1 | -- | 18 | Thilini B. G. Herath, Prashant Khanna, Monjur Ahmed. Cybersecurity Practices for Social Media Users: A Systematic Literature Review |
19 | -- | 0 | . Acknowledgment to Reviewers of Journal of Cybersecurity and Privacy in 2021 |
20 | -- | 41 | Tor Onshus, Lars Bodsberg, Stein Hauge, Martin Gilje Jaatun, Mary Ann Lundteigen, Thor Myklebust, Maria Vatshaug Ottermo, Stig Petersen, Egil Wille. Security and Independence of Process Safety and Control Systems in the Petroleum Industry |
42 | -- | 64 | Nadine Kashmar, Mehdi Adda, Hussein Ibrahim. HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New Opportunities |
65 | -- | 74 | Lili Nemec Zlatolas, Natasa Feher, Marko Hölbl. Security Perception of IoT Devices in Smart Homes |
74 | -- | 88 | Harry Owen, Javad Zarrin, Shahrzad M. Pour. A Survey on Botnets, Issues, Threats, Methods, Detection and Prevention |
89 | -- | 106 | Maryam Taeb, Hongmei Chi. Comparison of Deepfake Detection Techniques through Deep Learning |
107 | -- | 123 | Abdulghafour Mohammad. Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review |
124 | -- | 152 | Philokypros P. Ioulianou, Vassilios G. Vassilakis, Siamak F. Shahandashti. A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks |
154 | -- | 190 | Andrew McCarthy, Essam Ghadafi, Panagiotis Andriotis, Phil Legg. Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey |
191 | -- | 219 | Laura Genga, Luca Allodi, Nicola Zannone. Association Rule Mining Meets Regression Analysis: An Automated Approach to Unveil Systematic Biases in Decision-Making Processes |