Skip to Content
  • Tracked for
    Impact Factor
  • 9.1
    CiteScore
  • 22 days
    Time to First Decision

Most Cited

  • Review
  • Open Access
157 Citations
86,467 Views
51 Pages

Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions

  • Anastasios Giannaros,
  • Aristeidis Karras,
  • Leonidas Theodorakopoulos,
  • Christos Karras,
  • Panagiotis Kranias,
  • Nikolaos Schizas,
  • Gerasimos Kalogeratos and
  • Dimitrios Tsolis

5 August 2023

Autonomous vehicles (AVs), defined as vehicles capable of navigation and decision-making independent of human intervention, represent a revolutionary advancement in transportation technology. These vehicles operate by synthesizing an array of sophist...

  • Article
  • Open Access
92 Citations
26,014 Views
44 Pages

27 September 2023

Smart grids have emerged as a transformative technology in the power sector, enabling efficient energy management. However, the increased reliance on digital technologies also exposes smart grids to various cybersecurity threats and attacks. This art...

  • Review
  • Open Access
58 Citations
17,683 Views
27 Pages

23 February 2024

Ensuring confidentiality and privacy is critical when it comes to sharing images over unsecured networks such as the internet. Since widely used and secure encryption methods, such as AES, Twofish, and RSA, are not suitable for real-time image encryp...

  • Review
  • Open Access
44 Citations
16,495 Views
36 Pages

Security in Cloud-Native Services: A Survey

  • Theodoros Theodoropoulos,
  • Luis Rosa,
  • Chafika Benzaid,
  • Peter Gray,
  • Eduard Marin,
  • Antonios Makris,
  • Luis Cordeiro,
  • Ferran Diego,
  • Pavel Sorokin and
  • Konstantinos Tserpes
  • + 3 authors

26 October 2023

Cloud-native services face unique cybersecurity challenges due to their distributed infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man-in-the-Middle (MITM) attacks. Additionally, these services often process s...

  • Article
  • Open Access
26 Citations
30,574 Views
31 Pages

Protection of Personal Data in the Context of E-Commerce

  • Zlatan Morić,
  • Vedran Dakic,
  • Daniela Djekic and
  • Damir Regvart

20 September 2024

This paper examines the impact of stringent regulations on personal data protection on customer perception of data security and online shopping behavior. In the context of the rapidly expanding e-commerce landscape, ensuring the security of personal...

  • Review
  • Open Access
25 Citations
7,399 Views
24 Pages

11 September 2023

Anonymization techniques are widely used to make personal data broadly available for analytics/data-mining purposes while preserving the privacy of the personal information enclosed in it. In the past decades, a substantial number of anonymization te...

  • Feature Paper
  • Review
  • Open Access
19 Citations
15,756 Views
25 Pages

Cybersecurity for AI Systems: A Survey

  • Raghvinder S. Sangwan,
  • Youakim Badr and
  • Satish M. Srinivasan

Recent advances in machine learning have created an opportunity to embed artificial intelligence in software-intensive systems. These artificial intelligence systems, however, come with a new set of vulnerabilities making them potential targets for c...

  • Article
  • Open Access
19 Citations
25,843 Views
24 Pages

Data Privacy and Ethical Considerations in Database Management

  • Eduardo Pina,
  • José Ramos,
  • Henrique Jorge,
  • Paulo Váz,
  • José Silva,
  • Cristina Wanzeller,
  • Maryam Abbasi and
  • Pedro Martins

Data privacy and ethical considerations ensure the security of databases by respecting individual rights while upholding ethical considerations when collecting, managing, and using information. Nowadays, despite having regulations that help to protec...

  • Article
  • Open Access
18 Citations
21,051 Views
28 Pages

2 September 2023

Business Email Compromise (BEC) attacks have emerged as serious threats to organizations in recent years, exploiting social engineering and malware to dupe victims into divulging confidential information and executing fraudulent transactions. This pa...

  • Article
  • Open Access
17 Citations
6,604 Views
36 Pages

The increasing sophistication of fraud tactics necessitates advanced detection methods to protect financial assets and maintain system integrity. Various approaches based on artificial intelligence have been proposed to identify fraudulent activities...

  • Review
  • Open Access
17 Citations
8,495 Views
32 Pages

Throughout the past several decades, mobile devices have evolved in capability and popularity at growing rates while improvement in security has fallen behind. As smartphones now hold mass quantities of sensitive information from millions of people a...

  • Article
  • Open Access
16 Citations
8,603 Views
13 Pages

3 August 2023

With the growth in network usage, there has been a corresponding growth in the nefarious exploitation of this technology. A wide array of techniques is now available that can be used to deal with cyberattacks, and one of them is network intrusion det...

