You are currently viewing a new version of our website. To view the old version click .
  • Tracked forImpact Factor
  • 9.1CiteScore
  • 25 daysTime to First Decision

Journal of Cybersecurity and Privacy, Volume 5, Issue 2

June 2025 - 25 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (25)

  • Review
  • Open Access
2,797 Views
33 Pages

As offensive cyber operations have become more commonplace, cyber collateral damage (CCD) to society and to civilian infrastructure has expanded in impact and severity. Several research contexts, frameworks, and methods apply to these collateral effe...

  • Article
  • Open Access
9,165 Views
25 Pages

Improving Threat Detection in Wazuh Using Machine Learning Techniques

  • Samir Achraf Chamkar,
  • Mounia Zaydi,
  • Yassine Maleh and
  • Noreddine Gherabi

The increasing complexity and sophistication of cyber threats underscore the critical need for advanced threat detection mechanisms within Security Operations Centers (SOCs) to effectively mitigate risks and enhance cybersecurity resilience. This stu...

  • Review
  • Open Access
3 Citations
3,082 Views
26 Pages

A Survey on Immersive Cyber Situational Awareness Systems

  • Hussain Ahmad,
  • Faheem Ullah and
  • Rehan Jafri

Cyber situational awareness systems are increasingly used for creating cyber common operating pictures for cybersecurity analysis and education. However, these systems face data occlusion and convolution issues due to the burgeoning complexity, dimen...

  • Article
  • Open Access
3,357 Views
41 Pages

The increasing prevalence of malicious Microsoft Office documents poses a significant threat to cybersecurity. Conventional methods of detecting these malicious documents often rely on prior knowledge of the document or the exploitation method employ...

  • Article
  • Open Access
2 Citations
2,987 Views
28 Pages

In an age of AI-generated content and deepfakes, fake news and disinformation are increasingly spread using manipulated or fabricated images. To address this challenge, we introduce Post-Quantum VerITAS, a cryptographic framework for verifying the au...

  • Feature Paper
  • Article
  • Open Access
1 Citations
4,983 Views
36 Pages

Containerized applications are pivotal to contemporary cloud-native architectures, yet they present novel security challenges. Kubernetes, a prevalent open-source platform for container orchestration, provides robust automation but lacks inherent sec...

  • Article
  • Open Access
930 Views
20 Pages

As adaptive multi-rate (AMR) speech applications become increasingly widespread, AMR-based steganography presents growing security risks. Conventional steganalysis methods often assume known embedding rates, limiting their practicality in real-world...

  • Article
  • Open Access
1 Citations
1,970 Views
23 Pages

Post-Quantum Digital Signature: Verkle-Based HORST

  • Maksim Iavich,
  • Tamari Kuchukhidze and
  • Razvan Bocu

The security of commonly used cryptographic systems like RSA and ECC might be threatened by the future development of quantum computing. Verkle-based HORST decreases the size of signatures by 75% (from 12.8 KB to 3.2 KB) and enables O(1)-sized proofs...

  • Article
  • Open Access
2 Citations
4,552 Views
29 Pages

Wireless Local Area Networks (WLANs), particularly Wi-Fi, serve as the backbone of modern connectivity, supporting billions of devices globally and forming a critical component in Internet of Things (IoT) ecosystems. However, the increasing ubiquity...

  • Article
  • Open Access
4 Citations
6,202 Views
21 Pages

Phishing remains a persistent cybersecurity threat, often bypassing traditional detection methods due to evolving attack techniques. This study presents a Reinforcement Learning (RL)-based phishing detection framework, leveraging a Deep Q-Network (DQ...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X