You are currently viewing a new version of our website. To view the old version click .
  • Tracked forImpact Factor
  • 9.1CiteScore
  • 25 daysTime to First Decision

Journal of Cybersecurity and Privacy, Volume 4, Issue 4

December 2024 - 12 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (12)

  • Systematic Review
  • Open Access
3 Citations
4,268 Views
26 Pages

2 December 2024

Today, IT organizations largely rely on cloud computing services to meet their infrastructure needs, making it the backbone of the industry. However, several challenges remain that need to be effectively addressed. Data breaches, identity and access...

  • Article
  • Open Access
2 Citations
2,151 Views
25 Pages

An Android-Based Internet of Medical Things Adaptive User Authentication and Authorization Model for the Elderly

  • Prudence M. Mavhemwa,
  • Marco Zennaro,
  • Philibert Nsengiyumva and
  • Frederic Nzanywayingoma

2 December 2024

Globally, 77% of the elderly aged 65 and above suffer from multiple chronic ailments, according to recent research. However, several barriers within the healthcare system in the developing world hinder the adoption of home-based patient management, h...

  • Review
  • Open Access
3 Citations
9,382 Views
21 Pages

Applications of Machine Learning in Cyber Security: A Review

  • Ioannis J. Vourganas and
  • Anna Lito Michala

17 November 2024

In recent years, Machine Learning (ML) and Artificial Intelligence (AI) have been gaining ground in Cyber Security (CS) research in an attempt to counter increasingly sophisticated attacks. However, this paper poses the question of qualitative and qu...

  • Article
  • Open Access
1 Citations
1,933 Views
21 Pages

Inferring TLB Configuration with Performance Tools

  • Cristian Agredo,
  • Tor J. Langehaug and
  • Scott R. Graham

12 November 2024

Modern computing systems are primarily designed for maximum performance, which inadvertently introduces vulnerabilities at the micro-architecture level. While cache side-channel analysis has received significant attention, other Central Processing Un...

  • Article
  • Open Access
3,221 Views
13 Pages

5 November 2024

In this study, we investigated the expanding problem of suspicious activity when using online in-game asset trading platforms. The decentralized structures and anonymity offered by these platforms provide a basis for suspicious actions, creating a th...

  • Article
  • Open Access
5 Citations
5,256 Views
28 Pages

10 October 2024

This paper introduces a comprehensive risk assessment of various wide area network (WAN) technologies as applied to Operational Technology (OT) infrastructures, thus uncovering which WAN technology is best suited for OT to mitigate the risks of Denia...

  • Retraction
  • Open Access
1,129 Views
1 Page

The journal retracts the article titled “Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia” [...]

  • Review
  • Open Access
10 Citations
21,407 Views
56 Pages

A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies

  • Khalid Bennouk,
  • Nawal Ait Aali,
  • Younès El Bouzekri El Idrissi,
  • Bechir Sebai,
  • Abou Zakaria Faroukhi and
  • Dorra Mahouachi

7 October 2024

The number of new vulnerabilities continues to rise significantly each year. Simultaneously, vulnerability databases have challenges in promptly sharing new security events with enough information to improve protections against emerging cyberattack v...

  • Article
  • Open Access
2,734 Views
30 Pages

Enhancing Cybersecurity through Comprehensive Investigation of Data Flow-Based Attack Scenarios

  • Sara Abbaspour Asadollah,
  • Shamoona Imtiaz,
  • Alireza Dehlaghi-Ghadim,
  • Mikael Sjödin and
  • Marjan Sirjani

4 October 2024

Integration of the Internet of Things (IoT) in industrial settings necessitates robust cybersecurity measures to mitigate risks such as data leakage, vulnerability exploitation, and compromised information flows. Recent cyberattacks on critical indus...

  • Article
  • Open Access
2,764 Views
18 Pages

1 October 2024

In the history of access control, nearly every system designed has relied on the operating system (OS) to enforce the access control protocols. However, if the OS (and specifically root access) is compromised, there are few if any solutions that can...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800XCreative Common CC BY license