


default search action
Journal of Cybersecurity and Privacy, Volume 3
Volume 3, Number 1, December 2022
- Mohamed Ali Kazi

, Steve Woodhead, Diane Gan
:
An Investigation to Detect Banking Malware Network Communication Traffic Using Machine Learning Techniques. 1-23 - Acknowledgment to the Reviewers of Journal of Cybersecurity and Privacy in 2022. 24-25

- Vasileios Vlachos, Yannis C. Stamatiou, Sotiris E. Nikoletseas:

The Privacy Flag Observatory: A Crowdsourcing Tool for Real Time Privacy Threats Evaluation. 26-43 - Raphael Kiesel

, Marvin Lakatsch, Alexander Mann
, Karl Lossie
, Felix Sohnius, Robert H. Schmitt:
Potential of Homomorphic Encryption for Cloud Computing Use Cases in Manufacturing. 44-60 - Giorgia Tempestini, Ericka Rovira, Aryn Pyke, Francesco Di Nocera

:
The Cybersecurity Awareness INventory (CAIN): Early Phases of Development of a Tool for Assessing Cybersecurity Knowledge Based on the ISO/IEC 27032. 61-75 - Guillaume Bour

, Camillo Bosco
, Rita Maria Ugarelli, Martin Gilje Jaatun
:
Water-Tight IoT-Just Add Security. 76-94 - Shadi Sadeghpour

, Natalija Vlajic:
ReMouse Dataset: On the Efficacy of Measuring the Similarity of Human-Generated Trajectories for the Detection of Session-Replay Bots. 95-117
Volume 3, Number 2, April 2023
- Laurens D'hooge

, Miel Verkerken
, Tim Wauters
, Filip De Turck
, Bruno Volckaert
:
Characterizing the Impact of Data-Damaged Models on Generalization Strength in Intrusion Detection. 118-144 - Shinelle Hutchinson

, Milos Stankovic
, Samuel Ho
, Shiva Houshmand
, Umit Karabiyik
:
Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS. 145-165 - Raghvinder S. Sangwan, Youakim Badr

, Satish Mahadevan Srinivasan:
Cybersecurity for AI Systems: A Survey. 166-190 - David S. Butcher

, Christian J. Brigham, James Berhalter, Abigail L. Centers
, William M. Hunkapiller, Timothy P. Murphy, Eric C. Palm, Julia H. Smith:
Cybersecurity in a Large-Scale Research Facility - One Institution's Approach. 191-208 - Feng Wang

, Yongning Tang, Hongbing Fang:
Mitigating IoT Privacy-Revealing Features by Time Series Data Transformation. 209-226 - Sara Kokal, Mounika Vanamala, Rushit Dave:

Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication. 227-258 - Khosro Salmani

, Brian Atuh:
A Lesson for the Future: Will You Let Me Violate Your Privacy to Save Your Life? 259-274 - Ilias Belalis

, Georgios P. Spathoulas
, Ioannis Anagnostopoulos
:
Modeling Intruder Reconnaissance Behavior through State Diagrams to Support Defensive Deception. 275-302
Volume 3, Number 3, June 2023
- Lukas Schmidt, Henry Hosseini

, Thomas Hupperich
:
Assessing the Security and Privacy of Baby Monitor Apps. 303-326 - Henock Mulugeta Melaku

:
A Dynamic and Adaptive Cybersecurity Governance Framework. 327-350 - Andey Robins

, Stone Olguin
, Jarek Brown
, Clay Carper, Mike Borowczak
:
Power-Based Side-Channel Attacks on Program Control Flow with Machine Learning Models. 351-363 - Jennifer Bellizzi

, Eleonora Losiouk
, Mauro Conti
, Christian Colombo
, Mark Vella
:
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics. 364-395 - Ioannis Paspatis, Aggeliki Tsohou:

How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors. 396-415 - Juliet Samandari

, Clémentine Gritti
:
Post-Quantum Authentication in the MQTT Protocol. 416-434 - Richard Li, Michail Tsikerdekis

