Journal: J. Cybersecur. Priv.

Volume 1, Issue 4

539 -- 552Tirthankar Ghosh, Guillermo A. Francia III. Assessing Competencies Using Scenario-Based Learning in Cybersecurity
553 -- 579Jean Rosemond Dora, Karol Nemoga. Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks
580 -- 596Cecelia Horan, Hossein Saiedian. Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions
597 -- 614Leah Krehling, Aleksander Essex. A Security and Privacy Scoring System for Contact Tracing Apps
615 -- 637Kimia Ameri, Michael Hempel, Hamid Sharif, Juan Lopez Jr., Kalyan Perumalla. CyBERT: Cybersecurity Claim Classification by Fine-Tuning the BERT Language Model
638 -- 659Faisal Quader, Vandana P. Janeja. Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies
660 -- 674Anthony Overmars, Sitalakshmi Venkatraman. New Semi-Prime Factorization and Application in Large RSA Key Attacks
675 -- 704Tim Smit, Max van Haastrecht, Marco Spruit. The Effect of Countermeasure Readability on Security Intentions
704 -- 743Moses Ashawa, Sarah Morris. Modeling Correlation between Android Permissions Based on Threat and Protection Level Using Exploratory Factor Plane Analysis
743 -- 766Andreas Skalkos, Ioannis Stylios, Maria Karyda 0001, Spyros Kokolakis. Users' Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach
767 -- 792Ravi Chauhan, Ulya Sabeel, Alireza Izaddoost, Shahram Shah-Heydari. Polymorphic Adversarial Cyberattacks Using WGAN
793 -- 803Paul M. Simon, Scott R. Graham. Extending the Quality of Secure Service Model to Multi-Hop Networks
804 -- 832shadi sadeghpour, Natalija Vlajic. Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising