•  
  •  
 

Volume 5, Issue 2 (2026)

Articles

PDF

A Dynamic DNA Cryptosystem for Secure File Sharing
Kanaan J. Brakas and Mafaz Alanezi

PDF

Color Image Encryption Based on a New Symmetric Lightweight Algorithm
Ala’a Talib Khudhair, Abeer Tariq Maolood, and Ekhlas Khalaf Gbashi

PDF

A Secure Password based Authentication with Variable Key Lengths Based on the Image Embedded Method
Seerwan Waleed Jirjees, Farah Flayyeh Alkhalid, Ahmed Mudheher Hasan, Amjad Jaleel Humaidi, and Amjad Jaleel Humaidi

PDF

Development of real-time threat detection systems with AI-driven cybersecurity in critical infrastructure
Noora Zidan Khalaf, Israa Ibraheem Al Barazanchi, Israa Ibraheem Al Barazanchi, A. D. Radhi, A. D. Radhi, Pritesh Shah, and Ravi Sekhar

PDF

Cybersecurity risk assessment for identifying threats, vulnerabilities and countermeasures in the IoT
Mohammed Amin Almaiah, Rami Shehab, Tayseer Alkhdour, Mansour Obeidat, and Mansour Obeidat

PDF

An Effective Feature Optimization Model for Android Malware Detection
Hussein K. Almulla, Hussam J. Mohammed, Nathan Clarke, Ahmed Adnan Hadi, and Ahmed Adnan Hadi

PDF

Enhancing User Authentication through the Implementation of the ForestPA Algorithm for Smart Healthcare Systems
Nurul Syafiqah Zaidi, Al-Fahim Mubarak Ali, Ahmad Firdaus, Adamu Abubakar Ibrahim, Adamu Abubakar Ibrahim, and Mohd Faizal Ab Razak

PDF

Healthcare Security in Edge-Fog-Cloud Environment using Blockchain: A Systematic Review
Zaid J. Al-Araji, Mahmood S. AlKhaldee, Ammar Awad Mutlag, Zaid Ali Abdulkadhim, Zaid Ali Abdulkadhim, Sharifah Sakinah Syed Ahmad, Namaa N. Hikmat, Ayad Yassen, Abdullah A. Ibrahim Al-Dulaimi, Najwa N. Hazem Al-Sheikh, and Ammar Hashim Ali

PDF

CNNs in Image Forensics: A Systematic Literature Review of Copy-Move, Splicing, Noise Detection, and Data Poisoning Detection Methods
Mohammed R. Subhi, Salman Yussof, Liyana Adilla binti Burhanuddin Adilla binti Burhanuddin, Firas Layth Khaleel, and Firas Layth Khaleel

PDF

A Stacked Ensemble Classifier for Email Spam Detection via an Evolutionary Algorithm
Salam Al-augby, Hasanen Alyasiri, Fahad Ghalib Abdulkadhim, Zahraa Ch. Oleiwi, and Zahraa Ch. Oleiwi

PDF

Optimized Deep Learning Model Using Binary Particle Swarm Optimization for Phishing Attack Detection: A Comparative Study
El-Sayed M. El-Kenawy, Marwa M. Eid, Hussein Lafta Hussein, Ahmed M. Osman, and Ahmed M. Osman

PDF

Ensure Privacy-Preserving Using Deep Learning
Abeer Dawood Salman and Ruqayah Rabeea Al-Dahhan

PDF

Blockchain and Federated Learning in Edge-Fog-Cloud Computing Environments for Smart Logistics
Guma Ali, Adebo Thomas, Maad M. Mijwil, Kholoud Al-Mahzoum, Kholoud Al-Mahzoum, Ayodeji Olalekan Salau, Ioannis Adamopoulos, Indu Bala, and Aseed Yaseen Rashid Al-jubori

PDF

A Systematic Review of Metaverse Cybersecurity: Frameworks, Challenges, and Strategic Approaches in a Quantum-Driven Era
Hasan Ali Al-Tameemi, Ghadeer Ghazi Shayea, Mishall Al-Zubaidie, Yahya Layth Khaleel, Yahya Layth Khaleel, Noor Al-Huda K. Hussein, Raad Z. Homod, Mohammad Aljanabi, O. S. Albahri, A. H. Alamoodi, Maad M. Mijwil, Mohammed A. Fadhel, Iman Mohamad Sharaf, Mohanad G. Yaseen, Ahmed Hussein Ali, U. S. Mahmoud, Saleh M. Mohammed, and A. S. Albahri

PDF

Anti-Cyber Childhood Exploitation: An Online Game Chat Monitoring System
Saja J. Mohammed, Awos K. Ali, and Ibrahim M. Ahmed

PDF

A Novel Diffusion-Based Cryptographic Method for Cyber Security
Kamaran Adil Ibrahim, Basim Najim Al-Din Abed, and Sura Abed Sarab Hussien

PDF

Optimizing Cybersecurity in 5G-Enabled IoT Networks via a Resource-Efficient Random Forest Model
Zainab Ali Abbood, Aysar Hadi Oleiwi, Raghad Tariq Al-Hassani, Jenan Ayad, and Jenan Ayad