You are currently viewing a new version of our website. To view the old version click .
  • Tracked forImpact Factor
  • 9.1CiteScore
  • 25 daysTime to First Decision

Journal of Cybersecurity and Privacy, Volume 1, Issue 2

June 2021 - 9 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (9)

  • Article
  • Open Access
3 Citations
8,374 Views
22 Pages

Water CIs are exposed to a wide number of IT challenges that go from the cooperation and alignment between physical and cyber security teams to the proliferation of new vulnerabilities and complex cyber-attacks with potential disastrous consequences....

  • Article
  • Open Access
7 Citations
7,503 Views
25 Pages

Along with the use of cloud-based services, infrastructure, and storage, the use of application logs in business critical applications is a standard practice. Application logs must be stored in an accessible manner in order to be used whenever needed...

  • Article
  • Open Access
14 Citations
11,244 Views
21 Pages

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scr...

  • Article
  • Open Access
24 Citations
8,983 Views
17 Pages

The evolution of information systems has escalated significantly within the last decade as research unveils new concepts. The general orientation to provide solutions to complex problems continues to inspire innovation and new advancements. Cybersecu...

  • Article
  • Open Access
2 Citations
4,933 Views
13 Pages

Model for Quantifying the Quality of Secure Service

  • Paul M. Simon,
  • Scott Graham,
  • Christopher Talbot and
  • Micah Hayden

Although not common today, communications networks could adjust security postures based on changing mission security requirements, environmental conditions, or adversarial capability, through the coordinated use of multiple channels. This will requir...

  • Review
  • Open Access
6 Citations
10,302 Views
15 Pages

Since several years, the overall awareness for the necessity to consider a vehicle as a potentially vulnerable system is facing accelerated growth. In 2015, the safety relevant exploitability of vulnerabilities through cyber attacks was exposed to a...

  • Article
  • Open Access
58 Citations
11,191 Views
22 Pages

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

  • Pavlos Papadopoulos,
  • Oliver Thornewill von Essen,
  • Nikolaos Pitropakis,
  • Christos Chrysoulas,
  • Alexios Mylonas and
  • William J. Buchanan

23 April 2021

As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven Internet of Things market where security is an afterthought. Traditional defe...

  • Communication
  • Open Access
30 Citations
10,268 Views
13 Pages

Marine Network Protocols and Security Risks

  • Ky Tran,
  • Sid Keene,
  • Erik Fretheim and
  • Michail Tsikerdekis

14 April 2021

Marine network protocols are domain-specific network protocols that aim to incorporate particular features within the specialized marine context that devices are implemented in. Devices implemented in such vessels involve critical equipment; however,...

  • Article
  • Open Access
58 Citations
26,858 Views
20 Pages

Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal

  • Mário Antunes,
  • Marisa Maximiano,
  • Ricardo Gomes and
  • Daniel Pinto

Information security plays a key role in enterprises management, as it deals with the confidentiality, privacy, integrity, and availability of one of their most valuable resources: data and information. Small and Medium-sized enterprises (SME) are se...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X