Skip Content
You are currently on the new version of our website. Access the old version .
  • Tracked for
    Impact Factor
  • 9.1
    CiteScore
  • 22 days
    Time to First Decision

Journal of Cybersecurity and Privacy, Volume 2, Issue 3

2022 September - 16 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (16)

  • Article
  • Open Access
1 Citations
10,746 Views
14 Pages

19 September 2022

Mobile devices, specifically smartphones, have become a necessity in everyday life, as we perform many essential day-to-day tasks using these devices. With the projected increase in mobile devices to 18.22 billion by 2025, the reliance on smartphones...

  • Article
  • Open Access
5 Citations
4,422 Views
19 Pages

14 September 2022

To implement new software functions and more flexible updates in the future as well as to provide cloud-based functionality, the service-oriented architecture (SOA) paradigm is increasingly being integrated into automotive electrical and electronic a...

  • Review
  • Open Access
44 Citations
18,512 Views
17 Pages

8 September 2022

Contactless fingerprint identification systems have been introduced to address the deficiencies of contact-based fingerprint systems. A number of studies have been reported regarding contactless fingerprint processing, including classical image proce...

  • Article
  • Open Access
4,269 Views
14 Pages

31 August 2022

Messaging services are usually provided within social network platforms and allow these platforms to collect additional information about users, such as what time, for how long, with whom, and where a user communicates. This information allows the id...

  • Article
  • Open Access
11 Citations
6,015 Views
38 Pages

18 August 2022

Older adults in the U.S. are interested in maintaining independence, aging at home longer, and staying active. Their substantial size, market share, and household wealth sparked the interest of investors and developers in remote monitoring, smart hom...

  • Review
  • Open Access
111 Citations
16,797 Views
22 Pages

Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis

  • Rachida Hireche,
  • Houssem Mansouri and
  • Al-Sakib Khan Pathan

17 August 2022

The Internet of Medical Things (IoMT) has become a strategic priority for future e-healthcare because of its ability to improve patient care and its scope of providing more reliable clinical data, increasing efficiency, and reducing costs. It is no w...

  • Article
  • Open Access
8 Citations
4,444 Views
11 Pages

15 August 2022

Optimizing the monitoring of network traffic features to detect abnormal traffic is critical. We propose a two-stage monitoring and classification (MOCA) system requiring fewer features to detect and classify malicious network attacks. The first stag...

  • Article
  • Open Access
3 Citations
4,289 Views
23 Pages

SMARTEN—A Sample-Based Approach towards Privacy-Friendly Data Refinement

  • Christoph Stach,
  • Michael Behringer,
  • Julia Bräcker,
  • Clémentine Gritti and
  • Bernhard Mitschang

15 August 2022

Two factors are crucial for the effective operation of modern-day smart services: Initially, IoT-enabled technologies have to capture and combine huge amounts of data on data subjects. Then, all these data have to be processed exhaustively by means o...

  • Article
  • Open Access
10 Citations
5,334 Views
19 Pages

10 August 2022

Security assurance (SA) is a technique that helps organizations to appraise the trust and confidence that a system can be operated correctly and securely. To foster effective SA, there must be systematic techniques to reflect the fact that the system...

  • Article
  • Open Access
63 Citations
26,654 Views
14 Pages

This article identifies human factors in workplaces that contribute to the challenges faced by cybersecurity leadership within organizations and discusses strategic communication, human–computer interaction, organizational factors, social envir...

  • Review
  • Open Access
27 Citations
17,946 Views
17 Pages

The Evolution of Volatile Memory Forensics

  • Hannah Nyholm,
  • Kristine Monteith,
  • Seth Lyles,
  • Micaela Gallegos,
  • Mark DeSantis,
  • John Donaldson and
  • Claire Taylor

The collection and analysis of volatile memory is a vibrant area of research in the cybersecurity community. The ever-evolving and growing threat landscape is trending towards fileless malware, which avoids traditional detection but can be found by e...

  • Review
  • Open Access
153 Citations
66,312 Views
29 Pages

Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review

  • Mostofa Ahsan,
  • Kendall E. Nygard,
  • Rahul Gomes,
  • Md Minhaz Chowdhury,
  • Nafiz Rifat and
  • Jayden F Connolly

Machine learning is of rising importance in cybersecurity. The primary objective of applying machine learning in cybersecurity is to make the process of malware detection more actionable, scalable and effective than traditional approaches, which requ...

  • Article
  • Open Access
3 Citations
5,152 Views
11 Pages

Currently, network environments are complex infrastructures with different levels of security, isolation and permissions. The management of these networks is a complex task, faced with different issues such as adversarial attacks, user demands, virtu...

  • Article
  • Open Access
12 Citations
10,350 Views
26 Pages

The emergence of the COVID-19 pandemic in early 2020 has transformed how individuals work and learn and how they can apply cyber-security requirements in their, mostly remote, environments. This transformation also affected the university student pop...

  • Article
  • Open Access
7 Citations
7,248 Views
24 Pages

Recently, phishing attacks have been increasing tremendously, and attackers discover new techniques every day to deceive users. With the advancement of technology, teenagers are considered the most technologically advanced generation, having grown up...

  • Article
  • Open Access
1 Citations
6,267 Views
22 Pages

Bingo: A Semi-Centralized Password Storage System

  • Abdullah F. Al-Aboosi,
  • Matan Broner and
  • Fadhil Y. Al-Aboosi

A lack of security best practices in modern password storage has led to a dramatic rise in the number of online data breaches, resulting in financial damages and lowered trust in online service providers. This work aims to explore the question of how...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X