- Pierre-Emmanuel Arduin, Benjamin Costé. Learning to Hack, Playing to Learn: Gamification in Cybersecurity Courses. J. Cybersecur. Priv., 6(1):16, 2026.
- Gonesh Chandra Saha, Ahmed Afif Monrat, Karl Andersson 0001. Enhancing EV Charging Resilience: A Review of Blockchain and Cybersecurity Applications. J. Cybersecur. Priv., 6(1):33, 2026.
- António Gonçalves, Anacleto Correia. XAI-Compliance-by-Design: A Modular Framework for GDPR- and AI Act-Aligned Decision Transparency in High-Risk AI Systems. J. Cybersecur. Priv., 6(2):43, 2026.
- Abdullah Alaklabi, Muhammad Asfand Hafeez, Arslan Munir. Fast and Lightweight Hybrid Image Encryption and Steganography Leveraging an SPN, Chaotic Maps, and LSB Substitution. J. Cybersecur. Priv., 6(1):31, 2026.
- Lucía Alba Torres, Miguel Rebollo, Javier Palanca, Mario Aragonés Lozano. cyberSPADE: A Hierarchical Multi-Agent Architecture for Coordinated Cyberdefense. J. Cybersecur. Priv., 6(1):28, 2026.
- Jose R. Rosas-Bustos, Jesse Van Griensven The, Roydon Andrew Fraser, Sebastian Ratto Valderrama, Nadeem Said, Andy Thanos. Theoretical Vulnerabilities in Quantum Integrity Verification Under Bell-Hidden Variable Convergence. J. Cybersecur. Priv., 6(1):15, 2026.
- Jack Kolenbrander, Elliott Rheault, Alan J. Michaels. Privacy Risks of Cybersquatting Attacks. J. Cybersecur. Priv., 6(1):38, 2026.
- Georg Goldenits, Philip König, Sebastian Raubitzek, Andreas Ekelhart. Small Language Models for Phishing Website Detection: Cost, Performance, and Privacy Trade-Offs. J. Cybersecur. Priv., 6(2):48, 2026.
- Qutaiba Alasad, Meaad Ahmed, Shahad Alahmed, Omer T. Khattab, Saba Alaa Abdulwahhab, Jiann-Shuin Yuan. A Comprehensive Review: The Evolving Cat-and-Mouse Game in Network Intrusion Detection Systems Leveraging Machine Learning. J. Cybersecur. Priv., 6(1):13, 2026.
- Nikolaos-Achilleas Steiakakis, Giorgos Vasiliadis. Trusted Yet Flexible: High-Level Runtimes for Secure ML Inference in TEEs. J. Cybersecur. Priv., 6(1):23, 2026.