ICCK Transactions on Cybersecurity

Publishing Model:
ISSN:
ISSN: 3069-3349
ICCK Transactions on Cybersecurity aims to publish cutting-edge research in the field of cybersecurity, focusing on both theoretical advancements and practical applications.
DOI Prefix: 10.62762/TC

Journal Metrics

-
Impact Factor
-
CiteScore

Recent Articles

Free Access | Research Article | 25 December 2025
From Phishing to Prompt Bombing: Innovative Game-Theoretic Solutions for Modern Cyber Threats
ICCK Transactions on Cybersecurity | Volume 1, Issue 2: 35-57, 2025-2026 | DOI: 10.62762/TC.2025.969565
Abstract
The rise of multi-factor authentication (MFA) has significantly enhanced cybersecurity postures, yet its effectiveness is increasingly challenged by sophisticated social engineering attacks, particularly those exploiting MFA fatigue. MFA fatigue, a tactic where attackers inundate users with authentication prompts, aims to induce erroneous approvals, as notably exemplified by the 2022 Uber breach. This phenomenon undermines the very security MFA is designed to provide by leveraging human vulnerabilities. Game theory, a powerful mathematical framework for analyzing strategic decision-making, offers a robust methodology to model the dynamic interactions between attackers and defenders. By apply... More >

Graphical Abstract
From Phishing to Prompt Bombing: Innovative Game-Theoretic Solutions for Modern Cyber Threats
Free Access | Research Article | 01 September 2025
USVScout: Detecting Security Vulnerabilities in USV-based Marine Applications
ICCK Transactions on Cybersecurity | Volume 1, Issue 1: 17-34, 2025-2026 | DOI: 10.62762/TC.2025.281528
Abstract
With the deep integration of artificial intelligence (AI) and Internet of Things (IoT) technologies, the maritime transportation industry is undergoing profound changes, and the application scenarios of unmanned surface vehicles (USVs) are constantly expanding. Aiming at the security threats faced by USV application systems, this paper proposes a new threat model for ship communication protocols and service logics, and the system covers the potential adversarial entity attack paths in application program logics and communication protocols. Based on this model, the automated security inspection framework USVScout was designed and implemented. By parsing the source code of the application prog... More >

Graphical Abstract
USVScout: Detecting Security Vulnerabilities in USV-based Marine Applications
Free Access | Editorial | 30 August 2025
Securing the Cognitive Future in the Era of 6G and Beyond
ICCK Transactions on Cybersecurity | Volume 1, Issue 1: 15-16, 2025-2026 | DOI: 10.62762/TC.2025.346449
Abstract
This editorial emphasizes the urgent need for resilient, intelligent, and secure-by-design systems to address the evolving threats in the 6G and beyond era. More >
Free Access | Editorial | 27 August 2025
The Quantum Countdown: A Global Call to Action for Post-Quantum Readiness
ICCK Transactions on Cybersecurity | Volume 1, Issue 1: 13-14, 2025-2026 | DOI: 10.62762/TC.2025.873234
Abstract
The editorial highlights the urgent need for global action to adopt post-quantum cryptographic standards, as quantum computing threatens current encryption systems, with significant financial and strategic challenges ahead. More >
Free Access | Research Article | 19 August 2025
AI-Driven Intrusion Detection System Using SSH Honeypots
ICCK Transactions on Cybersecurity | Volume 1, Issue 1: 3-12, 2025-2026 | DOI: 10.62762/TC.2025.521799
Abstract
With the rapid evolution of cyber threats targeting critical services like SSH, traditional Intrusion Detection Systems (IDS) are often unable to handle zero-day attacks and advanced persistent threats. This work proposes an intelligent IDS powered by SSH honeypots combined with machine learning. The honeypots simulate vulnerable SSH services to capture attacker behavior, which is then analyzed using Random Forest classifiers and Autoencoders for accurate intrusion detection. Our AI-based framework shows robust detection rates across multiple attack vectors, offering dynamic adaptability to evolving threats. The proposed system demonstrates a promising defense mechanism, bridging the gap bet... More >

Graphical Abstract
AI-Driven Intrusion Detection System Using SSH Honeypots
Open Access | Editorial | 19 July 2025
Editorial: Launching ICCK Transactions on Cybersecurity – A New Forum for Secure Digital Futures
ICCK Transactions on Cybersecurity | Volume 1, Issue 1: 1-2, 2025-2026 | DOI: 10.62762/TC.2025.890879
Abstract
Presents the inaugural editorial for the ICCK Transactions on Cybersecurity. More >

Journal Statistics

11
Authors
4
Countries / Regions
6
Articles
0
Citations
2025
Published Since
0
Special Issues
4,491
Article Views
919
Article Downloads
ICCK Transactions on Cybersecurity
ICCK Transactions on Cybersecurity
eISSN: 3069-3349
Crossref
Crossref
Member of Crossref
Visit Crossref →