Journal: J. Cybersecur. Priv.

Volume 4, Issue 3

388 -- 409Jack Laurie Tilbury, Stephen Flowerday. Humans and Automation: Augmenting Security Operation Centers
410 -- 448Paolo Modesti, Lewis Golightly, Louis Holmes, Chidimma Opara, Marco Moscini. Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking Tools
449 -- 467Mamadou Kasse, Rodolphe Charrier, Alexandre Berred, Cyrille Bertelle, Christophe Delpierre. An Approach for Anomaly Detection in Network Communications Using k-Path Analysis
468 -- 493Abdelouadoud Stambouli, Luigi Logrippo. Implementation of a Partial-Order Data Security Model for the Internet of Things (IoT) Using Software-Defined Networking (SDN)
494 -- 517Eduardo Pina, José Ramos, Henrique Jorge, Paulo Váz, José Silva, Cristina Wanzeller, Maryam Abbasi, Pedro Martins 0003. Data Privacy and Ethical Considerations in Database Management
518 -- 545Charalampos Bratsas, Efstathios Konstantinos Anastasiadis, Alexandros K. Angelidis, Lazaros Ioannidis, Rigas Kotsakis, Stefanos Ougiaroglou. Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review
546 -- 571Jack Kolenbrander, Ethan Husmann, Christopher Henshaw, Elliott Rheault, Madison G. Boswell, Alan J. Michaels. Use & Abuse of Personal Information, Part II: Robust Generation of Fake IDs for Privacy Experimentation
572 -- 593Elliott Rheault, Mary Nerayo, Jaden Leonard, Jack Kolenbrander, Christopher Henshaw, Madison G. Boswell, Alan J. Michaels. Use and Abuse of Personal Information, Part I: Design of a Scalable OSINT Collection Engine
594 -- 614Christopher R. Sears, Daniel R. Cunningham. Individual Differences in Psychological Stress Associated with Data Breach Experiences
615 -- 628Alan Mills, Jonathan White, Phil Legg. GoibhniUWE: A Lightweight and Modular Container-Based Cyber Range
629 -- 649Antonio Francesco Gentile, Davide Macrì, Emilio Greco, Peppino Fazio. IoT IP Overlay Network Security Performance Analysis with Open Source Infrastructure Deployment
650 -- 662Chatphat Titiakarawongse, Sasiyaporn Taksin, Jidapa Ruangsawat, Kunthida Deeduangpan, Sirapat Boonkrong. Comparative Vulnerability Analysis of Thai and Non-Thai Mobile Banking Applications
663 -- 677A. M. Mahmud Chowdhury, Md Jahangir Alam Khondkar, Masudul Haider Imtiaz. Advancements in Synthetic Generation of Contactless Palmprint Biometrics Using StyleGAN Models
678 -- 730Fahad Alotaibi, Ramesh K. Karne, Alexander L. Wijesinha, Nirmala Soundararajan, Abhishek Rangi. An Evaluation of the Security of Bare Machine Computing (BMC) Systems against Cybersecurity Attacks
731 -- 761Zlatan Moric, Vedran Dakic, Daniela Djekic, Damir Regvart. Protection of Personal Data in the Context of E-Commerce
762 -- 776Erik William Tomlinson, Wolday Abrha, Seong Dae Kim, Salvador A. Ortega. Cybersecurity Access Control: Framework Analysis in a Healthcare Institution