi.org/10.3390/jcp2030026}, doi = {10.3390/JCP2030026}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/SpiekermannK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/StachBBGM22, author = {Christoph Stach and Michael Behringer and Julia Br{\"{a}}cker and Cl{\'{e}}mentine Gritti and Bernhard Mitschang}, title = {{SMARTEN} - {A} Sample-Based Approach towards Privacy-Friendly Data Refinement}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {3}, pages = {606--628}, year = {2022}, url = {https://doi.org/10.3390/jcp2030031}, doi = {10.3390/JCP2030031}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/StachBBGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/StankovicK22, author = {Milos Stankovic and Umit Karabiyik}, title = {Exploratory Study on Kali NetHunter Lite: {A} Digital Forensics Approach}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {3}, pages = {750--763}, year = {2022}, url = {https://doi.org/10.3390/jcp2030038}, doi = {10.3390/JCP2030038}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/StankovicK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/TaebC22, author = {Maryam Taeb and Hongmei Chi}, title = {Comparison of Deepfake Detection Techniques through Deep Learning}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {1}, pages = {89--106}, year = {2022}, url = {https://doi.org/10.3390/jcp2010007}, doi = {10.3390/JCP2010007}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/TaebC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/TayyabKDKL22, author = {Umm{-}e{-}Hani Tayyab and Faiza Babar Khan and Muhammad Hanif Durad and Asifullah Khan and Yeon Soo Lee}, title = {A Survey of the Recent Trends in Deep Learning Based Malware Detection}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {4}, pages = {800--829}, year = {2022}, url = {https://doi.org/10.3390/jcp2040041}, doi = {10.3390/JCP2040041}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/TayyabKDKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/TaziSCD22, author = {Faiza Tazi and Sunny Shrestha and Junibel De La Cruz and Sanchari Das}, title = {SoK: An Evaluation of the Secure End User Experience on the Dark Net through Systematic Literature Review}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {2}, pages = {329--357}, year = {2022}, url = {https://doi.org/10.3390/jcp2020018}, doi = {10.3390/JCP2020018}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/TaziSCD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/Triplett22, author = {William Triplett}, title = {Addressing Human Factors in Cybersecurity Leadership}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {3}, pages = {573--586}, year = {2022}, url = {https://doi.org/10.3390/jcp2030029}, doi = {10.3390/JCP2030029}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/Triplett22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/UnsalO22, author = {Ayse {\"{U}}nsal and Melek {\"{O}}nen}, title = {Calibrating the Attack to Sensitivity in Differentially Private Mechanisms}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {4}, pages = {830--852}, year = {2022}, url = {https://doi.org/10.3390/jcp2040042}, doi = {10.3390/JCP2040042}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/UnsalO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/WalraveODP22, author = {Michel Walrave and Joris Van Ouytsel and Kay Diederen and Koen Ponnet}, title = {Checked and Approved? Human Resources Managers' Uses of Social Media for Cybervetting}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {2}, pages = {402--417}, year = {2022}, url = {https://doi.org/10.3390/jcp2020021}, doi = {10.3390/JCP2020021}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/WalraveODP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/WenSK22, author = {Shao{-}Fang Wen and Ankur Shukla and Basel Katt}, title = {Developing Security Assurance Metrics to Support Quantitative Security Assurance Evaluation}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {3}, pages = {587--605}, year = {2022}, url = {https://doi.org/10.3390/jcp2030030}, doi = {10.3390/JCP2030030}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/WenSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/X22, title = {Acknowledgment to Reviewers of Journal of Cybersecurity and Privacy in 2021}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {1}, pages = {19}, year = {2022}, url = {https://doi.org/10.3390/jcp2010002}, doi = {10.3390/JCP2010002}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/X22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/ZhouFM22, author = {Haozhe Zhou and Amin Milani Fard and Adetokunbo Makanju}, title = {The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {2}, pages = {358--378}, year = {2022}, url = {https://doi.org/10.3390/jcp2020019}, doi = {10.3390/JCP2020019}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/ZhouFM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/ZlatolasFH22, author = {Lili Nemec Zlatolas and Natasa Feher and Marko H{\"{o}}lbl}, title = {Security Perception of IoT Devices in Smart Homes}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {1}, pages = {65--74}, year = {2022}, url = {https://doi.org/10.3390/jcp2010005}, doi = {10.3390/JCP2010005}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/ZlatolasFH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.