You are currently on the new version of our website. Access the old version .
  • Tracked for
    Impact Factor
  • 9.1
    CiteScore
  • 22 days
    Time to First Decision

Journal of Cybersecurity and Privacy, Volume 1, Issue 4

2021 December - 13 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (13)

  • Article
  • Open Access
12 Citations
20,848 Views
29 Pages

16 December 2021

Over the last two decades, we have witnessed a fundamental transformation of the advertising industry, which has been steadily moving away from the traditional advertising mediums, such as television or direct marketing, towards digital-centric and i...

  • Article
  • Open Access
2 Citations
4,660 Views
11 Pages

15 December 2021

Rarely are communications networks point-to-point. In most cases, transceiver relay stations exist between transmitter and receiver end-points. These relay stations, while essential for controlling cost and adding flexibility to network architectures...

  • Article
  • Open Access
13 Citations
8,775 Views
26 Pages

Polymorphic Adversarial Cyberattacks Using WGAN

  • Ravi Chauhan,
  • Ulya Sabeel,
  • Alireza Izaddoost and
  • Shahram Shah Heydari

12 December 2021

Intrusion Detection Systems (IDS) are essential components in preventing malicious traffic from penetrating networks and systems. Recently, these systems have been enhancing their detection ability using machine learning algorithms. This development...

  • Article
  • Open Access
23 Citations
9,824 Views
24 Pages

3 December 2021

Smartphone user authentication based on passwords, PINs, and touch patterns raises several security concerns. Behavioral Biometrics Continuous Authentication (BBCA) technologies provide a promising solution which can increase smartphone security and...

  • Article
  • Open Access
3 Citations
6,348 Views
39 Pages

30 November 2021

The evolution of mobile technology has increased correspondingly with the number of attacks on mobile devices. Malware attack on mobile devices is one of the top security challenges the mobile community faces daily. While malware classification and d...

  • Article
  • Open Access
5 Citations
8,261 Views
29 Pages

The Effect of Countermeasure Readability on Security Intentions

  • Tim Smit,
  • Max van Haastrecht and
  • Marco Spruit

19 November 2021

Human failure is a primary contributor to successful cyber attacks. For any cybersecurity initiative, it is therefore vital to motivate individuals to implement secure behavior. Research using protection motivation theory (PMT) has given insights int...

  • Article
  • Open Access
12 Citations
9,874 Views
15 Pages

12 November 2021

Semi-prime factorization is an increasingly important number theoretic problem, since it is computationally intractable. Further, this property has been applied in public-key cryptography, such as the Rivest–Shamir–Adleman (RSA) encryption systems fo...

  • Review
  • Open Access
24 Citations
22,503 Views
22 Pages

11 November 2021

This paper focuses on understanding the characteristics of multiple types of cyber-attacks through a comprehensive evaluation of case studies of real-world cyber-attacks. For each type of attack, we identify and link the attack type to the characteri...

  • Article
  • Open Access
72 Citations
15,774 Views
23 Pages

CyBERT: Cybersecurity Claim Classification by Fine-Tuning the BERT Language Model

  • Kimia Ameri,
  • Michael Hempel,
  • Hamid Sharif,
  • Juan Lopez Jr. and
  • Kalyan Perumalla

4 November 2021

We introduce CyBERT, a cybersecurity feature claims classifier based on bidirectional encoder representations from transformers and a key component in our semi-automated cybersecurity vetting for industrial control systems (ICS). To train CyBERT, we...

  • Article
  • Open Access
12 Citations
7,892 Views
18 Pages

14 October 2021

Contact tracing applications have flooded the marketplace, as governments worldwide have been working to release apps for their citizens. These apps use a variety of protocols to perform contact tracing, resulting in widely differing security and pri...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X