


default search action
Journal of Cybersecurity and Privacy, Volume 5
Volume 5, Number 1, 2024
- Cristina Regueiro
, Borja Urquizu
:
Blockchain-Based Evidence Trustworthiness System in Certification. 1 - Vedran Dakic
, Zlatan Moric
, Ana Kapulica, Damir Regvart
:
Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations. 2
Volume 5, Number 1, 2025
- Dharani Kanta Roy
, Hemanta Kumar Kalita:
Enhanced Deep Autoencoder-Based Reinforcement Learning Model with Improved Flamingo Search Policy Selection for Attack Classification. 3 - Mohamed Ali Kazi
:
Detecting Malware C&C Communication Traffic Using Artificial Intelligence Techniques. 4 - K. C. Lalropuia
, Sanjeev Goyal, Borja Garcia de Soto
, Dongchi Yao, Muammer Semih Sonkor
:
Mitigating Malicious Insider Threats to Common Data Environments in the Architecture, Engineering, and Construction Industry: An Incomplete Information Game Approach. 5 - Abdulazeez AlAli, George Theodorakopoulos
:
Partial Fake Speech Attacks in the Real World Using Deepfake Audio. 6 - Anna Thomaidou
, Konstantinos Limniotis
:
Navigating Through Human Rights in AI: Exploring the Interplay Between GDPR and Fundamental Rights Impact Assessment. 7 - Abeer Y. Al-Hyari
, Mua'ad Abu-Faraj
, Charlie Obimbo
, Moutaz Alazab
:
Chaotic Hénon-Logistic Map Integration: A Powerful Approach for Safeguarding Digital Images. 8 - Mohammed Tayebi, Said El Kafhali
:
Generative Modeling for Imbalanced Credit Card Fraud Transaction Detection. 9 - A. Binod Sapkota
, Arjun Ray
, Manish Kumar Yadav
, Babu R. Dawadi
, Shashidhar R. Joshi:
Machine Learning-Based Attack Detection and Mitigation with Multi-Controller Placement Optimization over SDN Environment. 10
Volume 5, Number 2, 2025
- Muhammad Asfand Hafeez, Kazi Hassan Shakib, Arslan Munir
:
A Secure and Scalable Authentication and Communication Protocol for Smart Grids. 11 - Kamran Razzaq, Mahmood Hussain Shah
:
Advancing Cybersecurity Through Machine Learning: A Scientometric Analysis of Global Research Trends and Influential Contributions. 12 - Denis Berger, Mouad Lemoudden
, William J. Buchanan
:
Post-Quantum Migration of the Tor Application. 13 - François Marin
, Pierre-Emmanuel Arduin, Myriam Merad:
Physics-Informed Graph Neural Networks for Attack Path Prediction. 15

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.