From the street to the internet? Exploring hybrid offending among financially motivated cybercriminals Luuk BekkersRutger Leukfeldt in Trends in Organized Crime Article 03 February 2026
Fast and accurate identification of hardware Trojan locations in gate-level netlist using nearest neighbour approach integrated with machine learning technique Anindita ChattopadhyaySiddharth BisariyaVijay Kumar Sutrakar in Discover Electronics Article Open access 03 February 2026
Behavioral differential petri nets based privacy-preserving method for event logs Daoyu KanXianwen Fang in Knowledge and Information Systems Article 02 February 2026
Defense against data poisoning attacks in robot vision systems based on adversarial example detection Ruiqing ChuXiao FuXiaoyang Zhou in Frontiers of Computer Science Article 31 January 2026
A zero-watermarking scheme for digital images using histogram based features of circular sub-images Nasir Mehmood in Multimedia Tools and Applications Article 29 January 2026
UniAttack: Unified Physical-Digital Face Attack Detection Shunxin ChenAjian LiuZhen Lei in International Journal of Computer Vision Article 29 January 2026
A Stackelberg game based deception defense strategy against APT under resource constraints Xin DengPengdeng LiZhihong Tian in Science China Information Sciences Article 28 January 2026
A novel video region tampering detection method based on deep neural network Hao ChenQi HanXin Bao in Multimedia Tools and Applications Article 27 January 2026
Simulation of DoS and jamming attacks on railway control systems over TCP/IP and radio frequency Mays AbukeshekMohammed Al-MhiqaniRemy Odimegwu in Journal of Transportation Security Article Open access 23 January 2026
From Prey to Protect: Exploring Social Engineering Through Games and Simulation. Trust, Awareness, and Phishing Defense Affan YasinRubia FatimaKashif Ishaq in International Journal of Information Security Article 22 January 2026
Psychological impact of cyber-crime on victims Ruchi GautamSwati Yadav in Current Psychology Article 19 January 2026
Kriminologischer Beitrag Barbara Horten SchindlerChristian SteffanJohanna Schläger in Forensische Psychiatrie, Psychologie, Kriminologie Article 19 January 2026
Robust defense strategies for multimodal contrastive learning: efficient fine-tuning against backdoor attacks Md. Iqbal HossainAfia SajeedaMing Shao in Multimedia Tools and Applications Article 17 January 2026
Legal and regulatory challenges in addressing high-tech crimes in the banking sector: developing a cybersecurity risk assessment framework for Vietnam Luong Vu Bui in Journal of Banking Regulation Article Open access 14 January 2026
PFSA: Pseudo Fault Sensitization Attack on Logic Locking via Key-invalidation Lei ZhangXuejun LiuYuan Liu in Journal of Electronic Testing Article 14 January 2026
Combining parameter fragmentation and group shuffling to defend against the untrustworthy server in federated learning Hongle GuoWanghu ChenXiaojuan Geng in Scientific Reports Article Open access 13 January 2026
Detecting illicit transactions in bitcoin: a wavelet-temporal graph transformer approach for anti-money laundering Ziqian LinQining LuoZhenkai Qin in Scientific Reports Article Open access 13 January 2026
Assessing the Links Between Exposure to Adverse Environments and Cyberbullying Perpetration and Victimization Among Chinese Rural Children Huihui GongMengtong ChenQiushi Zhou in Child and Adolescent Social Work Journal Article 12 January 2026
Hybrid Machine Learning-Based Detection of Phishing Attacks through E-mails and SMSs in Electronic Vehicles Bhoomika S. HorapetiMosiur RahamanBrij B. Gupta in SN Computer Science Article 12 January 2026
Journal Journal of Computer Virology and Hacking Techniques The field of computer virus prevention has rapidly taken an important position in our technological and information society. Viral attacks increase... Publishing model Hybrid Journal Impact Factor 1.9 (2024) Downloads 100,037 (2025) Submission to first decision(median) 5 days
Journal International Journal of Information Security The International Journal of Information Security is an English language international journal on research in information security. Information... Publishing model Open Access Journal Impact Factor 3.2 (2024) Downloads 750,551 (2025) Submission to first decision(median) 9 days
Journal Journal of Cryptographic Engineering The Journal of Cryptographic Engineering (JCEN) presents high-quality scientific research on architectures, algorithms, techniques, tools,... Publishing model Hybrid Journal Impact Factor 1.4 (2024) Downloads 82,948 (2025) Submission to first decision(median) 23 days