- Alexander Neulinger, Lukas Sparer, Maryam Roshanaei, Dragutin Ostojic, Jainil Kakka, Dusan Ramljak. Is Blockchain the Future of AI Alignment? Developing a Framework and a Research Agenda Based on a Systematic Literature Review. J. Cybersecur. Priv., 5(3):50, 2025.
- Teodora Vasilas, Remus Brad. When Things Heat Up: Detecting Malicious Activity Using CPU Thermal Sensors. J. Cybersecur. Priv., 5(3):56, 2025.
- Shiyu Tang, Fei Du, Zulong Diao, Wenjun Fan. A Multi-Feature Semantic Fusion Machine Learning Architecture for Detecting Encrypted Malicious Traffic. J. Cybersecur. Priv., 5(3):47, 2025.
- A. Binod Sapkota, Arjun Ray, Manish Kumar Yadav, Babu R. Dawadi, Shashidhar R. Joshi. Machine Learning-Based Attack Detection and Mitigation with Multi-Controller Placement Optimization over SDN Environment. J. Cybersecur. Priv., 5(1):10, 2025.
- Edward J. Cartwright, Anna Cartwright 0001, Lian Xue. Ransomware Splash Screens, Loss Aversion and Trust: Insights from Behavioral Economics. J. Cybersecur. Priv., 5(3):69, 2025.
- Oussama El Rhayati, Hatim Essadeq, Omar El Beqqali, Hamid Tairi, Mohamed Lamrini, Jamal Riffi. Structured Heatmap Learning for Multi-Family Malware Classification: A Deep and Explainable Approach Using CAPEv2. J. Cybersecur. Priv., 5(3):72, 2025.
- Imad Bourian, Lahcen Hassine, Khalid Chougdali. AI-Driven Security for Blockchain-Based Smart Contracts: A GAN-Assisted Deep Learning Approach to Malware Detection. J. Cybersecur. Priv., 5(3):53, 2025.
- James Cameron Patterson, William J. Buchanan, Callum Turino. Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices. J. Cybersecur. Priv., 5(3):42, 2025.
- Denis Berger, Mouad Lemoudden, William J. Buchanan. Post-Quantum Migration of the Tor Application. J. Cybersecur. Priv., 5(2):13, 2025.
- László Bognár. Predicting Cybersecurity Incidents via Self-Reported Behavioral and Psychological Indicators: A Stratified Logistic Regression Approach. J. Cybersecur. Priv., 5(3):67, 2025.