-
81
Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach
Published 2022-03-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
82
User Reputation on E-Commerce: Blockchain-Based Approaches
Published 2022-12-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
83
Calibrating the Attack to Sensitivity in Differentially Private Mechanisms
Published 2022-10-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
84
Incidental Data: A Survey towards Awareness on Privacy-Compromising Data Incidentally Shared on Social Media
Published 2024-02-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
85
The Evolution of Volatile Memory Forensics
Published 2022-07-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
86
Polymorphic Adversarial Cyberattacks Using WGAN
Published 2021-12-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
87
The Cybersecurity Awareness INventory (CAIN): Early Phases of Development of a Tool for Assessing Cybersecurity Knowledge Based on the ISO/IEC 27032
Published 2023-02-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
88
Assessing the Security and Privacy of Baby Monitor Apps
Published 2023-06-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
89
Unsupervised Machine Learning Techniques for Detecting PLC Process Control Anomalies
Published 2022-03-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
90
A Dynamic and Adaptive Cybersecurity Governance Framework
Published 2023-06-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
91
Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures—A Perspective on the Greek Landscape
Published 2023-09-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
92
Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review
Published 2022-09-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
93
Security Perception of IoT Devices in Smart Homes
Published 2022-02-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
94
Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity
Published 2021-05-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
95
A Distributed Model for Privacy Preserving V2I Communication with Strong Unframeability and Efficient Revocation
Published 2022-09-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
96
Improved Detection and Response via Optimized Alerts: Usability Study
Published 2022-05-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
97
Security Vulnerabilities in 5G Non-Stand-Alone Networks: A Systematic Analysis and Attack Taxonomy
Published 2024-01-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
98
Cybersecurity in a Large-Scale Research Facility—One Institution’s Approach
Published 2023-05-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
99
Security in Cloud-Native Services: A Survey
Published 2023-10-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
100
A Survey on Botnets, Issues, Threats, Methods, Detection and Prevention
Published 2022-02-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article