Journal of Cybersecurity and Privacy: A New Open Access Journal
- articles that convey new cybersecurity and privacy solutions and technologies;
- articles bridging different technologies with cybersecurity and privacy such as cybersecurity for AI and AI for cybersecurity, technology and public policy for cybersecurity and privacy;
- articles that discuss the, ethical, policy and legal implications of cybersecurity and privacy;
- position articles with new ideas and paradigm shifts for cybersecurity and privacy;
- articles containing implementation of basic and applied research into real-world applications;
- survey and tutorial articles that cover emerging cybersecurity and privacy challenges and solutions.
Conflicts of Interest
References
- Ljungholm, D.P. Regulating Autonomous Vehicles in a Smart Urban Transport System: Safety, Security, and Privacy Issues. Contemp. Readings L. Soc. 2020, 12, 9–15. [Google Scholar]
- Rawat, D.B.; Ghafoor, K.Z. Smart Cities Cybersecurity and Privacy; Elsevier Press: Amsterdam, The Netherlands, 2018. [Google Scholar]
- Jeschke, S.; Brecher, C.; Song, H.; Rawat, D.B. Industrial Internet of Things: Cyber-Manufacturing Systems; Springer: Cham, Switzerland, 2016. [Google Scholar]
- Rawat, D.B.; Rodrigues, J.; Stojmenovic, I. Cyber Physical Systems: From Theory to Practice; CRC Press: Boca Raton, FL, USA, 2015. [Google Scholar]
- Olowononi, F.; Rawat, D.B.; Liu, C. Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS. IEEE Commun. Surv. Tutor. 2021. [Google Scholar] [CrossRef]
- Rawat, D.B.; Reddy, S. Software Defined Networking Architecture, Security and Energy Efficiency: A Survey. IEEE Commun. Surv. Tutor. 2017, 19, 325–346. [Google Scholar] [CrossRef]
- Wu, J.M.-T.; Srivastava, G.; Jolfaei, A.; Fournier-Viger, P.; Lin, J.C.-W. Hiding Sensitive Information in Ehealth Datasets. Futur. Gener. Comput. Syst. 2021, 117, 169–180. [Google Scholar] [CrossRef]
- Peiser, J. A Hacker Broke into a Florida Town’s Water Supply and Tried to Poison it with Lye, Police Said, 2021. Available online: https://www.washingtonpost.com/nation/2021/02/09/oldsmar-water-supply-hack-florida (accessed on 25 February 2021).
- Hackers Remotely Kill a Jeep on the Highway—With Me in It. Available online: https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway (accessed on 25 February 2021).
- Uprety, A.; Rawat, D.B. Reinforcement Learning for IoT Security: A Comprehensive Survey. IEEE Internet Things J. 2020. [Google Scholar] [CrossRef]
- The Real Story of How the Internet Became so Vulnerable, The Washington Post. Available online: https://www.washingtonpost.com/sf/business/2015/05/30/net-of-insecurity-part-1/ (accessed on 25 February 2021).
- Rawat, D.B.; Bajracharya, C. Cyber security for smart grid systems: Status, challenges and perspectives. SoutheastCon 2015, 1–6. [Google Scholar] [CrossRef]
- Rawat, D.B.; Bajracharya, C. Detection of False Data Injection Attacks in Smart Grid Communication Systems. IEEE Signal Process. Lett. 2015, 22, 1652–1656. [Google Scholar] [CrossRef]
- Rawat, D.B.; Bajracharya, C. Vehicular Cyber Physical Systems: Adaptive Connectivity and Security; Springer: Berlin/Heidelberg, Germany, 2016. [Google Scholar]
- Safavat, S.; Rawat, D.B. On the Elliptic Curve Cryptography for Privacy-Aware Secure ACO-AODV Routing in Intent-Based Internet of Vehicles for Smart Cities. IEEE Trans. Intell. Transp. Syst. 2020. [Google Scholar] [CrossRef]
- Sharma, R.; Rawat, D.B. Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey. IEEE Commun. Surv. Tutor. 2015, 17, 1023–1043. [Google Scholar] [CrossRef]
- Healthcare Breaches Affected Nearly One Million US Patients: The Security Risks of Medical IoT URL. Available online: https://blog.checkpoint.com/2019/05/29/ultrasound-iot-hack-security-risks-healthcare-medical-device-michigan-ransomware/ (accessed on 25 February 2021).
Biography
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Rawat, D.B. Journal of Cybersecurity and Privacy: A New Open Access Journal. J. Cybersecur. Priv. 2021, 1, 195-198. https://doi.org/10.3390/jcp1010010
Rawat DB. Journal of Cybersecurity and Privacy: A New Open Access Journal. Journal of Cybersecurity and Privacy. 2021; 1(1):195-198. https://doi.org/10.3390/jcp1010010
Chicago/Turabian StyleRawat, Danda B. 2021. "Journal of Cybersecurity and Privacy: A New Open Access Journal" Journal of Cybersecurity and Privacy 1, no. 1: 195-198. https://doi.org/10.3390/jcp1010010
APA StyleRawat, D. B. (2021). Journal of Cybersecurity and Privacy: A New Open Access Journal. Journal of Cybersecurity and Privacy, 1(1), 195-198. https://doi.org/10.3390/jcp1010010