ISSN :3049-2335
Original Research
Overview of the Code-Reuse Attacks Mitigations, and Evaluation using SMAA-2 Approach
https://dx.doi.org/10.54364/cybersecurityjournal.2025.1106
02-Jan-2025
Mahmoud Said Elsayed Abdallah

Adv. Know. Base. Syst. Data Sci. Cyber., 2 (1 ):108-148

Abstract PDF

Original Research
Performance of Levene's Test with Various Residuals and Correction Factor for Homogeneity of Variance in Single and Factorial ANOVA-A Simulation Approach
https://dx.doi.org/10.54364/cybersecurityjournal.2025.1107
04-Jan-2025
Dr Benjamin Odoi

Adv. Know. Base. Syst. Data Sci. Cyber., 2 (1 ):149-171

Abstract PDF

Original Research
Security Models based on Semantic Web Technologies: The ARK Platform Security Modules
https://dx.doi.org/10.54364/cybersecurityjournal.2025.1108
09-Apr-2025
Julio Noe Hernandez Torres, Junli Liang, Lucy McKenna, Rob Brennan,

Adv. Know. Base. Syst. Data Sci. Cyber., 2 (1 ):172-183

Abstract PDF

Original Research
Evaluation of Prompting Strategies for Cyberbullying Detection using various Large Language Models
https://dx.doi.org/10.54364/cybersecurityjournal.2025.1109
29-Apr-2025
Anamika Gupta

Adv. Know. Base. Syst. Data Sci. Cyber., 2 (1 ):184-196

Abstract PDF

Original Research
Assessing Vulnerabilities in Voice Assistants: Comparative Analysis of Google Assistant, Siri, and Alexa
https://dx.doi.org/10.54364/cybersecurityjournal.2025.1110
30-Apr-2025
Neha Giri

Adv. Know. Base. Syst. Data Sci. Cyber., 2 (1 ):197-214

Abstract PDF