Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jocsap/jocsap3.bht:"
@article{DBLP:journals/jocsap/AbdelmouminRR23, author = {Ghada Abdelmoumin and Danda B. Rawat and Abdul Rahman}, title = {Studying Imbalanced Learning for Anomaly-Based Intelligent {IDS} for Mission-Critical Internet of Things}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {4}, pages = {706--743}, year = {2023}, url = {https://doi.org/10.3390/jcp3040032}, doi = {10.3390/JCP3040032}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/AbdelmouminRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/AbkenariFK23, author = {Fatemeh Ahmadi Abkenari and Amin Milani Fard and Sara Khanchi}, title = {Hybrid Machine Learning-Based Approaches for Feature and Overfitting Reduction to Model Intrusion Patterns}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {3}, pages = {544--557}, year = {2023}, url = {https://doi.org/10.3390/jcp3030026}, doi = {10.3390/JCP3030026}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/AbkenariFK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/BelalisSA23, author = {Ilias Belalis and Georgios P. Spathoulas and Ioannis Anagnostopoulos}, title = {Modeling Intruder Reconnaissance Behavior through State Diagrams to Support Defensive Deception}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {2}, pages = {275--302}, year = {2023}, url = {https://doi.org/10.3390/jcp3020015}, doi = {10.3390/JCP3020015}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/BelalisSA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/BellizziLCCV23, author = {Jennifer Bellizzi and Eleonora Losiouk and Mauro Conti and Christian Colombo and Mark Vella}, title = {{VEDRANDO:} {A} Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {3}, pages = {364--395}, year = {2023}, url = {https://doi.org/10.3390/jcp3030019}, doi = {10.3390/JCP3030019}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/BellizziLCCV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/BourBUJ23, author = {Guillaume Bour and Camillo Bosco and Rita Maria Ugarelli and Martin Gilje Jaatun}, title = {Water-Tight IoT-Just Add Security}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {1}, pages = {76--94}, year = {2023}, url = {https://doi.org/10.3390/jcp3010006}, doi = {10.3390/JCP3010006}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/BourBUJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/Bouramdane23, author = {Ayat{-}Allah Bouramdane}, title = {Cyberattacks in Smart Grids: Challenges and Solving the Multi-Criteria Decision-Making for Cybersecurity Options, Including Ones That Incorporate Artificial Intelligence, Using an Analytical Hierarchy Process}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {4}, pages = {662--705}, year = {2023}, url = {https://doi.org/10.3390/jcp3040031}, doi = {10.3390/JCP3040031}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/Bouramdane23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/ButcherBBCHMPS23, author = {David S. Butcher and Christian J. Brigham and James Berhalter and Abigail L. Centers and William M. Hunkapiller and Timothy P. Murphy and Eric C. Palm and Julia H. Smith}, title = {Cybersecurity in a Large-Scale Research Facility - One Institution's Approach}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {2}, pages = {191--208}, year = {2023}, url = {https://doi.org/10.3390/jcp3020011}, doi = {10.3390/JCP3020011}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/ButcherBBCHMPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/CarperOBCB23, author = {Clay Carper and Stone Olguin and Jarek Brown and Caylie Charlton and Mike Borowczak}, title = {Challenging Assumptions of Normality in {AES} s-Box Configurations under Side-Channel Analysis}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {4}, pages = {844--857}, year = {2023}, url = {https://doi.org/10.3390/jcp3040038}, doi = {10.3390/JCP3040038}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/CarperOBCB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/DhoogeVWTV23, author = {Laurens D'hooge and Miel Verkerken and Tim Wauters and Filip De Turck and Bruno Volckaert}, title = {Characterizing the Impact of Data-Damaged Models on Generalization Strength in Intrusion Detection}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {2}, pages = {118--144}, year = {2023}, url = {https://doi.org/10.3390/jcp3020008}, doi = {10.3390/JCP3020008}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/DhoogeVWTV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/GhanemMODD23, author = {Mohamed Chahine Ghanem and Patrick Mulvihill and Karim Ouazzane and Ramzi Djemai and Dipo Dunsin}, title = {{D2WFP:} {A} Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {4}, pages = {808--829}, year = {2023}, url = {https://doi.org/10.3390/jcp3040036}, doi = {10.3390/JCP3040036}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/GhanemMODD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/GhaniSV23, author = {Humera Ghani and Shahram Salekzamankhani and Bal S. Virdee}, title = {A Hybrid Dimensionality Reduction for Network Intrusion Detection}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {4}, pages = {830--843}, year = {2023}, url = {https://doi.org/10.3390/jcp3040037}, doi = {10.3390/JCP3040037}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/GhaniSV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/GhaniVS23, author = {Humera Ghani and Bal S. Virdee and Shahram Salekzamankhani}, title = {A Deep Learning Approach for Network Intrusion Detection Using a Small Features Vector}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {3}, pages = {451--463}, year = {2023}, url = {https://doi.org/10.3390/jcp3030023}, doi = {10.3390/JCP3030023}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/GhaniVS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/GhoshBBKB23, author = {Tirthankar Ghosh and Sikha Bagui and Subhash C. Bagui and Martin Kadzis and Jackson Bare}, title = {Anomaly Detection for Modbus over {TCP} in Control Systems Using Entropy and Classification-Based Analysis}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {4}, pages = {895--913}, year = {2023}, url = {https://doi.org/10.3390/jcp3040041}, doi = {10.3390/JCP3040041}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/GhoshBBKB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/GiannarosKTKKSKT23, author = {Anastasios Giannaros and Aristeidis Karras and Leonidas Theodorakopoulos and Christos N. Karras and Panagiotis Kranias and Nikolaos Schizas and Gerasimos Kalogeratos and Dimitrios Tsolis}, title = {Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {3}, pages = {493--543}, year = {2023}, url = {https://doi.org/10.3390/jcp3030025}, doi = {10.3390/JCP3030025}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/GiannarosKTKKSKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/GolightlyMC23, author = {Lewis Golightly and Paolo Modesti and Victor Chang}, title = {Deploying Secure Distributed Systems: Comparative Analysis of {GNS3} and {SEED} Internet Emulator}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {3}, pages = {464--492}, year = {2023}, url = {https://doi.org/10.3390/jcp3030024}, doi = {10.3390/JCP3030024}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/GolightlyMC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/HutchinsonSHHK23, author = {Shinelle Hutchinson and Milos Stankovic and Samuel Ho and Shiva Houshmand and Umit Karabiyik}, title = {Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {2}, pages = {145--165}, year = {2023}, url = {https://doi.org/10.3390/jcp3020009}, doi = {10.3390/JCP3020009}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/HutchinsonSHHK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/KhaembaTM23, author = {Noel Khaemba and Issa Traor{\'{e}} and Mohammad Mamun}, title = {A Framework for Synthetic Agetech Attack Data Generation}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {4}, pages = {744--757}, year = {2023}, url = {https://doi.org/10.3390/jcp3040033}, doi = {10.3390/JCP3040033}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/KhaembaTM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/KieselLMLSS23, author = {Raphael Kiesel and Marvin Lakatsch and Alexander Mann and Karl Lossie and Felix Sohnius and Robert H. Schmitt}, title = {Potential of Homomorphic Encryption for Cloud Computing Use Cases in Manufacturing}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {1}, pages = {44--60}, year = {2023}, url = {https://doi.org/10.3390/jcp3010004}, doi = {10.3390/JCP3010004}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/KieselLMLSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/KokalVD23, author = {Sara Kokal and Mounika Vanamala and Rushit Dave}, title = {Deep Learning and Machine Learning, Better Together Than Apart: {A} Review on Biometrics Mobile Authentication}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {2}, pages = {227--258}, year = {2023}, url = {https://doi.org/10.3390/jcp3020013}, doi = {10.3390/JCP3020013}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/KokalVD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/KroesLGJ23, author = {Shannon K. S. Kroes and Matthijs van Leeuwen and Rolf H. H. Groenwold and Mart P. Janssen}, title = {Evaluating Cluster-Based Synthetic Data Generation for Blood-Transfusion Analysis}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {4}, pages = {882--894}, year = {2023}, url = {https://doi.org/10.3390/jcp3040040}, doi = {10.3390/JCP3040040}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/KroesLGJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/LiT23, author = {Richard Li and Michail Tsikerdekis}, title = {Hourly Network Anomaly Detection on {HTTP} Using Exponential Random Graph Models and Autoregressive Moving Average}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {3}, pages = {435--450}, year = {2023}, url = {https://doi.org/10.3390/jcp3030022}, doi = {10.3390/JCP3030022}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/LiT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/Majeed23, author = {Abdul Majeed}, title = {Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: {A} Systematic Review}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {3}, pages = {638--661}, year = {2023}, url = {https://doi.org/10.3390/jcp3030030}, doi = {10.3390/JCP3030030}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/Majeed23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/Melaku23, author = {Henock Mulugeta Melaku}, title = {A Dynamic and Adaptive Cybersecurity Governance Framework}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {3}, pages = {327--350}, year = {2023}, url = {https://doi.org/10.3390/jcp3030017}, doi = {10.3390/JCP3030017}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/Melaku23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/PapathanasiouLLG23, author = {Anastasios Papathanasiou and George Liontos and Vasiliki Liagkou and Euripidis Glavas}, title = {Business Email Compromise {(BEC)} Attacks: Threats, Vulnerabilities and Countermeasures - {A} Perspective on the Greek Landscape}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {3}, pages = {610--637}, year = {2023}, url = {https://doi.org/10.3390/jcp3030029}, doi = {10.3390/JCP3030029}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/PapathanasiouLLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/PaspatisT23, author = {Ioannis Paspatis and Aggeliki Tsohou}, title = {How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {3}, pages = {396--415}, year = {2023}, url = {https://doi.org/10.3390/jcp3030020}, doi = {10.3390/JCP3030020}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/PaspatisT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/RobinsOBCB23, author = {Andey Robins and Stone Olguin and Jarek Brown and Clay Carper and Mike Borowczak}, title = {Power-Based Side-Channel Attacks on Program Control Flow with Machine Learning Models}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {3}, pages = {351--363}, year = {2023}, url = {https://doi.org/10.3390/jcp3030018}, doi = {10.3390/JCP3030018}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/RobinsOBCB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/SadeghpourV23, author = {Shadi Sadeghpour and Natalija Vlajic}, title = {ReMouse Dataset: On the Efficacy of Measuring the Similarity of Human-Generated Trajectories for the Detection of Session-Replay Bots}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {1}, pages = {95--117}, year = {2023}, url = {https://doi.org/10.3390/jcp3010007}, doi = {10.3390/JCP3010007}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/SadeghpourV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/SalinL23, author = {Hannes Salin and Martin Lundgren}, title = {A Gap Analysis of the Adoption Maturity of Certificateless Cryptography in Cooperative Intelligent Transportation Systems}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {3}, pages = {591--609}, year = {2023}, url = {https://doi.org/10.3390/jcp3030028}, doi = {10.3390/JCP3030028}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/SalinL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/SalmaniA23, author = {Khosro Salmani and Brian Atuh}, title = {A Lesson for the Future: Will You Let Me Violate Your Privacy to Save Your Life?}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {2}, pages = {259--274}, year = {2023}, url = {https://doi.org/10.3390/jcp3020014}, doi = {10.3390/JCP3020014}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/SalmaniA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/SamandariG23, author = {Juliet Samandari and Cl{\'{e}}mentine Gritti}, title = {Post-Quantum Authentication in the {MQTT} Protocol}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {3}, pages = {416--434}, year = {2023}, url = {https://doi.org/10.3390/jcp3030021}, doi = {10.3390/JCP3030021}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/SamandariG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/SangwanBS23, author = {Raghvinder S. Sangwan and Youakim Badr and Satish Mahadevan Srinivasan}, title = {Cybersecurity for {AI} Systems: {A} Survey}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {2}, pages = {166--190}, year = {2023}, url = {https://doi.org/10.3390/jcp3020010}, doi = {10.3390/JCP3020010}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/SangwanBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/SchmidtHH23, author = {Lukas Schmidt and Henry Hosseini and Thomas Hupperich}, title = {Assessing the Security and Privacy of Baby Monitor Apps}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {3}, pages = {303--326}, year = {2023}, url = {https://doi.org/10.3390/jcp3030016}, doi = {10.3390/JCP3030016}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/SchmidtHH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/SobreroCUB23, author = {Filippo Sobrero and Beatrice Clavarezza and Daniele Ucci and Federica Bisio}, title = {Towards a Near-Real-Time Protocol Tunneling Detector Based on Machine Learning Techniques}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {4}, pages = {794--807}, year = {2023}, url = {https://doi.org/10.3390/jcp3040035}, doi = {10.3390/JCP3040035}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/SobreroCUB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/TempestiniRPN23, author = {Giorgia Tempestini and Ericka Rovira and Aryn Pyke and Francesco Di Nocera}, title = {The Cybersecurity Awareness INventory {(CAIN):} Early Phases of Development of a Tool for Assessing Cybersecurity Knowledge Based on the {ISO/IEC} 27032}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {1}, pages = {61--75}, year = {2023}, url = {https://doi.org/10.3390/jcp3010005}, doi = {10.3390/JCP3010005}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/TempestiniRPN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/TheodoropoulosRBGMMCDSGBTT23, author = {Theodoros Theodoropoulos and Lu{\'{\i}}s Rosa and Chafika Benzaid and Peter Gray and Eduard Marin and Antonios Makris and Lu{\'{\i}}s Cordeiro and Ferran Diego and Pavel Sorokin and Marco Di Girolamo and Paolo Barone and Tarik Taleb and Konstantinos Tserpes}, title = {Security in Cloud-Native Services: {A} Survey}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {4}, pages = {758--793}, year = {2023}, url = {https://doi.org/10.3390/jcp3040034}, doi = {10.3390/JCP3040034}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/TheodoropoulosRBGMMCDSGBTT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/VlachosSN23, author = {Vasileios Vlachos and Yannis C. Stamatiou and Sotiris E. Nikoletseas}, title = {The Privacy Flag Observatory: {A} Crowdsourcing Tool for Real Time Privacy Threats Evaluation}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {1}, pages = {26--43}, year = {2023}, url = {https://doi.org/10.3390/jcp3010003}, doi = {10.3390/JCP3010003}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/VlachosSN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/WangTF23, author = {Feng Wang and Yongning Tang and Hongbing Fang}, title = {Mitigating IoT Privacy-Revealing Features by Time Series Data Transformation}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {2}, pages = {209--226}, year = {2023}, url = {https://doi.org/10.3390/jcp3020012}, doi = {10.3390/JCP3020012}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/WangTF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/X23, title = {Acknowledgment to the Reviewers of Journal of Cybersecurity and Privacy in 2022}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {1}, pages = {24--25}, year = {2023}, url = {https://doi.org/10.3390/jcp3010002}, doi = {10.3390/JCP3010002}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/X23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/lelahTJA23, author = {Turki Al lelah and George Theodorakopoulos and Amir Javed and Eirini Anthi}, title = {Machine Learning Detection of Cloud Services Abuse as C{\&}C Infrastructure}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {4}, pages = {858--881}, year = {2023}, url = {https://doi.org/10.3390/jcp3040039}, doi = {10.3390/JCP3040039}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/lelahTJA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/lelahTRJA23, author = {Turki Al lelah and George Theodorakopoulos and Philipp Reinecke and Amir Javed and Eirini Anthi}, title = {Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C{\&}C) Infrastructure: {A} Systematic Literature Review}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {3}, pages = {558--590}, year = {2023}, url = {https://doi.org/10.3390/jcp3030027}, doi = {10.3390/JCP3030027}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/lelahTRJA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/KaziWG22, author = {Mohamed Ali Kazi and Steve Woodhead and Diane Gan}, title = {An Investigation to Detect Banking Malware Network Communication Traffic Using Machine Learning Techniques}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {1}, pages = {1--23}, year = {2022}, url = {https://doi.org/10.3390/jcp3010001}, doi = {10.3390/JCP3010001}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/KaziWG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.