Skip to Content
You are currently on the new version of our website. Access the old version .
  • Tracked for
    Impact Factor
  • 9.1
    CiteScore
  • 22 days
    Time to First Decision

Most Recent

  • Article
  • Open Access

Network slicing is a core enabler of multi-tenant 5th Generation (5G) architectures, allowing heterogeneous services to coexist over shared infrastructure. However, ensuring effective isolation between slices remains a critical security challenge, as...

  • Review
  • Open Access

The rapid expansion of electric vehicles (EVs) has added complexity to the resilience and security challenges to the EV charging systems, especially owing to the exposure to the cyber–physical threats and the reliance on centrally coordinated s...

  • Article
  • Open Access
43 Views
18 Pages

The exponential growth of network traffic and the increasing sophistication of cyberattacks have underscored the need for intelligent and real-time Intrusion Detection Systems (IDS). Traditional flow-based IDS models typically analyze each network fl...

  • Article
  • Open Access
147 Views
24 Pages

The rapid growth of digital communication has heightened the need for the secure transfer of sensitive image data. This is due to the increasing threats posed by cyberattacks and unauthorized access. Traditional encryption methods, while effective fo...

  • Review
  • Open Access
173 Views
25 Pages

Addressing the Cybersecurity Skills Shortage in Lithuania: Policy Insights from the United Kingdom

  • Carlene Campbell,
  • Sergio Jofre,
  • Giedre Sabaliauskaite,
  • Carolyne Obonyo and
  • Odayne Haughton

Cybersecurity has become a critical challenge to policy as cyber threats continue to increase in frequency, sophistication, and societal impact, exposing the growing vulnerability of the critical infrastructure supporting vital societal functions. Gl...

  • Article
  • Open Access
139 Views
29 Pages

cyberSPADE: A Hierarchical Multi-Agent Architecture for Coordinated Cyberdefense

  • Lucía Alba Torres,
  • Miguel Rebollo,
  • Javier Palanca and
  • Mario Aragonés Lozano

Modern cyber threats demand coordinated defensive strategies that extend beyond centralized security mechanisms. However, existing multi-agent platforms exhibit critical limitations in explicit communication and real-time coordination for cyberdefens...

  • Article
  • Open Access
141 Views
36 Pages

Generative AI (GenAI) systems are increasingly deployed across high-impact sectors, introducing security risks that fundamentally differ from those of traditional software. Their probabilistic behavior, emergent failure modes, and expanded attack sur...

  • Article
  • Open Access
143 Views
28 Pages

The emerging scope of the Industrial Internet of Services (IIoS) requires a robust intrusion detection system to detect malicious attacks. The increasing frequency of sophisticated and high-impact cyber attacks has resulted in financial losses and ca...

  • Article
  • Open Access
233 Views
25 Pages

DIGITRACKER: An Efficient Tool Leveraging Loki for Detecting, Mitigating Cyber Threats and Empowering Cyber Defense

  • Mohammad Meraj Mirza,
  • Rayan Saad Alsuwat,
  • Yasser Musaed Alqurashi,
  • Abdullah Adel Alharthi,
  • Abdulrahman Matar Alsuwat,
  • Osama Mohammed Alasamri and
  • Nasser Ahmed Hussain

Cybersecurity teams rely on signature-based scanners such as Loki, a command-line tool for scanning malware, to identify Indicators of Compromise (IOCs), malicious artifacts, and YARA-rule matches. However, the raw Loki log output delivered as CSV or...

  • Article
  • Open Access
247 Views
29 Pages

Digital Boundaries and Consent in the Metaverse: A Comparative Review of Privacy Risks

  • Sofia Sakka,
  • Vasiliki Liagkou,
  • Afonso Ferreira and
  • Chrysostomos Stylios

Metaverse presents significant opportunities for educational advancement by facilitating immersive, personalized, and interactive learning experiences through technologies such as virtual reality (VR), augmented reality (AR), extended reality (XR), a...

  • Article
  • Open Access
281 Views
14 Pages

Trusted Yet Flexible: High-Level Runtimes for Secure ML Inference in TEEs

  • Nikolaos-Achilleas Steiakakis and
  • Giorgos Vasiliadis

Machine learning inference is increasingly deployed on shared and cloud infrastructures, where both user inputs and model parameters are highly sensitive. Confidential computing promises to protect these assets using Trusted Execution Environments (T...

