Skip Content
You are currently on the new version of our website. Access the old version .
  • Tracked for
    Impact Factor
  • 9.1
    CiteScore
  • 22 days
    Time to First Decision

Journal of Cybersecurity and Privacy, Volume 5, Issue 4

2025 December - 36 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (36)

  • Article
  • Open Access
793 Views
40 Pages

High cybersecurity risks and attacks cause information theft, unauthorized access to data and information, reputational damage, and financial loss in small and medium enterprises (SMEs). This creates a need to adopt information security systems of SM...

  • Article
  • Open Access
898 Views
22 Pages

The rapid expansion of Internet of Things (IoT) technologies has introduced significant challenges in understanding the complexity and structure of network traffic data, which is essential for developing effective cybersecurity solutions. This resear...

  • Article
  • Open Access
448 Views
24 Pages

Smart phones have become an integral part of our lives in modern society, as we carry and use them throughout a day. However, this “body part” may maliciously collect and leak our personal information without our knowledge. When we instal...

  • Article
  • Open Access
1,392 Views
29 Pages

Leveraging Static Analysis for Feedback-Driven Security Patching in LLM-Generated Code

  • Kamel Alrashedy,
  • Abdullah Aljasser,
  • Pradyumna Tambwekar and
  • Matthew Gombolay

Large language models (LLMs) have shown remarkable potential for automatic code generation. Yet, these models share a weakness with their human counterparts: inadvertently generating code with security vulnerabilities that could allow unauthorized at...

  • Article
  • Open Access
742 Views
27 Pages

As technology advances, developers continually create innovative solutions to enhance smartphone security. However, the rapid spread of Android malware poses significant threats to devices and sensitive data. The Android Operating System (OS)’s...

  • Article
  • Open Access
649 Views
27 Pages

Towards an End-to-End (E2E) Adversarial Learning and Application in the Physical World

  • Dudi Biton,
  • Jacob Shams,
  • Satoru Koda,
  • Asaf Shabtai,
  • Yuval Elovici and
  • Ben Nassi

The traditional process for learning patch-based adversarial attacks, conducted in the digital domain and later applied in the physical domain (e.g., via printed stickers), may suffer reduced performance due to adversarial patches’ limited tran...

  • Article
  • Open Access
715 Views
14 Pages

Evaluating Privacy Technologies in Digital Payments: A Balanced Framework

  • Ioannis Fragkiadakis,
  • Stefanos Gritzalis and
  • Costas Lambrinoudakis

Privacy enhancement technologies are significant in the development of digital payment systems. At present, multiple innovative digital payment solutions have been introduced and may be implemented globally soon. As cyber threats continue to increase...

  • Article
  • Open Access
1,023 Views
29 Pages

Bridging Cybersecurity Practice and Law: A Hands-On, Scenario-Based Curriculum Using the NICE Framework to Foster Skill Development

  • Colman McGuan,
  • Aadithyan Vijaya Raghavan,
  • Komala M. Mandapati,
  • Chansu Yu,
  • Brian E. Ray,
  • Debbie K. Jackson and
  • Sathish Kumar

In an increasingly interconnected world, cybersecurity professionals play a pivotal role in safeguarding organizations from cyber threats. To secure their cyberspace, organizations are forced to adopt a cybersecurity framework such as the NIST Nation...

  • Article
  • Open Access
1,484 Views
64 Pages

Small and Medium-sized Enterprises (SMEs) face disproportionately high risks from Advanced Persistent Threats (APTs), which often evade traditional cybersecurity measures. Existing frameworks catalogue adversary tactics and defensive solutions but pr...

  • Article
  • Open Access
796 Views
20 Pages

The widespread dissemination of misleading news presents serious challenges to public discourse, democratic institutions, and societal trust. Misleading-news classification (MNC) has been extensively studied through deep neural models that rely mainl...

  • Systematic Review
  • Open Access
1 Citations
1,481 Views
30 Pages

Privacy harms have expanded alongside rapid technological change, challenging the adequacy of existing regulatory frameworks. This systematic review (1990–2025) systematically maps documented privacy harms to specific legal mechanisms and obser...

  • Article
  • Open Access
918 Views
16 Pages

Phishing attacks, particularly Smishing (SMS phishing), have become a major cybersecurity threat, with attackers using social engineering tactics to take advantage of human vulnerabilities. Traditional detection models often struggle to keep up with...

  • Systematic Review
  • Open Access
2,667 Views
22 Pages

This review examines AI governance centered on Regulation (EU) 2024/1689 of the European Parliament and of the Council of 13 June 2024 laying down harmonised rules on artificial intelligence (the EU Artificial Intelligence Act), alongside comparable...

