You are currently viewing a new version of our website. To view the old version click .
  • Tracked forImpact Factor
  • 9.1CiteScore
  • 25 daysTime to First Decision

Most Recent

  • Article
  • Open Access
262 Views
29 Pages

Leveraging Static Analysis for Feedback-Driven Security Patching in LLM-Generated Code

  • Kamel Alrashedy,
  • Abdullah Aljasser,
  • Pradyumna Tambwekar and
  • Matthew Gombolay

Large language models (LLMs) have shown remarkable potential for automatic code generation. Yet, these models share a weakness with their human counterparts: inadvertently generating code with security vulnerabilities that could allow unauthorized at...

  • Article
  • Open Access
268 Views
27 Pages

As technology advances, developers continually create innovative solutions to enhance smartphone security. However, the rapid spread of Android malware poses significant threats to devices and sensitive data. The Android Operating System (OS)’s...

  • Article
  • Open Access
221 Views
27 Pages

Towards an End-to-End (E2E) Adversarial Learning and Application in the Physical World

  • Dudi Biton,
  • Jacob Shams,
  • Satoru Koda,
  • Asaf Shabtai,
  • Yuval Elovici and
  • Ben Nassi

The traditional process for learning patch-based adversarial attacks, conducted in the digital domain and later applied in the physical domain (e.g., via printed stickers), may suffer reduced performance due to adversarial patches’ limited tran...

  • Article
  • Open Access
260 Views
14 Pages

Evaluating Privacy Technologies in Digital Payments: A Balanced Framework

  • Ioannis Fragkiadakis,
  • Stefanos Gritzalis and
  • Costas Lambrinoudakis

Privacy enhancement technologies are significant in the development of digital payment systems. At present, multiple innovative digital payment solutions have been introduced and may be implemented globally soon. As cyber threats continue to increase...

  • Article
  • Open Access
355 Views
29 Pages

Bridging Cybersecurity Practice and Law: A Hands-On, Scenario-Based Curriculum Using the NICE Framework to Foster Skill Development

  • Colman McGuan,
  • Aadithyan Vijaya Raghavan,
  • Komala M. Mandapati,
  • Chansu Yu,
  • Brian E. Ray,
  • Debbie K. Jackson and
  • Sathish Kumar

In an increasingly interconnected world, cybersecurity professionals play a pivotal role in safeguarding organizations from cyber threats. To secure their cyberspace, organizations are forced to adopt a cybersecurity framework such as the NIST Nation...

  • Article
  • Open Access
393 Views
64 Pages

Small and Medium-sized Enterprises (SMEs) face disproportionately high risks from Advanced Persistent Threats (APTs), which often evade traditional cybersecurity measures. Existing frameworks catalogue adversary tactics and defensive solutions but pr...

  • Article
  • Open Access
273 Views
20 Pages

The widespread dissemination of misleading news presents serious challenges to public discourse, democratic institutions, and societal trust. Misleading-news classification (MNC) has been extensively studied through deep neural models that rely mainl...

  • Systematic Review
  • Open Access
662 Views
30 Pages

Privacy harms have expanded alongside rapid technological change, challenging the adequacy of existing regulatory frameworks. This systematic review (1990–2025) systematically maps documented privacy harms to specific legal mechanisms and obser...

  • Article
  • Open Access
356 Views
16 Pages

Phishing attacks, particularly Smishing (SMS phishing), have become a major cybersecurity threat, with attackers using social engineering tactics to take advantage of human vulnerabilities. Traditional detection models often struggle to keep up with...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X