Search dblp for Publications

export results for "toc:db/journals/jocsap/jocsap1.bht:"

 download as .bib file

@article{DBLP:journals/jocsap/AhsanGCN21,
  author       = {Mostofa Ahsan and
                  Rahul Gomes and
                  Md Minhaz Chowdhury and
                  Kendall E. Nygard},
  title        = {Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic
                  Feature Selector},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {199--218},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1010011},
  doi          = {10.3390/JCP1010011},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/AhsanGCN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/AlrubaiqA21,
  author       = {Abdullah Alrubaiq and
                  Talal Alharbi},
  title        = {Developing a Cybersecurity Framework for e-Government Project in the
                  Kingdom of Saudi Arabia},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {302--318},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1020017},
  doi          = {10.3390/JCP1020017},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/AlrubaiqA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/AmeriHSLP21,
  author       = {Kimia Ameri and
                  Michael Hempel and
                  Hamid Sharif and
                  Juan Lopez Jr. and
                  Kalyan Perumalla},
  title        = {CyBERT: Cybersecurity Claim Classification by Fine-Tuning the {BERT}
                  Language Model},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {615--637},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1040031},
  doi          = {10.3390/JCP1040031},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/AmeriHSLP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/AntunesMGP21,
  author       = {M{\'{a}}rio Antunes and
                  Marisa Maximiano and
                  Ricardo Gomes and
                  Daniel Pinto},
  title        = {Information Security and Cybersecurity Management: {A} Case Study
                  with SMEs in Portugal},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {219--238},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1020012},
  doi          = {10.3390/JCP1020012},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/AntunesMGP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/AraujoP21,
  author       = {Rui Ara{\'{u}}jo and
                  Ant{\'{o}}nio Pinto},
  title        = {Secure Remote Storage of Logs with Search Capabilities},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {340--364},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1020019},
  doi          = {10.3390/JCP1020019},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/AraujoP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/AshawaM21,
  author       = {Moses Ashawa and
                  Sarah Morris},
  title        = {Modeling Correlation between Android Permissions Based on Threat and
                  Protection Level Using Exploratory Factor Plane Analysis},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {704--743},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1040035},
  doi          = {10.3390/JCP1040035},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/AshawaM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/AslamTM21,
  author       = {Sidra Aslam and
                  Aleksandar Tosic and
                  Michael Mrissa},
  title        = {Secure and Privacy-Aware Blockchain Design: Requirements, Challenges
                  and Solutions},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {164--194},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1010009},
  doi          = {10.3390/JCP1010009},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/AslamTM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/BohmDPP21,
  author       = {Fabian B{\"{o}}hm and
                  Marietheres Dietz and
                  Tobias Preindl and
                  G{\"{u}}nther Pernul},
  title        = {Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives
                  for Cybersecurity},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {519--538},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1030026},
  doi          = {10.3390/JCP1030026},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/BohmDPP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/BolzK21,
  author       = {Robin Bolz and
                  Reiner Kriesten},
  title        = {Automotive Vulnerability Disclosure: Stakeholders, Opportunities,
                  Challenges},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {274--288},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1020015},
  doi          = {10.3390/JCP1020015},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocsap/BolzK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/BreilingDPR21,
  author       = {Benjamin Breiling and
                  Bernhard Dieber and
                  Martin Pinzger and
                  Stefan Rass},
  title        = {A Cryptography-Powered Infrastructure to Ensure the Integrity of Robot
                  Workflows},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {93--118},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1010006},
  doi          = {10.3390/JCP1010006},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/BreilingDPR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/ChauhanSIS21,
  author       = {Ravi Chauhan and
                  Ulya Sabeel and
                  Alireza Izaddoost and
                  Shahram Shah{-}Heydari},
  title        = {Polymorphic Adversarial Cyberattacks Using {WGAN}},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {767--792},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1040037},
  doi          = {10.3390/JCP1040037},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/ChauhanSIS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/DoraN21,
  author       = {Jean Rosemond Dora and
                  Karol Nemoga},
  title        = {Ontology for Cross-Site-Scripting {(XSS)} Attack in Cybersecurity},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {319--339},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1020018},
  doi          = {10.3390/JCP1020018},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/DoraN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/DoraN21a,
  author       = {Jean Rosemond Dora and
                  Karol Nemoga},
  title        = {Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless
                  Sensor Networks},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {553--579},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1040028},
  doi          = {10.3390/JCP1040028},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/DoraN21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/GhoshF21,
