


default search action
Journal of Cybersecurity and Privacy, Volume 3
Volume 3, Number 1, December 2022
- Mohamed Ali Kazi
, Steve Woodhead, Diane Gan
:
An Investigation to Detect Banking Malware Network Communication Traffic Using Machine Learning Techniques. 1-23 - Acknowledgment to the Reviewers of Journal of Cybersecurity and Privacy in 2022. 24-25
- Vasileios Vlachos, Yannis C. Stamatiou, Sotiris E. Nikoletseas:
The Privacy Flag Observatory: A Crowdsourcing Tool for Real Time Privacy Threats Evaluation. 26-43 - Raphael Kiesel
, Marvin Lakatsch, Alexander Mann
, Karl Lossie
, Felix Sohnius, Robert H. Schmitt:
Potential of Homomorphic Encryption for Cloud Computing Use Cases in Manufacturing. 44-60 - Giorgia Tempestini, Ericka Rovira, Aryn Pyke, Francesco Di Nocera
:
The Cybersecurity Awareness INventory (CAIN): Early Phases of Development of a Tool for Assessing Cybersecurity Knowledge Based on the ISO/IEC 27032. 61-75 - Guillaume Bour
, Camillo Bosco
, Rita Maria Ugarelli, Martin Gilje Jaatun
:
Water-Tight IoT-Just Add Security. 76-94 - Shadi Sadeghpour
, Natalija Vlajic:
ReMouse Dataset: On the Efficacy of Measuring the Similarity of Human-Generated Trajectories for the Detection of Session-Replay Bots. 95-117
Volume 3, Number 2, April 2023
- Laurens D'hooge
, Miel Verkerken
, Tim Wauters
, Filip De Turck
, Bruno Volckaert
:
Characterizing the Impact of Data-Damaged Models on Generalization Strength in Intrusion Detection. 118-144 - Shinelle Hutchinson
, Milos Stankovic
, Samuel Ho
, Shiva Houshmand
, Umit Karabiyik
:
Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS. 145-165 - Raghvinder S. Sangwan, Youakim Badr
, Satish Mahadevan Srinivasan:
Cybersecurity for AI Systems: A Survey. 166-190 - David S. Butcher
, Christian J. Brigham, James Berhalter, Abigail L. Centers
, William M. Hunkapiller, Timothy P. Murphy, Eric C. Palm, Julia H. Smith:
Cybersecurity in a Large-Scale Research Facility - One Institution's Approach. 191-208 - Feng Wang
, Yongning Tang, Hongbing Fang:
Mitigating IoT Privacy-Revealing Features by Time Series Data Transformation. 209-226 - Sara Kokal, Mounika Vanamala, Rushit Dave:
Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication. 227-258 - Khosro Salmani
, Brian Atuh:
A Lesson for the Future: Will You Let Me Violate Your Privacy to Save Your Life? 259-274 - Ilias Belalis
, Georgios P. Spathoulas
, Ioannis Anagnostopoulos
:
Modeling Intruder Reconnaissance Behavior through State Diagrams to Support Defensive Deception. 275-302
Volume 3, Number 3, June 2023
- Lukas Schmidt, Henry Hosseini
, Thomas Hupperich
:
Assessing the Security and Privacy of Baby Monitor Apps. 303-326 - Henock Mulugeta Melaku
:
A Dynamic and Adaptive Cybersecurity Governance Framework. 327-350 - Andey Robins
, Stone Olguin
, Jarek Brown
, Clay Carper, Mike Borowczak
:
Power-Based Side-Channel Attacks on Program Control Flow with Machine Learning Models. 351-363 - Jennifer Bellizzi
, Eleonora Losiouk
, Mauro Conti
, Christian Colombo
, Mark Vella
:
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics. 364-395 - Ioannis Paspatis, Aggeliki Tsohou:
How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors. 396-415 - Juliet Samandari
, Clémentine Gritti
:
Post-Quantum Authentication in the MQTT Protocol. 416-434 - Richard Li, Michail Tsikerdekis
:
Hourly Network Anomaly Detection on HTTP Using Exponential Random Graph Models and Autoregressive Moving Average. 435-450 - Humera Ghani, Bal S. Virdee
, Shahram Salekzamankhani:
A Deep Learning Approach for Network Intrusion Detection Using a Small Features Vector. 451-463 - Lewis Golightly
, Paolo Modesti
, Victor Chang
:
Deploying Secure Distributed Systems: Comparative Analysis of GNS3 and SEED Internet Emulator. 464-492 - Anastasios Giannaros
, Aristeidis Karras
, Leonidas Theodorakopoulos
, Christos N. Karras
, Panagiotis Kranias
, Nikolaos Schizas
, Gerasimos Kalogeratos
, Dimitrios Tsolis
:
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions. 493-543 - Fatemeh Ahmadi Abkenari, Amin Milani Fard
, Sara Khanchi:
Hybrid Machine Learning-Based Approaches for Feature and Overfitting Reduction to Model Intrusion Patterns. 544-557 - Turki Al Lelah
, George Theodorakopoulos
, Philipp Reinecke, Amir Javed, Eirini Anthi:
Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review. 558-590 - Hannes Salin, Martin Lundgren
:
A Gap Analysis of the Adoption Maturity of Certificateless Cryptography in Cooperative Intelligent Transportation Systems. 591-609 - Anastasios Papathanasiou
, George Liontos
, Vasiliki Liagkou
, Euripidis Glavas
:
Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures - A Perspective on the Greek Landscape. 610-637 - Abdul Majeed
:
Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review. 638-661
Volume 3, Number 4, September 2023
- Ayat-Allah Bouramdane
:
Cyberattacks in Smart Grids: Challenges and Solving the Multi-Criteria Decision-Making for Cybersecurity Options, Including Ones That Incorporate Artificial Intelligence, Using an Analytical Hierarchy Process. 662-705 - Ghada Abdelmoumin
, Danda B. Rawat
, Abdul Rahman:
Studying Imbalanced Learning for Anomaly-Based Intelligent IDS for Mission-Critical Internet of Things. 706-743 - Noel Khaemba, Issa Traoré, Mohammad Mamun
:
A Framework for Synthetic Agetech Attack Data Generation. 744-757 - Theodoros Theodoropoulos
, Luís Rosa, Chafika Benzaid
, Peter Gray, Eduard Marin, Antonios Makris
, Luís Cordeiro
, Ferran Diego, Pavel Sorokin, Marco Di Girolamo
, Paolo Barone, Tarik Taleb
, Konstantinos Tserpes
:
Security in Cloud-Native Services: A Survey. 758-793 - Filippo Sobrero, Beatrice Clavarezza, Daniele Ucci
, Federica Bisio:
Towards a Near-Real-Time Protocol Tunneling Detector Based on Machine Learning Techniques. 794-807 - Mohamed Chahine Ghanem
, Patrick Mulvihill, Karim Ouazzane, Ramzi Djemai, Dipo Dunsin
:
D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities. 808-829 - Humera Ghani, Shahram Salekzamankhani, Bal S. Virdee
:
A Hybrid Dimensionality Reduction for Network Intrusion Detection. 830-843 - Clay Carper
, Stone Olguin
, Jarek Brown
, Caylie Charlton
, Mike Borowczak
:
Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis. 844-857 - Turki Al Lelah
, George Theodorakopoulos
, Amir Javed, Eirini Anthi:
Machine Learning Detection of Cloud Services Abuse as C&C Infrastructure. 858-881 - Shannon K. S. Kroes
, Matthijs van Leeuwen
, Rolf H. H. Groenwold
, Mart P. Janssen
:
Evaluating Cluster-Based Synthetic Data Generation for Blood-Transfusion Analysis. 882-894 - Tirthankar Ghosh
, Sikha Bagui
, Subhash C. Bagui
, Martin Kadzis, Jackson Bare:
Anomaly Detection for Modbus over TCP in Control Systems Using Entropy and Classification-Based Analysis. 895-913

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.