Volume 3, Issue 1 (2023)
Articles
The Purpose of Cybersecurity Governance in the Digital Transformation of Public Services and Protecting the Digital Environment
Maad Mijwil, Youssef Filali, Mohammad Aljanabi, Mariem Bounabi, and Mariem Bounabi
Theoretical Background of Cryptography
Rusul Mansoor Al-Amri, Dalal N. Hamood, and Alaa Kadhim Farhan
ChatGPT: Future Directions and Open possibilities
Mohammad Aljanabi
ChatGPT: Exploring the Role of Cybersecurity in the Protection of Medical Information
Maad Mijwil, Mohammad Aljanabi, and Ahmed Hussein Ali
Threats Detection in the Internet of Things Using Convolutional neural networks, long short-term memory, and gated recurrent units
Naomi A. Bajao and Jae-an Sarucam
SQL Injection Attack: Quick View
Vugar Abdullayev and Alok Singh Chauhan
Novel Convolutional Neural Networks based Jaya algorithm Approach for Accurate Deepfake Video Detection
Zahraa Faiz Hussain and Hind Raad Ibraheem
Advanced cyber security using Spectral entity feature selection based on Cyber Crypto Proof Security Protocol (C2PSP)
GOPALAKRISHNAN S, Karabi Saikia, and Ranadheer Reddy Vallem
An efficient cyber security system based on flow-based anomaly detection using Artificial neural network
J. Jasmine Hephzipah, Ranadheer Reddy Vallem, M. Sahaya Sheela, and G. Dhanalakshmi
Exploring the Top Five Evolving Threats in Cybersecurity: An In-Depth Overview
Maad Mijwil, Omega John Unogwu, Youssef Filali, Indu Bala, and Indu Bala
Cyber Security System Based on Machine Learning Using Logistic Decision Support Vector
Sahaya Sheela M, Hemanand D, and Ranadheer Reddy Vallem
Review on Blockchain Technology : Architecture, Characteristics, Benefits, Algorithms, Challenges and Applications
Karthik Kumar Vaigandla, Radha Krishna Karne, Mounika Siluveru, Madhavi Kesoju, and Madhavi Kesoju
An Analysis of the Internet of Everything
Roheen Qamar and Baqar Ali Zardari
A Process of Penetration Testing Using Various Tools
K. Deepika kongara and Shivani Krishnama
The impact of Blockchain technique on trustworthy healthcare sector
Nour Sadeq, Zeid Hamzeh, Ghalia Nassreddine, Tamima ElHassan, and Tamima ElHassan
A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond
Habeeb Omotunde and Maryam Ahmed
Machine Learning-Based Detection of Smartphone Malware: Challenges and Solutions
Amneh Alamleh, Sattam Almatarneh, Ghassan Samara, Mohammad Rasmi, and Mohammad Rasmi
Cybersecurity and Artificial Intelligence Applications: A Bibliometric Analysis Based on Scopus Database
O. S. Albahri and A. H. AlAmoodi
Cyber-Attack Detection for Cloud-Based Intrusion Detection Systems
Muna Ismael Shihan Al-jumaili and Jad Bazzi
Securing Tomorrow: Navigating the Evolving Cybersecurity Landscape
A. S. Albahri, Mohanad G. Yaseen, Mohammad Aljanabi, Ahmed Hussein Ali, and Ahmed Hussein Ali
Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence
Faris Kamil Hasan Mihna, Mustafa Abdulfattah Habeeb, Yahya Layth Khaleel, Yasir Hussein Ali, and Yasir Hussein Ali
A New Tiger Beetle Algorithm for Cybersecurity, Medical Image Segmentation and Other Global Problems Optimization
Ahmed Saihood, Mohammed Adel Al-Shaher, and Mohammed A. Fadhel
Distributed Denial of Service Attack Detection in IoT Networks using Deep Learning and Feature Fusion: A Review
Abdulhafiz Nuhu, Anis Farihan Mat Raffei, Mohd Faizal Ab Razak, Abubakar Ahmad, and Abubakar Ahmad