-
1
SMARTEN—A Sample-Based Approach towards Privacy-Friendly Data Refinement
Published 2022-08-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
2
CLAP: A Cross-Layer Analytic Platform for the Correlation of Cyber and Physical Security Events Affecting Water Critical Infrastructures
Published 2021-06-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
3
Addressing Human Factors in Cybersecurity Leadership
Published 2022-07-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
4
Tor Hidden Services: A Systematic Literature Review
Published 2021-09-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
5
Towards a Near-Real-Time Protocol Tunneling Detector Based on Machine Learning Techniques
Published 2023-11-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
6
Bingo: A Semi-Centralized Password Storage System
Published 2022-06-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
7
Secure Remote Storage of Logs with Search Capabilities
Published 2021-06-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
8
HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New Opportunities
Published 2022-02-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
9
A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context
Published 2021-07-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
10
A Deep Learning Approach for Network Intrusion Detection Using a Small Features Vector
Published 2023-08-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
11
Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review
Published 2023-09-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
12
Towards Agile Cybersecurity Risk Management for Autonomous Software Engineering Teams
Published 2022-04-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
13
MOCA: A Network Intrusion Monitoring and Classification System
Published 2022-08-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
14
Mitigating IoT Privacy-Revealing Features by Time Series Data Transformation
Published 2023-05-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
15
Generic Patterns for Intrusion Detection Systems in Service-Oriented Automotive and Medical Architectures
Published 2022-09-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
16
Model for Quantifying the Quality of Secure Service
Published 2021-05-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
17
How Close Is Existing C/C++ Code to a Safe Subset?
Published 2023-12-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
18
Water-Tight IoT–Just Add Security
Published 2023-03-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
19
Potential of Homomorphic Encryption for Cloud Computing Use Cases in Manufacturing
Published 2023-02-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article -
20
Automotive Vulnerability Disclosure: Stakeholders, Opportunities, Challenges
Published 2021-05-01“…Journal of Cybersecurity and Privacy…”
Get full text
Article