ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)

About the Journal

The Journal of Cyber Security and Mobility (JCSM) is a rigorously peer-reviewed, Gold Open Access journal that operates at the confluence of cybersecurity, information mobility, and next-generation communication infrastructures. Established in 2012, JCSM has become an authoritative venue for the dissemination of advanced scholarship, encompassing theoretical frameworks, empirical studies, methodological innovations, and system implementations in the security of mobile, distributed, and cyber-physical systems.

To accommodate the increasing volume and breadth of high-quality submissions, JCSM expanded its publication frequency from four to six issues per year as of 2022. Each issue contains approximately 10 meticulously reviewed research articles, culminating in an annual output of 60 papers. The journal’s Article Processing Charge (APC) remains competitively priced at 1300 EUR, reinforcing River Publishers’ commitment to accessibility, scholarly inclusivity, and high editorial standards.

Articles are published under the Creative Commons Attribution-Non Commercial 4.0 International (CC BY-NC 4.0) license, facilitating free, immediate access and legal reuse, provided proper attribution is maintained.

JCSM serves a global, interdisciplinary audience comprising researchers, engineers, cybersecurity professionals, policymakers, and technology developers. The journal emphasizes the security and governance of edge computing, blockchain infrastructure, autonomous systems, and mobile cyber-physical networks in both civilian and industrial contexts.

Aims & Scope

The Journal of Cybersecurity and Mobility (JCSM) seeks to foster advancing knowledge, as a multidisciplinary platform, on the security, privacy, resilience, and governance of mobile and interconnected systems. We bring together research from computer science, engineering, law, ethics, and the social sciences to address the complex challenges of securing a hyper-connected world.

Key areas of interest include authentication and access control, adversarial AI, IoT and vehicular network security, edge/fog and cloud integration, post-quantum cryptography, privacy-enhancing technologies, and cyber-physical infrastructures such as transport, healthcare, and smart grids. We also welcome contributions on policy, regulation, human-centred cybersecurity, and the societal implications of mobility and surveillance.

JCSM invites both theoretical and applied research, including experiments, simulations, formal models, case studies, and policy analysis. Our goal is to support innovation that strengthens trust, resilience, and ethical practice in the next generation of mobile and ubiquitous systems.

Areas of focus include (but are not limited to)

Authentication, Access & Identity
• Secure authentication and identity verification systems 
• Biometric, behavioural, and context-aware access control models 

Artificial Intelligence & Security
• Adversarial machine learning in mobility contexts 
• AI-driven threat detection and adaptive defence systems
• Deepfake detection and trust in mobile media communication
• Generative AI & Emerging Risks
• AI for Resilience & Recovery

Networks & Protocols
• Wireless sensor and actuator network security 
• Secure vehicular ad hoc networks (VANETs), UAV systems, and urban air mobility (UAM) 
• Satellite–terrestrial hybrid network security
• Next-generation networks (5G/6G), including network slicing, SDN/NFV, and ultra-low-latency
  applications

Cryptography & Privacy
• Cryptographic protocols for low-power and constrained devices 
• Distributed ledger technologies for secure communication (blockchains, DAGs, etc.) 
• Quantum-safe and post-quantum security for mobile networks
• Privacy-enhancing technologies (differential privacy, homomorphic encryption, secure multi-party
  computation)

Edge, Cloud & Distributed Systems
• Cloud Computing as a Service Infrastructure
• Edge and fog computing security paradigms 
• Hybrid cloud–edge security integration
• Trusted execution environments (TEEs) and hardware-assisted security

Cyber-Physical & Critical Infrastructure
• Industrial IoT and smart city cybersecurity
• Security in intelligent transport systems, healthcare IoT, and energy grids
• Resilience and recovery frameworks for mobile-critical infrastructures

Governance, Policy & Human Factors
• Threat intelligence and malware analysis in mobile platforms 
• Cross-border data governance, localisation, and regulatory compliance
• Cyber International Law & Cyber Insurance
• Cybersecurity Design, Cybersecurity Global Cooperation & Initiatives
• Ethical, legal, human-rights, and societal implications of mobile surveillance and ubiquitous
  connectivity