You are currently viewing a new version of our website. To view the old version click .
  • Tracked forImpact Factor
  • 9.1CiteScore
  • 25 daysTime to First Decision

Most Cited

  • Review
  • Open Access
141 Citations
83,483 Views
51 Pages

Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions

  • Anastasios Giannaros,
  • Aristeidis Karras,
  • Leonidas Theodorakopoulos,
  • Christos Karras,
  • Panagiotis Kranias,
  • Nikolaos Schizas,
  • Gerasimos Kalogeratos and
  • Dimitrios Tsolis

5 August 2023

Autonomous vehicles (AVs), defined as vehicles capable of navigation and decision-making independent of human intervention, represent a revolutionary advancement in transportation technology. These vehicles operate by synthesizing an array of sophist...

  • Article
  • Open Access
80 Citations
24,114 Views
44 Pages

27 September 2023

Smart grids have emerged as a transformative technology in the power sector, enabling efficient energy management. However, the increased reliance on digital technologies also exposes smart grids to various cybersecurity threats and attacks. This art...

  • Review
  • Open Access
48 Citations
16,293 Views
27 Pages

23 February 2024

Ensuring confidentiality and privacy is critical when it comes to sharing images over unsecured networks such as the internet. Since widely used and secure encryption methods, such as AES, Twofish, and RSA, are not suitable for real-time image encryp...

  • Review
  • Open Access
38 Citations
14,921 Views
36 Pages

Security in Cloud-Native Services: A Survey

  • Theodoros Theodoropoulos,
  • Luis Rosa,
  • Chafika Benzaid,
  • Peter Gray,
  • Eduard Marin,
  • Antonios Makris,
  • Luis Cordeiro,
  • Ferran Diego,
  • Pavel Sorokin and
  • Marco Di Girolamo
  • + 3 authors

26 October 2023

Cloud-native services face unique cybersecurity challenges due to their distributed infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man-in-the-Middle (MITM) attacks. Additionally, these services often process s...

  • Review
  • Open Access
20 Citations
6,797 Views
24 Pages

11 September 2023

Anonymization techniques are widely used to make personal data broadly available for analytics/data-mining purposes while preserving the privacy of the personal information enclosed in it. In the past decades, a substantial number of anonymization te...

  • Feature Paper
  • Review
  • Open Access
17 Citations
14,905 Views
25 Pages

Cybersecurity for AI Systems: A Survey

  • Raghvinder S. Sangwan,
  • Youakim Badr and
  • Satish M. Srinivasan

Recent advances in machine learning have created an opportunity to embed artificial intelligence in software-intensive systems. These artificial intelligence systems, however, come with a new set of vulnerabilities making them potential targets for c...

  • Article
  • Open Access
16 Citations
26,945 Views
31 Pages

Protection of Personal Data in the Context of E-Commerce

  • Zlatan Morić,
  • Vedran Dakic,
  • Daniela Djekic and
  • Damir Regvart

20 September 2024

This paper examines the impact of stringent regulations on personal data protection on customer perception of data security and online shopping behavior. In the context of the rapidly expanding e-commerce landscape, ensuring the security of personal...

  • Review
  • Open Access
15 Citations
7,931 Views
32 Pages

Throughout the past several decades, mobile devices have evolved in capability and popularity at growing rates while improvement in security has fallen behind. As smartphones now hold mass quantities of sensitive information from millions of people a...

  • Article
  • Open Access
15 Citations
22,949 Views
24 Pages

Data Privacy and Ethical Considerations in Database Management

  • Eduardo Pina,
  • José Ramos,
  • Henrique Jorge,
  • Paulo Váz,
  • José Silva,
  • Cristina Wanzeller,
  • Maryam Abbasi and
  • Pedro Martins

Data privacy and ethical considerations ensure the security of databases by respecting individual rights while upholding ethical considerations when collecting, managing, and using information. Nowadays, despite having regulations that help to protec...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X