Search dblp for Publications

export results for "toc:db/journals/jocsap/jocsap3.bht:"

 download as .bib file

@article{DBLP:journals/jocsap/AbdelmouminRR23,
  author       = {Ghada Abdelmoumin and
                  Danda B. Rawat and
                  Abdul Rahman},
  title        = {Studying Imbalanced Learning for Anomaly-Based Intelligent {IDS} for
                  Mission-Critical Internet of Things},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {4},
  pages        = {706--743},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3040032},
  doi          = {10.3390/JCP3040032},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/AbdelmouminRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/AbkenariFK23,
  author       = {Fatemeh Ahmadi Abkenari and
                  Amin Milani Fard and
                  Sara Khanchi},
  title        = {Hybrid Machine Learning-Based Approaches for Feature and Overfitting
                  Reduction to Model Intrusion Patterns},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {544--557},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3030026},
  doi          = {10.3390/JCP3030026},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/AbkenariFK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/BelalisSA23,
  author       = {Ilias Belalis and
                  Georgios P. Spathoulas and
                  Ioannis Anagnostopoulos},
  title        = {Modeling Intruder Reconnaissance Behavior through State Diagrams to
                  Support Defensive Deception},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {2},
  pages        = {275--302},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3020015},
  doi          = {10.3390/JCP3020015},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/BelalisSA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/BellizziLCCV23,
  author       = {Jennifer Bellizzi and
                  Eleonora Losiouk and
                  Mauro Conti and
                  Christian Colombo and
                  Mark Vella},
  title        = {{VEDRANDO:} {A} Novel Way to Reveal Stealthy Attack Steps on Android
                  through Memory Forensics},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {364--395},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3030019},
  doi          = {10.3390/JCP3030019},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/BellizziLCCV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/BourBUJ23,
  author       = {Guillaume Bour and
                  Camillo Bosco and
                  Rita Maria Ugarelli and
                  Martin Gilje Jaatun},
  title        = {Water-Tight IoT-Just Add Security},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {1},
  pages        = {76--94},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3010006},
  doi          = {10.3390/JCP3010006},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/BourBUJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/Bouramdane23,
  author       = {Ayat{-}Allah Bouramdane},
  title        = {Cyberattacks in Smart Grids: Challenges and Solving the Multi-Criteria
                  Decision-Making for Cybersecurity Options, Including Ones That Incorporate
                  Artificial Intelligence, Using an Analytical Hierarchy Process},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {4},
  pages        = {662--705},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3040031},
  doi          = {10.3390/JCP3040031},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/Bouramdane23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/ButcherBBCHMPS23,
  author       = {David S. Butcher and
                  Christian J. Brigham and
                  James Berhalter and
                  Abigail L. Centers and
                  William M. Hunkapiller and
                  Timothy P. Murphy and
                  Eric C. Palm and
                  Julia H. Smith},
  title        = {Cybersecurity in a Large-Scale Research Facility - One Institution's
                  Approach},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {2},
  pages        = {191--208},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3020011},
  doi          = {10.3390/JCP3020011},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/ButcherBBCHMPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/CarperOBCB23,
  author       = {Clay Carper and
                  Stone Olguin and
                  Jarek Brown and
                  Caylie Charlton and
                  Mike Borowczak},
  title        = {Challenging Assumptions of Normality in {AES} s-Box Configurations
                  under Side-Channel Analysis},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {4},
  pages        = {844--857},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3040038},
  doi          = {10.3390/JCP3040038},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/CarperOBCB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/DhoogeVWTV23,
  author       = {Laurens D'hooge and
                  Miel Verkerken and
                  Tim Wauters and
                  Filip De Turck and
                  Bruno Volckaert},
  title        = {Characterizing the Impact of Data-Damaged Models on Generalization
                  Strength in Intrusion Detection},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {2},
  pages        = {118--144},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3020008},
  doi          = {10.3390/JCP3020008},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/DhoogeVWTV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/GhanemMODD23,
  author       = {Mohamed Chahine Ghanem and
                  Patrick Mulvihill and
                  Karim Ouazzane and
                  Ramzi Djemai and
                  Dipo Dunsin},
  title        = {{D2WFP:} {A} Novel Protocol for Forensically Identifying, Extracting,
