- Andreas Skalkos, Ioannis Stylios, Maria Karyda, Spyros Kokolakis:
Users' Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach. J. Cybersecur. Priv. 1(4): 743-766 (2021) - Tim Smit, Max van Haastrecht, Marco Spruit:
The Effect of Countermeasure Readability on Security Intentions. J. Cybersecur. Priv. 1(4): 675-704 (2021) - Ky Tran, Sid Keene, Erik Fretheim, Michail Tsikerdekis:
Marine Network Protocols and Security Risks. J. Cybersecur. Priv. 1(2): 239-251 (2021) - Diana L. Huete Trujillo, Antonio Ruiz-Martínez:
Tor Hidden Services: A Systematic Literature Review. J. Cybersecur. Priv. 1(3): 496-518 (2021) - 2020
- Davide Berardi, Franco Callegati, Andrea Melis, Marco Prandini:
Password Similarity Using Probabilistic Data Structures. J. Cybersecur. Priv. 1(1): 78-92 (2020) - Konstantinos Chatzikokolakis, Natasha Fernandes, Catuscia Palamidessi:
Refinement Orders for Quantitative Information Flow and Differential Privacy. J. Cybersecur. Priv. 1(1): 40-77 (2020) - Alan Mills, Phil Legg:
Investigating Anti-Evasion Malware Triggers Using Automated Sandbox Reconfiguration Techniques. J. Cybersecur. Priv. 1(1): 19-39 (2020) - Danda B. Rawat, Vijay Chaudhary, Ronald Doku:
Blockchain Technology: Emerging Applications and Use Cases for Secure and Trustworthy Smart Systems. J. Cybersecur. Priv. 1(1): 4-18 (2020) - 2018
- Wade Trappe, Jeremy Straub:
Cybersecurity: A New Open Access Journal. J. Cybersecur. Priv. 1(1): 1 (2018) - Wade Trappe, Jeremy Straub:
Journal of Cybersecurity and Privacy: A New Open Access Journal. J. Cybersecur. Priv. 1(1): 1-3 (2018)