default search action
Journal of Cybersecurity and Privacy, Volume 3
Volume 3, Number 1, December 2022
- Mohamed Ali Kazi, Steve Woodhead, Diane Gan:
An Investigation to Detect Banking Malware Network Communication Traffic Using Machine Learning Techniques. 1-23 - Acknowledgment to the Reviewers of Journal of Cybersecurity and Privacy in 2022. 24-25
- Vasileios Vlachos, Yannis C. Stamatiou, Sotiris E. Nikoletseas:
The Privacy Flag Observatory: A Crowdsourcing Tool for Real Time Privacy Threats Evaluation. 26-43 - Raphael Kiesel, Marvin Lakatsch, Alexander Mann, Karl Lossie, Felix Sohnius, Robert H. Schmitt:
Potential of Homomorphic Encryption for Cloud Computing Use Cases in Manufacturing. 44-60 - Giorgia Tempestini, Ericka Rovira, Aryn Pyke, Francesco Di Nocera:
The Cybersecurity Awareness INventory (CAIN): Early Phases of Development of a Tool for Assessing Cybersecurity Knowledge Based on the ISO/IEC 27032. 61-75 - Guillaume Bour, Camillo Bosco, Rita Maria Ugarelli, Martin Gilje Jaatun:
Water-Tight IoT-Just Add Security. 76-94 - Shadi Sadeghpour, Natalija Vlajic:
ReMouse Dataset: On the Efficacy of Measuring the Similarity of Human-Generated Trajectories for the Detection of Session-Replay Bots. 95-117
Volume 3, Number 2, April 2023
- Laurens D'hooge, Miel Verkerken, Tim Wauters, Filip De Turck, Bruno Volckaert:
Characterizing the Impact of Data-Damaged Models on Generalization Strength in Intrusion Detection. 118-144 - Shinelle Hutchinson, Milos Stankovic, Samuel Ho, Shiva Houshmand, Umit Karabiyik:
Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS. 145-165 - Raghvinder S. Sangwan, Youakim Badr, Satish Mahadevan Srinivasan:
Cybersecurity for AI Systems: A Survey. 166-190 - David S. Butcher, Christian J. Brigham, James Berhalter, Abigail L. Centers, William M. Hunkapiller, Timothy P. Murphy, Eric C. Palm, Julia H. Smith:
Cybersecurity in a Large-Scale Research Facility - One Institution's Approach. 191-208 - Feng Wang, Yongning Tang, Hongbing Fang:
Mitigating IoT Privacy-Revealing Features by Time Series Data Transformation. 209-226 - Sara Kokal, Mounika Vanamala, Rushit Dave:
Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication. 227-258 - Khosro Salmani, Brian Atuh:
A Lesson for the Future: Will You Let Me Violate Your Privacy to Save Your Life? 259-274 - Ilias Belalis, Georgios P. Spathoulas, Ioannis Anagnostopoulos:
Modeling Intruder Reconnaissance Behavior through State Diagrams to Support Defensive Deception. 275-302
Volume 3, Number 3, June 2023
- Lukas Schmidt, Henry Hosseini, Thomas Hupperich:
Assessing the Security and Privacy of Baby Monitor Apps. 303-326 - Henock Mulugeta Melaku:
A Dynamic and Adaptive Cybersecurity Governance Framework. 327-350 - Andey Robins, Stone Olguin, Jarek Brown, Clay Carper, Mike Borowczak:
Power-Based Side-Channel Attacks on Program Control Flow with Machine Learning Models. 351-363 - Jennifer Bellizzi, Eleonora Losiouk, Mauro Conti, Christian Colombo, Mark Vella:
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics. 364-395 - Ioannis Paspatis, Aggeliki Tsohou:
How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors. 396-415 - Juliet Samandari, Clémentine Gritti:
Post-Quantum Authentication in the MQTT Protocol. 416-434 - Richard Li, Michail Tsikerdekis:
