You are currently viewing a new version of our website. To view the old version click .
  • Tracked forImpact Factor
  • 9.1CiteScore
  • 25 daysTime to First Decision

Journal of Cybersecurity and Privacy, Volume 4, Issue 1

March 2024 - 7 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (7)

  • Review
  • Open Access
50 Citations
16,670 Views
27 Pages

23 February 2024

Ensuring confidentiality and privacy is critical when it comes to sharing images over unsecured networks such as the internet. Since widely used and secure encryption methods, such as AES, Twofish, and RSA, are not suitable for real-time image encryp...

  • Article
  • Open Access
1 Citations
4,621 Views
21 Pages

Incidental Data: A Survey towards Awareness on Privacy-Compromising Data Incidentally Shared on Social Media

  • Stefan Kutschera,
  • Wolfgang Slany,
  • Patrick Ratschiller,
  • Sarina Gursch,
  • Patrick Deininger and
  • Håvard Dagenborg

23 February 2024

Sharing information with the public is becoming easier than ever before through the usage of the numerous social media platforms readily available today. Once posted online and released to the public, information is almost impossible to withdraw or d...

  • Article
  • Open Access
1 Citations
3,206 Views
29 Pages

7 February 2024

Multiple studies have demonstrated that the conventional method of learning is suboptimal when our goal is to enhance individuals’ genuine privacy behavior. This study introduces a framework for transforming privacy behavior, with the objective...

  • Article
  • Open Access
3 Citations
4,442 Views
21 Pages

10 January 2024

Identifying potential system attacks that define security requirements is crucial to building secure cyber systems. Moreover, the attack frequency makes their subsequent analysis challenging and arduous in cyber–physical systems (CPS). Since CP...

  • Article
  • Open Access
2 Citations
2,882 Views
14 Pages

10 January 2024

The RSA (Rivest–Shamir–Adleman) cryptosystem is an asymmetric public key cryptosystem popular for its use in encryptions and digital signatures. However, the Wiener’s attack on the RSA cryptosystem utilizes continued fractions, whic...

  • Article
  • Open Access
13 Citations
9,734 Views
18 Pages

Security Vulnerabilities in 5G Non-Stand-Alone Networks: A Systematic Analysis and Attack Taxonomy

  • Mohamad Saalim Wani,
  • Michael Rademacher,
  • Thorsten Horstmann and
  • Mathias Kretschmer

5G networks, pivotal for our digital mobile societies, are transitioning from 4G to 5G Stand-Alone (SA) networks. However, during this transition, 5G Non-Stand-Alone (NSA) networks are widely used. This paper examines potential security vulnerabiliti...

  • Article
  • Open Access
2 Citations
3,998 Views
22 Pages

28 December 2023

Using a safe subset of C++ is a promising direction for increasing the safety of the programming language while maintaining its performance and productivity. In this paper, we examine how close existing C/C++ code is to conforming to a safe subset of...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X