ISSN :3049-2335

Current Issue

Volume -2, Issue -1, January-April 2025, 2025

Original Research
Overview of the Code-Reuse Attacks Mitigations, and Evaluation using SMAA-2 Approach
DOI: https://dx.doi.org/10.54364/cybersecurityjournal.2025.1106
02-Jan-2025
Mahmoud Said Elsayed Abdallah

PDF Abstract

Volume -2, Issue -1, Apr, 2025

Original Research

Volume -2, Issue -1, January-April 2025, 2025

Original Research
Security Models based on Semantic Web Technologies: The ARK Platform Security Modules
DOI: https://dx.doi.org/10.54364/cybersecurityjournal.2025.1108
09-Apr-2025
Julio Noe Hernandez Torres, Junli Liang, Lucy McKenna, Rob Brennan,

PDF Abstract

Volume -2, Issue -1, January-April 2025, 2025

Original Research
Evaluation of Prompting Strategies for Cyberbullying Detection using various Large Language Models
DOI: https://dx.doi.org/10.54364/cybersecurityjournal.2025.1109
29-Apr-2025
Anamika Gupta

PDF Abstract

Volume -2, Issue -1, January-April 2025, 2025

Original Research
Assessing Vulnerabilities in Voice Assistants: Comparative Analysis of Google Assistant, Siri, and Alexa
DOI: https://dx.doi.org/10.54364/cybersecurityjournal.2025.1110
30-Apr-2025
Neha Giri

PDF Abstract