Journal: J. Cybersecur. Priv.

Volume 2, Issue 1

1 -- 18Thilini B. G. Herath, Prashant Khanna, Monjur Ahmed. Cybersecurity Practices for Social Media Users: A Systematic Literature Review
19 -- 0. Acknowledgment to Reviewers of Journal of Cybersecurity and Privacy in 2021
20 -- 41Tor Onshus, Lars Bodsberg, Stein Hauge, Martin Gilje Jaatun, Mary Ann Lundteigen, Thor Myklebust, Maria Vatshaug Ottermo, Stig Petersen, Egil Wille. Security and Independence of Process Safety and Control Systems in the Petroleum Industry
42 -- 64Nadine Kashmar, Mehdi Adda, Hussein Ibrahim. HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New Opportunities
65 -- 74Lili Nemec Zlatolas, Natasa Feher, Marko Hölbl. Security Perception of IoT Devices in Smart Homes
74 -- 88Harry Owen, Javad Zarrin, Shahrzad M. Pour. A Survey on Botnets, Issues, Threats, Methods, Detection and Prevention
89 -- 106Maryam Taeb, Hongmei Chi. Comparison of Deepfake Detection Techniques through Deep Learning
107 -- 123Abdulghafour Mohammad. Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review
124 -- 152Philokypros P. Ioulianou, Vassilios G. Vassilakis, Siamak F. Shahandashti. A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks
154 -- 190Andrew McCarthy, Essam Ghadafi, Panagiotis Andriotis, Phil Legg. Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey
191 -- 219Laura Genga, Luca Allodi, Nicola Zannone. Association Rule Mining Meets Regression Analysis: An Automated Approach to Unveil Systematic Biases in Decision-Making Processes