ICCK Transactions on Cybersecurity

Publishing Model:
ISSN:
  ISSN:  3069-3349
ICCK Transactions on Cybersecurity aims to publish cutting-edge research in the field of cybersecurity, focusing on both theoretical advancements and practical applications.
E-mail:[email protected]  DOI Prefix: 10.62762/TC
-
Impact Factor
-
CiteScore

Recent Articles

Research Article | 01 September 2025
USVScout: Detecting Security Vulnerabilities in USV-based Marine Applications
ICCK Transactions on Cybersecurity | Volume 1, Issue 1: 17-34, 2025 | DOI: 10.62762/TC.2025.281528
Abstract
With the deep integration of artificial intelligence (AI) and Internet of Things (IoT) technologies, the maritime transportation industry is undergoing profound changes, and the application scenarios of unmanned surface vehicles (USVs) are constantly expanding. Aiming at the security threats faced by USV application systems, this paper proposes a new threat model for ship communication protocols and service logics, and the system covers the potential adversarial entity attack paths in application program logics and communication protocols. Based on this model, the automated security inspection framework USVScout was designed and implemented. By parsing the source code of the application prog... More >

Graphical Abstract
USVScout: Detecting Security Vulnerabilities in USV-based Marine Applications

Editorial | 30 August 2025
Securing the Cognitive Future in the Era of 6G and Beyond
ICCK Transactions on Cybersecurity | Volume 1, Issue 1: 15-16, 2025 | DOI: 10.62762/TC.2025.346449
Abstract
This editorial emphasizes the urgent need for resilient, intelligent, and secure-by-design systems to address the evolving threats in the 6G and beyond era. More >

Editorial | 27 August 2025
The Quantum Countdown: A Global Call to Action for Post-Quantum Readiness
ICCK Transactions on Cybersecurity | Volume 1, Issue 1: 13-14, 2025 | DOI: 10.62762/TC.2025.873234
Abstract
The editorial highlights the urgent need for global action to adopt post-quantum cryptographic standards, as quantum computing threatens current encryption systems, with significant financial and strategic challenges ahead. More >

Research Article | 19 August 2025
AI-Driven Intrusion Detection System Using SSH Honeypots
ICCK Transactions on Cybersecurity | Volume 1, Issue 1: 3-12, 2025 | DOI: 10.62762/TC.2025.521799
Abstract
With the rapid evolution of cyber threats targeting critical services like SSH, traditional Intrusion Detection Systems (IDS) are often unable to handle zero-day attacks and advanced persistent threats. This work proposes an intelligent IDS powered by SSH honeypots combined with machine learning. The honeypots simulate vulnerable SSH services to capture attacker behavior, which is then analyzed using Random Forest classifiers and Autoencoders for accurate intrusion detection. Our AI-based framework shows robust detection rates across multiple attack vectors, offering dynamic adaptability to evolving threats. The proposed system demonstrates a promising defense mechanism, bridging the gap bet... More >

Graphical Abstract
AI-Driven Intrusion Detection System Using SSH Honeypots

Open Access | Editorial | 19 July 2025
Editorial: Launching ICCK Transactions on Cybersecurity – A New Forum for Secure Digital Futures
ICCK Transactions on Cybersecurity | Volume 1, Issue 1: 1-2, 2025 | DOI: 10.62762/TC.2025.890879
Abstract
Presents the inaugural editorial for the ICCK Transactions on Cybersecurity. More >
Journal Statistics
8
Authors
4
Author Distribution (Countries/Regions)
5
Articles
0
Citations
2025
Published Since
0
Special Issues
646
Article Views
181
Article Downloads
ICCK Transactions on Cybersecurity

ICCK Transactions on Cybersecurity

eISSN: 3069-3349

Email: [email protected]

Crossref

Crossref

Member of Crossref
https://www.crossref.org

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/icck/