You are currently viewing a new version of our website. To view the old version click .
  • Tracked forImpact Factor
  • 9.1CiteScore
  • 25 daysTime to First Decision

Journal of Cybersecurity and Privacy, Volume 4, Issue 2

June 2024 - 12 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (12)

  • Article
  • Open Access
4 Citations
10,306 Views
25 Pages

An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure

  • Habib El Amin,
  • Abed Ellatif Samhat,
  • Maroun Chamoun,
  • Lina Oueidat and
  • Antoine Feghali

Emerging cyber threats’ sophistication, impact, and complexity rapidly evolve, confronting organizations with demanding challenges. This severe escalation requires a deeper understanding of adversary dynamics to develop enhanced defensive strat...

  • Article
  • Open Access
1 Citations
2,563 Views
17 Pages

Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals

  • Pete Burnap,
  • Eirini Anthi,
  • Philipp Reineckea,
  • Lowri Williams,
  • Fengnian Cao,
  • Rakan Aldmoura and
  • Kevin Jones

Traditionally, cyber risk assessment considers system-level risk separately from individual component-level risk, i.e., devices, data, people. This separation prevents effective impact assessment where attack intelligence for a specific device can be...

  • Article
  • Open Access
6 Citations
5,821 Views
16 Pages

In the evolving landscape of cybersecurity threats, permanent denial-of-service (PDoS) attacks have emerged as a particularly damaging form of cyber aggression. Unlike the more well-known denial-of-service (DoS) attacks, which disrupt services tempor...

  • Article
  • Open Access
2 Citations
2,767 Views
26 Pages

Developing a security solution for spatial files within today’s enterprise Geographical Information System (GIS) that is also usable presents a multifaceted challenge. These files exist in “data silos” of different file server types, resulting in lim...

  • Article
  • Open Access
2 Citations
4,829 Views
20 Pages

User-generated passwords often pose a security risk in authentication systems. However, providing a comparative substitute poses a challenge, given the common tradeoff between security and user experience. This paper integrates cryptographic methods...

  • Feature Paper
  • Article
  • Open Access
3 Citations
2,316 Views
14 Pages

20 April 2024

Security threat and risk assessment of systems requires the integrated use of information from multiple knowledge bases. Such use is typically carried out ad-hoc by security experts in an unstructured manner. Also, this ad-hoc use of information ofte...

  • Article
  • Open Access
10 Citations
5,689 Views
23 Pages

The exponential growth in data volumes, combined with the inherent complexity of network algorithms, has drastically affected network security. Data activities are producing voluminous network logs that often mask critical vulnerabilities. Although t...

  • Article
  • Open Access
3 Citations
2,944 Views
18 Pages

Trustworthiness of Situational Awareness: Significance and Quantification

  • Arslan Munir,
  • Alexander Aved,
  • Khanh Pham and
  • Joonho Kong

Situational awareness (SA) is of tremendous significance for successful operations in many domains, such as surveillance, humanitarian, search, and rescue missions, and national security. SA is particularly important for the defense sector, and is re...

  • Article
  • Open Access
4 Citations
4,527 Views
27 Pages

31 March 2024

Internet applications rely on Secure Socket Layer (SSL)/Transport Security Layer (TSL) certifications to establish secure communication. However, the centralized nature of certificate authorities (CAs) poses a risk, as malicious third parties could e...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X