Journal: J. Cybersecur. Priv.

Volume 2, Issue 4

764 -- 777Maha Alghawazi, Daniyal M. Alghazzawi, Suaad Alarifi. Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review
778 -- 799Panayiotis Kalogeropoulos, Dimitrios Papanikas, Panayiotis Kotzanikolaou. A Distributed Model for Privacy Preserving V2I Communication with Strong Unframeability and Efficient Revocation
800 -- 829Umm-e-Hani Tayyab, Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan, Yeon Soo Lee. A Survey of the Recent Trends in Deep Learning Based Malware Detection
830 -- 852Ayse Ünsal, Melek Önen. Calibrating the Attack to Sensitivity in Differentially Private Mechanisms
853 -- 861Mohammed A. Ahmed, Hatem F. Sindi, Majid Kamal A. Nour. Cybersecurity in Hospitals: An Evaluation Model
862 -- 881Jins de Jong, Bart Kamphorst, Shannon Kroes. Differentially Private Block Coordinate Descent for Linear Regression on Vertically Partitioned Data
882 -- 906Hunter D. Moore, Andrew Stephens, William Scherer. An Understanding of the Vulnerability of Datasets to Disparate Membership Inference Attacks
907 -- 923Maria José Angélico Gonçalves, Rui Humberto R. Pereira, Marta Alexandra Guerra Magalhães Coelho. User Reputation on E-Commerce: Blockchain-Based Approaches

Volume 2, Issue 3

444 -- 465Abdullah F. Al-Aboosi, Matan Broner, Fadhil Y. Al-Aboosi. Bingo: A Semi-Centralized Password Storage System
466 -- 489Rosemary Cosmas Tlatlaa Panga, Janeth Marwa, Jema David Ndibwile. A Game or Notes? The Use of a Customized Mobile Game to Improve Teenagers' Phishing Knowledge, Case of Tanzania
490 -- 515Tibor Pósa, Jens Grossklags. Work Experience as a Factor in Cyber-Security Risk Awareness: A Survey Study with University Students
516 -- 526Daniel Spiekermann, Jörg Keller 0001. Requirements for Crafting Virtual Network Packet Captures
527 -- 555Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, Md Minhaz Chowdhury, Nafiz Rifat, Jayden F. Connolly. Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning - A Review
556 -- 572Hannah Nyholm, Kristine Monteith, Seth Lyles, Micaela Gallegos, Mark Desantis, John Donaldson, Claire Taylor. The Evolution of Volatile Memory Forensics
573 -- 586William Triplett. Addressing Human Factors in Cybersecurity Leadership
587 -- 605Shao-Fang Wen, Ankur Shukla, Basel Katt. Developing Security Assurance Metrics to Support Quantitative Security Assurance Evaluation
606 -- 628Christoph Stach, Michael Behringer, Julia Bräcker, Clémentine Gritti, Bernhard Mitschang. SMARTEN - A Sample-Based Approach towards Privacy-Friendly Data Refinement
629 -- 639Jessil Fuhr, Feng Wang 0017, Yongning Tang. MOCA: A Network Intrusion Monitoring and Classification System
640 -- 661Rachida Hireche, Houssem Mansouri, Al-Sakib Khan Pathan. Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis
662 -- 699Christina L. Phibbs, Shawon S. M. Rahman. A Synopsis of "The Impact of Motivation, Price, and Habit on Intention to Use IoT-Enabled Technology: A Correlational Study"
700 -- 713Pedro Sousa, António Pinto, Pedro Pinto 0001. Exploiting Online Services to Enable Anonymous and Confidential Messaging
714 -- 730A. M. Mahmud Chowdhury, Masudul Haider Imtiaz. Contactless Fingerprint Recognition Using Deep Learning - A Systematic Review
731 -- 749Andreas Puder, Marcel Rumez, Daniel Grimm, Eric Sax. Generic Patterns for Intrusion Detection Systems in Service-Oriented Automotive and Medical Architectures
750 -- 763Milos Stankovic, Umit Karabiyik. Exploratory Study on Kali NetHunter Lite: A Digital Forensics Approach

Volume 2, Issue 2

220 -- 244Emmanuel Aboah Boateng, J. W. Bruce. Unsupervised Machine Learning Techniques for Detecting PLC Process Control Anomalies
245 -- 256Francesco Di Nocera, Giorgia Tempestini. Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach
257 -- 275Abdulghafour Mohammad, Sergio Vargas, Pavel Cermák. Using Blockchain for Data Collection in the Automotive Industry Sector: A Literature Review
276 -- 291Hannes Salin, Martin Lundgren. Towards Agile Cybersecurity Risk Management for Autonomous Software Engineering Teams
292 -- 310Caspar Schwarz-Schilling, Sheng-Nan Li, Claudio J. Tessone. Stochastic Modelling of Selfish Mining in Proof-of-Work Protocols
311 -- 328Niusen Chen, Bo Chen. Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration
329 -- 357Faiza Tazi, Sunny Shrestha, Junibel De La Cruz, Sanchari Das. SoK: An Evaluation of the Secure End User Experience on the Dark Net through Systematic Literature Review
358 -- 378Haozhe Zhou, Amin Milani Fard, Adetokunbo Makanju. The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support
379 -- 401Griffith Russell McRee. Improved Detection and Response via Optimized Alerts: Usability Study
402 -- 417Michel Walrave, Joris Van Ouytsel, Kay Diederen, Koen Ponnet. Checked and Approved? Human Resources Managers' Uses of Social Media for Cybervetting
418 -- 443Kimia Ameri, Michael Hempel, Hamid Sharif, Juan Lopez Jr., Kalyan Perumalla. An Accuracy-Maximization Approach for Claims Classifiers in Document Content Analytics for Cybersecurity

Volume 2, Issue 1

1 -- 18Thilini B. G. Herath, Prashant Khanna, Monjur Ahmed. Cybersecurity Practices for Social Media Users: A Systematic Literature Review
19 -- 0. Acknowledgment to Reviewers of Journal of Cybersecurity and Privacy in 2021
20 -- 41Tor Onshus, Lars Bodsberg, Stein Hauge, Martin Gilje Jaatun, Mary Ann Lundteigen, Thor Myklebust, Maria Vatshaug Ottermo, Stig Petersen, Egil Wille. Security and Independence of Process Safety and Control Systems in the Petroleum Industry
42 -- 64Nadine Kashmar, Mehdi Adda, Hussein Ibrahim. HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New Opportunities
65 -- 74Lili Nemec Zlatolas, Natasa Feher, Marko Hölbl. Security Perception of IoT Devices in Smart Homes
74 -- 88Harry Owen, Javad Zarrin, Shahrzad M. Pour. A Survey on Botnets, Issues, Threats, Methods, Detection and Prevention
89 -- 106Maryam Taeb, Hongmei Chi. Comparison of Deepfake Detection Techniques through Deep Learning
107 -- 123Abdulghafour Mohammad. Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review
124 -- 152Philokypros P. Ioulianou, Vassilios G. Vassilakis, Siamak F. Shahandashti. A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks
154 -- 190Andrew McCarthy, Essam Ghadafi, Panagiotis Andriotis, Phil Legg. Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey
191 -- 219Laura Genga, Luca Allodi, Nicola Zannone. Association Rule Mining Meets Regression Analysis: An Automated Approach to Unveil Systematic Biases in Decision-Making Processes