  • Review
  • Open Access
15 Citations
25,698 Views
56 Pages

A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies

  • Khalid Bennouk,
  • Nawal Ait Aali,
  • Younès El Bouzekri El Idrissi,
  • Bechir Sebai,
  • Abou Zakaria Faroukhi and
  • Dorra Mahouachi

7 October 2024

The number of new vulnerabilities continues to rise significantly each year. Simultaneously, vulnerability databases have challenges in promptly sharing new security events with enough information to improve protections against emerging cyberattack v...

  • Systematic Review
  • Open Access
14 Citations
10,502 Views
33 Pages

Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review

  • Turki Al lelah,
  • George Theodorakopoulos,
  • Philipp Reinecke,
  • Amir Javed and
  • Eirini Anthi

1 September 2023

The widespread adoption of cloud-based and public legitimate services (CPLS) has inadvertently opened up new avenues for cyber attackers to establish covert and resilient command-and-control (C&C) communication channels. This abuse poses a signif...

  • Article
  • Open Access
14 Citations
10,379 Views
18 Pages

Security Vulnerabilities in 5G Non-Stand-Alone Networks: A Systematic Analysis and Attack Taxonomy

  • Mohamad Saalim Wani,
  • Michael Rademacher,
  • Thorsten Horstmann and
  • Mathias Kretschmer

5G networks, pivotal for our digital mobile societies, are transitioning from 4G to 5G Stand-Alone (SA) networks. However, during this transition, 5G Non-Stand-Alone (NSA) networks are widely used. This paper examines potential security vulnerabiliti...

  • Article
  • Open Access
12 Citations
6,656 Views
23 Pages

The exponential growth in data volumes, combined with the inherent complexity of network algorithms, has drastically affected network security. Data activities are producing voluminous network logs that often mask critical vulnerabilities. Although t...

  • Systematic Review
  • Open Access
11 Citations
9,693 Views
28 Pages

Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review

  • Charalampos Bratsas,
  • Efstathios Konstantinos Anastasiadis,
  • Alexandros K. Angelidis,
  • Lazaros Ioannidis,
  • Rigas Kotsakis and
  • Stefanos Ougiaroglou

1 August 2024

The amount of data related to cyber threats and cyber attack incidents is rapidly increasing. The extracted information can provide security analysts with useful Cyber Threat Intelligence (CTI) to enhance their decision-making. However, because the d...

  • Article
  • Open Access
10 Citations
6,882 Views
22 Pages

D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities

  • Mohamed Chahine Ghanem,
  • Patrick Mulvihill,
  • Karim Ouazzane,
  • Ramzi Djemai and
  • Dipo Dunsin

15 November 2023

The use of the unindexed web, commonly known as the deep web and dark web, to commit or facilitate criminal activity has drastically increased over the past decade. The dark web is a dangerous place where all kinds of criminal activities take place,...

  • Article
  • Open Access
10 Citations
6,934 Views
29 Pages

3 August 2023

Network emulation offers a flexible solution for network deployment and operations, leveraging software to consolidate all nodes in a topology and utilizing the resources of a single host system server. This research paper investigated the state of c...

  • Systematic Review
  • Open Access
9 Citations
7,747 Views
22 Pages

The continuous integration of automated tools into security operation centers (SOCs) increases the volume of alerts for security analysts. This amplifies the risk of automation bias and complacency to the point that security analysts have reported mi...

  • Article
  • Open Access
9 Citations
14,367 Views
26 Pages

Partial Fake Speech Attacks in the Real World Using Deepfake Audio

  • Abdulazeez Alali and
  • George Theodorakopoulos

Advances in deep learning have led to dramatic improvements in generative synthetic speech, eliminating robotic speech patterns to create speech that is indistinguishable from a human voice. Although these advances are extremely useful in various app...

  • Article
  • Open Access
9 Citations
1,518 Views
22 Pages

AI-Powered Security for IoT Ecosystems: A Hybrid Deep Learning Approach to Anomaly Detection

  • Deepak Kumar,
  • Priyanka Pramod Pawar,
  • Santosh Reddy Addula,
  • Mohan Kumar Meesala,
  • Oludotun Oni,
  • Qasim Naveed Cheema,
  • Anwar Ul Haq and
  • Guna Sekhar Sajja

The rapid expansion of the Internet of Things (IoT) has introduced new vulnerabilities that traditional security mechanisms often fail to address effectively. Signature-based intrusion detection systems cannot adapt to zero-day attacks, while rule-ba...

