Skip to Content
  • Tracked for
    Impact Factor
  • 9.1
    CiteScore
  • 22 days
    Time to First Decision

Journal of Cybersecurity and Privacy, Volume 5, Issue 3

2025 September - 42 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (42)

  • Article
  • Open Access
3,623 Views
21 Pages

The rapid expansion of mobile financial services (MFSs) has brought about benefits in terms of financial inclusion in developing countries; however, threats have also emerged on the sides of cybersecurity and privacy. Traditional fraud-detection stra...

  • Review
  • Open Access
5 Citations
7,430 Views
28 Pages

Cyber Attacks on Space Information Networks: Vulnerabilities, Threats, and Countermeasures for Satellite Security

  • Afsana Sharmin,
  • Bahar Uddin Mahmud,
  • Norun Nabi,
  • Mujiba Shaima and
  • Md Jobair Hossain Faruk

The growing reliance on satellite-based infrastructures for communication, navigation, defense, and environmental monitoring has magnified the urgency of securing Space Information Networks (SINs) against cyber threats. This paper presents a comprehe...

  • Article
  • Open Access
1,336 Views
27 Pages

Microarchitectural Malware Detection via Translation Lookaside Buffer (TLB) Events

  • Cristian Agredo,
  • Daniel F. Koranek,
  • Christine M. Schubert Kabban,
  • Jose A. Gutierrez del Arroyo and
  • Scott R. Graham

Prior work has shown that Translation Lookaside Buffer (TLB) data contains valuable behavioral information. Many existing methodologies rely on timing features or focus solely on workload classification. In this study, we propose a novel approach to...

  • Article
  • Open Access
1 Citations
5,838 Views
16 Pages

Ensuring data privacy and security in sensitive domains such as healthcare remains a critical challenge. Homomorphic Encryption (HE) offers a promising approach by enabling computations directly on encrypted data, but the diversity of available schem...

  • Article
  • Open Access
2 Citations
2,427 Views
23 Pages

Supervisory Control and Data Acquisition (SCADA) systems play a critical role in industrial processes by providing real-time monitoring and control of equipment across large-scale, distributed operations. In the context of cyber security, Intrusion D...

  • Article
  • Open Access
1,534 Views
11 Pages

Structured Heatmap Learning for Multi-Family Malware Classification: A Deep and Explainable Approach Using CAPEv2

  • Oussama El Rhayati,
  • Hatim Essadeq,
  • Omar El Beqqali,
  • Hamid Tairi,
  • Mohamed Lamrini and
  • Jamal Riffi

Accurate malware family classification from dynamic sandbox reports continues to be a fundamental cybersecurity challenge. Most prior works depend on random splits that tend to overestimate accuracy, whereas deployment requires robustness under tempo...

  • Article
  • Open Access
6,706 Views
24 Pages

Large language models (LLMs) have become essential in various use cases, such as code generation, reasoning, or translation. Applications vary from language understanding to decision making. Despite this rapid evolution, significant concerns appear r...

  • Article
  • Open Access
1,748 Views
29 Pages

Ransomware is a fast-evolving form of cybercrime in which a ransom is demanded to restore access to a victim’s encrypted files. The business model of the criminals relies on victims being willing to pay the ransom demand. In this paper we use i...

  • Article
  • Open Access
6,351 Views
31 Pages

Electronic health record (EHR) data breaches create severe concerns for patients’ privacy, safety, and risk of loss for healthcare entities responsible for managing patient health records. EHR systems collect a vast amount of user-sensitive dat...

  • Article
  • Open Access
1 Citations
2,144 Views
20 Pages

Modern network intrusion detection systems (NIDSs) rely on complex deep learning models. However, the “black-box” nature of deep learning methods hinders transparency and trust in predictions, preventing the timely implementation of count...

  • Article
  • Open Access
1 Citations
2,889 Views
38 Pages

This study presents a novel and interpretable, deployment-ready framework for predicting cybersecurity incidents through item-level behavioral, cognitive, and dispositional indicators. Based on survey data from 453 professionals across countries and...

  • Article
  • Open Access
1,039 Views
32 Pages

Obligations in the Next-Generation Access Control (NGAC) standard enable the development of security-intensive workflow systems where access privileges evolve over time. However, specifying obligations for dynamic access requirements poses challenges...

  • Systematic Review
  • Open Access
3 Citations
4,125 Views
21 Pages

A Systematic Literature Review of Information Privacy in Blockchain Systems

  • Michael Herbert Ziegler,
  • Mariusz Nowostawski and
  • Basel Katt

In this literature review, we critically examine the evolving landscape of privacy in blockchain systems, with a particular focus on the differentiation of privacy attacks and protective measures across three distinct layers: the on-chain layer; the...

  • Article
  • Open Access
1,006 Views
24 Pages

Towards Analyzable Design Paradigms for Chaos-Based Cryptographic Primitives

  • Abubakar Abba,
  • Je Sen Teh,
  • Mohd Najwadi Yusoff and
  • Adnan Anwar

Although many chaos-based cryptosystems have been proposed over the past decade, they have yet to gain traction in real-world applications. A key reason for this is that most designs rely on security through obscurity, with unnecessarily complex stru...

