You are currently viewing a new version of our website. To view the old version click .
  • Tracked forImpact Factor
  • 9.1CiteScore
  • 25 daysTime to First Decision

Journal of Cybersecurity and Privacy, Volume 2, Issue 1

March 2022 - 11 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (11)

  • Feature Paper
  • Article
  • Open Access
4 Citations
7,634 Views
29 Pages

21 March 2022

Decisional processes are at the basis of most businesses in several application domains. However, they are often not fully transparent and can be affected by human or algorithmic biases that may lead to systematically incorrect or unfair outcomes. In...

  • Article
  • Open Access
56 Citations
12,016 Views
37 Pages

17 March 2022

Machine learning has become widely adopted as a strategy for dealing with a variety of cybersecurity issues, ranging from insider threat detection to intrusion and malware detection. However, by their very nature, machine learning systems can introdu...

  • Article
  • Open Access
39 Citations
7,262 Views
30 Pages

A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks

  • Philokypros P. Ioulianou,
  • Vassilios G. Vassilakis and
  • Siamak F. Shahandashti

Routing attacks are a major security issue for Internet of Things (IoT) networks utilising routing protocols, as malicious actors can overwhelm resource-constrained devices with denial-of-service (DoS) attacks, notably rank and blackhole attacks. In...

  • Review
  • Open Access
3 Citations
7,021 Views
17 Pages

As the functionality and services provided by cloud computing increase, control access to these services becomes more complex, and more security breaches are generated. This is mainly based on the emergence of new requirements and constraints in the...

  • Article
  • Open Access
82 Citations
37,857 Views
18 Pages

Deepfakes are realistic-looking fake media generated by deep-learning algorithms that iterate through large datasets until they have learned how to solve the given problem (i.e., swap faces or objects in video and digital content). The massive genera...

  • Article
  • Open Access
26 Citations
10,558 Views
15 Pages

28 February 2022

Botnets have become increasingly common and progressively dangerous to both business and domestic networks alike. Due to the Covid-19 pandemic, a large quantity of the population has been performing corporate activities from their homes. This leads t...

  • Article
  • Open Access
26 Citations
11,768 Views
9 Pages

Security Perception of IoT Devices in Smart Homes

  • Lili Nemec Zlatolas,
  • Nataša Feher and
  • Marko Hölbl

14 February 2022

IoT devices are used frequently in smart homes. To better understand how users perceive the security of IoT devices in their smart homes, a model was developed and tested with multiple linear regression. A total of 306 participants participated in th...

  • Article
  • Open Access
2 Citations
6,695 Views
23 Pages

14 February 2022

Access control (AC) policies are a set of rules administering decisions in systems and they are increasingly used for implementing flexible and adaptive systems to control access in today’s internet services, networks, security systems, and oth...

  • Article
  • Open Access
8 Citations
9,786 Views
22 Pages

Security and Independence of Process Safety and Control Systems in the Petroleum Industry

  • Tor Onshus,
  • Lars Bodsberg,
  • Stein Hauge,
  • Martin Gilje Jaatun,
  • Mary Ann Lundteigen,
  • Thor Myklebust,
  • Maria Vatshaug Ottermo,
  • Stig Petersen and
  • Egil Wille

12 February 2022

The developments of reduced manning on offshore facilities and increased information transfer from offshore to land continue and may also be a prerequisite for the future survival of the oil and gas industry. A general requirement from the operators...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800XCreative Common CC BY license