Skip to Content
  • Tracked for
    Impact Factor
  • 9.1
    CiteScore
  • 22 days
    Time to First Decision

Journal of Cybersecurity and Privacy, Volume 3, Issue 3

2023 September - 15 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (15)

  • Review
  • Open Access
26 Citations
7,440 Views
24 Pages

11 September 2023

Anonymization techniques are widely used to make personal data broadly available for analytics/data-mining purposes while preserving the privacy of the personal information enclosed in it. In the past decades, a substantial number of anonymization te...

  • Article
  • Open Access
18 Citations
21,194 Views
28 Pages

2 September 2023

Business Email Compromise (BEC) attacks have emerged as serious threats to organizations in recent years, exploiting social engineering and malware to dupe victims into divulging confidential information and executing fraudulent transactions. This pa...

  • Article
  • Open Access
3 Citations
3,516 Views
19 Pages

1 September 2023

Cooperative Intelligent Transport Systems (C-ITSs) are an important development for society. C-ITSs enhance road safety, improve traffic efficiency, and promote sustainable transportation through interconnected and intelligent communication between v...

  • Systematic Review
  • Open Access
14 Citations
10,567 Views
33 Pages

Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review

  • Turki Al lelah,
  • George Theodorakopoulos,
  • Philipp Reinecke,
  • Amir Javed and
  • Eirini Anthi

1 September 2023

The widespread adoption of cloud-based and public legitimate services (CPLS) has inadvertently opened up new avenues for cyber attackers to establish covert and resilient command-and-control (C&C) communication channels. This abuse poses a signif...

  • Article
  • Open Access
5 Citations
3,032 Views
14 Pages

25 August 2023

An intrusion detection system (IDS), whether as a device or software-based agent, plays a significant role in networks and systems security by continuously monitoring traffic behaviour to detect malicious activities. The literature includes IDSs that...

  • Review
  • Open Access
158 Citations
86,637 Views
51 Pages

Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions

  • Anastasios Giannaros,
  • Aristeidis Karras,
  • Leonidas Theodorakopoulos,
  • Christos Karras,
  • Panagiotis Kranias,
  • Nikolaos Schizas,
  • Gerasimos Kalogeratos and
  • Dimitrios Tsolis

5 August 2023

Autonomous vehicles (AVs), defined as vehicles capable of navigation and decision-making independent of human intervention, represent a revolutionary advancement in transportation technology. These vehicles operate by synthesizing an array of sophist...

  • Article
  • Open Access
10 Citations
6,983 Views
29 Pages

3 August 2023

Network emulation offers a flexible solution for network deployment and operations, leveraging software to consolidate all nodes in a topology and utilizing the resources of a single host system server. This research paper investigated the state of c...

  • Article
  • Open Access
17 Citations
8,638 Views
13 Pages

3 August 2023

With the growth in network usage, there has been a corresponding growth in the nefarious exploitation of this technology. A wide array of techniques is now available that can be used to deal with cyberattacks, and one of them is network intrusion det...

  • Article
  • Open Access
1 Citations
3,278 Views
16 Pages

1 August 2023

Network anomaly detection solutions can analyze a network’s data volume by protocol over time and can detect many kinds of cyberattacks such as exfiltration. We use exponential random graph models (ERGMs) in order to flatten hourly network topo...

  • Article
  • Open Access
17 Citations
4,851 Views
19 Pages

Post-Quantum Authentication in the MQTT Protocol

  • Juliet Samandari and
  • Clémentine Gritti

Message Queue Telemetry Transport (MQTT) is a common communication protocol used in the Internet of Things (IoT). MQTT is a simple, lightweight messaging protocol used to establish communication between multiple devices relying on the publish–s...

  • Article
  • Open Access
4 Citations
4,578 Views
20 Pages

Several studies have shown that the traditional way of learning is not optimal when we aim to improve ICT users’ actual privacy behaviors. In this research, we present a literature review of the theories that are followed in other fields to mod...

  • Feature Paper
  • Article
  • Open Access
2 Citations
4,401 Views
32 Pages

VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics

  • Jennifer Bellizzi,
  • Eleonora Losiouk,
  • Mauro Conti,
  • Christian Colombo and
  • Mark Vella

The ubiquity of Android smartphones makes them targets of sophisticated malware, which maintain long-term stealth, particularly by offloading attack steps to benign apps. Such malware leaves little to no trace in logs, and the attack steps become dif...

  • Article
  • Open Access
1 Citations
4,498 Views
13 Pages

Power-Based Side-Channel Attacks on Program Control Flow with Machine Learning Models

  • Andey Robins,
  • Stone Olguin,
  • Jarek Brown,
  • Clay Carper and
  • Mike Borowczak

The control flow of a program represents valuable and sensitive information; in embedded systems, this information can take on even greater value as the resources, control flow, and execution of the system have more constraints and functional implica...

  • Article
  • Open Access
39 Citations
17,684 Views
24 Pages

Cybersecurity protects cyberspace from a wide range of cyber threats to reduce overall business risk, ensure business continuity, and maximize business opportunities and return on investments. Cybersecurity is well achieved by using appropriate sets...

  • Article
  • Open Access
6 Citations
10,211 Views
24 Pages

Assessing the Security and Privacy of Baby Monitor Apps

  • Lukas Schmidt,
  • Henry Hosseini and
  • Thomas Hupperich

Emerging technologies in video monitoring solutions seriously threaten personal privacy, as current technologies hold the potential for total surveillance. These concerns apply in particular to baby monitor solutions incorporating mobile applications...

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X