You are currently on the new version of our website. Access the old version .
  • Tracked for
    Impact Factor
  • 9.1
    CiteScore
  • 22 days
    Time to First Decision

Journal of Cybersecurity and Privacy, Volume 1, Issue 3

September 2021 - 6 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (6)

  • Review
  • Open Access
35 Citations
16,153 Views
21 Pages

Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity

  • Fabian Böhm,
  • Marietheres Dietz,
  • Tobias Preindl and
  • Günther Pernul

9 September 2021

The rapid advancements of technology related to the Internet of Things and Cyber-Physical Systems mark an ongoing industrial revolution. Digital Twins and Augmented Reality play a significant role in this technological advancement. They are highly co...

  • Article
  • Open Access
15 Citations
25,311 Views
23 Pages

Tor Hidden Services: A Systematic Literature Review

  • Diana L. Huete Trujillo and
  • Antonio Ruiz-Martínez

8 September 2021

Anonymous communications networks were created to protect the privacy of communications, preventing censorship and traffic analysis. The most famous anonymous communication network is Tor. This anonymous communication network provides some interestin...

  • Feature Paper
  • Review
  • Open Access
23 Citations
11,469 Views
26 Pages

Biometric Systems De-Identification: Current Advancements and Future Directions

  • Md Shopon,
  • Sanjida Nasreen Tumpa,
  • Yajurv Bhatia,
  • K. N. Pavan Kumar and
  • Marina L. Gavrilova

31 August 2021

Biometric de-identification is an emerging topic of research within the information security domain that integrates privacy considerations with biometric system development. A comprehensive overview of research in the context of authentication applic...

  • Article
  • Open Access
8 Citations
7,636 Views
17 Pages

12 August 2021

In some wireless networks Received Signal Strength Indicator (RSSI) based device profiling may be the only viable approach to combating MAC-layer spoofing attacks, while in others it can be used as a valuable complement to the existing defenses. Unfo...

  • Article
  • Open Access
9 Citations
7,858 Views
31 Pages

A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context

  • Romain Laborde,
  • Sravani Teja Bulusu,
  • Ahmad Samer Wazan,
  • Arnaud Oglaza and
  • Abdelmalek Benzekri

An effective network security requirement engineering is needed to help organizations in capturing cost-effective security solutions that protect networks against malicious attacks while meeting the business requirements. The diversity of currently a...

  • Article
  • Open Access
51 Citations
92,329 Views
35 Pages

Advanced persistent threats pose a significant challenge for blue teams as they apply various attacks over prolonged periods, impeding event correlation and their detection. In this work, we leverage various diverse attack scenarios to assess the eff...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X