Journal Name: Computer Fraud and Security
Publisher: Beijing Press
ISSN (print): 1361-3723
ISSN (online): 1873-7056
Journal E-mail: editor@computerfraudsecurity.com


Welcome to the Computer Fraud and Security Journal (CFSJ), your premier source for insights and research in the rapidly evolving fields of cybersecurity, fraud prevention, and digital security.

Our Mission
At CFSJ, our mission is to provide a comprehensive platform that bridges the gap between academic research and practical application in the world of computer fraud and security. We are dedicated to advancing the understanding of cybersecurity threats, fraud prevention techniques, and the technologies that protect digital assets. Our goal is to empower researchers, practitioners, and decision-makers with the knowledge and tools they need to combat cyber threats effectively.

What We Do
CFSJ is a leading peer-reviewed journal that publishes cutting-edge research and analysis on various aspects of computer fraud and security. Our content includes:

  • Original Research Articles: In-depth studies and innovative research findings that push the boundaries of knowledge in cybersecurity and fraud prevention.
  • Review Articles: Comprehensive overviews of current trends, challenges, and advancements in the field.
  • Case Studies: Real-world applications and analyses of cybersecurity incidents and fraud cases.
  • Technical Notes: Short reports on emerging technologies, methodologies, and tools in the domain of computer security.

Our Editorial Team
Our editorial board comprises experts from academia, industry, and government sectors, each bringing a wealth of knowledge and experience to the table. Our reviewers are specialists in their fields, ensuring that the content we publish is of the highest quality and relevance.

Why Choose Us?

  • Expertise: Our contributors are recognized leaders in cybersecurity and fraud prevention, providing authoritative and up-to-date information.
  • Quality: We uphold rigorous standards for research and review, ensuring that every article published meets our high-quality benchmarks.
  • Impact: By disseminating valuable research and insights, we aim to influence both policy and practice in the field of computer security.

Get Involved
We invite researchers, practitioners, and professionals to contribute to our journal, share their expertise, and engage with our community. Whether you are interested in submitting your research, reviewing articles, or simply staying informed about the latest developments, CFSJ is your go-to resource for all things related to computer fraud and security.

Volume 2024, Issue 8

Published: 2024-12-01

The Future of Cyber Security Policy in the Post-Quantum Era

Bindu Ronald, Jaya Gupta, Fathimath Sheema Zahir, Shubhangi B Patil, Gauri Krishna Barse, Shilpa Choudhary

01 - 07

Cryptographic Techniques for Secure IoT Data Transmission

Sanjivani Hemant Kulkarni, Khanday Shafi Ahmad, Tushar Jadhav, Dipti Durgesh Patil, Amruta Mhatre, Smita Desai

08 - 13

Blockchain-Based Supply Chain Security: Mitigating Fraud and Cyber Attacks

Vivian Brian Lobo, Hamza Khan, Vandini Sharma, Arati Vinayak Deshpande, Dinesh Goyal, Anil Kumar

14 - 20

Blockchain Security Protocols: Enhancing the Resilience of Distributed Networks

Padmavati Shrivastava, Mayur Jakhete, Leena Indise, Shaiqua Taushif Khan, Sneha Umakant Agalawe, Sinu Nambiar

21 - 26

Cloud Security in Edge Computing: Addressing Data Privacy Concerns

Lakhwinder Kaur, Hruhiskehsh Joshi, Atmaram Shelke, Prashant Rahangdale, Ramesh Chandra Poonia, Sandeep Kumar

27 - 33

Quantum Cryptography and its Implications for Secure Voting Systems

Shweta Bandhekar, Anjali Shrivastav, Ahmar Afaq, Ganesh Shridhar Raghtate, Deepali Jayant Joshi, Vinit Khetani

34 - 39

Cyber Security Policy for the Protection of Critical National Infrastructure

Anjali Shrivastav, Kirti Bikram, Shweta Redkar, Bhagwan Dinkar Thorat, Vinit Khetani, Yatin Gandhi

40 - 46

Enhancing Cyber Fraud Detection Using Machine Learning Algorithms

Namrata Verma, Ansa Ahmed Dean, Bhavna Ambudkar, Devika A. Verma, Sonia Sagar Sorte, Varsha Kiran Bhosale

47 - 54

Quantum Cryptography in Secure Communication: Opportunities and Challenges

Harsha Avinash Bhute, Bharati P. Vasgi, Aparajita Mohanty, Chandrakant D. Kokane, Gopal B. Deshmukh, Syed Sumera Ali

55 - 63

Blockchain-Based Solutions for Enhancing Cybersecurity in Healthcare Systems

Vijaya Balpande, Abhijeet Rajan, Hrushikesh Joshi, Harsha Avinash Bhute, Santoshkumar Vaman Chobe, Vikas Nandgaonkar

64 - 72

Cybersecurity in IoT-Based Smart Grids: A Comprehensive Survey

Manjusha Tatiya, Alisha Verma, Sopan Talekar, Santosh Kumar, Varsha Kiran Bhosale, Sandeep Kumar

73 - 81

View All Issues
How to harness AI securely in your business
Suid Adeyanju
Vol. 2024, Issue 6
Rethinking how you safeguard data
Mark Grindey
Vol. 2024, Issue 6
The AI vs AI showdown
Simon Horswell
Vol. 2024, Issue 6


Traditional fraud engines need to widen their view
Danny Kadyshevitch
Vol. 2024, Issue 6
Securing data on the move
Rick Vanover
Vol. 2024, Issue 6
The recruitment wall in cyber security
Jamal Elmellas
Vol. 2024, Issue 5
The best form of defence – the benefits of red teaming
Steve Mansfield-Devine
Vol. 2018, Issue 10
Encrypted DNS: The good, the bad and the moot
Georgios Kambourakis, Georgios Karopoulos
Vol. 2022, Issue 5


Cyber incident response and planning: a flexible approach
Nivedita Shinde, Priti Kulkarni
Vol. 2021, Issue 1
Deconstructing the SolarWinds breach
Lavi Lazarovitz
Vol. 2021, Issue 6
IBM: Cost of a Data Breach Report
Author
Vol. 2021, Issue 8
Verizon: Data Breach Investigations Report
Steve Mansfield-Devine
Vol. 2022, Issue 6
Cyber Security Breaches Survey 2022
Steve Mansfield-Devine
Vol. 2022, Issue 4


Sophos: The State of Ransomware 2022
Steve Mansfield-Devine
Vol. 2022, Issue 5
Encrypted DNS: The good, the bad and the moot
Georgios Kambourakis, Georgios Karopoulos
Vol. 2022, Issue 5
Strategies for counteracting social engineering attacks
Rubia Fatima, Affan Yasin, Lin Liu, Wang Jianmin
Vol. 2022, Issue 7