  • Article
  • Open Access
190 Views
41 Pages

Wireless sensor networks comprise many resource-constrained nodes that must protect both local readings and routing metadata. The sensors collect data from the environment or from the individual to whom they are attached and transmit it to the neares...

  • Article
  • Open Access
169 Views
21 Pages

Image Encryption Using Chaotic Box Partition–Permutation and Modular Diffusion with PBKDF2 Key Derivation

  • Javier Alberto Vargas Valencia,
  • Mauricio A. Londoño-Arboleda,
  • Hernán David Salinas Jiménez,
  • Carlos Alberto Marín Arango and
  • Luis Fernando Duque Gómez

This work presents a hybrid chaotic–cryptographic image encryption method that integrates a physical two-dimensional delta-kicked oscillator with a PBKDF2-HMAC-SHA256 key derivation function (KDF). The user-provided key material—a 12-char...

  • Article
  • Open Access
731 Views
48 Pages

Generative Artificial Intelligence (GenAI) systems have introduced new classes of security incidents that traditional response frameworks were not designed to manage, ranging from model manipulation and data exfiltration to misinformation cascades an...

  • Article
  • Open Access
360 Views
24 Pages

Cross-site scripting (XSS) attacks are among the threats facing web security, resulting from the diversity and complexity of HTML formats. Research has shown that some text processing-based methods are limited in their ability to detect this type of...

  • Article
  • Open Access
729 Views
22 Pages

A Comparative Evaluation of Snort and Suricata for Detecting Data Exfiltration Tunnels in Cloud Environments

  • Mahmoud H. Qutqut,
  • Ali Ahmed,
  • Mustafa K. Taqi,
  • Jordan Abimanyu,
  • Erika Thea Ajes and
  • Fatima Alhaj

Data exfiltration poses a major cybersecurity challenge because it involves the unauthorized transfer of sensitive information. Intrusion Detection Systems (IDSs) are vital security controls in identifying such attacks; however, their effectiveness i...

  • Article
  • Open Access
505 Views
15 Pages

Theoretical Vulnerabilities in Quantum Integrity Verification Under Bell-Hidden Variable Convergence

  • Jose R. Rosas-Bustos,
  • Jesse Van Griensven Thé,
  • Roydon Andrew Fraser,
  • Sebastian Ratto Valderrama,
  • Nadeem Said and
  • Andy Thanos

This paper identifies theoretical vulnerabilities in quantum integrity verification by demonstrating that Bell inequality (BI) violations, central to the detection of quantum entanglement, can align with predictions from hidden variable theories (HVT...

  • Article
  • Open Access
812 Views
16 Pages

Cybersecurity education requires practical activities such as malware analysis, phishing detection, and Capture the Flag (CTF) challenges. These exercises enable students to actively apply theoretical concepts in realistic scenarios, fostering experi...

  • Article
  • Open Access
596 Views
36 Pages

Evaluation of Anomaly-Based Network Intrusion Detection Systems with Unclean Training Data for Low-Rate Attack Detection

  • Angela Oryza Prabowo,
  • Deka Julian Arrizki,
  • Baskoro Adi Pratomo,
  • Ahmad Ibnu Fajar,
  • Krisna Badru Wijaya,
  • Hudan Studiawan,
  • Ary Mazharuddin Shiddiqi and
  • Siti Hajar Othman

Anomaly-based network intrusion detection systems (NIDSs) complement signature-based detection methods to identify unknown (zero-day) attacks. The integration of machine and deep learning enhanced the efficiency of such NIDSs. However, since anomaly-...

  • Article
  • Open Access
326 Views
35 Pages

While face recognition systems are increasingly deployed in critical domains, they remain vulnerable to presentation attacks and exhibit significant demographic bias, particularly affecting African populations. This paper presents a fairness-aware Pr...

  • Review
  • Open Access
762 Views
38 Pages

A Comprehensive Review: The Evolving Cat-and-Mouse Game in Network Intrusion Detection Systems Leveraging Machine Learning

  • Qutaiba Alasad,
  • Meaad Ahmed,
  • Shahad Alahmed,
  • Omer T. Khattab,
  • Saba Alaa Abdulwahhab and
  • Jiann-Shuin Yuan

Machine learning (ML) techniques have significantly enhanced decision support systems to render them more accurate, efficient, and faster. ML classifiers in securing networks, on the other hand, face a disproportionate risk from the sophisticated adv...

  • Review
  • Open Access
625 Views
21 Pages

Industrial Control Systems (ICS) are fundamental to the operation, monitoring, and automation of critical infrastructure in sectors such as energy, water utilities, manufacturing, transportation, and oil and gas. According to the Purdue Model, ICS en...

  • Article
  • Open Access
665 Views
18 Pages

One of the major challenges for effective intrusion detection systems (IDSs) is continuously and efficiently incorporating changes on cyber-attack tactics, techniques, and procedures in the Internet of Things (IoT). Semi-automated cross-organizationa...

  • Article
  • Open Access
924 Views
15 Pages

Free live sports streaming (FLS) services attract millions of users who, driven by the excitement of live events, often engage with these high-risk platforms. Although these platforms are widely perceived as risky, the specific threats they pose have...

  • Article
  • Open Access
341 Views
26 Pages

This contribution outlines a completely new, fully local approach for secure web-based device control on the basis of browser inter-window messaging. Modern smart home IoT (Internet of Things) devices are commonly controlled with proprietary mobile a...

  • Communication
  • Open Access
788 Views
11 Pages

Explainability is increasingly expected to support not only interpretation, but also accountability, human oversight, and auditability in high-risk Artificial Intelligence (AI) systems. However, in many deployments, explanations are generated as isol...

  • Review
  • Open Access
922 Views
29 Pages

Acoustic Side-Channel Attacks (ASCAs) exploit the sound produced by keyboards and other devices to infer sensitive information without breaching software or network defenses. Recent advances in deep learning, large language models, and signal process...

  • Article
  • Open Access
659 Views
31 Pages

The Cyber Kill Chain (CKC) is a prevalent concept in cyber defense; nevertheless, its emphasis on post-reconnaissance phases limits the capacity to foresee attacker activities outside the organizational boundary. This study introduces and empirically...

  • Article
  • Open Access
700 Views
23 Pages

Statistical confidentiality focuses on protecting data to preserve its analytical value while preventing identity exposure, ensuring privacy and security in any system handling sensitive information. Homomorphic encryption allows computations on encr...

  • Article
  • Open Access
873 Views
20 Pages

Online hate speech poses a growing socio-technological threat that undermines democratic resilience and obstructs progress toward Sustainable Development Goal 16 (SDG 16). This study examines the regulatory and behavioral dimensions of this phenomeno...

  • Article
  • Open Access
598 Views
21 Pages

Using Secure Multi-Party Computation to Create Clinical Trial Cohorts

  • Rafael Borges,
  • Bruno Ferreira,
  • Carlos Machado Antunes,
  • Marisa Maximiano,
  • Ricardo Gomes,
  • Vítor Távora,
  • Manuel Dias,
  • Ricardo Correia Bezerra and
  • Patrício Domingues

The increasing volume of digital medical data offers substantial research opportunities, though its complete utilization is hindered by ongoing privacy and security obstacles. This proof-of-concept study explores and confirms the viability of using S...

  • Article
  • Open Access
438 Views
23 Pages

Huffman Tree and Binary Conversion for Efficient and Secure Data Encryption and Decryption

  • Suchart Khummanee,
  • Thanapat Cheawchanwattana,
  • Chanwit Suwannapong,
  • Sarutte Atsawaraungsuk and
  • Kritsanapong Somsuk

This study proposes the Huffman Tree and Binary Conversion (HTB) which is a preprocessing algorithm to transform the Huffman tree into binary representation before the encryption process. In fact, HTB can improve the structural readiness of plaintext...

  • Article
  • Open Access
851 Views
40 Pages

High cybersecurity risks and attacks cause information theft, unauthorized access to data and information, reputational damage, and financial loss in small and medium enterprises (SMEs). This creates a need to adopt information security systems of SM...

  • Article
  • Open Access
932 Views
22 Pages

The rapid expansion of Internet of Things (IoT) technologies has introduced significant challenges in understanding the complexity and structure of network traffic data, which is essential for developing effective cybersecurity solutions. This resear...

  • Article
  • Open Access
1,437 Views
29 Pages

Leveraging Static Analysis for Feedback-Driven Security Patching in LLM-Generated Code

  • Kamel Alrashedy,
  • Abdullah Aljasser,
  • Pradyumna Tambwekar and
  • Matthew Gombolay

Large language models (LLMs) have shown remarkable potential for automatic code generation. Yet, these models share a weakness with their human counterparts: inadvertently generating code with security vulnerabilities that could allow unauthorized at...

  • Article
  • Open Access
777 Views
27 Pages

As technology advances, developers continually create innovative solutions to enhance smartphone security. However, the rapid spread of Android malware poses significant threats to devices and sensitive data. The Android Operating System (OS)’s...

  • Article
  • Open Access
668 Views
27 Pages

Towards an End-to-End (E2E) Adversarial Learning and Application in the Physical World

  • Dudi Biton,
  • Jacob Shams,
  • Satoru Koda,
  • Asaf Shabtai,
  • Yuval Elovici and
  • Ben Nassi

The traditional process for learning patch-based adversarial attacks, conducted in the digital domain and later applied in the physical domain (e.g., via printed stickers), may suffer reduced performance due to adversarial patches’ limited tran...

  • Article
  • Open Access
1 Citations
751 Views
14 Pages

Evaluating Privacy Technologies in Digital Payments: A Balanced Framework

  • Ioannis Fragkiadakis,
  • Stefanos Gritzalis and
  • Costas Lambrinoudakis

Privacy enhancement technologies are significant in the development of digital payment systems. At present, multiple innovative digital payment solutions have been introduced and may be implemented globally soon. As cyber threats continue to increase...

  • Article
  • Open Access
1,049 Views
29 Pages

Bridging Cybersecurity Practice and Law: A Hands-On, Scenario-Based Curriculum Using the NICE Framework to Foster Skill Development

  • Colman McGuan,
  • Aadithyan Vijaya Raghavan,
  • Komala M. Mandapati,
  • Chansu Yu,
  • Brian E. Ray,
  • Debbie K. Jackson and
  • Sathish Kumar

In an increasingly interconnected world, cybersecurity professionals play a pivotal role in safeguarding organizations from cyber threats. To secure their cyberspace, organizations are forced to adopt a cybersecurity framework such as the NIST Nation...

  • Article
  • Open Access
1,542 Views
64 Pages

Small and Medium-sized Enterprises (SMEs) face disproportionately high risks from Advanced Persistent Threats (APTs), which often evade traditional cybersecurity measures. Existing frameworks catalogue adversary tactics and defensive solutions but pr...

  • Article
  • Open Access
813 Views
20 Pages

The widespread dissemination of misleading news presents serious challenges to public discourse, democratic institutions, and societal trust. Misleading-news classification (MNC) has been extensively studied through deep neural models that rely mainl...

  • Systematic Review
  • Open Access
1 Citations
1,547 Views
30 Pages

Privacy harms have expanded alongside rapid technological change, challenging the adequacy of existing regulatory frameworks. This systematic review (1990–2025) systematically maps documented privacy harms to specific legal mechanisms and obser...

  • Article
  • Open Access
946 Views
16 Pages

Phishing attacks, particularly Smishing (SMS phishing), have become a major cybersecurity threat, with attackers using social engineering tactics to take advantage of human vulnerabilities. Traditional detection models often struggle to keep up with...

  • Systematic Review
  • Open Access
2,765 Views
22 Pages

This review examines AI governance centered on Regulation (EU) 2024/1689 of the European Parliament and of the Council of 13 June 2024 laying down harmonised rules on artificial intelligence (the EU Artificial Intelligence Act), alongside comparable...

  • Article
  • Open Access
1,557 Views
19 Pages

This article analyzes how artificial intelligence (AI) is influencing the evolution of cybercrime in Ecuador. The use of AI tools to create new threats, such as intelligent malware, automated phishing, and financial fraud, is on the rise. The main pr...

  • Article
  • Open Access
988 Views
37 Pages

Zero Trust in Practice: A Mixed-Methods Study Under the TOE Framework

  • Angélica Pigola and
  • Fernando de Souza Meirelles

This study examines the adoption and implementation of the Zero Trust (ZT) cybersecurity paradigm using the Technology–Organization–Environment (TOE) framework. While ZT is gaining traction as a security model, many organizations struggle...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X