You are currently viewing a new version of our website. To view the old version click .
  • Tracked forImpact Factor
  • 9.1CiteScore
  • 25 daysTime to First Decision

Journal of Cybersecurity and Privacy, Volume 2, Issue 3

September 2022 - 16 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (16)

  • Article
  • Open Access
1 Citations
10,245 Views
14 Pages

19 September 2022

Mobile devices, specifically smartphones, have become a necessity in everyday life, as we perform many essential day-to-day tasks using these devices. With the projected increase in mobile devices to 18.22 billion by 2025, the reliance on smartphones...

  • Article
  • Open Access
5 Citations
4,343 Views
19 Pages

14 September 2022

To implement new software functions and more flexible updates in the future as well as to provide cloud-based functionality, the service-oriented architecture (SOA) paradigm is increasingly being integrated into automotive electrical and electronic a...

  • Review
  • Open Access
42 Citations
17,964 Views
17 Pages

8 September 2022

Contactless fingerprint identification systems have been introduced to address the deficiencies of contact-based fingerprint systems. A number of studies have been reported regarding contactless fingerprint processing, including classical image proce...

  • Article
  • Open Access
4,155 Views
14 Pages

31 August 2022

Messaging services are usually provided within social network platforms and allow these platforms to collect additional information about users, such as what time, for how long, with whom, and where a user communicates. This information allows the id...

  • Article
  • Open Access
11 Citations
5,882 Views
38 Pages

18 August 2022

Older adults in the U.S. are interested in maintaining independence, aging at home longer, and staying active. Their substantial size, market share, and household wealth sparked the interest of investors and developers in remote monitoring, smart hom...

  • Review
  • Open Access
105 Citations
16,434 Views
22 Pages

Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis

  • Rachida Hireche,
  • Houssem Mansouri and
  • Al-Sakib Khan Pathan

17 August 2022

The Internet of Medical Things (IoMT) has become a strategic priority for future e-healthcare because of its ability to improve patient care and its scope of providing more reliable clinical data, increasing efficiency, and reducing costs. It is no w...

  • Article
  • Open Access
7 Citations
4,373 Views
11 Pages

15 August 2022

Optimizing the monitoring of network traffic features to detect abnormal traffic is critical. We propose a two-stage monitoring and classification (MOCA) system requiring fewer features to detect and classify malicious network attacks. The first stag...

  • Article
  • Open Access
3 Citations
4,235 Views
23 Pages

SMARTEN—A Sample-Based Approach towards Privacy-Friendly Data Refinement

  • Christoph Stach,
  • Michael Behringer,
  • Julia Bräcker,
  • Clémentine Gritti and
  • Bernhard Mitschang

15 August 2022

Two factors are crucial for the effective operation of modern-day smart services: Initially, IoT-enabled technologies have to capture and combine huge amounts of data on data subjects. Then, all these data have to be processed exhaustively by means o...

  • Article
  • Open Access
10 Citations
5,122 Views
19 Pages

10 August 2022

Security assurance (SA) is a technique that helps organizations to appraise the trust and confidence that a system can be operated correctly and securely. To foster effective SA, there must be systematic techniques to reflect the fact that the system...

  • Article
  • Open Access
57 Citations
25,951 Views
14 Pages

This article identifies human factors in workplaces that contribute to the challenges faced by cybersecurity leadership within organizations and discusses strategic communication, human–computer interaction, organizational factors, social envir...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X