Journal: J. Cybersecur. Priv.

Volume 4, Issue 2

153 -- 166Anthony J. Rose, Scott R. Graham, Christine M. Schubert Kabban, Jacob J. Krasnov, Wayne C. Henry. ScriptBlock Smuggling: Uncovering Stealthy Evasion Techniques in PowerShell and .NET Environments
167 -- 195Jan Domnik, Alexander Holland 0003. On Data Leakage Prevention Maturity: Adapting the C2M2 Framework
196 -- 222Ratna Halder, Dipanjan Das Roy, Dongwan Shin. A Blockchain-Based Decentralized Public Key Infrastructure Using the Web of Trust
223 -- 240Arslan Munir, Alexander J. Aved, Khanh Pham, Joonho Kong. Trustworthiness of Situational Awareness: Significance and Quantification
241 -- 263Eric Muhati, Danda B. Rawat. Data-Driven Network Anomaly Detection with Cyber Attack and Defense Visualization
264 -- 277Avi Shaked. Facilitating the Integrative Use of Security Knowledge Bases within a Modelling Environment
278 -- 297Tunde Oduguwa, Abdullahi Arabo. Passwordless Authentication Using a Combination of Cryptography, Steganography, and Biometrics
298 -- 323Pankajeshwara Sharma, Michael Govorov, Michael Martin. A Usable Encryption Solution for File-Based Geospatial Data within a Database File System
324 -- 339Stanislav Abaimov. Understanding and Classifying Permanent Denial-of-Service Attacks
340 -- 356Pete Burnap, Eirini Anthi, Philipp Reinecke, Lowri Williams, Fengnian Cao, Rakan Aldmour, Kevin Jones. Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals
357 -- 381Habib El Amin, Abed Ellatif Samhat, Maroun Chamoun, Lina Oueidat, Antoine Feghali. An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure
382 -- 387Feng Wang 0017, Yongning Tang. Diverse Intrusion and Malware Detection: AI-Based and Non-AI-Based Solutions