Hourly Network Anomaly Detection on HTTP Using Exponential Random Graph Models and Autoregressive Moving Average. 435-450 - Humera Ghani, Bal S. Virdee, Shahram Salekzamankhani:
A Deep Learning Approach for Network Intrusion Detection Using a Small Features Vector. 451-463 - Lewis Golightly, Paolo Modesti, Victor Chang:
Deploying Secure Distributed Systems: Comparative Analysis of GNS3 and SEED Internet Emulator. 464-492 - Anastasios Giannaros, Aristeidis Karras, Leonidas Theodorakopoulos, Christos N. Karras, Panagiotis Kranias, Nikolaos Schizas, Gerasimos Kalogeratos, Dimitrios Tsolis:
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions. 493-543 - Fatemeh Ahmadi Abkenari, Amin Milani Fard, Sara Khanchi:
Hybrid Machine Learning-Based Approaches for Feature and Overfitting Reduction to Model Intrusion Patterns. 544-557 - Turki Al Lelah, George Theodorakopoulos, Philipp Reinecke, Amir Javed, Eirini Anthi:
Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review. 558-590 - Hannes Salin, Martin Lundgren:
A Gap Analysis of the Adoption Maturity of Certificateless Cryptography in Cooperative Intelligent Transportation Systems. 591-609 - Anastasios Papathanasiou, George Liontos, Vasiliki Liagkou, Euripidis Glavas:
Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures - A Perspective on the Greek Landscape. 610-637 - Abdul Majeed:
Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review. 638-661
Volume 3, Number 4, September 2023
- Ayat-Allah Bouramdane:
Cyberattacks in Smart Grids: Challenges and Solving the Multi-Criteria Decision-Making for Cybersecurity Options, Including Ones That Incorporate Artificial Intelligence, Using an Analytical Hierarchy Process. 662-705 - Ghada Abdelmoumin, Danda B. Rawat, Abdul Rahman:
Studying Imbalanced Learning for Anomaly-Based Intelligent IDS for Mission-Critical Internet of Things. 706-743 - Noel Khaemba, Issa Traoré, Mohammad Mamun:
A Framework for Synthetic Agetech Attack Data Generation. 744-757 - Theodoros Theodoropoulos, Luís Rosa, Chafika Benzaid, Peter Gray, Eduard Marin, Antonios Makris, Luís Cordeiro, Ferran Diego, Pavel Sorokin, Marco Di Girolamo, Paolo Barone, Tarik Taleb, Konstantinos Tserpes:
Security in Cloud-Native Services: A Survey. 758-793 - Filippo Sobrero, Beatrice Clavarezza, Daniele Ucci, Federica Bisio:
Towards a Near-Real-Time Protocol Tunneling Detector Based on Machine Learning Techniques. 794-807 - Mohamed Chahine Ghanem, Patrick Mulvihill, Karim Ouazzane, Ramzi Djemai, Dipo Dunsin:
D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities. 808-829 - Humera Ghani, Shahram Salekzamankhani, Bal S. Virdee:
A Hybrid Dimensionality Reduction for Network Intrusion Detection. 830-843 - Clay Carper, Stone Olguin, Jarek Brown, Caylie Charlton, Mike Borowczak:
Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis. 844-857 - Turki Al Lelah, George Theodorakopoulos, Amir Javed, Eirini Anthi:
Machine Learning Detection of Cloud Services Abuse as C&C Infrastructure. 858-881 - Shannon K. S. Kroes, Matthijs van Leeuwen, Rolf H. H. Groenwold, Mart P. Janssen:
Evaluating Cluster-Based Synthetic Data Generation for Blood-Transfusion Analysis. 882-894 - Tirthankar Ghosh, Sikha Bagui, Subhash C. Bagui, Martin Kadzis, Jackson Bare:
Anomaly Detection for Modbus over TCP in Control Systems Using Entropy and Classification-Based Analysis. 895-913
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.