Journal Name: Computer Fraud and Security
ISSN: 1361-3723
Journal E-mail: editor@computerfraudsecurity.com
Paper Publication Fee: 1500 USD


Welcome to the Computer Fraud & Security Journal (CFSJ), your premier source for insights and research in the rapidly evolving fields of cybersecurity, fraud prevention, and digital security.

Our Mission
At CFSJ, our mission is to provide a comprehensive platform that bridges the gap between academic research and practical application in the world of computer fraud & security. We are dedicated to advancing the understanding of cybersecurity threats, fraud prevention techniques, and the technologies that protect digital assets. Our goal is to empower researchers, practitioners, and decision-makers with the knowledge and tools they need to combat cyber threats effectively.

What We Do
CFSJ is a leading peer-reviewed journal that publishes cutting-edge research and analysis on various aspects of computer fraud & security. Our content includes:

  • Original Research Articles: In-depth studies and innovative research findings that push the boundaries of knowledge in cybersecurity and fraud prevention.
  • Review Articles: Comprehensive overviews of current trends, challenges, and advancements in the field.
  • Case Studies: Real-world applications and analyses of cybersecurity incidents and fraud cases.
  • Technical Notes: Short reports on emerging technologies, methodologies, and tools in the domain of computer security.

Our Editorial Team
Our editorial board comprises experts from academia, industry, and government sectors, each bringing a wealth of knowledge and experience to the table. Our reviewers are specialists in their fields, ensuring that the content we publish is of the highest quality and relevance.

Why Choose Us?

  • Expertise: Our contributors are recognized leaders in cybersecurity and fraud prevention, providing authoritative and up-to-date information.
  • Quality: We uphold rigorous standards for research and review, ensuring that every article published meets our high-quality benchmarks.
  • Impact: By disseminating valuable research and insights, we aim to influence both policy and practice in the field of computer security.

Get Involved
We invite researchers, practitioners, and professionals to contribute to our journal, share their expertise, and engage with our community. Whether you are interested in submitting your research, reviewing articles, or simply staying informed about the latest developments, CFSJ is your go-to resource for all things related to computer fraud & security.

Call for Papers

2024-12-09

Call for Papers for the New Issue.
Last Date of Submission: February 28th, 2025

Volume 2025, Issue 1

Published: 2025-01-23

Modeling of PV Power Based on Weather Random Sampling and Fluctuation Characteristics Simulation

Zhenzhen Wang, Ruiqing Fan, Quanyou Li, Lingxu Guo, Jiaan Zhang

33-44

Temperature Prediction of High-voltage Switchgear Based on Multi-type Machine Learning Algorithm

Zuowei Pan, Xiaowei Wang, Yan Li, Haiting Yang, Ning Wang, Guoliang Sun, Jun Wu, Bo Zhang

63-72

State Perception and Health Prediction of Key Equipment in Power Metering Production

Chong Li, Hongtao Shen, Juchuan Guo, Hongming Ma, Yi Wang, Rongkun Guo

84-99

Automotive Styling Design Optimisation Based on Elliptic Fourier and Response-NSGA-II

Zhe Luo, Yu Zhong, Xinyu Wang, Jiantao He, Xiuyun Zhai

249 - 262

Visual Localization and Dense Map Construction in Dynamic Scenes

Huipeng Li, Zhaolan He, Kadan Xie, Cong Xue

263 - 274

The Impact of Virtual Reality Technology on Developing Critical Thinking Skills in University Students

Reviandari Widyatiningtyas, Nugroho Susanto, Darmawanta Sembiring, Mia Aina, Adi Asmara, Loso Judijanto, Jeffrey Payung Langi, Rd. D. Lokita Pramesti Dewi, Tono Wartono, Mohan Taufiq Mashuri, Evaristus Silitubun, Aditya Ridho Fatmawan, I Putu Agus Dharma Hita

385 - 391

View All Issues
How to harness AI securely in your business
Suid Adeyanju
Vol. 2024, Issue 6
Rethinking how you safeguard data
Mark Grindey
Vol. 2024, Issue 6
The AI vs AI showdown
Simon Horswell
Vol. 2024, Issue 6


Traditional fraud engines need to widen their view
Danny Kadyshevitch
Vol. 2024, Issue 6
Securing data on the move
Rick Vanover
Vol. 2024, Issue 6
The recruitment wall in cyber security
Jamal Elmellas
Vol. 2024, Issue 5
The best form of defence – the benefits of red teaming
Steve Mansfield-Devine
Vol. 2018, Issue 10
Encrypted DNS: The good, the bad and the moot
Georgios Kambourakis, Georgios Karopoulos
Vol. 2022, Issue 5


Cyber incident response and planning: a flexible approach
Nivedita Shinde, Priti Kulkarni
Vol. 2021, Issue 1
Deconstructing the SolarWinds breach
Lavi Lazarovitz
Vol. 2021, Issue 6
IBM: Cost of a Data Breach Report
Author
Vol. 2021, Issue 8
Verizon: Data Breach Investigations Report
Steve Mansfield-Devine
Vol. 2022, Issue 6
Cyber Security Breaches Survey 2022
Steve Mansfield-Devine
Vol. 2022, Issue 4


Sophos: The State of Ransomware 2022
Steve Mansfield-Devine
Vol. 2022, Issue 5
Encrypted DNS: The good, the bad and the moot
Georgios Kambourakis, Georgios Karopoulos
Vol. 2022, Issue 5
Strategies for counteracting social engineering attacks
Rubia Fatima, Affan Yasin, Lin Liu, Wang Jianmin
Vol. 2022, Issue 7