You are currently viewing a new version of our website. To view the old version click .
  • Tracked forImpact Factor
  • 9.1CiteScore
  • 25 daysTime to First Decision

Journal of Cybersecurity and Privacy, Volume 5, Issue 4

December 2025 - 13 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (13)

  • Article
  • Open Access

AI-Powered Security for IoT Ecosystems: A Hybrid Deep Learning Approach to Anomaly Detection

  • Deepak Kumar,
  • Priyanka Pramod Pawar,
  • Santosh Reddy Addula,
  • Mohan Kumar Meesala,
  • Oludotun Oni,
  • Qasim Naveed Cheema,
  • Anwar Ul Haq and
  • Guna Sekhar Sajja
J. Cybersecur. Priv.2025, 5(4), 90;https://doi.org/10.3390/jcp5040090 
(registering DOI)

27 October 2025

The rapid expansion of the Internet of Things (IoT) has introduced new vulnerabilities that traditional security mechanisms often fail to address effectively. Signature-based intrusion detection systems cannot adapt to zero-day attacks, while rule-ba...

  • Article
  • Open Access
488 Views
29 Pages

Between Firewalls and Feelings: Modelling Trust and Commitment in Digital Banking Platforms

  • Ruhunage Panchali Dias,
  • Zazli Lily Wisker and
  • Noor H. S. Alani

Digital banking has become part of everyday life in Aotearoa–New Zealand, offering convenience but also raising questions of trust, security, and long-term commitment. This study examines how service quality, security and privacy, user experien...

  • Article
  • Open Access
296 Views
14 Pages

A Similarity Measure for Linking CoinJoin Output Spenders

  • Michael Herbert Ziegler,
  • Mariusz Nowostawski and
  • Basel Katt

This paper introduces a novel similarity measure to link transactions which spend outputs of CoinJoin transactions, CoinJoin Spending Transactions (CSTs), by analyzing their on-chain properties, addressing the challenge of preserving user privacy in...

  • Review
  • Open Access
819 Views
56 Pages

Generative artificial intelligence (AI) and persistent empirical gaps are reshaping the cyber threat landscape faster than Zero-Trust Architecture (ZTA) research can respond. We reviewed 10 recent ZTA surveys and 136 primary studies (2022–2024)...

  • Article
  • Open Access
358 Views
26 Pages

Hardware systems are foundational to critical infrastructure, embedded devices, and consumer products, making robust security assurance essential. However, existing hardware security standards remain fragmented, inconsistent in scope, and difficult t...

  • Article
  • Open Access
446 Views
20 Pages

Evaluating the Generalization Gaps of Intrusion Detection Systems Across DoS Attack Variants

  • Roshan Jameel,
  • Khyati Marwah,
  • Sheikh Mohammad Idrees and
  • Mariusz Nowostawski

Intrusion Detection Systems (IDS) play a vital role in safeguarding networks, yet their effectiveness is often challenged, as cyberattacks evolve in new and unexpected ways. Machine learning models, although very powerful, usually perform well only o...

  • Article
  • Open Access
562 Views
15 Pages

Blockchain-Enabled GDPR Compliance Enforcement for IIoT Data Access

  • Amina Isazade,
  • Ali Malik and
  • Mohammed B. Alshawki

The General Data Protection Regulation (GDPR) imposes additional demands and obligations on service providers that handle and process personal data. In this paper, we examine how advanced cryptographic techniques can be employed to develop a privacy-...

  • Article
  • Open Access
593 Views
23 Pages

This study proposes methods of computer simulation to study and optimize the cybersecurity of Small Modular Nuclear Reactors (SMRs). SMRs hold the potential to help build a clean and sustainable power grid but will struggle to gain widespread adoptio...

  • Article
  • Open Access
387 Views
27 Pages

Known attacks on the tropical implementation of Stickel protocol involve finding minimal covers for a certain covering problem, and this leads to an exponential growth in the worst case time required to recover the secret key as the used polynomial d...

  • Article
  • Open Access
791 Views
17 Pages

Trends and Challenges in Cybercrime in Greece

  • Anastasios Papathanasiou,
  • Georgios Germanos,
  • Vasiliki Liagkou and
  • Vasileios Vlachos

This study investigates the evolution of cybercrime in Greece by analyzing data from the Cyber Crime Division of the Hellenic Police. By combining 2023 statistics with earlier national and international data (e.g., Europol, FBI), this study presents...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800XCreative Common CC BY license