You are currently viewing a new version of our website. To view the old version click .
  • Tracked forImpact Factor
  • 9.1CiteScore
  • 25 daysTime to First Decision

Journal of Cybersecurity and Privacy, Volume 3, Issue 4

December 2023 - 11 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (11)

  • Article
  • Open Access
8 Citations
4,367 Views
19 Pages

Anomaly Detection for Modbus over TCP in Control Systems Using Entropy and Classification-Based Analysis

  • Tirthankar Ghosh,
  • Sikha Bagui,
  • Subhash Bagui,
  • Martin Kadzis and
  • Jackson Bare

1 December 2023

This article presents a statistical approach using entropy and classification-based analysis to detect anomalies in industrial control systems traffic. Several statistical techniques have been proposed to create baselines and measure deviation to det...

  • Article
  • Open Access
1 Citations
2,243 Views
13 Pages

Evaluating Cluster-Based Synthetic Data Generation for Blood-Transfusion Analysis

  • Shannon K. S. Kroes,
  • Matthijs van Leeuwen,
  • Rolf H. H. Groenwold and
  • Mart P. Janssen

1 December 2023

Synthetic data generation is becoming an increasingly popular approach to making privacy-sensitive data available for analysis. Recently, cluster-based synthetic data generation (CBSDG) has been proposed, which uses explainable and tractable techniqu...

  • Article
  • Open Access
1 Citations
3,121 Views
24 Pages

Machine Learning Detection of Cloud Services Abuse as C&C Infrastructure

  • Turki Al lelah,
  • George Theodorakopoulos,
  • Amir Javed and
  • Eirini Anthi

1 December 2023

The proliferation of cloud and public legitimate services (CLS) on a global scale has resulted in increasingly sophisticated malware attacks that abuse these services as command-and-control (C&C) communication channels. Conventional security solu...

  • Article
  • Open Access
5 Citations
2,356 Views
14 Pages

Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis

  • Clay Carper,
  • Stone Olguin,
  • Jarek Brown,
  • Caylie Charlton and
  • Mike Borowczak

29 November 2023

Power-based Side-Channel Analysis (SCA) began with visual-based examinations and has progressed to utilize data-driven statistical analysis. Two distinct classifications of these methods have emerged over the years; those focused on leakage exploitat...

  • Article
  • Open Access
5 Citations
3,595 Views
14 Pages

A Hybrid Dimensionality Reduction for Network Intrusion Detection

  • Humera Ghani,
  • Shahram Salekzamankhani and
  • Bal Virdee

16 November 2023

Due to the wide variety of network services, many different types of protocols exist, producing various packet features. Some features contain irrelevant and redundant information. The presence of such features increases computational complexity and...

  • Article
  • Open Access
7 Citations
6,301 Views
22 Pages

D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities

  • Mohamed Chahine Ghanem,
  • Patrick Mulvihill,
  • Karim Ouazzane,
  • Ramzi Djemai and
  • Dipo Dunsin

15 November 2023

The use of the unindexed web, commonly known as the deep web and dark web, to commit or facilitate criminal activity has drastically increased over the past decade. The dark web is a dangerous place where all kinds of criminal activities take place,...

  • Article
  • Open Access
1 Citations
3,238 Views
14 Pages

Towards a Near-Real-Time Protocol Tunneling Detector Based on Machine Learning Techniques

  • Filippo Sobrero,
  • Beatrice Clavarezza,
  • Daniele Ucci and
  • Federica Bisio

6 November 2023

In the very recent years, cybersecurity attacks have increased at an unprecedented pace, becoming ever more sophisticated and costly. Their impact has involved both private/public companies and critical infrastructures. At the same time, due to the C...

  • Review
  • Open Access
38 Citations
15,003 Views
36 Pages

Security in Cloud-Native Services: A Survey

  • Theodoros Theodoropoulos,
  • Luis Rosa,
  • Chafika Benzaid,
  • Peter Gray,
  • Eduard Marin,
  • Antonios Makris,
  • Luis Cordeiro,
  • Ferran Diego,
  • Pavel Sorokin and
  • Marco Di Girolamo
  • + 3 authors

26 October 2023

Cloud-native services face unique cybersecurity challenges due to their distributed infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man-in-the-Middle (MITM) attacks. Additionally, these services often process s...

  • Article
  • Open Access
3 Citations
2,447 Views
14 Pages

A Framework for Synthetic Agetech Attack Data Generation

  • Noel Khaemba,
  • Issa Traoré and
  • Mohammad Mamun

9 October 2023

To address the lack of datasets for agetech, this paper presents an approach for generating synthetic datasets that include traces of benign and attack datasets for agetech. The generated datasets could be used to develop and evaluate intrusion detec...

  • Article
  • Open Access
4 Citations
2,978 Views
38 Pages

6 October 2023

Training-anomaly-based, machine-learning-based, intrusion detection systems (AMiDS) for use in critical Internet of Things (CioT) systems and military Internet of Things (MioT) environments may involve synthetic data or publicly simulated data due to...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X