  • Article
  • Open Access
1 Citations
4,543 Views
25 Pages

Threat Intelligence Extraction Framework (TIEF) for TTP Extraction

  • Anooja Joy,
  • Madhav Chandane,
  • Yash Nagare and
  • Faruk Kazi

The increasing complexity and scale of cyber threats demand advanced, automated methodologies for extracting actionable cyber threat intelligence (CTI). The automated extraction of Tactics, Techniques, and Procedures (TTPs) from unstructured threat r...

  • Article
  • Open Access
874 Views
19 Pages

Efficient k-Resilient Public Key Authenticated Encryption with Keyword Search

  • Koon-Ming Chan,
  • Swee-Huay Heng,
  • Syh-Yuan Tan and
  • Shing-Chiang Tan

Traditional encryption prioritises confidentiality but complicates search operations, requiring decryption before searches can be conducted. The public key encryption with keyword search (PEKS) scheme addresses this limitation by enabling authorised...

  • Article
  • Open Access
2,206 Views
16 Pages

Ransomware attacks pose a serious threat to global cybersecurity, inflicting severe financial and operational damage on organizations, individuals, and critical infrastructure. Despite their pervasive impact, proactive measures to mitigate ransomware...

  • Article
  • Open Access
1 Citations
2,579 Views
54 Pages

The growing sophistication of cyber threats has posed significant challenges for organizations in terms of accurately detecting and responding to incidents in a coordinated manner. Despite advances in the application of machine learning and automatio...

  • Article
  • Open Access
6,411 Views
22 Pages

This paper proposes and evaluates a novel real-time cybersecurity framework integrating artificial intelligence (AI) and blockchain technology to enhance the detection and auditability of cyber threats. Traditional cybersecurity approaches often lack...

  • Article
  • Open Access
2 Citations
3,860 Views
30 Pages

A Comprehensive Analysis of Evolving Permission Usage in Android Apps: Trends, Threats, and Ecosystem Insights

  • Ali Alkinoon,
  • Trung Cuong Dang,
  • Ahod Alghuried,
  • Abdulaziz Alghamdi,
  • Soohyeon Choi,
  • Manar Mohaisen,
  • An Wang,
  • Saeed Salem and
  • David Mohaisen

The proper use of Android app permissions is crucial to the success and security of these apps. Users must agree to permission requests when installing or running their apps. Despite official Android platform documentation on proper permission usage,...

  • Article
  • Open Access
1 Citations
953 Views
21 Pages

Metric Differential Privacy on the Special Orthogonal Group SO(3)

  • Anna Katharina Hildebrandt,
  • Elmar Schömer and
  • Andreas Hildebrandt

Differential privacy (DP) is an important framework to provide strong theoretical guarantees on the privacy and utility of released data. Since its introduction in 2006, DP has been applied to various data types and domains. More recently, the introd...

  • Article
  • Open Access
1,477 Views
21 Pages

In today’s era of technology, where information is readily available anytime and from anywhere, safeguarding our privacy and sensitive data is more important than ever. The thermal sensors embedded within a CPU are primarily utilized for monito...

  • Article
  • Open Access
4 Citations
6,521 Views
60 Pages

The increasing complexity and volume of cybersecurity logs demand advanced analytical techniques capable of accurate threat detection and explainability. This paper investigates the application of Large Language Models (LLMs), specifically qwen2.5:7b...

  • Article
  • Open Access
932 Views
19 Pages

Frame-wise steganalysis is a crucial task in low-bit-rate speech streams that can achieve active defense. However, there is no common theory on how to extract steganalysis features for frame-wise steganalysis. Moreover, existing frame-wise steganalys...

  • Article
  • Open Access
3,817 Views
17 Pages

In the modern era, the use of blockchain technology has been growing rapidly, where Ethereum smart contracts play an important role in securing decentralized application systems. However, these smart contracts are also susceptible to a large number o...

  • Article
  • Open Access
1 Citations
2,580 Views
28 Pages

As Android malware grows increasingly sophisticated, traditional detection methods struggle to keep pace, creating an urgent need for robust, interpretable, and real-time solutions to safeguard mobile ecosystems. This study introduces YoloMal-XAI, a...

  • Article
  • Open Access
1,331 Views
20 Pages

This study explores the emergent dynamics of knowledge sovereignty within organisations following data breach incidents. Using qualitative analysis based on Benoit’s image restoration theory, this study shows that employees do more than relay o...

  • Systematic Review
  • Open Access
1 Citations
4,792 Views
36 Pages

Is Blockchain the Future of AI Alignment? Developing a Framework and a Research Agenda Based on a Systematic Literature Review

  • Alexander Neulinger,
  • Lukas Sparer,
  • Maryam Roshanaei,
  • Dragutin Ostojić,
  • Jainil Kakka and
  • Dušan Ramljak

Artificial intelligence (AI) agents are increasingly shaping vital sectors of society, including healthcare, education, supply chains, and finance. As their influence grows, AI alignment research plays a pivotal role in ensuring these systems are tru...