  • Article
  • Open Access
1,490 Views
19 Pages

This article analyzes how artificial intelligence (AI) is influencing the evolution of cybercrime in Ecuador. The use of AI tools to create new threats, such as intelligent malware, automated phishing, and financial fraud, is on the rise. The main pr...

  • Article
  • Open Access
960 Views
37 Pages

Zero Trust in Practice: A Mixed-Methods Study Under the TOE Framework

  • Angélica Pigola and
  • Fernando de Souza Meirelles

This study examines the adoption and implementation of the Zero Trust (ZT) cybersecurity paradigm using the Technology–Organization–Environment (TOE) framework. While ZT is gaining traction as a security model, many organizations struggle...

  • Article
  • Open Access
1,816 Views
40 Pages

Integrated Analysis of Malicious Software: Insights from Static and Dynamic Perspectives

  • Maria-Mădălina Andronache,
  • Alexandru Vulpe and
  • Corneliu Burileanu

Malware remains one of the most persistent and evolving threats to cybersecurity, necessitating robust analysis techniques to understand and mitigate its impact. This study presents a comprehensive analysis of selected malware samples using both stat...

  • Article
  • Open Access
1 Citations
2,572 Views
26 Pages

Identifying and Modeling Barriers to Compliance with the NIS2 Directive: A DEMATEL Approach

  • Konstantina Mentzelou,
  • Panos T. Chountalas,
  • Fotis C. Kitsios,
  • Anastasios I. Magoutas and
  • Thomas K. Dasaklis

The implementation of the NIS2 Directive expands the scope of cybersecurity regulation across the European Union, placing new demands on both essential and important entities. Despite its importance, organizations face multiple barriers that undermin...

  • Article
  • Open Access
1,722 Views
26 Pages

Ransomware attacks pose a serious threat to computer networks, causing widespread disruption to individual, corporate, governmental, and critical national infrastructures. To mitigate their impact, extensive research has been conducted to analyze ran...

  • Systematic Review
  • Open Access
2 Citations
7,999 Views
25 Pages

AI-Augmented SOC: A Survey of LLMs and Agents for Security Automation

  • Siddhant Srinivas,
  • Brandon Kirk,
  • Julissa Zendejas,
  • Michael Espino,
  • Matthew Boskovich,
  • Abdul Bari,
  • Khalil Dajani and
  • Nabeel Alzahrani

The increasing volume, velocity, and sophistication of cyber threats have placed immense pressure on modern Security Operations Centers (SOCs). Traditional rule-based and manual processes are proving insufficient, leading to alert fatigue, delayed re...

  • Article
  • Open Access
1,786 Views
17 Pages

Anomaly Detection Against Fake Base Station Threats Using Machine Learning

  • Amanul Islam,
  • Sourav Purification and
  • Sang-Yoon Chang

Mobile networking in 4G and 5G remains vulnerable against fake base stations. A fake base station can inject and manipulate the radio resource control (RRC) communication protocol to disable the user equipment’s connectivity. To motivate our re...

  • Article
  • Open Access
1,142 Views
17 Pages

Perceiving Digital Threats and Artificial Intelligence: A Psychometric Approach to Cyber Risk

  • Diana Carbone,
  • Francesco Marcatto,
  • Francesca Mistichelli and
  • Donatella Ferrante

The rapid digitalization of work and daily life has introduced a wide range of online threats, from common hazards such as malware and phishing to emerging challenges posed by artificial intelligence (AI). While technical aspects of cybersecurity hav...

  • Review
  • Open Access
2,675 Views
20 Pages

Hashing in the Fight Against CSAM: Technology at the Crossroads of Law and Ethics

  • Evangelia Daskalaki,
  • Emmanouela Kokolaki and
  • Paraskevi Fragopoulou

Hashes are vital in limiting the spread of child sexual abuse material online, yet their use introduces unresolved technical, legal, and ethical challenges. This paper bridges a critical gap by analyzing both cryptographic and perceptual hashing, not...

  • Article
  • Open Access
1,047 Views
25 Pages

Email continues to serve as a primary vector for cyber-attacks, with phishing, spoofing, and polymorphic malware evolving rapidly to evade traditional defences. Conventional email security systems, often reliant on static, signature-based detection s...

  • Article
  • Open Access
7 Citations
1,378 Views
22 Pages

AI-Powered Security for IoT Ecosystems: A Hybrid Deep Learning Approach to Anomaly Detection

  • Deepak Kumar,
  • Priyanka Pramod Pawar,
  • Santosh Reddy Addula,
  • Mohan Kumar Meesala,
  • Oludotun Oni,
  • Qasim Naveed Cheema,
  • Anwar Ul Haq and
  • Guna Sekhar Sajja

The rapid expansion of the Internet of Things (IoT) has introduced new vulnerabilities that traditional security mechanisms often fail to address effectively. Signature-based intrusion detection systems cannot adapt to zero-day attacks, while rule-ba...

