You are currently viewing a new version of our website. To view the old version click .
  • Tracked forImpact Factor
  • 9.1CiteScore
  • 25 daysTime to First Decision

Journal of Cybersecurity and Privacy, Volume 5, Issue 1

March 2025 - 10 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (10)

  • Article
  • Open Access
4,022 Views
28 Pages

Machine Learning-Based Attack Detection and Mitigation with Multi-Controller Placement Optimization over SDN Environment

  • Binod Sapkota,
  • Arjun Ray,
  • Manish Kumar Yadav,
  • Babu R. Dawadi and
  • Shashidhar R. Joshi

The increasing complexity and scale of modern software-defined networking demands advanced solutions to address security challenges, particularly distributed denial-of-service (DDoS) attacks in multi-controller environments. Traditional single-contro...

  • Article
  • Open Access
8 Citations
4,925 Views
36 Pages

The increasing sophistication of fraud tactics necessitates advanced detection methods to protect financial assets and maintain system integrity. Various approaches based on artificial intelligence have been proposed to identify fraudulent activities...

  • Article
  • Open Access
2 Citations
2,624 Views
30 Pages

Chaotic Hénon–Logistic Map Integration: A Powerful Approach for Safeguarding Digital Images

  • Abeer Al-Hyari,
  • Mua’ad Abu-Faraj,
  • Charlie Obimbo and
  • Moutaz Alazab

This paper presents an integrated chaos-based algorithm for image encryption that combines the chaotic Hénon map and chaotic logistic map (CLM) to enhance the security of digital image communication. The proposed method leverages chaos theory...

  • Article
  • Open Access
3 Citations
4,063 Views
39 Pages

The relationship and the interplay between the EU AI Act and the data protection law is a challenging issue. This paper focuses on exploring the interplay between legal provisions stemming from the AI Act and those stemming from the GDPR, with the ul...

  • Article
  • Open Access
5 Citations
9,697 Views
26 Pages

Partial Fake Speech Attacks in the Real World Using Deepfake Audio

  • Abdulazeez Alali and
  • George Theodorakopoulos

Advances in deep learning have led to dramatic improvements in generative synthetic speech, eliminating robotic speech patterns to create speech that is indistinguishable from a human voice. Although these advances are extremely useful in various app...

  • Article
  • Open Access
2 Citations
1,863 Views
42 Pages

Common data environments (CDEs) are centralized repositories in the architecture, engineering, and construction (AEC) industry designed to improve collaboration and project efficiency. However, CDEs hosted on cloud platforms face significant risks fr...

  • Article
  • Open Access
1 Citations
3,178 Views
31 Pages

Banking malware poses a significant threat to users by infecting their computers and then attempting to perform malicious activities such as surreptitiously stealing confidential information from them. Banking malware variants are also continuing to...

  • Article
  • Open Access
2 Citations
2,096 Views
31 Pages

Intrusion detection has been a vast-surveyed topic for many decades as network attacks are tremendously growing. This has heightened the need for security in networks as web-based communication systems are advanced nowadays. The proposed work introdu...

  • Article
  • Open Access
3 Citations
39,850 Views
41 Pages

Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations

  • Vedran Dakić,
  • Zlatan Morić,
  • Ana Kapulica and
  • Damir Regvart

The Zero Trust Architecture (ZTA) security system follows the “never trust, always verify” principle. The process constantly verifies users and devices trying to access resources. This paper describes how Microsoft Azure uses ZTA to enfor...

  • Article
  • Open Access
1 Citations
3,575 Views
22 Pages

Digital evidence is a critical component in today’s organizations, as it is the foundation on which any certification is based. This paper presents a risk assessment of evidence in the certification domain to identify the main security risks. T...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800XCreative Common CC BY license