Association Rule Mining Meets Regression Analysis: An Automated Approach to Unveil Systematic Biases in Decision-Making Processes
(Login to Download)
Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey
(Login to Download)
A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks
(Login to Download)
Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review
(Login to Download)
Comparison of Deepfake Detection Techniques through Deep Learning
(Login to Download)
A Survey on Botnets, Issues, Threats, Methods, Detection and Prevention
(Login to Download)
Security Perception of IoT Devices in Smart Homes
(Login to Download)
HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New Opportunities
(Login to Download)
Security and Independence of Process Safety and Control Systems in the Petroleum Industry
(Login to Download)
Acknowledgment to Reviewers of Journal of Cybersecurity and Privacy in 2021
(Login to Download)
Cybersecurity Practices for Social Media Users: A Systematic Literature Review
(Login to Download)
An Accuracy-Maximization Approach for Claims Classifiers in Document Content Analytics for Cybersecurity
(Login to Download)
Checked and Approved? Human Resources Managers’ Uses of Social Media for Cybervetting
(Login to Download)
Improved Detection and Response via Optimized Alerts: Usability Study
(Login to Download)
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support
(Login to Download)
SoK: An Evaluation of the Secure End User Experience on the Dark Net through Systematic Literature Review
(Login to Download)
Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration
(Login to Download)
Stochastic Modelling of Selfish Mining in Proof-of-Work Protocols
(Login to Download)
Towards Agile Cybersecurity Risk Management for Autonomous Software Engineering Teams
(Login to Download)
Using Blockchain for Data Collection in the Automotive Industry Sector: A Literature Review
(Login to Download)
Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach
(Login to Download)
Unsupervised Machine Learning Techniques for Detecting PLC Process Control Anomalies
(Login to Download)
Exploratory Study on Kali NetHunter Lite: A Digital Forensics Approach
(Login to Download)
Generic Patterns for Intrusion Detection Systems in Service-Oriented Automotive and Medical Architectures
(Login to Download)
Contactless Fingerprint Recognition Using Deep Learning—A Systematic Review
(Login to Download)
Exploiting Online Services to Enable Anonymous and Confidential Messaging
(Login to Download)
A Synopsis of “The Impact of Motivation, Price, and Habit on Intention to Use IoT-Enabled Technology: A Correlational Study”
(Login to Download)
Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis
(Login to Download)
MOCA: A Network Intrusion Monitoring and Classification System
(Login to Download)
SMARTEN—A Sample-Based Approach towards Privacy-Friendly Data Refinement
(Login to Download)
Developing Security Assurance Metrics to Support Quantitative Security Assurance Evaluation
(Login to Download)
Addressing Human Factors in Cybersecurity Leadership
(Login to Download)
The Evolution of Volatile Memory Forensics
(Login to Download)
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
(Login to Download)
Requirements for Crafting Virtual Network Packet Captures
(Login to Download)
Work Experience as a Factor in Cyber-Security Risk Awareness: A Survey Study with University Students
(Login to Download)
A Game or Notes? The Use of a Customized Mobile Game to Improve Teenagers’ Phishing Knowledge, Case of Tanzania
(Login to Download)
Bingo: A Semi-Centralized Password Storage System
(Login to Download)
User Reputation on E-Commerce: Blockchain-Based Approaches
(Login to Download)
An Understanding of the Vulnerability of Datasets to Disparate Membership Inference Attacks
(Login to Download)
Differentially Private Block Coordinate Descent for Linear Regression on Vertically Partitioned Data
(Login to Download)
Cybersecurity in Hospitals: An Evaluation Model
(Login to Download)
Calibrating the Attack to Sensitivity in Differentially Private Mechanisms
(Login to Download)
A Survey of the Recent Trends in Deep Learning Based Malware Detection
(Login to Download)
A Distributed Model for Privacy Preserving V2I Communication with Strong Unframeability and Efficient Revocation
(Login to Download)
Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review
(Login to Download)