You are currently viewing a new version of our website. To view the old version click .
  • Tracked forImpact Factor
  • 9.1CiteScore
  • 25 daysTime to First Decision

Journal of Cybersecurity and Privacy, Volume 5, Issue 4

December 2025 - 36 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (36)

  • Article
  • Open Access

High cybersecurity risks and attacks cause information theft, unauthorized access to data and information, reputational damage, and financial loss in small and medium enterprises (SMEs). This creates a need to adopt information security systems of SM...

  • Article
  • Open Access
134 Views
22 Pages

The rapid expansion of Internet of Things (IoT) technologies has introduced significant challenges in understanding the complexity and structure of network traffic data, which is essential for developing effective cybersecurity solutions. This resear...

  • Article
  • Open Access
150 Views
24 Pages

Smart phones have become an integral part of our lives in modern society, as we carry and use them throughout a day. However, this “body part” may maliciously collect and leak our personal information without our knowledge. When we instal...

  • Article
  • Open Access
519 Views
29 Pages

Leveraging Static Analysis for Feedback-Driven Security Patching in LLM-Generated Code

  • Kamel Alrashedy,
  • Abdullah Aljasser,
  • Pradyumna Tambwekar and
  • Matthew Gombolay

Large language models (LLMs) have shown remarkable potential for automatic code generation. Yet, these models share a weakness with their human counterparts: inadvertently generating code with security vulnerabilities that could allow unauthorized at...

  • Article
  • Open Access
358 Views
27 Pages

As technology advances, developers continually create innovative solutions to enhance smartphone security. However, the rapid spread of Android malware poses significant threats to devices and sensitive data. The Android Operating System (OS)’s...

  • Article
  • Open Access
280 Views
27 Pages

Towards an End-to-End (E2E) Adversarial Learning and Application in the Physical World

  • Dudi Biton,
  • Jacob Shams,
  • Satoru Koda,
  • Asaf Shabtai,
  • Yuval Elovici and
  • Ben Nassi

The traditional process for learning patch-based adversarial attacks, conducted in the digital domain and later applied in the physical domain (e.g., via printed stickers), may suffer reduced performance due to adversarial patches’ limited tran...

  • Article
  • Open Access
334 Views
14 Pages

Evaluating Privacy Technologies in Digital Payments: A Balanced Framework

  • Ioannis Fragkiadakis,
  • Stefanos Gritzalis and
  • Costas Lambrinoudakis

Privacy enhancement technologies are significant in the development of digital payment systems. At present, multiple innovative digital payment solutions have been introduced and may be implemented globally soon. As cyber threats continue to increase...

  • Article
  • Open Access
430 Views
29 Pages

Bridging Cybersecurity Practice and Law: A Hands-On, Scenario-Based Curriculum Using the NICE Framework to Foster Skill Development

  • Colman McGuan,
  • Aadithyan Vijaya Raghavan,
  • Komala M. Mandapati,
  • Chansu Yu,
  • Brian E. Ray,
  • Debbie K. Jackson and
  • Sathish Kumar

In an increasingly interconnected world, cybersecurity professionals play a pivotal role in safeguarding organizations from cyber threats. To secure their cyberspace, organizations are forced to adopt a cybersecurity framework such as the NIST Nation...

  • Article
  • Open Access
536 Views
64 Pages

Small and Medium-sized Enterprises (SMEs) face disproportionately high risks from Advanced Persistent Threats (APTs), which often evade traditional cybersecurity measures. Existing frameworks catalogue adversary tactics and defensive solutions but pr...

  • Article
  • Open Access
331 Views
20 Pages

The widespread dissemination of misleading news presents serious challenges to public discourse, democratic institutions, and societal trust. Misleading-news classification (MNC) has been extensively studied through deep neural models that rely mainl...

of 4

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X