•  
  •  
 

Volume 3, Issue 1 (2023)

Articles

PDF

Theoretical Background of Cryptography
Rusul Mansoor Al-Amri, Dalal N. Hamood, and Alaa Kadhim Farhan

PDF

SQL Injection Attack: Quick View
Vugar Abdullayev and Alok Singh Chauhan

PDF

An efficient cyber security system based on flow-based anomaly detection using Artificial neural network
J. Jasmine Hephzipah, Ranadheer Reddy Vallem, M. Sahaya Sheela, and G. Dhanalakshmi

PDF

Exploring the Top Five Evolving Threats in Cybersecurity: An In-Depth Overview
Maad Mijwil, Omega John Unogwu, Youssef Filali, Indu Bala, and Indu Bala

PDF

Review on Blockchain Technology : Architecture, Characteristics, Benefits, Algorithms, Challenges and Applications
Karthik Kumar Vaigandla, Radha Krishna Karne, Mounika Siluveru, Madhavi Kesoju, and Madhavi Kesoju

PDF

An Analysis of the Internet of Everything
Roheen Qamar and Baqar Ali Zardari

PDF

A Process of Penetration Testing Using Various Tools
K. Deepika kongara and Shivani Krishnama

PDF

The impact of Blockchain technique on trustworthy healthcare sector
Nour Sadeq, Zeid Hamzeh, Ghalia Nassreddine, Tamima ElHassan, and Tamima ElHassan

PDF

Machine Learning-Based Detection of Smartphone Malware: Challenges and Solutions
Amneh Alamleh, Sattam Almatarneh, Ghassan Samara, Mohammad Rasmi, and Mohammad Rasmi

PDF

Cyber-Attack Detection for Cloud-Based Intrusion Detection Systems
Muna Ismael Shihan Al-jumaili and Jad Bazzi

PDF

Securing Tomorrow: Navigating the Evolving Cybersecurity Landscape
A. S. Albahri, Mohanad G. Yaseen, Mohammad Aljanabi, Ahmed Hussein Ali, and Ahmed Hussein Ali

PDF

Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence
Faris Kamil Hasan Mihna, Mustafa Abdulfattah Habeeb, Yahya Layth Khaleel, Yasir Hussein Ali, and Yasir Hussein Ali

PDF

Distributed Denial of Service Attack Detection in IoT Networks using Deep Learning and Feature Fusion: A Review
Abdulhafiz Nuhu, Anis Farihan Mat Raffei, Mohd Faizal Ab Razak, Abubakar Ahmad, and Abubakar Ahmad