Skip Content
You are currently on the new version of our website. Access the old version .
  • Tracked for
    Impact Factor
  • 9.1
    CiteScore
  • 22 days
    Time to First Decision

Journal of Cybersecurity and Privacy, Volume 6, Issue 1

2026 February - 25 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (25)

  • Article
  • Open Access

DIGITRACKER: An Efficient Tool Leveraging Loki for Detecting, Mitigating Cyber Threats and Empowering Cyber Defense

  • Mohammad Meraj Mirza,
  • Rayan Saad Alsuwat,
  • Yasser Musaed Alqurashi,
  • Abdullah Adel Alharthi,
  • Abdulrahman Matar Alsuwat,
  • Osama Mohammed Alasamri and
  • Nasser Ahmed Hussain

Cybersecurity teams rely on signature-based scanners such as Loki, a command-line tool for scanning malware, to identify Indicators of Compromise (IOCs), malicious artifacts, and YARA-rule matches. However, the raw Loki log output delivered as CSV or...

  • Article
  • Open Access

Digital Boundaries and Consent in the Metaverse: A Comparative Review of Privacy Risks

  • Sofia Sakka,
  • Vasiliki Liagkou,
  • Afonso Ferreira and
  • Chrysostomos Stylios

Metaverse presents significant opportunities for educational advancement by facilitating immersive, personalized, and interactive learning experiences through technologies such as virtual reality (VR), augmented reality (AR), extended reality (XR), a...

  • Article
  • Open Access
188 Views
14 Pages

Trusted Yet Flexible: High-Level Runtimes for Secure ML Inference in TEEs

  • Nikolaos-Achilleas Steiakakis and
  • Giorgos Vasiliadis

Machine learning inference is increasingly deployed on shared and cloud infrastructures, where both user inputs and model parameters are highly sensitive. Confidential computing promises to protect these assets using Trusted Execution Environments (T...

  • Article
  • Open Access
141 Views
41 Pages

Wireless sensor networks comprise many resource-constrained nodes that must protect both local readings and routing metadata. The sensors collect data from the environment or from the individual to whom they are attached and transmit it to the neares...

  • Article
  • Open Access
120 Views
21 Pages

Image Encryption Using Chaotic Box Partition–Permutation and Modular Diffusion with PBKDF2 Key Derivation

  • Javier Alberto Vargas Valencia,
  • Mauricio A. Londoño-Arboleda,
  • Hernán David Salinas Jiménez,
  • Carlos Alberto Marín Arango and
  • Luis Fernando Duque Gómez

This work presents a hybrid chaotic–cryptographic image encryption method that integrates a physical two-dimensional delta-kicked oscillator with a PBKDF2-HMAC-SHA256 key derivation function (KDF). The user-provided key material—a 12-char...

  • Article
  • Open Access
432 Views
48 Pages

Generative Artificial Intelligence (GenAI) systems have introduced new classes of security incidents that traditional response frameworks were not designed to manage, ranging from model manipulation and data exfiltration to misinformation cascades an...

  • Article
  • Open Access
284 Views
24 Pages

Cross-site scripting (XSS) attacks are among the threats facing web security, resulting from the diversity and complexity of HTML formats. Research has shown that some text processing-based methods are limited in their ability to detect this type of...

  • Article
  • Open Access
533 Views
22 Pages

A Comparative Evaluation of Snort and Suricata for Detecting Data Exfiltration Tunnels in Cloud Environments

  • Mahmoud H. Qutqut,
  • Ali Ahmed,
  • Mustafa K. Taqi,
  • Jordan Abimanyu,
  • Erika Thea Ajes and
  • Fatima Alhaj

Data exfiltration poses a major cybersecurity challenge because it involves the unauthorized transfer of sensitive information. Intrusion Detection Systems (IDSs) are vital security controls in identifying such attacks; however, their effectiveness i...

  • Article
  • Open Access
376 Views
15 Pages

Theoretical Vulnerabilities in Quantum Integrity Verification Under Bell-Hidden Variable Convergence

  • Jose R. Rosas-Bustos,
  • Jesse Van Griensven Thé,
  • Roydon Andrew Fraser,
  • Sebastian Ratto Valderrama,
  • Nadeem Said and
  • Andy Thanos

This paper identifies theoretical vulnerabilities in quantum integrity verification by demonstrating that Bell inequality (BI) violations, central to the detection of quantum entanglement, can align with predictions from hidden variable theories (HVT...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X