Journal of Reliable and Secure Computing

Publishing Model:
ISSN:
ISSN: 3070-6424
The Journal of Reliable and Secure Computing (JRSC) is an international peer-reviewed journal dedicated to advancing research and practice in reliable, trustworthy, and secure computing.
DOI Prefix: 10.62762/JRSC

Journal Metrics

-
Impact Factor
-
CiteScore

Recent Articles

Open Access | Research Article | 28 January 2026
Blockchain Consensus Mechanisms and Enhancement Techniques for Federated Learning-Based Intrusion Detection Systems in IoT Smart Homes
Journal of Reliable and Secure Computing | Volume 2, Issue 1: 1-26, 2026 | DOI: 10.62762/JRSC.2025.761390
Abstract
The rapid proliferation of smart home IoT devices has introduced unprecedented cybersecurity vulnerabilities, necessitating scalable and privacy-preserving intrusion detection systems (IDS). Federated Learning (FL) offers a promising decentralized approach by training models locally without sharing raw data, but it remains susceptible to poisoning attacks and relies on a vulnerable central aggregator. This paper presents a novel blockchain-enhanced FL framework tailored for smart home IDS, integrating multiple consensus mechanisms—Proof-of-Stake (PoS), Practical Byzantine Fault Tolerance (PBFT), and Proof-of-Authority (PoA)—for the first time in this context. Our approach uniquely combin... More >

Graphical Abstract
Blockchain Consensus Mechanisms and Enhancement Techniques for Federated Learning-Based Intrusion Detection Systems in IoT Smart Homes
Open Access | Research Article | 28 December 2025
Enhancing UAV Security with GPS Spoofing and Jamming Anomaly Detection
Journal of Reliable and Secure Computing | Volume 1, Issue 1: 54-67, 2025 | DOI: 10.62762/JRSC.2025.368867
Abstract
Unmanned aerial vehicles face GPS spoofing and jamming that can compromise navigation and safety. We present an anomaly detection method that achieves both high accuracy and interpretability, enabling UAV operators to understand why an alert is triggered, which enables timely responses and builds trust in autonomous detection systems operating in safety-critical environments. We use five classifiers, including XGBoost, Support Vector Machine, K-Nearest Neighbor, Random Forest, and Naive Bayes, trained on a UAV dataset containing 3622 samples for spoofing detection and 6445 for jamming detection made in PX4 and Gazebo with benign flight and attack cases. After feature scaling and reduction, X... More >

Graphical Abstract
Enhancing UAV Security with GPS Spoofing and Jamming Anomaly Detection
Open Access | Review Article | 20 December 2025
Virtual Tourism Cybersecurity: A Scientometric Analysis of Research Trends
Journal of Reliable and Secure Computing | Volume 1, Issue 1: 41-53, 2025 | DOI: 10.62762/JRSC.2025.547593
Abstract
The rapid pace of technological developments in the digital age has transformed the tourism sector, spawning virtual tourism, an emerging platform through which tourists are able to visit their destination using augmented reality (AR) and virtual reality (VR) for interactive experiences. Such technological transformation creates significant cybersecurity challenges, such as data breaches, violations of users’ privacy, and vulnerabilities on platforms. Therefore, our work uses bibliometric approaches to examine the growing body of research on virtual tourism cybersecurity. A total of 1145 publications were retrieved using the specified query, which includes studies on the dangers of data th... More >

Graphical Abstract
Virtual Tourism Cybersecurity: A Scientometric Analysis of Research Trends
Open Access | Research Article | 19 December 2025
PUF-AKA-IoD: A Provably Secure PUF-Based Authentication and Key Agreement Protocol for IoD over 5G Networks
Journal of Reliable and Secure Computing | Volume 1, Issue 1: 25-40, 2025 | DOI: 10.62762/JRSC.2025.869145
Abstract
The Internet of Things (IoT) is a technological ecosystem that interconnects physical devices via the Internet to enable data exchange and coordinated operations, among which the Internet of Drones (IoD) represents a specialized application integrating drone technology with IoT for remote control and data transmission. With the adoption of fifth-generation (5G) mobile communication networks in IoD environments, drones can transmit high-quality data and respond to user requests with reduced latency. In recent years, various authentication schemes using temporary credentials have been proposed to allow users and drones to establish session keys with the assistance of a control server; however,... More >

Graphical Abstract
PUF-AKA-IoD: A Provably Secure PUF-Based Authentication and Key Agreement Protocol for IoD over 5G Networks
Open Access | Review Article | 02 November 2025 | Cited: 2 , Scopus 2
Privacy and Trust in Blockchain-Federated Intrusion Detection Systems: Taxonomy, Challenges and Perspectives
Journal of Reliable and Secure Computing | Volume 1, Issue 1: 4-24, 2025 | DOI: 10.62762/JRSC.2025.399812
Abstract
Intrusion Detection Systems (IDS) play a critical role in protecting modern networks, but traditional centralized designs raise serious concerns regarding data privacy, trust, and scalability. Federated Learning (FL) reduces privacy risks through decentralized model training, and blockchain enhances trust by providing immutability and transparency. Combining these technologies creates a promising paradigm for secure and trustworthy IDS. This paper presents a comprehensive survey of blockchain-federated IDS with a particular focus on privacy and trust. The key contribution is a multi-dimensional taxonomy that integrates IDS architectures, FL strategies, blockchain types, and consensus mechani... More >

Graphical Abstract
Privacy and Trust in Blockchain-Federated Intrusion Detection Systems: Taxonomy, Challenges and Perspectives
Open Access | Editorial | 29 September 2025
Inaugural Editorial for the Journal of Reliable and Secure Computing
Journal of Reliable and Secure Computing | Volume 1, Issue 1: 1-3, 2025 | DOI: 10.62762/JRSC.2025.220451
Abstract
Presents the introductory editorial for the inaugural issue of this title. More >

Journal Statistics

18
Authors
7
Countries / Regions
6
Articles
2
Citations
2025
Published Since
0
Special Issues
3,691
Article Views
814
Article Downloads
Journal of Reliable and Secure Computing
Journal of Reliable and Secure Computing
eISSN: 3070-6424
Crossref
Crossref
Member of Crossref
Visit Crossref →