  • Article
  • Open Access
8 Citations
4,842 Views
19 Pages

Anomaly Detection for Modbus over TCP in Control Systems Using Entropy and Classification-Based Analysis

  • Tirthankar Ghosh,
  • Sikha Bagui,
  • Subhash Bagui,
  • Martin Kadzis and
  • Jackson Bare

1 December 2023

This article presents a statistical approach using entropy and classification-based analysis to detect anomalies in industrial control systems traffic. Several statistical techniques have been proposed to create baselines and measure deviation to det...

  • Article
  • Open Access
8 Citations
43,253 Views
41 Pages

Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations

  • Vedran Dakić,
  • Zlatan Morić,
  • Ana Kapulica and
  • Damir Regvart

The Zero Trust Architecture (ZTA) security system follows the “never trust, always verify” principle. The process constantly verifies users and devices trying to access resources. This paper describes how Microsoft Azure uses ZTA to enfor...

  • Article
  • Open Access
8 Citations
4,047 Views
19 Pages

Water-Tight IoT–Just Add Security

  • Guillaume Bour,
  • Camillo Bosco,
  • Rita Ugarelli and
  • Martin Gilje Jaatun

The security of IoT-based digital solutions is a critical concern in the adoption of Industry 4.0 technologies. These solutions are increasingly being used to support the interoperability of critical infrastructure, such as in the water and energy se...

  • Article
  • Open Access
8 Citations
4,639 Views
15 Pages

Cybersecurity Access Control: Framework Analysis in a Healthcare Institution

  • Erik William Tomlinson,
  • Wolday D. Abrha,
  • Seong Dae Kim and
  • Salvador A. Ortega

20 September 2024

Cyber threats are continually evolving and becoming increasingly complex, affecting various industries. Healthcare institutions are the second most targeted industry, preceded by manufacturing. The industry is on the lookout for a reliable cybersecur...

  • Article
  • Open Access
7 Citations
5,800 Views
23 Pages

Session-replay bots are believed to be the latest and most sophisticated generation of web bots, and they are also very difficult to defend against. Combating session-replay bots is particularly challenging in online domains that are repeatedly visit...

  • Article
  • Open Access
7 Citations
5,287 Views
18 Pages

Cybersecurity in a Large-Scale Research Facility—One Institution’s Approach

  • David S. Butcher,
  • Christian J. Brigham,
  • James Berhalter,
  • Abigail L. Centers,
  • William M. Hunkapiller,
  • Timothy P. Murphy,
  • Eric C. Palm and
  • Julia H. Smith

A cybersecurity approach for a large-scale user facility is presented—utilizing the National High Magnetic Field Laboratory (NHMFL) at Florida State University (FSU) as an example. The NHMFL provides access to the highest magnetic fields for sc...

  • Review
  • Open Access
7 Citations
6,449 Views
25 Pages

Implementing machine learning is imperative for enhancing advanced cybersecurity practices globally. The current cybersecurity landscape needs further investigation into the potential impasse. This scientometric study aims to comprehensively analyse...

  • Article
  • Open Access
7 Citations
12,124 Views
17 Pages

25 September 2024

The rising frequency and complexity of cybersecurity threats necessitate robust monitoring and rapid response capabilities to safeguard digital assets effectively. As a result, many organizations are increasingly establishing Security Operations Cent...

  • Article
  • Open Access
7 Citations
6,229 Views
22 Pages

The widespread rise of misinformation across digital platforms has increased the demand for accurate and efficient Fake News Detection (FND) systems. This study introduces an enhanced transformer-based architecture for FND, developed through comprehe...

  • Article
  • Open Access
6 Citations
3,897 Views
14 Pages

A Hybrid Dimensionality Reduction for Network Intrusion Detection

  • Humera Ghani,
  • Shahram Salekzamankhani and
  • Bal Virdee

16 November 2023

Due to the wide variety of network services, many different types of protocols exist, producing various packet features. Some features contain irrelevant and redundant information. The presence of such features increases computational complexity and...

  • Article
  • Open Access
6 Citations
6,426 Views
28 Pages

10 October 2024

This paper introduces a comprehensive risk assessment of various wide area network (WAN) technologies as applied to Operational Technology (OT) infrastructures, thus uncovering which WAN technology is best suited for OT to mitigate the risks of Denia...

  • Article
  • Open Access
6 Citations
5,901 Views
39 Pages

The relationship and the interplay between the EU AI Act and the data protection law is a challenging issue. This paper focuses on exploring the interplay between legal provisions stemming from the AI Act and those stemming from the GDPR, with the ul...