                  and Analysing Deep and Dark Web Browsing Activities},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {4},
  pages        = {808--829},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3040036},
  doi          = {10.3390/JCP3040036},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/GhanemMODD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/GhaniSV23,
  author       = {Humera Ghani and
                  Shahram Salekzamankhani and
                  Bal S. Virdee},
  title        = {A Hybrid Dimensionality Reduction for Network Intrusion Detection},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {4},
  pages        = {830--843},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3040037},
  doi          = {10.3390/JCP3040037},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/GhaniSV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/GhaniVS23,
  author       = {Humera Ghani and
                  Bal S. Virdee and
                  Shahram Salekzamankhani},
  title        = {A Deep Learning Approach for Network Intrusion Detection Using a Small
                  Features Vector},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {451--463},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3030023},
  doi          = {10.3390/JCP3030023},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/GhaniVS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/GhoshBBKB23,
  author       = {Tirthankar Ghosh and
                  Sikha Bagui and
                  Subhash C. Bagui and
                  Martin Kadzis and
                  Jackson Bare},
  title        = {Anomaly Detection for Modbus over {TCP} in Control Systems Using Entropy
                  and Classification-Based Analysis},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {4},
  pages        = {895--913},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3040041},
  doi          = {10.3390/JCP3040041},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/GhoshBBKB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/GiannarosKTKKSKT23,
  author       = {Anastasios Giannaros and
                  Aristeidis Karras and
                  Leonidas Theodorakopoulos and
                  Christos N. Karras and
                  Panagiotis Kranias and
                  Nikolaos Schizas and
                  Gerasimos Kalogeratos and
                  Dimitrios Tsolis},
  title        = {Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges,
                  Open Topics, Blockchain, and Future Directions},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {493--543},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3030025},
  doi          = {10.3390/JCP3030025},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/GiannarosKTKKSKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/GolightlyMC23,
  author       = {Lewis Golightly and
                  Paolo Modesti and
                  Victor Chang},
  title        = {Deploying Secure Distributed Systems: Comparative Analysis of {GNS3}
                  and {SEED} Internet Emulator},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {464--492},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3030024},
  doi          = {10.3390/JCP3030024},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/GolightlyMC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/HutchinsonSHHK23,
  author       = {Shinelle Hutchinson and
                  Milos Stankovic and
                  Samuel Ho and
                  Shiva Houshmand and
                  Umit Karabiyik},
  title        = {Investigating the Privacy and Security of the SimpliSafe Security
                  System on Android and iOS},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {2},
  pages        = {145--165},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3020009},
  doi          = {10.3390/JCP3020009},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/HutchinsonSHHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/KhaembaTM23,
  author       = {Noel Khaemba and
                  Issa Traor{\'{e}} and
                  Mohammad Mamun},
  title        = {A Framework for Synthetic Agetech Attack Data Generation},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {4},
  pages        = {744--757},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3040033},
  doi          = {10.3390/JCP3040033},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/KhaembaTM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/KieselLMLSS23,
  author       = {Raphael Kiesel and
                  Marvin Lakatsch and
                  Alexander Mann and
                  Karl Lossie and
                  Felix Sohnius and
                  Robert H. Schmitt},
  title        = {Potential of Homomorphic Encryption for Cloud Computing Use Cases
                  in Manufacturing},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {1},
  pages        = {44--60},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3010004},
  doi          = {10.3390/JCP3010004},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/KieselLMLSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/KokalVD23,
  author       = {Sara Kokal and
                  Mounika Vanamala and
                  Rushit Dave},
  title        = {Deep Learning and Machine Learning, Better Together Than Apart: {A}
                  Review on Biometrics Mobile Authentication},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {2},
  pages        = {227--258},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3020013},
  doi          = {10.3390/JCP3020013},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/KokalVD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/KroesLGJ23,
  author       = {Shannon K. S. Kroes and
                  Matthijs van Leeuwen and
                  Rolf H. H. Groenwold and
                  Mart P. Janssen},
  title        = {Evaluating Cluster-Based Synthetic Data Generation for Blood-Transfusion
