Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jocsap/jocsap1.bht:"
@article{DBLP:journals/jocsap/AhsanGCN21, author = {Mostofa Ahsan and Rahul Gomes and Md Minhaz Chowdhury and Kendall E. Nygard}, title = {Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {1}, pages = {199--218}, year = {2021}, url = {https://doi.org/10.3390/jcp1010011}, doi = {10.3390/JCP1010011}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/AhsanGCN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/AlrubaiqA21, author = {Abdullah Alrubaiq and Talal Alharbi}, title = {Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {2}, pages = {302--318}, year = {2021}, url = {https://doi.org/10.3390/jcp1020017}, doi = {10.3390/JCP1020017}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/AlrubaiqA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/AmeriHSLP21, author = {Kimia Ameri and Michael Hempel and Hamid Sharif and Juan Lopez Jr. and Kalyan Perumalla}, title = {CyBERT: Cybersecurity Claim Classification by Fine-Tuning the {BERT} Language Model}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {4}, pages = {615--637}, year = {2021}, url = {https://doi.org/10.3390/jcp1040031}, doi = {10.3390/JCP1040031}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/AmeriHSLP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/AntunesMGP21, author = {M{\'{a}}rio Antunes and Marisa Maximiano and Ricardo Gomes and Daniel Pinto}, title = {Information Security and Cybersecurity Management: {A} Case Study with SMEs in Portugal}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {2}, pages = {219--238}, year = {2021}, url = {https://doi.org/10.3390/jcp1020012}, doi = {10.3390/JCP1020012}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/AntunesMGP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/AraujoP21, author = {Rui Ara{\'{u}}jo and Ant{\'{o}}nio Pinto}, title = {Secure Remote Storage of Logs with Search Capabilities}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {2}, pages = {340--364}, year = {2021}, url = {https://doi.org/10.3390/jcp1020019}, doi = {10.3390/JCP1020019}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/AraujoP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/AshawaM21, author = {Moses Ashawa and Sarah Morris}, title = {Modeling Correlation between Android Permissions Based on Threat and Protection Level Using Exploratory Factor Plane Analysis}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {4}, pages = {704--743}, year = {2021}, url = {https://doi.org/10.3390/jcp1040035}, doi = {10.3390/JCP1040035}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/AshawaM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/AslamTM21, author = {Sidra Aslam and Aleksandar Tosic and Michael Mrissa}, title = {Secure and Privacy-Aware Blockchain Design: Requirements, Challenges and Solutions}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {1}, pages = {164--194}, year = {2021}, url = {https://doi.org/10.3390/jcp1010009}, doi = {10.3390/JCP1010009}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/AslamTM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/BohmDPP21, author = {Fabian B{\"{o}}hm and Marietheres Dietz and Tobias Preindl and G{\"{u}}nther Pernul}, title = {Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {3}, pages = {519--538}, year = {2021}, url = {https://doi.org/10.3390/jcp1030026}, doi = {10.3390/JCP1030026}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/BohmDPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/BolzK21, author = {Robin Bolz and Reiner Kriesten}, title = {Automotive Vulnerability Disclosure: Stakeholders, Opportunities, Challenges}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {2}, pages = {274--288}, year = {2021}, url = {https://doi.org/10.3390/jcp1020015}, doi = {10.3390/JCP1020015}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocsap/BolzK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/BreilingDPR21, author = {Benjamin Breiling and Bernhard Dieber and Martin Pinzger and Stefan Rass}, title = {A Cryptography-Powered Infrastructure to Ensure the Integrity of Robot Workflows}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {1}, pages = {93--118}, year = {2021}, url = {https://doi.org/10.3390/jcp1010006}, doi = {10.3390/JCP1010006}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/BreilingDPR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/ChauhanSIS21, author = {Ravi Chauhan and Ulya Sabeel and Alireza Izaddoost and Shahram Shah{-}Heydari}, title = {Polymorphic Adversarial Cyberattacks Using {WGAN}}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {4}, pages = {767--792}, year = {2021}, url = {https://doi.org/10.3390/jcp1040037}, doi = {10.3390/JCP1040037}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/ChauhanSIS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/DoraN21, author = {Jean Rosemond Dora and Karol Nemoga}, title = {Ontology for Cross-Site-Scripting {(XSS)} Attack in Cybersecurity}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {2}, pages = {319--339}, year = {2021}, url = {https://doi.org/10.3390/jcp1020018}, doi = {10.3390/JCP1020018}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/DoraN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/DoraN21a, author = {Jean Rosemond Dora and Karol Nemoga}, title = {Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {4}, pages = {553--579}, year = {2021}, url = {https://doi.org/10.3390/jcp1040028}, doi = {10.3390/JCP1040028}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/DoraN21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/GhoshF21, author = {Tirthankar Ghosh and Guillermo A. Francia III}, title = {Assessing Competencies Using