{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T01:54:29Z","timestamp":1760234069677,"version":"build-2065373602"},"reference-count":17,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T00:00:00Z","timestamp":1616112000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"abstract":"<jats:p>The Cybersecurity and Privacy field has been one of the most critical parts of our lives and modern society at large [...]<\/jats:p>","DOI":"10.3390\/jcp1010010","type":"journal-article","created":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T03:41:21Z","timestamp":1616125281000},"page":"195-198","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Journal of Cybersecurity and Privacy: A New Open Access Journal"],"prefix":"10.3390","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3638-3464","authenticated-orcid":false,"given":"Danda B.","family":"Rawat","sequence":"first","affiliation":[{"name":"Data Science and Cybersecurity Center, Department of Electrical Engineering and Computer Science, Howard University, Washington, DC 20059, USA"}]}],"member":"1968","published-online":{"date-parts":[[2021,3,19]]},"reference":[{"key":"ref_1","first-page":"9","article-title":"Regulating Autonomous Vehicles in a Smart Urban Transport System: Safety, Security, and Privacy Issues","volume":"12","author":"Ljungholm","year":"2020","journal-title":"Contemp. Readings L. Soc."},{"key":"ref_2","unstructured":"Rawat, D.B., and Ghafoor, K.Z. (2018). Smart Cities Cybersecurity and Privacy, Elsevier Press."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Jeschke, S., Brecher, C., Song, H., and Rawat, D.B. (2016). Industrial Internet of Things: Cyber-Manufacturing Systems, Springer.","DOI":"10.1007\/978-3-319-42559-7"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Rawat, D.B., Rodrigues, J., and Stojmenovic, I. (2015). Cyber Physical Systems: From Theory to Practice, CRC Press.","DOI":"10.1201\/b19290"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Olowononi, F., Rawat, D.B., and Liu, C. (2021). Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS. IEEE Commun. Surv. Tutor.","DOI":"10.1109\/COMST.2020.3036778"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1109\/COMST.2016.2618874","article-title":"Software Defined Networking Architecture, Security and Energy Efficiency: A Survey","volume":"19","author":"Rawat","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.future.2020.11.026","article-title":"Hiding Sensitive Information in Ehealth Datasets","volume":"117","author":"Wu","year":"2021","journal-title":"Futur. Gener. Comput. Syst."},{"key":"ref_8","unstructured":"Peiser, J. (2021, February 25). A Hacker Broke into a Florida Town\u2019s Water Supply and Tried to Poison it with Lye, Police Said, 2021. Available online: https:\/\/www.washingtonpost.com\/nation\/2021\/02\/09\/oldsmar-water-supply-hack-florida."},{"key":"ref_9","unstructured":"(2021, February 25). Hackers Remotely Kill a Jeep on the Highway\u2014With Me in It. Available online: https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Uprety, A., and Rawat, D.B. (2020). Reinforcement Learning for IoT Security: A Comprehensive Survey. IEEE Internet Things J.","DOI":"10.1109\/JIOT.2020.3040957"},{"key":"ref_11","unstructured":"(2021, February 25). The Real Story of How the Internet Became so Vulnerable, The Washington Post. Available online: https:\/\/www.washingtonpost.com\/sf\/business\/2015\/05\/30\/net-of-insecurity-part-1\/."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Rawat, D.B., and Bajracharya, C. (2015). Cyber security for smart grid systems: Status, challenges and perspectives. SoutheastCon, 1\u20136.","DOI":"10.1109\/SECON.2015.7132891"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1652","DOI":"10.1109\/LSP.2015.2421935","article-title":"Detection of False Data Injection Attacks in Smart Grid Communication Systems","volume":"22","author":"Rawat","year":"2015","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Rawat, D.B., and Bajracharya, C. (2016). Vehicular Cyber Physical Systems: Adaptive Connectivity and Security, Springer.","DOI":"10.1007\/978-3-319-44494-9"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Safavat, S., and Rawat, D.B. (2020). On the Elliptic Curve Cryptography for Privacy-Aware Secure ACO-AODV Routing in Intent-Based Internet of Vehicles for Smart Cities. IEEE Trans. Intell. Transp. Syst.","DOI":"10.1109\/TITS.2020.3008361"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1023","DOI":"10.1109\/COMST.2014.2380998","article-title":"Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey","volume":"17","author":"Sharma","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_17","unstructured":"(2021, February 25). Healthcare Breaches Affected Nearly One Million US Patients: The Security Risks of Medical IoT URL. Available online: https:\/\/blog.checkpoint.com\/2019\/05\/29\/ultrasound-iot-hack-security-risks-healthcare-medical-device-michigan-ransomware\/."}],"container-title":["Journal of Cybersecurity and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/1\/10\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:37:54Z","timestamp":1760161074000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/1\/10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,19]]},"references-count":17,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2021,3]]}},"alternative-id":["jcp1010010"],"URL":"https:\/\/doi.org\/10.3390\/jcp1010010","relation":{},"ISSN":["2624-800X"],"issn-type":[{"type":"electronic","value":"2624-800X"}],"subject":[],"published":{"date-parts":[[2021,3,19]]}}}