  • Article
  • Open Access
6 Citations
3,922 Views
30 Pages

Chaotic Hénon–Logistic Map Integration: A Powerful Approach for Safeguarding Digital Images

  • Abeer Al-Hyari,
  • Mua’ad Abu-Faraj,
  • Charlie Obimbo and
  • Moutaz Alazab

This paper presents an integrated chaos-based algorithm for image encryption that combines the chaotic Hénon map and chaotic logistic map (CLM) to enhance the security of digital image communication. The proposed method leverages chaos theory...

  • Article
  • Open Access
6 Citations
11,616 Views
32 Pages

Deepfake-Driven Social Engineering: Threats, Detection Techniques, and Defensive Strategies in Corporate Environments

  • Kristoffer Torngaard Pedersen,
  • Lauritz Pepke,
  • Tobias Stærmose,
  • Maria Papaioannou,
  • Gaurav Choudhary and
  • Nicola Dragoni

The evolution of deepfake technology has the potential to reshape the threat landscape in corporate environments by enabling highly convincing digital impersonations. In this paper, we explore how artificial media produced by AI can be misused to ass...

  • Systematic Review
  • Open Access
6 Citations
5,574 Views
26 Pages

2 December 2024

Today, IT organizations largely rely on cloud computing services to meet their infrastructure needs, making it the backbone of the industry. However, several challenges remain that need to be effectively addressed. Data breaches, identity and access...

  • Review
  • Open Access
6 Citations
11,846 Views
21 Pages

Applications of Machine Learning in Cyber Security: A Review

  • Ioannis J. Vourganas and
  • Anna Lito Michala

17 November 2024

In recent years, Machine Learning (ML) and Artificial Intelligence (AI) have been gaining ground in Cyber Security (CS) research in an attempt to counter increasingly sophisticated attacks. However, this paper poses the question of qualitative and qu...

  • Article
  • Open Access
6 Citations
12,055 Views
25 Pages

An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure

  • Habib El Amin,
  • Abed Ellatif Samhat,
  • Maroun Chamoun,
  • Lina Oueidat and
  • Antoine Feghali

Emerging cyber threats’ sophistication, impact, and complexity rapidly evolve, confronting organizations with demanding challenges. This severe escalation requires a deeper understanding of adversary dynamics to develop enhanced defensive strat...

  • Review
  • Open Access
6 Citations
5,416 Views
20 Pages

Data generated by Internet of Things devices enable the design of new business models and services, improving user experience and satisfaction. This data also serve as an essential information source for many fields, including disaster management, bi...

  • Article
  • Open Access
6 Citations
7,219 Views
21 Pages

Phishing remains a persistent cybersecurity threat, often bypassing traditional detection methods due to evolving attack techniques. This study presents a Reinforcement Learning (RL)-based phishing detection framework, leveraging a Deep Q-Network (DQ...

  • Article
  • Open Access
6 Citations
3,198 Views
20 Pages

A Secure and Scalable Authentication and Communication Protocol for Smart Grids

  • Muhammad Asfand Hafeez,
  • Kazi Hassan Shakib and
  • Arslan Munir

The growing adoption of smart grid systems presents significant advancements in the efficiency of energy distribution, along with enhanced monitoring and control capabilities. However, the interconnected and distributed nature of these systems also i...

  • Article
  • Open Access
5 Citations
3,016 Views
14 Pages

25 August 2023

An intrusion detection system (IDS), whether as a device or software-based agent, plays a significant role in networks and systems security by continuously monitoring traffic behaviour to detect malicious activities. The literature includes IDSs that...

  • Article
  • Open Access
5 Citations
3,219 Views
38 Pages

6 October 2023

Training-anomaly-based, machine-learning-based, intrusion detection systems (AMiDS) for use in critical Internet of Things (CioT) systems and military Internet of Things (MioT) environments may involve synthetic data or publicly simulated data due to...

  • Article
  • Open Access
5 Citations
2,566 Views
14 Pages

Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis

  • Clay Carper,
  • Stone Olguin,
  • Jarek Brown,
  • Caylie Charlton and
  • Mike Borowczak

29 November 2023

Power-based Side-Channel Analysis (SCA) began with visual-based examinations and has progressed to utilize data-driven statistical analysis. Two distinct classifications of these methods have emerged over the years; those focused on leakage exploitat...

  • Article
  • Open Access
5 Citations
6,298 Views
29 Pages

30 March 2024

In an evolving cybersecurity landscape marked by escalating data breaches and regulatory demands, data leakage prevention (DLP) has emerged as one of several defense mechanisms. This study underscores unresolved foundational issues within DLP, reveal...

  • Article
  • Open Access
5 Citations
5,538 Views
27 Pages

31 March 2024

Internet applications rely on Secure Socket Layer (SSL)/Transport Security Layer (TSL) certifications to establish secure communication. However, the centralized nature of certificate authorities (CAs) poses a risk, as malicious third parties could e...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X