                  Analysis},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {4},
  pages        = {882--894},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3040040},
  doi          = {10.3390/JCP3040040},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/KroesLGJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/LiT23,
  author       = {Richard Li and
                  Michail Tsikerdekis},
  title        = {Hourly Network Anomaly Detection on {HTTP} Using Exponential Random
                  Graph Models and Autoregressive Moving Average},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {435--450},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3030022},
  doi          = {10.3390/JCP3030022},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/LiT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/Majeed23,
  author       = {Abdul Majeed},
  title        = {Attribute-Centric and Synthetic Data Based Privacy Preserving Methods:
                  {A} Systematic Review},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {638--661},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3030030},
  doi          = {10.3390/JCP3030030},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/Majeed23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/Melaku23,
  author       = {Henock Mulugeta Melaku},
  title        = {A Dynamic and Adaptive Cybersecurity Governance Framework},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {327--350},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3030017},
  doi          = {10.3390/JCP3030017},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/Melaku23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/PapathanasiouLLG23,
  author       = {Anastasios Papathanasiou and
                  George Liontos and
                  Vasiliki Liagkou and
                  Euripidis Glavas},
  title        = {Business Email Compromise {(BEC)} Attacks: Threats, Vulnerabilities
                  and Countermeasures - {A} Perspective on the Greek Landscape},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {610--637},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3030029},
  doi          = {10.3390/JCP3030029},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/PapathanasiouLLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/PaspatisT23,
  author       = {Ioannis Paspatis and
                  Aggeliki Tsohou},
  title        = {How to Influence Privacy Behavior Using Cognitive Theory and Respective
                  Determinant Factors},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {396--415},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3030020},
  doi          = {10.3390/JCP3030020},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/PaspatisT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/RobinsOBCB23,
  author       = {Andey Robins and
                  Stone Olguin and
                  Jarek Brown and
                  Clay Carper and
                  Mike Borowczak},
  title        = {Power-Based Side-Channel Attacks on Program Control Flow with Machine
                  Learning Models},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {351--363},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3030018},
  doi          = {10.3390/JCP3030018},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/RobinsOBCB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/SadeghpourV23,
  author       = {Shadi Sadeghpour and
                  Natalija Vlajic},
  title        = {ReMouse Dataset: On the Efficacy of Measuring the Similarity of Human-Generated
                  Trajectories for the Detection of Session-Replay Bots},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {1},
  pages        = {95--117},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3010007},
  doi          = {10.3390/JCP3010007},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/SadeghpourV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/SalinL23,
  author       = {Hannes Salin and
                  Martin Lundgren},
  title        = {A Gap Analysis of the Adoption Maturity of Certificateless Cryptography
                  in Cooperative Intelligent Transportation Systems},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {591--609},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3030028},
  doi          = {10.3390/JCP3030028},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/SalinL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/SalmaniA23,
  author       = {Khosro Salmani and
                  Brian Atuh},
  title        = {A Lesson for the Future: Will You Let Me Violate Your Privacy to Save
                  Your Life?},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {2},
  pages        = {259--274},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3020014},
  doi          = {10.3390/JCP3020014},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/SalmaniA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/SamandariG23,
  author       = {Juliet Samandari and
                  Cl{\'{e}}mentine Gritti},
  title        = {Post-Quantum Authentication in the {MQTT} Protocol},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {416--434},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3030021},
  doi          = {10.3390/JCP3030021},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/SamandariG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/SangwanBS23,
  author       = {Raghvinder S. Sangwan and
                  Youakim Badr and
                  Satish Mahadevan Srinivasan},
  title        = {Cybersecurity for {AI} Systems: {A} Survey},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {2},
  pages        = {166--190},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3020010},
  doi          = {10.3390/JCP3020010},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/SangwanBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/SchmidtHH23,