  • Article
  • Open Access
3 Citations
1,478 Views
18 Pages

End-users in a decision-oriented Internet of Things (IoT) healthcare system are often left in the dark regarding critical security information necessary for making informed decisions about potential risks. This is partly due to the lack of transparen...

  • Article
  • Open Access
3 Citations
2,607 Views
36 Pages

The Internet of Vehicles (IoV) presents a vast opportunity for optimised traffic flow, road safety, and enhanced usage experience with the influence of Federated Learning (FL). However, the distributed nature of IoV networks creates certain inherent...

  • Article
  • Open Access
2 Citations
2,298 Views
24 Pages

With the increasing sophistication of network attacks, machine learning (ML)-based methods have showcased promising performance in attack detection. However, ML-based methods often suffer from high false rates when tackling encrypted malicious traffi...

  • Article
  • Open Access
1 Citations
2,495 Views
28 Pages

Detecting Jamming in Smart Grid Communications via Deep Learning

  • Muhammad Irfan,
  • Aymen Omri,
  • Javier Hernandez Fernandez,
  • Savio Sciancalepore and
  • Gabriele Oligeri

Power-Line Communication (PLC) allows data transmission through existing power lines, thus avoiding the expensive deployment of ad hoc network infrastructures. However, power line networks remain vastly unattended, which allows tampering by malicious...

  • Article
  • Open Access
1 Citations
1,680 Views
36 Pages

Triple-Shield Privacy in Healthcare: Federated Learning, p-ABCs, and Distributed Ledger Authentication

  • Sofia Sakka,
  • Nikolaos Pavlidis,
  • Vasiliki Liagkou,
  • Ioannis Panges,
  • Despina Elizabeth Filippidou,
  • Chrysostomos Stylios and
  • Anastasios Manos

The growing influence of technology in the healthcare industry has led to the creation of innovative applications that improve convenience, accessibility, and diagnostic accuracy. However, health applications face significant challenges concerning us...

  • Opinion
  • Open Access
1 Citations
2,879 Views
13 Pages

A Framework for the Design of Privacy-Preserving Record Linkage Systems

  • Zixin Nie,
  • Benjamin Tyndall,
  • Daniel Brannock,
  • Emily Gentles,
  • Elizabeth Parish and
  • Alison Banger

Record linkage can enhance the utility of data by bringing data together from different sources, increasing the available information about data subjects and providing more holistic views. Doing so, however, can increase privacy risks. To mitigate th...

  • Article
  • Open Access
9 Citations
6,346 Views
22 Pages

The widespread rise of misinformation across digital platforms has increased the demand for accurate and efficient Fake News Detection (FND) systems. This study introduces an enhanced transformer-based architecture for FND, developed through comprehe...

  • Article
  • Open Access
2 Citations
2,701 Views
25 Pages

The emergence of quantum computing and Shor’s algorithm necessitates an imminent shift from current public key cryptography techniques to post-quantum-robust techniques. The NIST has responded by standardising Post-Quantum Cryptography (PQC) al...

  • Systematic Review
  • Open Access
3 Citations
5,726 Views
24 Pages

A Systematic Review on Hybrid AI Models Integrating Machine Learning and Federated Learning

  • Jallal-Eddine Moussaoui,
  • Mehdi Kmiti,
  • Khalid El Gholami and
  • Yassine Maleh

Cyber threats are growing in scale and complexity, outpacing the capabilities of traditional security systems. Machine learning (ML) models offer enhanced detection accuracy but often rely on centralized data, raising privacy concerns. Federated lear...

  • Article
  • Open Access
11,445 Views
14 Pages

The European Union’s Artificial Intelligence Act (EU AI Act) is expected to be a major legal breakthrough in an attempt to tame AI’s negative aspects by setting common rules and obligations for companies active in the EU Single Market. Gl...

  • Article
  • Open Access
3 Citations
3,353 Views
29 Pages

Denial-of-Service Attacks on Permissioned Blockchains: A Practical Study

  • Mohammad Pishdar,
  • Yixing Lei,
  • Khaled Harfoush and
  • Jawad Manzoor

Hyperledger Fabric (HLF) is a leading permissioned blockchain platform designed for enterprise applications. However, it faces significant security risks from Denial-of-Service (DoS) attacks targeting its core components. This study systematically in...

  • Article
  • Open Access
6,325 Views
26 Pages

This study investigates the effectiveness of two cybersecurity awareness interventions—phishing simulations and organized online training—in enhancing end-user resilience to phishing attacks in a Croatian university setting. Three control...

  • Article
  • Open Access
4 Citations
3,063 Views
19 Pages

Federated learning enables privacy-preserving model training across distributed clients, yet real-world deployments face statistical, system, and behavioral heterogeneity, which degrades performance and increases vulnerability to adversarial clients....

  • Article
  • Open Access
1 Citations
1,736 Views
17 Pages

While Local Differential Privacy (LDP) offers strong privacy guarantees for IoT data collection, users often struggle to understand its implications and control their privacy settings. This paper presents a user-centric approach to implementing LDP i...

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X