You are currently viewing a new version of our website. To view the old version click .
  • Tracked forImpact Factor
  • 9.1CiteScore
  • 25 daysTime to First Decision

Journal of Cybersecurity and Privacy, Volume 3, Issue 2

June 2023 - 8 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (8)

  • Article
  • Open Access
3 Citations
2,728 Views
28 Pages

Active reconnaissance is the primary source of information gathering about the infrastructure of a target network for intruders. Its main functions are host discovery and port scanning, the basic techniques of which are thoroughly analyzed in the pre...

  • Article
  • Open Access
2 Citations
2,449 Views
16 Pages

COVID-19 was an unprecedented pandemic that changed the lives of everyone. To handle the virus’s rapid spread, governments and big tech companies, such as Google and Apple, implemented Contact Tracing Applications (CTAs). However, the response...

  • Review
  • Open Access
15 Citations
8,021 Views
32 Pages

Throughout the past several decades, mobile devices have evolved in capability and popularity at growing rates while improvement in security has fallen behind. As smartphones now hold mass quantities of sensitive information from millions of people a...

  • Article
  • Open Access
1 Citations
2,705 Views
18 Pages

As the Internet of Things (IoT) continues to expand, billions of IoT devices are now connected to the internet, producing vast quantities of data. Collecting and sharing this data has become crucial to improving IoT technologies and developing new ap...

  • Article
  • Open Access
7 Citations
5,038 Views
18 Pages

Cybersecurity in a Large-Scale Research Facility—One Institution’s Approach

  • David S. Butcher,
  • Christian J. Brigham,
  • James Berhalter,
  • Abigail L. Centers,
  • William M. Hunkapiller,
  • Timothy P. Murphy,
  • Eric C. Palm and
  • Julia H. Smith

A cybersecurity approach for a large-scale user facility is presented—utilizing the National High Magnetic Field Laboratory (NHMFL) at Florida State University (FSU) as an example. The NHMFL provides access to the highest magnetic fields for sc...

  • Feature Paper
  • Review
  • Open Access
18 Citations
15,041 Views
25 Pages

Cybersecurity for AI Systems: A Survey

  • Raghvinder S. Sangwan,
  • Youakim Badr and
  • Satish M. Srinivasan

Recent advances in machine learning have created an opportunity to embed artificial intelligence in software-intensive systems. These artificial intelligence systems, however, come with a new set of vulnerabilities making them potential targets for c...

  • Feature Paper
  • Article
  • Open Access
4 Citations
7,585 Views
21 Pages

Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS

  • Shinelle Hutchinson,
  • Miloš Stanković,
  • Samuel Ho,
  • Shiva Houshmand and
  • Umit Karabiyik

The emergence of the Internet of Things technologies and the increase and convenience of smart home devices have contributed to the growth of self-installed home security systems. While home security devices have become more accessible and can help u...

  • Article
  • Open Access
3 Citations
3,331 Views
27 Pages

Characterizing the Impact of Data-Damaged Models on Generalization Strength in Intrusion Detection

  • Laurens D’hooge,
  • Miel Verkerken,
  • Tim Wauters,
  • Filip De Turck and
  • Bruno Volckaert

Generalization is a longstanding assumption in articles concerning network intrusion detection through machine learning. Novel techniques are frequently proposed and validated based on the improvement they attain when classifying one or more of the e...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X