


default search action
Journal of Cybersecurity and Privacy, Volume 1
Volume 1, Number 1, June 2018
- Wade Trappe, Jeremy Straub
:
Cybersecurity: A New Open Access Journal. 1 - Wade Trappe
, Jeremy Straub
:
Journal of Cybersecurity and Privacy: A New Open Access Journal. 1-3 - Danda B. Rawat
, Vijay Chaudhary
, Ronald Doku:
Blockchain Technology: Emerging Applications and Use Cases for Secure and Trustworthy Smart Systems. 4-18 - Alan Mills
, Phil Legg
:
Investigating Anti-Evasion Malware Triggers Using Automated Sandbox Reconfiguration Techniques. 19-39 - Konstantinos Chatzikokolakis
, Natasha Fernandes
, Catuscia Palamidessi
:
Refinement Orders for Quantitative Information Flow and Differential Privacy. 40-77 - Davide Berardi
, Franco Callegati
, Andrea Melis
, Marco Prandini
:
Password Similarity Using Probabilistic Data Structures. 78-92 - Benjamin Breiling, Bernhard Dieber
, Martin Pinzger
, Stefan Rass
:
A Cryptography-Powered Infrastructure to Ensure the Integrity of Robot Workflows. 93-118 - Bilge Yigit Ozkan
, Sonny van Lingen, Marco Spruit
:
The Cybersecurity Focus Area Maturity (CYSFAM) Model. 119-139 - Davy Preuveneers
, Wouter Joosen:
Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence. 140-163 - Sidra Aslam
, Aleksandar Tosic
, Michael Mrissa
:
Secure and Privacy-Aware Blockchain Design: Requirements, Challenges and Solutions. 164-194 - Danda B. Rawat
:
Journal of Cybersecurity and Privacy: A New Open Access Journal. 195-198 - Mostofa Ahsan, Rahul Gomes
, Md Minhaz Chowdhury
, Kendall E. Nygard:
Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector. 199-218
Volume 1, Number 2, April 2021
- Mário Antunes
, Marisa Maximiano
, Ricardo Gomes
, Daniel Pinto:
Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal. 219-238 - Ky Tran, Sid Keene, Erik Fretheim, Michail Tsikerdekis
:
Marine Network Protocols and Security Risks. 239-251 - Pavlos Papadopoulos
, Oliver Thornewill von Essen, Nikolaos Pitropakis
, Christos Chrysoulas
, Alexios Mylonas
, William J. Buchanan
:
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. 252-273 - Robin Bolz, Reiner Kriesten
:
Automotive Vulnerability Disclosure: Stakeholders, Opportunities, Challenges. 274-288 - Paul Simon
, Scott R. Graham
, Christopher Talbot, Micah Hayden:
Model for Quantifying the Quality of Secure Service. 289-301 - (Withdrawn) Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia. 302-318
- Jean Rosemond Dora, Karol Nemoga:
Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity. 319-339 - Rui Araújo, António Pinto
:
Secure Remote Storage of Logs with Search Capabilities. 340-364 - Gustavo Gonzalez Granadillo, Rodrigo Diaz, Juan Caubet
, Ignasi Garcia-Milà Vidal
:
CLAP: A Cross-Layer Analytic Platform for the Correlation of Cyber and Physical Security Events Affecting Water Critical Infrastructures. 365-386
Volume 1, Number 3, July 2021
- George Karantzas, Constantinos Patsakis
:
An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors. 387-421 - Romain Laborde
, Sravani Teja Bulusu, Ahmad Samer Wazan, Arnaud Oglaza, Abdelmalek Benzekri:
A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context. 422-452 - Pooria Madani
, Natalija Vlajic:
RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach. 453-469 - Md. Shopon
, Sanjida Nasreen Tumpa
, Yajurv Bhatia, K. N. Pavan Kumar, Marina L. Gavrilova:
Biometric Systems De-Identification: Current Advancements and Future Directions. 470-495 - Diana L. Huete Trujillo, Antonio Ruiz-Martínez
:
Tor Hidden Services: A Systematic Literature Review. 496-518 - Fabian Böhm
, Marietheres Dietz
, Tobias Preindl, Günther Pernul:
Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity. 519-538
Volume 1, Number 4, September 2021
- Tirthankar Ghosh
, Guillermo A. Francia III
:
Assessing Competencies Using Scenario-Based Learning in Cybersecurity. 539-552 - Jean Rosemond Dora, Karol Nemoga
:
Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks. 553-579 - Cecelia Horan, Hossein Saiedian
:
Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions. 580-596 - Leah Krehling, Aleksander Essex
:
A Security and Privacy Scoring System for Contact Tracing Apps. 597-614 - Kimia Ameri
, Michael Hempel
, Hamid Sharif
, Juan Lopez Jr.
, Kalyan Perumalla
:
CyBERT: Cybersecurity Claim Classification by Fine-Tuning the BERT Language Model. 615-637 - Faisal Quader, Vandana P. Janeja
:
Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies. 638-659 - Anthony Overmars
, Sitalakshmi Venkatraman
:
New Semi-Prime Factorization and Application in Large RSA Key Attacks. 660-674 - Tim Smit
, Max van Haastrecht
, Marco Spruit
:
The Effect of Countermeasure Readability on Security Intentions. 675-704 - Moses Ashawa
, Sarah Morris:
Modeling Correlation between Android Permissions Based on Threat and Protection Level Using Exploratory Factor Plane Analysis. 704-743 - Andreas Skalkos
, Ioannis Stylios
, Maria Karyda, Spyros Kokolakis:
Users' Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach. 743-766 - Ravi Chauhan, Ulya Sabeel
, Alireza Izaddoost, Shahram Shah-Heydari
:
Polymorphic Adversarial Cyberattacks Using WGAN. 767-792 - Paul M. Simon
, Scott R. Graham
:
Extending the Quality of Secure Service Model to Multi-Hop Networks. 793-803 - Shadi Sadeghpour
, Natalija Vlajic:
Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising. 804-832

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.