  author       = {Tirthankar Ghosh and
                  Guillermo A. Francia III},
  title        = {Assessing Competencies Using Scenario-Based Learning in Cybersecurity},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {539--552},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1040027},
  doi          = {10.3390/JCP1040027},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/GhoshF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/GranadilloDCG21,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Rodrigo Diaz and
                  Juan Caubet and
                  Ignasi Garcia{-}Mil{\`{a}}},
  title        = {{CLAP:} {A} Cross-Layer Analytic Platform for the Correlation of Cyber
                  and Physical Security Events Affecting Water Critical Infrastructures},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {365--386},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1020020},
  doi          = {10.3390/JCP1020020},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/GranadilloDCG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/HoranS21,
  author       = {Cecelia Horan and
                  Hossein Saiedian},
  title        = {Cyber Crime Investigation: Landscape, Challenges, and Future Research
                  Directions},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {580--596},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1040029},
  doi          = {10.3390/JCP1040029},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocsap/HoranS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/KarantzasP21,
  author       = {George Karantzas and
                  Constantinos Patsakis},
  title        = {An Empirical Assessment of Endpoint Detection and Response Systems
                  against Advanced Persistent Threats Attack Vectors},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {387--421},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1030021},
  doi          = {10.3390/JCP1030021},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/KarantzasP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/KrehlingE21,
  author       = {Leah Krehling and
                  Aleksander Essex},
  title        = {A Security and Privacy Scoring System for Contact Tracing Apps},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {597--614},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1040030},
  doi          = {10.3390/JCP1040030},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/KrehlingE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/LabordeBWOB21,
  author       = {Romain Laborde and
                  Sravani Teja Bulusu and
                  Ahmad Samer Wazan and
                  Arnaud Oglaza and
                  Abdelmalek Benzekri},
  title        = {A Methodological Approach to Evaluate Security Requirements Engineering
                  Methodologies: Application to the {IREHDO2} Project Context},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {422--452},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1030022},
  doi          = {10.3390/JCP1030022},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/LabordeBWOB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/MadaniV21,
  author       = {Pooria Madani and
                  Natalija Vlajic},
  title        = {RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {453--469},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1030023},
  doi          = {10.3390/JCP1030023},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/MadaniV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/OvermarsV21,
  author       = {Anthony Overmars and
                  Sitalakshmi Venkatraman},
  title        = {New Semi-Prime Factorization and Application in Large {RSA} Key Attacks},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {660--674},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1040033},
  doi          = {10.3390/JCP1040033},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/OvermarsV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/OzkanLS21,
  author       = {Bilge Yigit Ozkan and
                  Sonny van Lingen and
                  Marco Spruit},
  title        = {The Cybersecurity Focus Area Maturity {(CYSFAM)} Model},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {119--139},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1010007},
  doi          = {10.3390/JCP1010007},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/OzkanLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/PapadopoulosEPCMB21,
  author       = {Pavlos Papadopoulos and
                  Oliver Thornewill von Essen and
                  Nikolaos Pitropakis and
                  Christos Chrysoulas and
                  Alexios Mylonas and
                  William J. Buchanan},
  title        = {Launching Adversarial Attacks against Network Intrusion Detection
                  Systems for IoT},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {252--273},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1020014},
  doi          = {10.3390/JCP1020014},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/PapadopoulosEPCMB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/PreuveneersJ21,
  author       = {Davy Preuveneers and
                  Wouter Joosen},
  title        = {Sharing Machine Learning Models as Indicators of Compromise for Cyber
                  Threat Intelligence},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {140--163},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1010008},
  doi          = {10.3390/JCP1010008},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/PreuveneersJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/QuaderJ21,
  author       = {Faisal Quader and
                  Vandana P. Janeja},
  title        = {Insights into Organizational Security Readiness: Lessons Learned from
                  Cyber-Attack Case Studies},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {638--659},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1040032},
  doi          = {10.3390/JCP1040032},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/QuaderJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/Rawat21,
  author       = {Danda B. Rawat},
  title        = {Journal of Cybersecurity and Privacy: {A} New Open Access Journal},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {195--198},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1010010},
  doi          = {10.3390/JCP1010010},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/Rawat21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/SadeghpourV21,
  author       = {Shadi Sadeghpour and
                  Natalija Vlajic},
  title        = {Ads and Fraud: {A} Comprehensive Survey of Fraud in Online Advertising},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {804--832},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1040039},
