Journal: J. Cybersecur. Priv.

Volume 4, Issue 1

1 -- 22Christian DeLozier. How Close Is Existing C/C++ Code to a Safe Subset?
23 -- 40Mohamad Saalim Wani, Michael Rademacher, Thorsten Horstmann, Mathias Kretschmer. Security Vulnerabilities in 5G Non-Stand-Alone Networks: A Systematic Analysis and Attack Taxonomy
41 -- 54Anthony Overmars, Sitalakshmi Venkatraman. Continued Fractions Applied to the One Line Factoring Algorithm for Breaking RSA
55 -- 75Elias Seid, Oliver Popov, Fredrik Blix. Security Attack Behavioural Pattern Analysis for Critical Service Providers
76 -- 104Ioannis Paspatis, Aggeliki Tsohou. Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement
105 -- 125Stefan Kutschera, Wolfgang Slany, Patrick Ratschiller, Sarina Gursch, Patrick Deininger, HÃ¥vard D. Johansen. Incidental Data: A Survey towards Awareness on Privacy-Compromising Data Incidentally Shared on Social Media
126 -- 152Yousef Alghamdi, Arslan Munir. Image Encryption Algorithms: A Survey of Design and Evaluation Metrics