default search action
Journal of Cybersecurity and Privacy, Volume 1
Volume 1, Number 1, June 2018
- Wade Trappe, Jeremy Straub:
Cybersecurity: A New Open Access Journal. 1 - Wade Trappe, Jeremy Straub:
Journal of Cybersecurity and Privacy: A New Open Access Journal. 1-3 - Danda B. Rawat, Vijay Chaudhary, Ronald Doku:
Blockchain Technology: Emerging Applications and Use Cases for Secure and Trustworthy Smart Systems. 4-18 - Alan Mills, Phil Legg:
Investigating Anti-Evasion Malware Triggers Using Automated Sandbox Reconfiguration Techniques. 19-39 - Konstantinos Chatzikokolakis, Natasha Fernandes, Catuscia Palamidessi:
Refinement Orders for Quantitative Information Flow and Differential Privacy. 40-77 - Davide Berardi, Franco Callegati, Andrea Melis, Marco Prandini:
Password Similarity Using Probabilistic Data Structures. 78-92 - Benjamin Breiling, Bernhard Dieber, Martin Pinzger, Stefan Rass:
A Cryptography-Powered Infrastructure to Ensure the Integrity of Robot Workflows. 93-118 - Bilge Yigit Ozkan, Sonny van Lingen, Marco Spruit:
The Cybersecurity Focus Area Maturity (CYSFAM) Model. 119-139 - Davy Preuveneers, Wouter Joosen:
Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence. 140-163 - Sidra Aslam, Aleksandar Tosic, Michael Mrissa:
Secure and Privacy-Aware Blockchain Design: Requirements, Challenges and Solutions. 164-194 - Danda B. Rawat:
Journal of Cybersecurity and Privacy: A New Open Access Journal. 195-198 - Mostofa Ahsan, Rahul Gomes, Md Minhaz Chowdhury, Kendall E. Nygard:
Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector. 199-218
Volume 1, Number 2, April 2021
- Mário Antunes, Marisa Maximiano, Ricardo Gomes, Daniel Pinto:
Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal. 219-238 - Ky Tran, Sid Keene, Erik Fretheim, Michail Tsikerdekis:
Marine Network Protocols and Security Risks. 239-251 - Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas, William J. Buchanan:
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. 252-273 - Robin Bolz, Reiner Kriesten:
Automotive Vulnerability Disclosure: Stakeholders, Opportunities, Challenges. 274-288 - Paul Simon, Scott R. Graham, Christopher Talbot, Micah Hayden:
Model for Quantifying the Quality of Secure Service. 289-301 - Abdullah Alrubaiq, Talal Alharbi:
Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia. 302-318 - Jean Rosemond Dora, Karol Nemoga:
Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity. 319-339 - Rui Araújo, António Pinto:
Secure Remote Storage of Logs with Search Capabilities. 340-364 - Gustavo Gonzalez Granadillo, Rodrigo Diaz, Juan Caubet, Ignasi Garcia-Milà Vidal:
CLAP: A Cross-Layer Analytic Platform for the Correlation of Cyber and Physical Security Events Affecting Water Critical Infrastructures. 365-386
Volume 1, Number 3, July 2021
- George Karantzas, Constantinos Patsakis:
An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors. 387-421 - Romain Laborde, Sravani Teja Bulusu, Ahmad Samer Wazan, Arnaud Oglaza, Abdelmalek Benzekri:
A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context. 422-452 - Pooria Madani, Natalija Vlajic:
RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach. 453-469 - Md. Shopon, Sanjida Nasreen Tumpa, Yajurv Bhatia, K. N. Pavan Kumar, Marina L. Gavrilova:
Biometric Systems De-Identification: Current Advancements and Future Directions. 470-495 - Diana L. Huete Trujillo, Antonio Ruiz-Martínez:
Tor Hidden Services: A Systematic Literature Review. 496-518 - Fabian Böhm, Marietheres Dietz, Tobias Preindl, Günther Pernul:
Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity. 519-538
Volume 1, Number 4, September 2021
- Tirthankar Ghosh, Guillermo A. Francia III:
Assessing Competencies Using Scenario-Based Learning in Cybersecurity. 539-552 - Jean Rosemond Dora, Karol Nemoga:
Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks. 553-579 - Cecelia Horan, Hossein Saiedian:
Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions. 580-596 - Leah Krehling, Aleksander Essex:
A Security and Privacy Scoring System for Contact Tracing Apps. 597-614 - Kimia Ameri, Michael Hempel, Hamid Sharif, Juan Lopez Jr., Kalyan Perumalla:
CyBERT: Cybersecurity Claim Classification by Fine-Tuning the BERT Language Model. 615-637 - Faisal Quader, Vandana P. Janeja:
Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies. 638-659 - Anthony Overmars, Sitalakshmi Venkatraman:
New Semi-Prime Factorization and Application in Large RSA Key Attacks. 660-674 - Tim Smit, Max van Haastrecht, Marco Spruit:
The Effect of Countermeasure Readability on Security Intentions. 675-704 - Moses Ashawa, Sarah Morris:
Modeling Correlation between Android Permissions Based on Threat and Protection Level Using Exploratory Factor Plane Analysis. 704-743 - Andreas Skalkos, Ioannis Stylios, Maria Karyda, Spyros Kokolakis:
Users' Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach. 743-766 - Ravi Chauhan, Ulya Sabeel, Alireza Izaddoost, Shahram Shah-Heydari:
Polymorphic Adversarial Cyberattacks Using WGAN. 767-792 - Paul M. Simon, Scott R. Graham:
Extending the Quality of Secure Service Model to Multi-Hop Networks. 793-803 - Shadi Sadeghpour, Natalija Vlajic:
Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising. 804-832
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.