  author       = {Lukas Schmidt and
                  Henry Hosseini and
                  Thomas Hupperich},
  title        = {Assessing the Security and Privacy of Baby Monitor Apps},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {303--326},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3030016},
  doi          = {10.3390/JCP3030016},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/SchmidtHH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/SobreroCUB23,
  author       = {Filippo Sobrero and
                  Beatrice Clavarezza and
                  Daniele Ucci and
                  Federica Bisio},
  title        = {Towards a Near-Real-Time Protocol Tunneling Detector Based on Machine
                  Learning Techniques},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {4},
  pages        = {794--807},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3040035},
  doi          = {10.3390/JCP3040035},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/SobreroCUB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/TempestiniRPN23,
  author       = {Giorgia Tempestini and
                  Ericka Rovira and
                  Aryn Pyke and
                  Francesco Di Nocera},
  title        = {The Cybersecurity Awareness INventory {(CAIN):} Early Phases of Development
                  of a Tool for Assessing Cybersecurity Knowledge Based on the {ISO/IEC}
                  27032},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {1},
  pages        = {61--75},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3010005},
  doi          = {10.3390/JCP3010005},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/TempestiniRPN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/TheodoropoulosRBGMMCDSGBTT23,
  author       = {Theodoros Theodoropoulos and
                  Lu{\'{\i}}s Rosa and
                  Chafika Benzaid and
                  Peter Gray and
                  Eduard Marin and
                  Antonios Makris and
                  Lu{\'{\i}}s Cordeiro and
                  Ferran Diego and
                  Pavel Sorokin and
                  Marco Di Girolamo and
                  Paolo Barone and
                  Tarik Taleb and
                  Konstantinos Tserpes},
  title        = {Security in Cloud-Native Services: {A} Survey},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {4},
  pages        = {758--793},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3040034},
  doi          = {10.3390/JCP3040034},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/TheodoropoulosRBGMMCDSGBTT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/VlachosSN23,
  author       = {Vasileios Vlachos and
                  Yannis C. Stamatiou and
                  Sotiris E. Nikoletseas},
  title        = {The Privacy Flag Observatory: {A} Crowdsourcing Tool for Real Time
                  Privacy Threats Evaluation},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {1},
  pages        = {26--43},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3010003},
  doi          = {10.3390/JCP3010003},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/VlachosSN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/WangTF23,
  author       = {Feng Wang and
                  Yongning Tang and
                  Hongbing Fang},
  title        = {Mitigating IoT Privacy-Revealing Features by Time Series Data Transformation},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {2},
  pages        = {209--226},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3020012},
  doi          = {10.3390/JCP3020012},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/WangTF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/X23,
  title        = {Acknowledgment to the Reviewers of Journal of Cybersecurity and Privacy
                  in 2022},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {1},
  pages        = {24--25},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3010002},
  doi          = {10.3390/JCP3010002},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/X23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/lelahTJA23,
  author       = {Turki Al lelah and
                  George Theodorakopoulos and
                  Amir Javed and
                  Eirini Anthi},
  title        = {Machine Learning Detection of Cloud Services Abuse as C{\&}C Infrastructure},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {4},
  pages        = {858--881},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3040039},
  doi          = {10.3390/JCP3040039},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/lelahTJA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/lelahTRJA23,
  author       = {Turki Al lelah and
                  George Theodorakopoulos and
                  Philipp Reinecke and
                  Amir Javed and
                  Eirini Anthi},
  title        = {Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control
                  (C{\&}C) Infrastructure: {A} Systematic Literature Review},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {558--590},
  year         = {2023},
  url          = {https://doi.org/10.3390/jcp3030027},
  doi          = {10.3390/JCP3030027},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/lelahTRJA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/KaziWG22,
  author       = {Mohamed Ali Kazi and
                  Steve Woodhead and
                  Diane Gan},
  title        = {An Investigation to Detect Banking Malware Network Communication Traffic
                  Using Machine Learning Techniques},
  journal      = {J. Cybersecur. Priv.},
  volume       = {3},
  number       = {1},
  pages        = {1--23},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp3010001},
  doi          = {10.3390/JCP3010001},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/KaziWG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics