Journal: J. Cybersecur. Priv.

Volume 4, Issue 4

777 -- 793Samir Achraf Chamkar, Yassine Maleh, Noreddine Gherabi. Security Operations Centers: Use Case Best Practices, Coverage, and Gap Analysis Based on MITRE Adversarial Tactics, Techniques, and Common Knowledge
794 -- 804Justin Foreman, Willie L. Waters, Charles A. Kamhoua, Ahmed H. Anwar, Jaime C. Acosta, Blessing C. Dike. Detection of Hacker Intention Using Deep Packet Inspection
805 -- 822Caleb Rother, Bo Chen 0028. Reversing File Access Control Using Disk Forensics on Low-Level Flash Memory
823 -- 852Sara Abbaspour Asadollah, Shamoona Imtiaz, Alireza Dehlaghi-Ghadim, Mikael Sjödin, Marjan Sirjani. Enhancing Cybersecurity through Comprehensive Investigation of Data Flow-Based Attack Scenarios
853 -- 908Khalid Bennouk, Nawal Ait Aali, Younès El Bouzekri El Idrissi, Bechir Sebai, Abou Zakaria Faroukhi, Dorra Mahouachi. A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies
909 -- 0Abdullah Alrubaiq, Talal Alharbi 0002. RETRACTED: Alrubaiq, A.; Alharbi, T. Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia. J. Cybersecur. Priv. 2021, 1, 302-318
910 -- 937Van Joshua Abergos, Faiza Medjek. A Risk Assessment Analysis to Enhance the Security of OT WAN with SD-WAN
938 -- 950Emil Eminov, Stephen V. Flowerday. Suspicious Financial Activity in the Context of In-Game Asset Exchange Marketplace
951 -- 971Cristian Agredo, Tor J. Langehaug, Scott R. Graham. Inferring TLB Configuration with Performance Tools
972 -- 992Ioannis Vourganas, Anna Lito Michala. Applications of Machine Learning in Cyber Security: A Review
993 -- 1017Prudence M. Mavhemwa, Marco Zennaro, Philibert Nsengiyumva, Frederic Nzanywayingoma. An Android-Based Internet of Medical Things Adaptive User Authentication and Authorization Model for the Elderly
1018 -- 1043Swatisipra Das, Rojalina Priyadarshini, Minati Mishra, Rabindra Kumar Barik. Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study

Volume 4, Issue 3

388 -- 409Jack Laurie Tilbury, Stephen Flowerday. Humans and Automation: Augmenting Security Operation Centers
410 -- 448Paolo Modesti, Lewis Golightly, Louis Holmes, Chidimma Opara, Marco Moscini. Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking Tools
449 -- 467Mamadou Kasse, Rodolphe Charrier, Alexandre Berred, Cyrille Bertelle, Christophe Delpierre. An Approach for Anomaly Detection in Network Communications Using k-Path Analysis
468 -- 493Abdelouadoud Stambouli, Luigi Logrippo. Implementation of a Partial-Order Data Security Model for the Internet of Things (IoT) Using Software-Defined Networking (SDN)
494 -- 517Eduardo Pina, José Ramos, Henrique Jorge, Paulo Váz, José Silva, Cristina Wanzeller, Maryam Abbasi, Pedro Martins 0003. Data Privacy and Ethical Considerations in Database Management
518 -- 545Charalampos Bratsas, Efstathios Konstantinos Anastasiadis, Alexandros K. Angelidis, Lazaros Ioannidis, Rigas Kotsakis, Stefanos Ougiaroglou. Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review
546 -- 571Jack Kolenbrander, Ethan Husmann, Christopher Henshaw, Elliott Rheault, Madison G. Boswell, Alan J. Michaels. Use & Abuse of Personal Information, Part II: Robust Generation of Fake IDs for Privacy Experimentation
572 -- 593Elliott Rheault, Mary Nerayo, Jaden Leonard, Jack Kolenbrander, Christopher Henshaw, Madison G. Boswell, Alan J. Michaels. Use and Abuse of Personal Information, Part I: Design of a Scalable OSINT Collection Engine
594 -- 614Christopher R. Sears, Daniel R. Cunningham. Individual Differences in Psychological Stress Associated with Data Breach Experiences
615 -- 628Alan Mills, Jonathan White, Phil Legg. GoibhniUWE: A Lightweight and Modular Container-Based Cyber Range
629 -- 649Antonio Francesco Gentile, Davide Macrì, Emilio Greco, Peppino Fazio. IoT IP Overlay Network Security Performance Analysis with Open Source Infrastructure Deployment
650 -- 662Chatphat Titiakarawongse, Sasiyaporn Taksin, Jidapa Ruangsawat, Kunthida Deeduangpan, Sirapat Boonkrong. Comparative Vulnerability Analysis of Thai and Non-Thai Mobile Banking Applications
663 -- 677A. M. Mahmud Chowdhury, Md Jahangir Alam Khondkar, Masudul Haider Imtiaz. Advancements in Synthetic Generation of Contactless Palmprint Biometrics Using StyleGAN Models
678 -- 730Fahad Alotaibi, Ramesh K. Karne, Alexander L. Wijesinha, Nirmala Soundararajan, Abhishek Rangi. An Evaluation of the Security of Bare Machine Computing (BMC) Systems against Cybersecurity Attacks
731 -- 761Zlatan Moric, Vedran Dakic, Daniela Djekic, Damir Regvart. Protection of Personal Data in the Context of E-Commerce
762 -- 776Erik William Tomlinson, Wolday Abrha, Seong Dae Kim, Salvador A. Ortega. Cybersecurity Access Control: Framework Analysis in a Healthcare Institution

Volume 4, Issue 2

153 -- 166Anthony J. Rose, Scott R. Graham, Christine M. Schubert Kabban, Jacob J. Krasnov, Wayne C. Henry. ScriptBlock Smuggling: Uncovering Stealthy Evasion Techniques in PowerShell and .NET Environments
167 -- 195Jan Domnik, Alexander Holland 0003. On Data Leakage Prevention Maturity: Adapting the C2M2 Framework
196 -- 222Ratna Halder, Dipanjan Das Roy, Dongwan Shin. A Blockchain-Based Decentralized Public Key Infrastructure Using the Web of Trust
223 -- 240Arslan Munir, Alexander J. Aved, Khanh Pham, Joonho Kong. Trustworthiness of Situational Awareness: Significance and Quantification
241 -- 263Eric Muhati, Danda B. Rawat. Data-Driven Network Anomaly Detection with Cyber Attack and Defense Visualization
264 -- 277Avi Shaked. Facilitating the Integrative Use of Security Knowledge Bases within a Modelling Environment
278 -- 297Tunde Oduguwa, Abdullahi Arabo. Passwordless Authentication Using a Combination of Cryptography, Steganography, and Biometrics
298 -- 323Pankajeshwara Sharma, Michael Govorov, Michael Martin. A Usable Encryption Solution for File-Based Geospatial Data within a Database File System
324 -- 339Stanislav Abaimov. Understanding and Classifying Permanent Denial-of-Service Attacks
340 -- 356Pete Burnap, Eirini Anthi, Philipp Reinecke, Lowri Williams, Fengnian Cao, Rakan Aldmour, Kevin Jones. Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals
357 -- 381Habib El Amin, Abed Ellatif Samhat, Maroun Chamoun, Lina Oueidat, Antoine Feghali. An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure
382 -- 387Feng Wang 0017, Yongning Tang. Diverse Intrusion and Malware Detection: AI-Based and Non-AI-Based Solutions

Volume 4, Issue 1

1 -- 22Christian DeLozier. How Close Is Existing C/C++ Code to a Safe Subset?
23 -- 40Mohamad Saalim Wani, Michael Rademacher, Thorsten Horstmann, Mathias Kretschmer. Security Vulnerabilities in 5G Non-Stand-Alone Networks: A Systematic Analysis and Attack Taxonomy
41 -- 54Anthony Overmars, Sitalakshmi Venkatraman. Continued Fractions Applied to the One Line Factoring Algorithm for Breaking RSA
55 -- 75Elias Seid, Oliver Popov, Fredrik Blix. Security Attack Behavioural Pattern Analysis for Critical Service Providers
76 -- 104Ioannis Paspatis, Aggeliki Tsohou. Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement
105 -- 125Stefan Kutschera, Wolfgang Slany, Patrick Ratschiller, Sarina Gursch, Patrick Deininger, Håvard D. Johansen. Incidental Data: A Survey towards Awareness on Privacy-Compromising Data Incidentally Shared on Social Media
126 -- 152Yousef Alghamdi, Arslan Munir. Image Encryption Algorithms: A Survey of Design and Evaluation Metrics