Scenario-Based Learning in Cybersecurity}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {4}, pages = {539--552}, year = {2021}, url = {https://doi.org/10.3390/jcp1040027}, doi = {10.3390/JCP1040027}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/GhoshF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/GranadilloDCG21, author = {Gustavo {Gonzalez Granadillo} and Rodrigo Diaz and Juan Caubet and Ignasi Garcia{-}Mil{\`{a}}}, title = {{CLAP:} {A} Cross-Layer Analytic Platform for the Correlation of Cyber and Physical Security Events Affecting Water Critical Infrastructures}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {2}, pages = {365--386}, year = {2021}, url = {https://doi.org/10.3390/jcp1020020}, doi = {10.3390/JCP1020020}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/GranadilloDCG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/HoranS21, author = {Cecelia Horan and Hossein Saiedian}, title = {Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {4}, pages = {580--596}, year = {2021}, url = {https://doi.org/10.3390/jcp1040029}, doi = {10.3390/JCP1040029}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocsap/HoranS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/KarantzasP21, author = {George Karantzas and Constantinos Patsakis}, title = {An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {3}, pages = {387--421}, year = {2021}, url = {https://doi.org/10.3390/jcp1030021}, doi = {10.3390/JCP1030021}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/KarantzasP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/KrehlingE21, author = {Leah Krehling and Aleksander Essex}, title = {A Security and Privacy Scoring System for Contact Tracing Apps}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {4}, pages = {597--614}, year = {2021}, url = {https://doi.org/10.3390/jcp1040030}, doi = {10.3390/JCP1040030}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/KrehlingE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/LabordeBWOB21, author = {Romain Laborde and Sravani Teja Bulusu and Ahmad Samer Wazan and Arnaud Oglaza and Abdelmalek Benzekri}, title = {A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the {IREHDO2} Project Context}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {3}, pages = {422--452}, year = {2021}, url = {https://doi.org/10.3390/jcp1030022}, doi = {10.3390/JCP1030022}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/LabordeBWOB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/MadaniV21, author = {Pooria Madani and Natalija Vlajic}, title = {RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {3}, pages = {453--469}, year = {2021}, url = {https://doi.org/10.3390/jcp1030023}, doi = {10.3390/JCP1030023}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/MadaniV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/OvermarsV21, author = {Anthony Overmars and Sitalakshmi Venkatraman}, title = {New Semi-Prime Factorization and Application in Large {RSA} Key Attacks}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {4}, pages = {660--674}, year = {2021}, url = {https://doi.org/10.3390/jcp1040033}, doi = {10.3390/JCP1040033}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/OvermarsV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/OzkanLS21, author = {Bilge Yigit Ozkan and Sonny van Lingen and Marco Spruit}, title = {The Cybersecurity Focus Area Maturity {(CYSFAM)} Model}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {1}, pages = {119--139}, year = {2021}, url = {https://doi.org/10.3390/jcp1010007}, doi = {10.3390/JCP1010007}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/OzkanLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/PapadopoulosEPCMB21, author = {Pavlos Papadopoulos and Oliver Thornewill von Essen and Nikolaos Pitropakis and Christos Chrysoulas and Alexios Mylonas and William J. Buchanan}, title = {Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {2}, pages = {252--273}, year = {2021}, url = {https://doi.org/10.3390/jcp1020014}, doi = {10.3390/JCP1020014}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/PapadopoulosEPCMB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/PreuveneersJ21, author = {Davy Preuveneers and Wouter Joosen}, title = {Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {1}, pages = {140--163}, year = {2021}, url = {https://doi.org/10.3390/jcp1010008}, doi = {10.3390/JCP1010008}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/PreuveneersJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/QuaderJ21, author = {Faisal Quader and Vandana P. Janeja}, title = {Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {4}, pages = {638--659}, year = {2021}, url = {https://doi.org/10.3390/jcp1040032}, doi = {10.3390/JCP1040032}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/QuaderJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/Rawat21, author = {Danda B. Rawat}, title = {Journal of Cybersecurity and Privacy: {A} New Open Access Journal}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {1}, pages = {195--198}, year = {2021}, url = {https://doi.org/10.3390/jcp1010010}, doi = {10.3390/JCP1010010}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/Rawat21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/SadeghpourV21, author = {Shadi Sadeghpour and Natalija Vlajic}, title = {Ads and Fraud: {A} Comprehensive Survey of Fraud in Online Advertising}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {4}, pages = {804--832}, year = {2021}, url = {https://doi.org/10.3390/jcp1040039}, doi = {10.3390/JCP1040039}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/SadeghpourV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/ShoponTBKG21, author = {Md. Shopon and Sanjida Nasreen Tumpa and Yajurv Bhatia and K. N. Pavan Kumar and Marina L. Gavrilova}, title = {Biometric Systems De-Identification: Current Advancements and Future Directions}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {3}, pages = {470--495}, year = {2021}, url = {https://doi.org/10.3390/jcp1030024}, doi = {10.3390/JCP1030024}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/ShoponTBKG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/SimonG21, author = {Paul M. Simon and Scott R. Graham}, title = {Extending the Quality of Secure Service Model to Multi-Hop Networks}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {4}, pages = {793--803}, year = {2021}, url = {https://doi.org/10.3390/jcp1040038}, doi = {10.3390/JCP1040038}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/SimonG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/SimonGTH21, author = {Paul Simon and Scott R. Graham and Christopher Talbot and Micah Hayden}, title = {Model for Quantifying the Quality of Secure Service}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {2}, pages = {289--301}, year = {2021}, url = {https://doi.org/10.3390/jcp1020016}, doi = {10.3390/JCP1020016}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/SimonGTH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/SkalkosSKK21, author = {Andreas Skalkos and Ioannis Stylios and Maria Karyda and Spyros Kokolakis}, title = {Users' Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication {(BBCA)} Technologies: {A} Protection Motivation Theory Approach}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {4}, pages = {743--766}, year = {2021}, url = {https://doi.org/10.3390/jcp1040036}, doi = {10.3390/JCP1040036}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/SkalkosSKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/SmitHS21, author = {Tim Smit and Max van Haastrecht and Marco Spruit}, title = {The Effect of Countermeasure Readability on Security Intentions}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {4}, pages = {675--704}, year = {2021}, url = {https://doi.org/10.3390/jcp1040034}, doi = {10.3390/JCP1040034}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/SmitHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/TranKFT21, author = {Ky Tran and Sid Keene and Erik Fretheim and Michail Tsikerdekis}, title = {Marine Network Protocols and Security Risks}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {2}, pages = {239--251}, year = {2021}, url = {https://doi.org/10.3390/jcp1020013}, doi = {10.3390/JCP1020013}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/TranKFT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/TrujilloR21, author = {Diana L. Huete Trujillo and Antonio Ruiz{-}Mart{\'{\i}}nez}, title = {Tor Hidden Services: {A} Systematic Literature Review}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {3}, pages = {496--518}, year = {2021}, url = {https://doi.org/10.3390/jcp1030025}, doi = {10.3390/JCP1030025}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/TrujilloR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/BerardiCMP20, author = {Davide Berardi and Franco Callegati and Andrea Melis and Marco Prandini}, title = {Password Similarity Using Probabilistic Data Structures}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {1}, pages = {78--92}, year = {2020}, url = {https://doi.org/10.3390/jcp1010005}, doi = {10.3390/JCP1010005}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/BerardiCMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/ChatzikokolakisFP20, author = {Konstantinos Chatzikokolakis and Natasha Fernandes and Catuscia Palamidessi}, title = {Refinement Orders for Quantitative Information Flow and Differential Privacy}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {1}, pages = {40--77}, year = {2020}, url = {https://doi.org/10.3390/jcp1010004}, doi = {10.3390/JCP1010004}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/ChatzikokolakisFP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/MillsL20, author = {Alan Mills and Phil Legg}, title = {Investigating Anti-Evasion Malware Triggers Using Automated Sandbox Reconfiguration Techniques}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {1}, pages = {19--39}, year = {2020}, url = {https://doi.org/10.3390/jcp1010003}, doi = {10.3390/JCP1010003}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/MillsL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/RawatCD20, author = {Danda B. Rawat and Vijay Chaudhary and Ronald Doku}, title = {Blockchain Technology: Emerging Applications and Use Cases for Secure and Trustworthy Smart Systems}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {1}, pages = {4--18}, year = {2020}, url = {https://doi.org/10.3390/jcp1010002}, doi = {10.3390/JCP1010002}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/RawatCD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/TrappeS18, author = {Wade Trappe and Jeremy Straub}, title = {Cybersecurity: {A} New Open Access Journal}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {1}, pages = {1}, year = {2018}, url = {https://doi.org/10.3390/cybersecurity1010001}, doi = {10.3390/CYBERSECURITY1010001}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/TrappeS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/TrappeS18a, author = {Wade Trappe and Jeremy Straub}, title = {Journal of Cybersecurity and Privacy: {A} New Open Access Journal}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {1}, pages = {1--3}, year = {2018}, url = {https://doi.org/10.3390/jcp1010001}, doi = {10.3390/JCP1010001}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/TrappeS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.