


default search action
Journal of Cybersecurity and Privacy, Volume 4
Volume 4, Number 1, March 2024
- Christian DeLozier
:
How Close Is Existing C/C++ Code to a Safe Subset? 1-22 - Mohamad Saalim Wani
, Michael Rademacher
, Thorsten Horstmann, Mathias Kretschmer
:
Security Vulnerabilities in 5G Non-Stand-Alone Networks: A Systematic Analysis and Attack Taxonomy. 23-40 - Anthony Overmars
, Sitalakshmi Venkatraman
:
Continued Fractions Applied to the One Line Factoring Algorithm for Breaking RSA. 41-54 - Elias Seid, Oliver Popov
, Fredrik Blix
:
Security Attack Behavioural Pattern Analysis for Critical Service Providers. 55-75 - Ioannis Paspatis, Aggeliki Tsohou:
Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement. 76-104 - Stefan Kutschera
, Wolfgang Slany
, Patrick Ratschiller
, Sarina Gursch
, Patrick Deininger
, Håvard D. Johansen
:
Incidental Data: A Survey towards Awareness on Privacy-Compromising Data Incidentally Shared on Social Media. 105-125 - Yousef Alghamdi
, Arslan Munir
:
Image Encryption Algorithms: A Survey of Design and Evaluation Metrics. 126-152
Volume 4, Number 2, June 2024
- Anthony J. Rose
, Scott R. Graham
, Christine M. Schubert-Kabban
, Jacob J. Krasnov
, Wayne C. Henry
:
ScriptBlock Smuggling: Uncovering Stealthy Evasion Techniques in PowerShell and .NET Environments. 153-166 - Jan Domnik
, Alexander Holland:
On Data Leakage Prevention Maturity: Adapting the C2M2 Framework. 167-195 - Ratna Halder, Dipanjan Das Roy, Dongwan Shin:
A Blockchain-Based Decentralized Public Key Infrastructure Using the Web of Trust. 196-222 - Arslan Munir
, Alexander J. Aved
, Khanh Pham, Joonho Kong
:
Trustworthiness of Situational Awareness: Significance and Quantification. 223-240 - Eric Muhati
, Danda B. Rawat
:
Data-Driven Network Anomaly Detection with Cyber Attack and Defense Visualization. 241-263 - Avi Shaked
:
Facilitating the Integrative Use of Security Knowledge Bases within a Modelling Environment. 264-277 - Tunde Oduguwa
, Abdullahi Arabo
:
Passwordless Authentication Using a Combination of Cryptography, Steganography, and Biometrics. 278-297 - Pankajeshwara Sharma, Michael Govorov
, Michael Martin:
A Usable Encryption Solution for File-Based Geospatial Data within a Database File System. 298-323 - Stanislav Abaimov:
Understanding and Classifying Permanent Denial-of-Service Attacks. 324-339 - Pete Burnap
, Eirini Anthi
, Philipp Reinecke, Lowri Williams
, Fengnian Cao, Rakan Aldmour, Kevin Jones:
Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals. 340-356 - Habib El Amin, Abed Ellatif Samhat
, Maroun Chamoun, Lina Oueidat, Antoine Feghali:
An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure. 357-381 - Feng Wang
, Yongning Tang:
Diverse Intrusion and Malware Detection: AI-Based and Non-AI-Based Solutions. 382-387
Volume 4, Number 3, September 2024
- Jack Laurie Tilbury, Stephen Flowerday
:
Humans and Automation: Augmenting Security Operation Centers. 388-409 - Paolo Modesti
, Lewis Golightly
, Louis Holmes, Chidimma Opara
, Marco Moscini
:
Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking Tools. 410-448 - Mamadou Kasse
, Rodolphe Charrier, Alexandre Berred
, Cyrille Bertelle
, Christophe Delpierre:
An Approach for Anomaly Detection in Network Communications Using k-Path Analysis. 449-467 - Abdelouadoud Stambouli
, Luigi Logrippo
:
Implementation of a Partial-Order Data Security Model for the Internet of Things (IoT) Using Software-Defined Networking (SDN). 468-493 - Eduardo Pina, José Ramos, Henrique Jorge, Paulo Váz, José Silva
, Cristina Wanzeller, Maryam Abbasi
, Pedro Martins
:
Data Privacy and Ethical Considerations in Database Management. 494-517 - Charalampos Bratsas
, Efstathios Konstantinos Anastasiadis
, Alexandros K. Angelidis
, Lazaros Ioannidis
, Rigas Kotsakis
, Stefanos Ougiaroglou
:
Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review. 518-545 - Jack Kolenbrander
, Ethan Husmann
, Christopher Henshaw
, Elliott Rheault, Madison G. Boswell, Alan J. Michaels
:
Use & Abuse of Personal Information, Part II: Robust Generation of Fake IDs for Privacy Experimentation. 546-571 - Elliott Rheault, Mary Nerayo, Jaden Leonard, Jack Kolenbrander
, Christopher Henshaw
, Madison G. Boswell, Alan J. Michaels
:
Use and Abuse of Personal Information, Part I: Design of a Scalable OSINT Collection Engine. 572-593 - Christopher R. Sears
, Daniel R. Cunningham:
Individual Differences in Psychological Stress Associated with Data Breach Experiences. 594-614 - Alan Mills
, Jonathan White
, Phil Legg
:
GoibhniUWE: A Lightweight and Modular Container-Based Cyber Range. 615-628 - Antonio Francesco Gentile
, Davide Macrì
, Emilio Greco
, Peppino Fazio
:
IoT IP Overlay Network Security Performance Analysis with Open Source Infrastructure Deployment. 629-649 - Chatphat Titiakarawongse, Sasiyaporn Taksin, Jidapa Ruangsawat, Kunthida Deeduangpan, Sirapat Boonkrong:
Comparative Vulnerability Analysis of Thai and Non-Thai Mobile Banking Applications. 650-662 - A. M. Mahmud Chowdhury
, Md Jahangir Alam Khondkar, Masudul Haider Imtiaz:
Advancements in Synthetic Generation of Contactless Palmprint Biometrics Using StyleGAN Models. 663-677 - Fahad Alotaibi, Ramesh K. Karne, Alexander L. Wijesinha, Nirmala Soundararajan, Abhishek Rangi:
An Evaluation of the Security of Bare Machine Computing (BMC) Systems against Cybersecurity Attacks. 678-730 - Zlatan Moric
, Vedran Dakic
, Daniela Djekic, Damir Regvart
:
Protection of Personal Data in the Context of E-Commerce. 731-761 - Erik William Tomlinson, Wolday Abrha, Seong Dae Kim
, Salvador A. Ortega:
Cybersecurity Access Control: Framework Analysis in a Healthcare Institution. 762-776
Volume 4, Number 4, 2024
- Samir Achraf Chamkar
, Yassine Maleh
, Noreddine Gherabi
:
Security Operations Centers: Use Case Best Practices, Coverage, and Gap Analysis Based on MITRE Adversarial Tactics, Techniques, and Common Knowledge. 777-793 - Justin Foreman
, Willie L. Waters, Charles A. Kamhoua, Ahmed H. Anwar, Jaime C. Acosta, Blessing C. Dike:
Detection of Hacker Intention Using Deep Packet Inspection. 794-804 - Caleb Rother
, Bo Chen
:
Reversing File Access Control Using Disk Forensics on Low-Level Flash Memory. 805-822 - Sara Abbaspour Asadollah, Shamoona Imtiaz, Alireza Dehlaghi-Ghadim, Mikael Sjödin, Marjan Sirjani:
Enhancing Cybersecurity through Comprehensive Investigation of Data Flow-Based Attack Scenarios. 823-852 - Khalid Bennouk
, Nawal Ait Aali
, Younès El Bouzekri El Idrissi
, Bechir Sebai, Abou Zakaria Faroukhi, Dorra Mahouachi:
A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies. 853-908 - RETRACTED: Alrubaiq, A.; Alharbi, T. Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia. J. Cybersecur. Priv. 2021, 1, 302-318. 909
- Van Joshua Abergos
, Faiza Medjek
:
A Risk Assessment Analysis to Enhance the Security of OT WAN with SD-WAN. 910-937 - Emil Eminov
, Stephen V. Flowerday
:
Suspicious Financial Activity in the Context of In-Game Asset Exchange Marketplace. 938-950 - Cristian Agredo, Tor J. Langehaug, Scott R. Graham
:
Inferring TLB Configuration with Performance Tools. 951-971 - Ioannis Vourganas
, Anna Lito Michala
:
Applications of Machine Learning in Cyber Security: A Review. 972-992 - Prudence M. Mavhemwa
, Marco Zennaro
, Philibert Nsengiyumva
, Frederic Nzanywayingoma
:
An Android-Based Internet of Medical Things Adaptive User Authentication and Authorization Model for the Elderly. 993-1017 - Swatisipra Das
, Rojalina Priyadarshini
, Minati Mishra
, Rabindra Kumar Barik
:
Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study. 1018-1043

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.