- A. Binod Sapkota, Arjun Ray, Manish Kumar Yadav, Babu R. Dawadi, Shashidhar R. Joshi. Machine Learning-Based Attack Detection and Mitigation with Multi-Controller Placement Optimization over SDN Environment. J. Cybersecur. Priv., 5(1):10, 2025.
- Denis Berger, Mouad Lemoudden, William J. Buchanan. Post-Quantum Migration of the Tor Application. J. Cybersecur. Priv., 5(2):13, 2025.
- Abeer Y. Al-Hyari, Mua'ad Abu-Faraj, Charlie Obimbo, Moutaz Alazab. Chaotic Hénon-Logistic Map Integration: A Powerful Approach for Safeguarding Digital Images. J. Cybersecur. Priv., 5(1):8, 2025.
- K. C. Lalropuia, Sanjeev Goyal, Borja Garcia de Soto, Dongchi Yao, Muammer Semih Sonkor. Mitigating Malicious Insider Threats to Common Data Environments in the Architecture, Engineering, and Construction Industry: An Incomplete Information Game Approach. J. Cybersecur. Priv., 5(1):5, 2025.
- Mohammed Tayebi, Said El Kafhali. Generative Modeling for Imbalanced Credit Card Fraud Transaction Detection. J. Cybersecur. Priv., 5(1):9, 2025.
- Muhammad Asfand Hafeez, Kazi Hassan Shakib, Arslan Munir. A Secure and Scalable Authentication and Communication Protocol for Smart Grids. J. Cybersecur. Priv., 5(2):11, 2025.
- Dharani Kanta Roy, Hemanta Kumar Kalita. Enhanced Deep Autoencoder-Based Reinforcement Learning Model with Improved Flamingo Search Policy Selection for Attack Classification. J. Cybersecur. Priv., 5(1):3, 2025.
- François Marin, Pierre-Emmanuel Arduin, Myriam Merad. Physics-Informed Graph Neural Networks for Attack Path Prediction. J. Cybersecur. Priv., 5(2):15, 2025.
- Kamran Razzaq, Mahmood Hussain Shah. Advancing Cybersecurity Through Machine Learning: A Scientometric Analysis of Global Research Trends and Influential Contributions. J. Cybersecur. Priv., 5(2):12, 2025.
- Mohamed Ali Kazi. Detecting Malware C&C Communication Traffic Using Artificial Intelligence Techniques. J. Cybersecur. Priv., 5(1):4, 2025.