ReMouse Dataset: On the Efficacy of Measuring the Similarity of Human-Generated Trajectories for the Detection of Session-Replay Bots
(Login to Download)
Water-Tight IoT–Just Add Security
(Login to Download)
The Cybersecurity Awareness INventory (CAIN): Early Phases of Development of a Tool for Assessing Cybersecurity Knowledge Based on the ISO/IEC 27032
(Login to Download)
Potential of Homomorphic Encryption for Cloud Computing Use Cases in Manufacturing
(Login to Download)
The Privacy Flag Observatory: A Crowdsourcing Tool for Real Time Privacy Threats Evaluation
(Login to Download)
Acknowledgment to the Reviewers of Journal of Cybersecurity and Privacy in 2022
(Login to Download)
An Investigation to Detect Banking Malware Network Communication Traffic Using Machine Learning Techniques
(Login to Download)
Modeling Intruder Reconnaissance Behavior through State Diagrams to Support Defensive Deception
(Login to Download)
A Lesson for the Future: Will You Let Me Violate Your Privacy to Save Your Life?
(Login to Download)
Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication
(Login to Download)
Mitigating IoT Privacy-Revealing Features by Time Series Data Transformation
(Login to Download)
Cybersecurity in a Large-Scale Research Facility—One Institution’s Approach
(Login to Download)
Cybersecurity for AI Systems: A Survey
(Login to Download)
Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS
(Login to Download)
Characterizing the Impact of Data-Damaged Models on Generalization Strength in Intrusion Detection
(Login to Download)
Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review
(Login to Download)
Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures—A Perspective on the Greek Landscape
(Login to Download)
A Gap Analysis of the Adoption Maturity of Certificateless Cryptography in Cooperative Intelligent Transportation Systems
(Login to Download)
Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review
(Login to Download)
Hybrid Machine Learning-Based Approaches for Feature and Overfitting Reduction to Model Intrusion Patterns
(Login to Download)
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
(Login to Download)
Deploying Secure Distributed Systems: Comparative Analysis of GNS3 and SEED Internet Emulator
(Login to Download)
A Deep Learning Approach for Network Intrusion Detection Using a Small Features Vector
(Login to Download)
Hourly Network Anomaly Detection on HTTP Using Exponential Random Graph Models and Autoregressive Moving Average
(Login to Download)
Post-Quantum Authentication in the MQTT Protocol
(Login to Download)
How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors
(Login to Download)
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics
(Login to Download)
Power-Based Side-Channel Attacks on Program Control Flow with Machine Learning Models
(Login to Download)
A Dynamic and Adaptive Cybersecurity Governance Framework
(Login to Download)
Assessing the Security and Privacy of Baby Monitor Apps
(Login to Download)
Anomaly Detection for Modbus over TCP in Control Systems Using Entropy and Classification-Based Analysis
(Login to Download)
Evaluating Cluster-Based Synthetic Data Generation for Blood-Transfusion Analysis
(Login to Download)
Machine Learning Detection of Cloud Services Abuse as C&C Infrastructure
(Login to Download)
Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis
(Login to Download)
A Hybrid Dimensionality Reduction for Network Intrusion Detection
(Login to Download)
D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities
(Login to Download)
Towards a Near-Real-Time Protocol Tunneling Detector Based on Machine Learning Techniques
(Login to Download)
Security in Cloud-Native Services: A Survey
(Login to Download)
A Framework for Synthetic Agetech Attack Data Generation
(Login to Download)
Studying Imbalanced Learning for Anomaly-Based Intelligent IDS for Mission-Critical Internet of Things
(Login to Download)
Cyberattacks in Smart Grids: Challenges and Solving the Multi-Criteria Decision-Making for Cybersecurity Options, Including Ones That Incorporate Artificial Intelligence, Using an Analytical Hierarchy Process
(Login to Download)