Volume 2, Issue 1 (2022)
Articles
Cybersecurity Challenges in Smart Cities: An Overview and Future Prospects
Maad Mijwil, Ruchi Doshi, Kamal Kant Hiran, Abdel-Hameed Al-Mistarehi, and Abdel-Hameed Al-Mistarehi
SQL Injection Attack Detection Using Machine Learning Algorithm
Taseer Muhammad and Hamayoon Ghafory
Ubiquitous Trust Management and Power Optimization for UAV Assisted Mobile Communication
Nejood F. Abdulsattar, Ali Alsalamy, and Ghadeer Ghazi Shayea
Introduction to The Data Mining Techniques in Cybersecurity
Israa Ezzat Salem, Maad Mijwil, Alaa Wagih Abdulqader, Marwa M. Ismaeel, Marwa M. Ismaeel, and Anas M. Zein Alaabdin
Detection of False Data Injection Attack using Machine Learning approach
Siti Nur Fathin Najwa Binti Mustaffa and muhammad Farhan
Machine Learning and Data Mining Methods for Cyber Security: A Survey
Ziaul Hasan, Hassan r. Mohammad, and Maka Jishkariani
Zero-Day Vulnerabilities: Unveiling the Threat Landscape in Network Security
Raheela zaib and Kai-Qing Zhou
Efficient Coherent Trust based Location Aware Clustering for Communication in Mobile Ad Hoc Networks
Ali Alsalamy, Nejood F. Abdulsattar, and Dheyaa Abdulameer Mohammed