Editorial: Journal of Cyber Security and Risk Auditing
By Youakim Badr
Adversarial Attack Detection in Industrial Control Systems Using LSTM-Based Intrusion Detection and Black-Box Defense Strategies
By Motaz Abdulaziz Almedires, Ahmed Elkhalil, Mohammed Amin
Security and Privacy Challenges and Solutions in Autonomous Driving Systems: A Comprehensive Review
By Giuseppe Lippi, Mahmoud Aljawarneh, Qais Al-Na’amneh, Rahaf Hazaymih, Lachhman Das Dhomeja
A Hybrid Genetic Algorithm and Hidden Markov Model-Based Hashing Technique for Robust Data Security
By Aseel AlShuaibi, Muhammad Waqas Arshad, Mohammed Maayah
Analytical Analysis of Cyber Threats and Defense Mechanisms for Web Application Security
By Bashaer Almelehy, Mohammad Ahmad, Ghalia Nassreddine, Mohammed Maayah, Aparna Achanta
Utilizing IDS and IPS to Improve Cybersecurity Monitoring Process
By Sokroeurn Ang, Mony Ho, Sopheaktra Huy, Midhunchakkaravarthy Janarthanan
Cybersecurity Challenges in Small and Medium Enterprises: A Scoping Review
By Mujtaba Awan, Abu Alam, Muhammad Kamran
Secure Blockchain-Based Tracking Storage and Permission Verification of Electronic Health Records
By Theyazn H. H. Aldhyani, Mohamed Chahine Ghanem, Mohammad Almaayah
A Novel Authentication Systems in Vehicular Communication: Challenges and Future Directions
By Vugar Abdullayev, Alex Khang, Nazila Ragimova, Mohammed Almaayah