:
Hourly Network Anomaly Detection on HTTP Using Exponential Random Graph Models and Autoregressive Moving Average. 435-450 - Humera Ghani, Bal S. Virdee

, Shahram Salekzamankhani:
A Deep Learning Approach for Network Intrusion Detection Using a Small Features Vector. 451-463 - Lewis Golightly

, Paolo Modesti
, Victor Chang
:
Deploying Secure Distributed Systems: Comparative Analysis of GNS3 and SEED Internet Emulator. 464-492 - Anastasios Giannaros

, Aristeidis Karras
, Leonidas Theodorakopoulos
, Christos N. Karras
, Panagiotis Kranias
, Nikolaos Schizas
, Gerasimos Kalogeratos
, Dimitrios Tsolis
:
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions. 493-543 - Fatemeh Ahmadi Abkenari, Amin Milani Fard

, Sara Khanchi:
Hybrid Machine Learning-Based Approaches for Feature and Overfitting Reduction to Model Intrusion Patterns. 544-557 - Turki Al Lelah

, George Theodorakopoulos
, Philipp Reinecke, Amir Javed, Eirini Anthi:
Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review. 558-590 - Hannes Salin, Martin Lundgren

:
A Gap Analysis of the Adoption Maturity of Certificateless Cryptography in Cooperative Intelligent Transportation Systems. 591-609 - Anastasios Papathanasiou

, George Liontos
, Vasiliki Liagkou
, Euripidis Glavas
:
Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures - A Perspective on the Greek Landscape. 610-637 - Abdul Majeed

:
Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review. 638-661
Volume 3, Number 4, September 2023
- Ayat-Allah Bouramdane

:
Cyberattacks in Smart Grids: Challenges and Solving the Multi-Criteria Decision-Making for Cybersecurity Options, Including Ones That Incorporate Artificial Intelligence, Using an Analytical Hierarchy Process. 662-705 - Ghada Abdelmoumin

, Danda B. Rawat
, Abdul Rahman:
Studying Imbalanced Learning for Anomaly-Based Intelligent IDS for Mission-Critical Internet of Things. 706-743 - Noel Khaemba, Issa Traoré, Mohammad Mamun

:
A Framework for Synthetic Agetech Attack Data Generation. 744-757 - Theodoros Theodoropoulos

, Luís Rosa, Chafika Benzaid
, Peter Gray, Eduard Marin, Antonios Makris
, Luís Cordeiro
, Ferran Diego, Pavel Sorokin, Marco Di Girolamo
, Paolo Barone, Tarik Taleb
, Konstantinos Tserpes
:
Security in Cloud-Native Services: A Survey. 758-793 - Filippo Sobrero, Beatrice Clavarezza, Daniele Ucci

, Federica Bisio:
Towards a Near-Real-Time Protocol Tunneling Detector Based on Machine Learning Techniques. 794-807 - Mohamed Chahine Ghanem

, Patrick Mulvihill, Karim Ouazzane, Ramzi Djemai, Dipo Dunsin
:
D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities. 808-829 - Humera Ghani, Shahram Salekzamankhani, Bal S. Virdee

:
A Hybrid Dimensionality Reduction for Network Intrusion Detection. 830-843 - Clay Carper

, Stone Olguin
, Jarek Brown
, Caylie Charlton
, Mike Borowczak
:
Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis. 844-857 - Turki Al Lelah

, George Theodorakopoulos
, Amir Javed, Eirini Anthi:
Machine Learning Detection of Cloud Services Abuse as C&C Infrastructure. 858-881 - Shannon K. S. Kroes

, Matthijs van Leeuwen
, Rolf H. H. Groenwold
, Mart P. Janssen
:
Evaluating Cluster-Based Synthetic Data Generation for Blood-Transfusion Analysis. 882-894 - Tirthankar Ghosh

, Sikha Bagui
, Subhash C. Bagui
, Martin Kadzis, Jackson Bare:
Anomaly Detection for Modbus over TCP in Control Systems Using Entropy and Classification-Based Analysis. 895-913

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














