Journal: J. Cybersecur. Priv.

Volume 1, Issue 3

387 -- 421George Karantzas, Constantinos Patsakis. An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors
422 -- 452Romain Laborde, Sravani Teja Bulusu, Ahmad Samer Wazan, Arnaud Oglaza, Abdelmalek Benzekri. A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context
453 -- 469Pooria Madani, Natalija Vlajic. RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach
470 -- 495Md. Shopon, Sanjida Nasreen Tumpa, Yajurv Bhatia, K. N. Pavan Kumar, Marina L. Gavrilova. Biometric Systems De-Identification: Current Advancements and Future Directions
496 -- 518Diana L. Huete Trujillo, Antonio Ruiz-Martínez. Tor Hidden Services: A Systematic Literature Review
519 -- 538Fabian Böhm, Marietheres Dietz, Tobias Preindl, Günther Pernul. Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity