


default search action
Journal of Cybersecurity and Privacy, Volume 5
Volume 5, Number 1, 2024
- Cristina Regueiro

, Borja Urquizu
:
Blockchain-Based Evidence Trustworthiness System in Certification. 1 - Vedran Dakic

, Zlatan Moric
, Ana Kapulica
, Damir Regvart
:
Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations. 2
Volume 5, Number 1, 2025
- Dharani Kanta Roy

, Hemanta Kumar Kalita:
Enhanced Deep Autoencoder-Based Reinforcement Learning Model with Improved Flamingo Search Policy Selection for Attack Classification. 3 - Mohamed Ali Kazi

:
Detecting Malware C&C Communication Traffic Using Artificial Intelligence Techniques. 4 - K. C. Lalropuia

, Sanjeev Goyal, Borja Garcia de Soto
, Dongchi Yao, Muammer Semih Sonkor
:
Mitigating Malicious Insider Threats to Common Data Environments in the Architecture, Engineering, and Construction Industry: An Incomplete Information Game Approach. 5 - Abdulazeez AlAli, George Theodorakopoulos

:
Partial Fake Speech Attacks in the Real World Using Deepfake Audio. 6 - Anna Thomaidou

, Konstantinos Limniotis
:
Navigating Through Human Rights in AI: Exploring the Interplay Between GDPR and Fundamental Rights Impact Assessment. 7 - Abeer Y. Al-Hyari

, Mua'ad Abu-Faraj
, Charlie Obimbo
, Moutaz Alazab
:
Chaotic Hénon-Logistic Map Integration: A Powerful Approach for Safeguarding Digital Images. 8 - Mohammed Tayebi, Said El Kafhali

:
Generative Modeling for Imbalanced Credit Card Fraud Transaction Detection. 9 - A. Binod Sapkota

, Arjun Ray
, Manish Kumar Yadav
, Babu R. Dawadi
, Shashidhar R. Joshi:
Machine Learning-Based Attack Detection and Mitigation with Multi-Controller Placement Optimization over SDN Environment. 10
Volume 5, Number 2, 2025
- Muhammad Asfand Hafeez, Kazi Hassan Shakib, Arslan Munir

:
A Secure and Scalable Authentication and Communication Protocol for Smart Grids. 11 - Kamran Razzaq

, Mahmood Hussain Shah
:
Advancing Cybersecurity Through Machine Learning: A Scientometric Analysis of Global Research Trends and Influential Contributions. 12 - Denis Berger, Mouad Lemoudden

, William J. Buchanan
:
Post-Quantum Migration of the Tor Application. 13 - François Marin

, Pierre-Emmanuel Arduin, Myriam Merad:
Physics-Informed Graph Neural Networks for Attack Path Prediction. 15
Volume 5, Number 3, 2025
- Xueting Li, Shiyao Dong, Amin Milani Fard

:
Enhancing User Experience with Visual Controls for Local Differential Privacy. 36 - Jiantao Xu

, Chen Zhang
, Liu Jin
, Chunhua Su
:
A Trust-Aware Incentive Mechanism for Federated Learning with Heterogeneous Clients in Edge Computing. 37 - Zlatan Moric

, Vedran Dakic
, Mladen Plecas, Ivana Ogrizek Biskupic
:
Evaluating End-User Defensive Approaches Against Phishing Using Education and Simulated Attacks in a Croatian University. 38 - Mohammad Pishdar

, Yixing Lei
, Khaled Harfoush, Jawad Manzoor
:
Denial-of-Service Attacks on Permissioned Blockchains: A Practical Study. 39 - Sotirios Stampernas, Costas Lambrinoudakis

:
A Framework for Compliance with Regulation (EU) 2024/1689 for Small and Medium-Sized Enterprises. 40 - Jallal-Eddine Moussaoui

, Mehdi Kmiti
, Khalid El Gholami
, Yassine Maleh
:
A Systematic Review on Hybrid AI Models Integrating Machine Learning and Federated Learning. 41 - James Cameron Patterson

, William J. Buchanan
, Callum Turino
:
Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices. 42 - Jayanti Rout

, Minati Mishra
, Manob Jyoti Saikia
:
Towards Reliable Fake News Detection: Enhanced Attention-Based Transformer Model. 43 - Zixin Nie

, Benjamin Tyndall
, Daniel Brannock
, Emily Gentles
, Elizabeth Parish
, Alison Banger
:
A Framework for the Design of Privacy-Preserving Record Linkage Systems. 44 - Sofia Sakka

, Nikolaos Pavlidis, Vasiliki Liagkou
, Ioannis Panges
, Despina Elizabeth Filippidou, Chrysostomos D. Stylios
, Anastasios Manos:
Triple-Shield Privacy in Healthcare: Federated Learning, p-ABCs, and Distributed Ledger Authentication. 45 - Muhammad Irfan

, Aymen Omri, Javier Hernandez Fernandez
, Savio Sciancalepore
, Gabriele Oligeri
:
Detecting Jamming in Smart Grid Communications via Deep Learning. 46 - Shiyu Tang, Fei Du

, Zulong Diao, Wenjun Fan
:
A Multi-Feature Semantic Fusion Machine Learning Architecture for Detecting Encrypted Malicious Traffic. 47 - Ahmed Alruwaili

, Sardar M. N. Islam
, Iqbal Gondal
:
Fed-DTB: A Dynamic Trust-Based Framework for Secure and Efficient Federated Learning in IoV Networks: Securing V2V/V2I Communication. 48 - Fariha Tasmin Jaigirdar

, Carsten Rudolph, Misita Anwar, Boyu Tan
:
Empowering End-Users with Cybersecurity Situational Awareness: Findings from IoT-Health Table-Top Exercises. 49 - Alexander Neulinger

, Lukas Sparer
, Maryam Roshanaei
, Dragutin Ostojic
, Jainil Kakka
, Dusan Ramljak
:
Is Blockchain the Future of AI Alignment? Developing a Framework and a Research Agenda Based on a Systematic Literature Review. 50 - Jeferson Martínez Lozano

, Kevin Restrepo Bedoya, Juan Velez-Ocampo:
The Knowledge Sovereignty Paradigm: Mapping Employee-Driven Information Governance Following Organisational Data Breaches. 51 - El Youssofi Chaymae

, Khalid Chougdali
:
YoloMal-XAI: Interpretable Android Malware Classification Using RGB Images and YOLO11. 52 - Imad Bourian

, Lahcen Hassine
, Khalid Chougdali
:
AI-Driven Security for Blockchain-Based Smart Contracts: A GAN-Assisted Deep Learning Approach to Malware Detection. 53 - Congcong Sun

, Azizol Abdullah
, Normalia Samian
, Nuur Alifah Roslan:
Frame-Wise Steganalysis Based on Mask-Gating Attention and Deep Residual Bilinear Interaction Mechanisms for Low-Bit-Rate Speech Streams. 54 - Giulia Palma

, Gaia Cecchi
, Mario Caronna, Antonio Rizzo
:
Leveraging Large Language Models for Scalable and Explainable Cybersecurity Log Analysis. 55 - Teodora Vasilas

, Remus Brad
:
When Things Heat Up: Detecting Malicious Activity Using CPU Thermal Sensors. 56 - Anna Katharina Hildebrandt, Elmar Schömer

, Andreas Hildebrandt
:
Metric Differential Privacy on the Special Orthogonal Group SO(3). 57 - Ali Alkinoon

, Trung Cuong Dang, Ahod Alghuried
, Abdulaziz Alghamdi
, Soohyeon Choi
, Manar Mohaisen
, An Wang
, Saeed Salem
, David Mohaisen
:
A Comprehensive Analysis of Evolving Permission Usage in Android Apps: Trends, Threats, and Ecosystem Insights. 58 - Sam Goundar

, Iqbal Gondal
:
AI-Blockchain Integration for Real-Time Cybersecurity: System Design and Evaluation. 59 - Alessandro Carvalho Coutinho

, Luciano Vieira de Araújo:
MICRA: A Modular Intelligent Cybersecurity Response Architecture with Machine Learning Integration. 60 - Yaman Roumani

, Yazan F. Roumani:
Predicting Ransomware Incidents with Time-Series Modeling. 61 - Koon-Ming Chan

, Swee-Huay Heng
, Syh-Yuan Tan
, Shing Chiang Tan
:
Efficient k-Resilient Public Key Authenticated Encryption with Keyword Search. 62 - Anooja Joy

, Madhav Chandane
, Yash Nagare
, Faruk Kazi
:
Threat Intelligence Extraction Framework (TIEF) for TTP Extraction. 63 - Abubakar Abba

, Je Sen Teh
, Mohd Najwadi Yusoff
, Adnan Anwar
:
Towards Analyzable Design Paradigms for Chaos-Based Cryptographic Primitives. 64 - Michael Herbert Ziegler

, Mariusz Nowostawski
, Basel Katt
:
A Systematic Literature Review of Information Privacy in Blockchain Systems. 65 - Vladislav Dubrovenski, Leo Chen, Dianxiang Xu:

Analyzing Action Interference of Administrative Obligations for SMT-Based Verification. 66 - László Bognár

:
Predicting Cybersecurity Incidents via Self-Reported Behavioral and Psychological Indicators: A Stratified Logistic Regression Approach. 67 - Vinura Galwaduge

, Jagath Samarabandu
:
Novel Actionable Counterfactual Explanations for Intrusion Detection Using Diffusion Models. 68 - Edward J. Cartwright

, Anna Cartwright
, Lian Xue
:
Ransomware Splash Screens, Loss Aversion and Trust: Insights from Behavioral Economics. 69 - Benjamin Yankson, Mehdi Barati, Rebecca Bondzie, Ram Madani:

The Rise of Hacking in Integrated EHR Systems: A Trend Analysis of U.S. Healthcare Data Breaches. 70 - Sahar Ben Yaala, Ridha Bouallegue:

Vulnerability Detection in Large Language Models: Addressing Security Concerns. 71 - Oussama El Rhayati

, Hatim Essadeq, Omar El Beqqali, Hamid Tairi, Mohamed Lamrini, Jamal Riffi:
Structured Heatmap Learning for Multi-Family Malware Classification: A Deep and Explainable Approach Using CAPEv2. 72 - Hong Nhung Nguyen

, Jakeoung Koo
:
Enhancing SCADA Security Using Generative Adversarial Network. 73 - Henrique Jorge, Cristina Wanzeller

, João Henriques
:
Evaluating Homomorphic Encryption Schemes for Privacy and Security in Healthcare Data Management. 74 - Cristian Agredo, Daniel F. Koranek

, Christine M. Schubert-Kabban, Jose A. Gutierrez del Arroyo, Scott R. Graham:
Microarchitectural Malware Detection via Translation Lookaside Buffer (TLB) Events. 75 - Afsana Sharmin

, Bahar Uddin Mahmud, Norun Nabi
, Mujiba Shaima, Md. Jobair Hossain Faruk
:
Cyber Attacks on Space Information Networks: Vulnerabilities, Threats, and Countermeasures for Satellite Security. 76 - Ebrahim Mollik, Faisal Majeed:

AI-Driven Cybersecurity in Mobile Financial Services: Enhancing Fraud Detection and Privacy in Emerging Markets. 77

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














