Skip Content
You are currently on the new version of our website. Access the old version .
  • Tracked for
    Impact Factor
  • 9.1
    CiteScore
  • 22 days
    Time to First Decision

Journal of Cybersecurity and Privacy, Volume 2, Issue 4

2022 December - 8 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (8)

  • Review
  • Open Access
9 Citations
5,232 Views
17 Pages

User Reputation on E-Commerce: Blockchain-Based Approaches

  • Maria José Angélico Gonçalves,
  • Rui Humberto Pereira and
  • Marta Alexandra Guerra Magalhães Coelho

19 December 2022

User trust is a fundamental issue in e-commerce. To address this problem, recommendation systems have been widely used in different application domains including social media healthcare, e-commerce, and others. In this paper, we present a systematic...

  • Article
  • Open Access
2 Citations
4,120 Views
25 Pages

14 December 2022

Recent efforts have shown that training data is not secured through the generalization and abstraction of algorithms. This vulnerability to the training data has been expressed through membership inference attacks that seek to discover the use of spe...

  • Article
  • Open Access
2,667 Views
20 Pages

9 November 2022

We present a differentially private extension of the block coordinate descent algorithm by means of objective perturbation. The algorithm iteratively performs linear regression in a federated setting on vertically partitioned data. In addition to a p...

  • Article
  • Open Access
12 Citations
8,317 Views
9 Pages

Cybersecurity in Hospitals: An Evaluation Model

  • Mohammed A. Ahmed,
  • Hatem F. Sindi and
  • Majid Nour

26 October 2022

Hospitals have been historically known for their strong risk mitigation policies and designs, which are not becoming easier or simpler to plan and operate. Currently, new technologies and devices are developed every day in the medical industry. These...

  • Article
  • Open Access
3 Citations
3,151 Views
23 Pages

18 October 2022

This work studies the power of adversarial attacks against machine learning algorithms that use differentially private mechanisms as their weapon. In our setting, the adversary aims to modify the content of a statistical dataset via insertion of addi...

  • Review
  • Open Access
81 Citations
21,617 Views
30 Pages

A Survey of the Recent Trends in Deep Learning Based Malware Detection

  • Umm-e-Hani Tayyab,
  • Faiza Babar Khan,
  • Muhammad Hanif Durad,
  • Asifullah Khan and
  • Yeon Soo Lee

28 September 2022

Monitoring Indicators of Compromise (IOC) leads to malware detection for identifying malicious activity. Malicious activities potentially lead to a system breach or data compromise. Various tools and anti-malware products exist for the detection of m...

  • Article
  • Open Access
4 Citations
10,364 Views
22 Pages

20 September 2022

Although Vehicle to Infrastructure (V2I) communications greatly improve the efficiency of early warning systems for car safety, communication privacy is an important concern. Although solutions exist in the literature for privacy preserving VANET com...

  • Article
  • Open Access
81 Citations
31,781 Views
14 Pages

20 September 2022

An SQL injection attack, usually occur when the attacker(s) modify, delete, read, and copy data from database servers and are among the most damaging of web application attacks. A successful SQL injection attack can affect all aspects of security, in...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X