  • Article
  • Open Access
2,575 Views
29 Pages

Between Firewalls and Feelings: Modelling Trust and Commitment in Digital Banking Platforms

  • Ruhunage Panchali Dias,
  • Zazli Lily Wisker and
  • Noor H. S. Alani

Digital banking has become part of everyday life in Aotearoa–New Zealand, offering convenience but also raising questions of trust, security, and long-term commitment. This study examines how service quality, security and privacy, user experien...

  • Article
  • Open Access
1 Citations
1,355 Views
14 Pages

A Similarity Measure for Linking CoinJoin Output Spenders

  • Michael Herbert Ziegler,
  • Mariusz Nowostawski and
  • Basel Katt

This paper introduces a novel similarity measure to link transactions which spend outputs of CoinJoin transactions, CoinJoin Spending Transactions (CSTs), by analyzing their on-chain properties, addressing the challenge of preserving user privacy in...

  • Review
  • Open Access
1 Citations
6,635 Views
56 Pages

Generative artificial intelligence (AI) and persistent empirical gaps are reshaping the cyber threat landscape faster than Zero-Trust Architecture (ZTA) research can respond. We reviewed 10 recent ZTA surveys and 136 primary studies (2022–2024)...

  • Article
  • Open Access
1,289 Views
26 Pages

Hardware systems are foundational to critical infrastructure, embedded devices, and consumer products, making robust security assurance essential. However, existing hardware security standards remain fragmented, inconsistent in scope, and difficult t...

  • Article
  • Open Access
1,269 Views
20 Pages

Evaluating the Generalization Gaps of Intrusion Detection Systems Across DoS Attack Variants

  • Roshan Jameel,
  • Khyati Marwah,
  • Sheikh Mohammad Idrees and
  • Mariusz Nowostawski

Intrusion Detection Systems (IDS) play a vital role in safeguarding networks, yet their effectiveness is often challenged, as cyberattacks evolve in new and unexpected ways. Machine learning models, although very powerful, usually perform well only o...

  • Article
  • Open Access
1,262 Views
15 Pages

Blockchain-Enabled GDPR Compliance Enforcement for IIoT Data Access

  • Amina Isazade,
  • Ali Malik and
  • Mohammed B. Alshawki

The General Data Protection Regulation (GDPR) imposes additional demands and obligations on service providers that handle and process personal data. In this paper, we examine how advanced cryptographic techniques can be employed to develop a privacy-...

  • Article
  • Open Access
1,414 Views
23 Pages

This study proposes methods of computer simulation to study and optimize the cybersecurity of Small Modular Nuclear Reactors (SMRs). SMRs hold the potential to help build a clean and sustainable power grid but will struggle to gain widespread adoptio...

  • Article
  • Open Access
900 Views
27 Pages

Known attacks on the tropical implementation of Stickel protocol involve finding minimal covers for a certain covering problem, and this leads to an exponential growth in the worst case time required to recover the secret key as the used polynomial d...

  • Article
  • Open Access
2,556 Views
17 Pages

Trends and Challenges in Cybercrime in Greece

  • Anastasios Papathanasiou,
  • Georgios Germanos,
  • Vasiliki Liagkou and
  • Vasileios Vlachos

This study investigates the evolution of cybercrime in Greece by analyzing data from the Cyber Crime Division of the Hellenic Police. By combining 2023 statistics with earlier national and international data (e.g., Europol, FBI), this study presents...

  • Article
  • Open Access
2,348 Views
18 Pages

As more machine learning models are used in sensitive fields like healthcare, finance, and smart infrastructure, protecting structured tabular data from privacy attacks is a key research challenge. Although several privacy-preserving methods have bee...

  • Review
  • Open Access
2,733 Views
30 Pages

A Systematic Literature Review on AI-Based Cybersecurity in Nuclear Power Plants

  • Marianna Lezzi,
  • Luigi Martino,
  • Ernesto Damiani and
  • Chan Yeob Yeun

Cybersecurity management plays a key role in preserving the operational security of nuclear power plants (NPPs), ensuring service continuity and system resilience. The growing number of sophisticated cyber-attacks against NPPs requires cybersecurity...

  • Article
  • Open Access
1,968 Views
21 Pages

ARGUS: An Autonomous Robotic Guard System for Uncovering Security Threats in Cyber-Physical Environments

  • Edi Marian Timofte,
  • Mihai Dimian,
  • Alin Dan Potorac,
  • Doru Balan,
  • Daniel-Florin Hrițcan,
  • Marcel Pușcașu and
  • Ovidiu Chiraș

Cyber-physical infrastructures such as hospitals and smart campuses face hybrid threats that target both digital and physical domains. Traditional security solutions separate surveillance from network monitoring, leaving blind spots when attackers co...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Cybersecur. Priv. - ISSN 2624-800X