  doi          = {10.3390/JCP1040039},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/SadeghpourV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/ShoponTBKG21,
  author       = {Md. Shopon and
                  Sanjida Nasreen Tumpa and
                  Yajurv Bhatia and
                  K. N. Pavan Kumar and
                  Marina L. Gavrilova},
  title        = {Biometric Systems De-Identification: Current Advancements and Future
                  Directions},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {470--495},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1030024},
  doi          = {10.3390/JCP1030024},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/ShoponTBKG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/SimonG21,
  author       = {Paul M. Simon and
                  Scott R. Graham},
  title        = {Extending the Quality of Secure Service Model to Multi-Hop Networks},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {793--803},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1040038},
  doi          = {10.3390/JCP1040038},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/SimonG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/SimonGTH21,
  author       = {Paul Simon and
                  Scott R. Graham and
                  Christopher Talbot and
                  Micah Hayden},
  title        = {Model for Quantifying the Quality of Secure Service},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {289--301},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1020016},
  doi          = {10.3390/JCP1020016},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/SimonGTH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/SkalkosSKK21,
  author       = {Andreas Skalkos and
                  Ioannis Stylios and
                  Maria Karyda and
                  Spyros Kokolakis},
  title        = {Users' Privacy Attitudes towards the Use of Behavioral Biometrics
                  Continuous Authentication {(BBCA)} Technologies: {A} Protection Motivation
                  Theory Approach},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {743--766},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1040036},
  doi          = {10.3390/JCP1040036},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/SkalkosSKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/SmitHS21,
  author       = {Tim Smit and
                  Max van Haastrecht and
                  Marco Spruit},
  title        = {The Effect of Countermeasure Readability on Security Intentions},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {675--704},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1040034},
  doi          = {10.3390/JCP1040034},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/SmitHS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/TranKFT21,
  author       = {Ky Tran and
                  Sid Keene and
                  Erik Fretheim and
                  Michail Tsikerdekis},
  title        = {Marine Network Protocols and Security Risks},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {239--251},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1020013},
  doi          = {10.3390/JCP1020013},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/TranKFT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/TrujilloR21,
  author       = {Diana L. Huete Trujillo and
                  Antonio Ruiz{-}Mart{\'{\i}}nez},
  title        = {Tor Hidden Services: {A} Systematic Literature Review},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {496--518},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1030025},
  doi          = {10.3390/JCP1030025},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/TrujilloR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/BerardiCMP20,
  author       = {Davide Berardi and
                  Franco Callegati and
                  Andrea Melis and
                  Marco Prandini},
  title        = {Password Similarity Using Probabilistic Data Structures},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {78--92},
  year         = {2020},
  url          = {https://doi.org/10.3390/jcp1010005},
  doi          = {10.3390/JCP1010005},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/BerardiCMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/ChatzikokolakisFP20,
  author       = {Konstantinos Chatzikokolakis and
                  Natasha Fernandes and
                  Catuscia Palamidessi},
  title        = {Refinement Orders for Quantitative Information Flow and Differential
                  Privacy},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {40--77},
  year         = {2020},
  url          = {https://doi.org/10.3390/jcp1010004},
  doi          = {10.3390/JCP1010004},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/ChatzikokolakisFP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/MillsL20,
  author       = {Alan Mills and
                  Phil Legg},
  title        = {Investigating Anti-Evasion Malware Triggers Using Automated Sandbox
                  Reconfiguration Techniques},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {19--39},
  year         = {2020},
  url          = {https://doi.org/10.3390/jcp1010003},
  doi          = {10.3390/JCP1010003},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/MillsL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/RawatCD20,
  author       = {Danda B. Rawat and
                  Vijay Chaudhary and
                  Ronald Doku},
  title        = {Blockchain Technology: Emerging Applications and Use Cases for Secure
                  and Trustworthy Smart Systems},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {4--18},
  year         = {2020},
  url          = {https://doi.org/10.3390/jcp1010002},
  doi          = {10.3390/JCP1010002},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/RawatCD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/TrappeS18,
  author       = {Wade Trappe and
                  Jeremy Straub},
  title        = {Cybersecurity: {A} New Open Access Journal},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {1},
  year         = {2018},
  url          = {https://doi.org/10.3390/cybersecurity1010001},
  doi          = {10.3390/CYBERSECURITY1010001},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/TrappeS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/TrappeS18a,
  author       = {Wade Trappe and
                  Jeremy Straub},
  title        = {Journal of Cybersecurity and Privacy: {A} New Open Access Journal},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {1--3},
  year         = {2018},
  url          = {https://doi.org/10.3390/jcp1010001},
  doi          = {10.3390/JCP1010001},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/TrappeS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics