Journal: J. Cybersecur. Priv.

Volume 1, Issue 4

539 -- 552Tirthankar Ghosh, Guillermo A. Francia III. Assessing Competencies Using Scenario-Based Learning in Cybersecurity
553 -- 579Jean Rosemond Dora, Karol Nemoga. Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks
580 -- 596Cecelia Horan, Hossein Saiedian. Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions
597 -- 614Leah Krehling, Aleksander Essex. A Security and Privacy Scoring System for Contact Tracing Apps
615 -- 637Kimia Ameri, Michael Hempel, Hamid Sharif, Juan Lopez Jr., Kalyan Perumalla. CyBERT: Cybersecurity Claim Classification by Fine-Tuning the BERT Language Model
638 -- 659Faisal Quader, Vandana P. Janeja. Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies
660 -- 674Anthony Overmars, Sitalakshmi Venkatraman. New Semi-Prime Factorization and Application in Large RSA Key Attacks
675 -- 704Tim Smit, Max van Haastrecht, Marco Spruit. The Effect of Countermeasure Readability on Security Intentions
704 -- 743Moses Ashawa, Sarah Morris. Modeling Correlation between Android Permissions Based on Threat and Protection Level Using Exploratory Factor Plane Analysis
743 -- 766Andreas Skalkos, Ioannis Stylios, Maria Karyda 0001, Spyros Kokolakis. Users' Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach
767 -- 792Ravi Chauhan, Ulya Sabeel, Alireza Izaddoost, Shahram Shah-Heydari. Polymorphic Adversarial Cyberattacks Using WGAN
793 -- 803Paul M. Simon, Scott R. Graham. Extending the Quality of Secure Service Model to Multi-Hop Networks
804 -- 832shadi sadeghpour, Natalija Vlajic. Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising

Volume 1, Issue 3

387 -- 421George Karantzas, Constantinos Patsakis. An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors
422 -- 452Romain Laborde, Sravani Teja Bulusu, Ahmad Samer Wazan, Arnaud Oglaza, Abdelmalek Benzekri. A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context
453 -- 469Pooria Madani, Natalija Vlajic. RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach
470 -- 495Md. Shopon, Sanjida Nasreen Tumpa, Yajurv Bhatia, K. N. Pavan Kumar, Marina L. Gavrilova. Biometric Systems De-Identification: Current Advancements and Future Directions
496 -- 518Diana L. Huete Trujillo, Antonio Ruiz-Martínez. Tor Hidden Services: A Systematic Literature Review
519 -- 538Fabian Böhm, Marietheres Dietz, Tobias Preindl, Günther Pernul. Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity

Volume 1, Issue 2

219 -- 238Mário Antunes 0002, Marisa Maximiano, Ricardo Gomes, Daniel Pinto. Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal
239 -- 251Ky Tran, Sid Keene, Erik Fretheim, Michail Tsikerdekis. Marine Network Protocols and Security Risks
252 -- 273Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas, William J. Buchanan. Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
274 -- 288Robin Bolz, Reiner Kriesten. Automotive Vulnerability Disclosure: Stakeholders, Opportunities, Challenges
289 -- 301Paul Simon, Scott R. Graham, Christopher Talbot, Micah Hayden. Model for Quantifying the Quality of Secure Service
302 -- 318Abdullah Alrubaiq, Talal Alharbi. Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia
319 -- 339Jean Rosemond Dora, Karol Nemoga. Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity
340 -- 364Rui Araújo, António Pinto. Secure Remote Storage of Logs with Search Capabilities
365 -- 386Gustavo Gonzalez Granadillo, Rodrigo Diaz, Juan Caubet, Ignasi Garcia-Milà. CLAP: A Cross-Layer Analytic Platform for the Correlation of Cyber and Physical Security Events Affecting Water Critical Infrastructures

Volume 1, Issue 1

1 -- 0Wade Trappe, Jeremy Straub. Cybersecurity: A New Open Access Journal
1 -- 3Wade Trappe, Jeremy Straub. Journal of Cybersecurity and Privacy: A New Open Access Journal
4 -- 18Danda B. Rawat, Vijay Chaudhary, Ronald Doku. Blockchain Technology: Emerging Applications and Use Cases for Secure and Trustworthy Smart Systems
19 -- 39Alan Mills, Phil Legg. Investigating Anti-Evasion Malware Triggers Using Automated Sandbox Reconfiguration Techniques
40 -- 77Konstantinos Chatzikokolakis 0001, Natasha Fernandes, Catuscia Palamidessi. Refinement Orders for Quantitative Information Flow and Differential Privacy
78 -- 92Davide Berardi, Franco Callegati, Andrea Melis 0001, Marco Prandini. Password Similarity Using Probabilistic Data Structures
93 -- 118Benjamin Breiling, Bernhard Dieber, Martin Pinzger 0001, Stefan Rass. A Cryptography-Powered Infrastructure to Ensure the Integrity of Robot Workflows
119 -- 139Bilge Yigit Ozkan, Sonny van Lingen, Marco Spruit. The Cybersecurity Focus Area Maturity (CYSFAM) Model
140 -- 163Davy Preuveneers, Wouter Joosen. Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence
164 -- 194Sidra Aslam, Aleksandar Tosic, Michael Mrissa. Secure and Privacy-Aware Blockchain Design: Requirements, Challenges and Solutions
195 -- 198Danda B. Rawat. Journal of Cybersecurity and Privacy: A New Open Access Journal
199 -- 218Mostofa Ahsan, Rahul Gomes, Md Minhaz Chowdhury, Kendall E. Nygard. Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector