About the Journal
Cybersecurity is the basis of information dissemination in the internet age.The Journal of Cyber Security focuses on all aspects of sciences, technologies, and applications relating to hardware security, software security and system security.
Read More
-
Open Access
ARTICLE
Securing Electronic Health Records with Cryptography and Lion Optimization
Journal of Cyber Security, Vol.7, pp. 21-43, 2025, DOI:10.32604/jcs.2025.059645 - 18 February 2025
Abstract With the internet and modern mobile technologies, health-related information is readily available, and thus, the security aspect of health information is at great risk. Confidentiality and protection of medical information regarding patients are of prime concern in the context of sharing such data with different healthcare providers. On one hand, Electronic Health Record Systems (EHRS) and online sites have proved to be hassle-free ways of exchanging medical information between health professionals. On the other hand, data security issues remain a concern. The proposed paper presents an improvement in the security mechanism of EHRS by utilizing… More >
-
Open Access
REVIEW
Quick Response Code Security Attacks and Countermeasures: A Systematic Literature Review
Journal of Cyber Security, Vol.7, pp. 1-20, 2025, DOI:10.32604/jcs.2025.059398 - 18 February 2025
Abstract A quick response code is a barcode that allows users to instantly access information via a digital device. Quick response codes store data as pixels in a square-shaped grid. QR codes are prone to cyber-attacks. This assault exploits human vulnerabilities, as users can scarcely discern what is concealed in the quick response code prior to usage. The aim of the study was to investigate Quick Response code attack types and the detection techniques. To achieve the objective, 50 relevant studies published between the year 2010 and 2024 were identified. The articles were obtained from the… More >
-
Open Access
ARTICLE
A Comparative Performance Analysis of Machine Learning Models for Intrusion Detection Classification
Journal of Cyber Security, Vol.6, pp. 1-23, 2024, DOI:10.32604/jcs.2023.046915
Abstract The importance of cybersecurity in contemporary society cannot be inflated, given the substantial impact of networks on various aspects of daily life. Traditional cybersecurity measures, such as anti-virus software and firewalls, safeguard networks against potential threats. In network security, using Intrusion Detection Systems (IDSs) is vital for effectively monitoring the various software and hardware components inside a given network. However, they may encounter difficulties when it comes to detecting solitary attacks. Machine Learning (ML) models are implemented in intrusion detection widely because of the high accuracy. The present work aims to assess the performance of More >
-
Open Access
ARTICLE
Comparative Analysis of Machine Learning Models for PDF Malware Detection: Evaluating Different Training and Testing Criteria
Journal of Cyber Security, Vol.5, pp. 1-11, 2023, DOI:10.32604/jcs.2023.042501
Abstract The proliferation of maliciously coded documents as file transfers increase has led to a rise in sophisticated attacks. Portable Document Format (PDF) files have emerged as a major attack vector for malware due to their adaptability and wide usage. Detecting malware in PDF files is challenging due to its ability to include various harmful elements such as embedded scripts, exploits, and malicious URLs. This paper presents a comparative analysis of machine learning (ML) techniques, including Naive Bayes (NB), K-Nearest Neighbor (KNN), Average One Dependency Estimator (A1DE), Random Forest (RF), and Support Vector Machine (SVM) for More >
-
Open Access
ARTICLE
Sentence Level Analysis Model for Phishing Detection Using KNN
Journal of Cyber Security, Vol.6, pp. 25-39, 2024, DOI:10.32604/jcs.2023.045859
Abstract Phishing emails have experienced a rapid surge in cyber threats globally, especially following the emergence of the COVID-19 pandemic. This form of attack has led to substantial financial losses for numerous organizations. Although various models have been constructed to differentiate legitimate emails from phishing attempts, attackers continuously employ novel strategies to manipulate their targets into falling victim to their schemes. This form of attack has led to substantial financial losses for numerous organizations. While efforts are ongoing to create phishing detection models, their current level of accuracy and speed in identifying phishing emails is less… More >
-
Open Access
ARTICLE
Detecting Phishing Using a Multi-Layered Social Engineering Framework
Journal of Cyber Security, Vol.5, pp. 13-32, 2023, DOI:10.32604/jcs.2023.043359
Abstract As businesses develop and expand with a significant volume of data, data protection and privacy become increasingly important. Research has shown a tremendous increase in phishing activities during and after COVID-19. This research aimed to improve the existing approaches to detecting phishing activities on the internet. We designed a multi-layered phish detection algorithm to detect and prevent phishing applications on the internet using URLs. In the algorithm, we considered technical dimensions of phishing attack prevention and mitigation on the internet. In our approach, we merge, Phishtank, Blacklist, Blocklist, and Whitelist to form our framework. A More >
-
Open Access
ARTICLE
Credit Card Fraud Detection on Original European Credit Card Holder Dataset Using Ensemble Machine Learning Technique
Journal of Cyber Security, Vol.5, pp. 33-46, 2023, DOI:10.32604/jcs.2023.045422
Abstract The proliferation of digital payment methods facilitated by various online platforms and applications has led to a surge in financial fraud, particularly in credit card transactions. Advanced technologies such as machine learning have been widely employed to enhance the early detection and prevention of losses arising from potentially fraudulent activities. However, a prevalent approach in existing literature involves the use of extensive data sampling and feature selection algorithms as a precursor to subsequent investigations. While sampling techniques can significantly reduce computational time, the resulting dataset relies on generated data and the accuracy of the pre-processing… More >
-
Open Access
REVIEW
Enhancing Cyber Security through Artificial Intelligence and Machine Learning: A Literature Review
Journal of Cyber Security, Vol.6, pp. 89-116, 2024, DOI:10.32604/jcs.2024.056164
Abstract The constantly increasing degree and frequency of cyber threats require the emergence of flexible and intelligent approaches to systems’ protection. Despite the calls for the use of artificial intelligence (AI) and machine learning (ML) in strengthening cyber security, there needs to be more literature on an integrated view of the application areas, open issues or trends in AI and ML for cyber security. Based on 90 studies, in the following literature review, the author categorizes and systematically analyzes the current research field to fill this gap. The review evidences that, in contrast to rigid rule-based… More >
-
Open Access
ARTICLE
Performance Evaluation of Machine Learning Algorithms in Reduced Dimensional Spaces
Journal of Cyber Security, Vol.6, pp. 69-87, 2024, DOI:10.32604/jcs.2024.051196
Abstract This paper investigates the impact of reducing feature-vector dimensionality on the performance of machine learning (ML) models. Dimensionality reduction and feature selection techniques can improve computational efficiency, accuracy, robustness, transparency, and interpretability of ML models. In high-dimensional data, where features outnumber training instances, redundant or irrelevant features introduce noise, hindering model generalization and accuracy. This study explores the effects of dimensionality reduction methods on binary classifier performance using network traffic data for cybersecurity applications. The paper examines how dimensionality reduction techniques influence classifier operation and performance across diverse performance metrics for seven ML models. Four… More >
-
Open Access
ARTICLE
An Intrusion Detection Method Based on a Universal Gravitation Clustering Algorithm
Journal of Cyber Security, Vol.6, pp. 41-68, 2024, DOI:10.32604/jcs.2024.049658
Abstract With the rapid advancement of the Internet, network attack methods are constantly evolving and adapting. To better identify the network attack behavior, a universal gravitation clustering algorithm was proposed by analyzing the dissimilarities and similarities of the clustering algorithms. First, the algorithm designated the cluster set as vacant, with the introduction of a new object. Subsequently, a new cluster based on the given object was constructed. The dissimilarities between it and each existing cluster were calculated using a defined difference measure. The minimum dissimilarity was selected. Through comparing the proposed algorithm with the traditional Back More >
-
Open Access
ARTICLE
Empirical Analysis of Neural Networks-Based Models for Phishing Website Classification Using Diverse Datasets
Journal of Cyber Security, Vol.5, pp. 47-66, 2023, DOI:10.32604/jcs.2023.045579
Abstract Phishing attacks pose a significant security threat by masquerading as trustworthy entities to steal sensitive information, a problem that persists despite user awareness. This study addresses the pressing issue of phishing attacks on websites and assesses the performance of three prominent Machine Learning (ML) models—Artificial Neural Networks (ANN), Convolutional Neural Networks (CNN), and Long Short-Term Memory (LSTM)—utilizing authentic datasets sourced from Kaggle and Mendeley repositories. Extensive experimentation and analysis reveal that the CNN model achieves a better accuracy of 98%. On the other hand, LSTM shows the lowest accuracy of 96%. These findings underscore the More >
-
Open Access
ARTICLE
Enhancing Private Cloud Based Intrusion Prevention and Detection System: An Unsupervised Machine Learning Approach
Journal of Cyber Security, Vol.6, pp. 155-177, 2024, DOI:10.32604/jcs.2024.059265
Abstract Cloud computing is a transformational paradigm involving the delivery of applications and services over the Internet, using access mechanisms through microprocessors, smartphones, etc. Latency time to prevent and detect modern and complex threats remains one of the major challenges. It is then necessary to think about an intrusion prevention system (IPS) design, making it possible to effectively meet the requirements of a cloud computing environment. From this analysis, the central question of the present study is to minimize the latency time for efficient threat prevention and detection in the cloud. To design this IPS design… More >
Copyright © 2025 The Author(s). Published by Tech Science Press.