Volume 5, Issue 2 (2026)
Articles
Measuring the Extent of Cyberbullying Comments in Facebook Groups for Mosul University Students
Kanaan J. Brakas and Mafaz Alanezi
Blockchain-Based Metadata Management in Distributed File Systems
Huda A. Alameen and Furkan Rabee
Synergizing Quantum-Safe Signatures with JWT for Unparalleled Security in Web Applications
Kalpana B. N and R Saravana Kumar
DAGchains: An Improved Blockchain Structure Based on Directed Acyclic Graph Construction and Distributed Mining
Abbas Mahdi and Furkan Rabee
A Novel Multi-Layered Secure Image Encryption Scheme Utilizing Protein Sequences, Dynamic Mealy Machines, 3D-AS Scrambling, and Chaotic Systems
Radhwan Jawad Kadhim and Hussein K. Khafaji
A Dynamic DNA Cryptosystem for Secure File Sharing
Kanaan J. Brakas and Mafaz Alanezi
Color Image Encryption Based on a New Symmetric Lightweight Algorithm
Ala’a Talib Khudhair, Abeer Tariq Maolood, and Ekhlas Khalaf Gbashi
Threat Detection Based on Explainable AI (XAI) and Hybrid Learning
Shatha J. Mohammed and Bashar M. Nema
A Secure Password based Authentication with Variable Key Lengths Based on the Image Embedded Method
Seerwan Waleed Jirjees, Farah Flayyeh Alkhalid, Ahmed Mudheher Hasan, Amjad Jaleel Humaidi, and Amjad Jaleel Humaidi
Development of real-time threat detection systems with AI-driven cybersecurity in critical infrastructure
Noora Zidan Khalaf, Israa Ibraheem Al Barazanchi, Israa Ibraheem Al Barazanchi, A. D. Radhi, A. D. Radhi, Pritesh Shah, and Ravi Sekhar
Cybersecurity risk assessment for identifying threats, vulnerabilities and countermeasures in the IoT
Mohammed Amin Almaiah, Rami Shehab, Tayseer Alkhdour, Mansour Obeidat, and Mansour Obeidat
An Effective Feature Optimization Model for Android Malware Detection
Hussein K. Almulla, Hussam J. Mohammed, Nathan Clarke, Ahmed Adnan Hadi, and Ahmed Adnan Hadi
Enhancing User Authentication through the Implementation of the ForestPA Algorithm for Smart Healthcare Systems
Nurul Syafiqah Zaidi, Al-Fahim Mubarak Ali, Ahmad Firdaus, Adamu Abubakar Ibrahim, Adamu Abubakar Ibrahim, and Mohd Faizal Ab Razak
An English-Swahili Email Spam Detection Model for Improved Accuracy Using Convolutional Neural Networks
Leshan Sankaine, John G. Ndia, and Dennis Kaburu
Healthcare Security in Edge-Fog-Cloud Environment using Blockchain: A Systematic Review
Zaid J. Al-Araji, Mahmood S. AlKhaldee, Ammar Awad Mutlag, Zaid Ali Abdulkadhim, Zaid Ali Abdulkadhim, Sharifah Sakinah Syed Ahmad, Namaa N. Hikmat, Ayad Yassen, Abdullah A. Ibrahim Al-Dulaimi, Najwa N. Hazem Al-Sheikh, and Ammar Hashim Ali
CNNs in Image Forensics: A Systematic Literature Review of Copy-Move, Splicing, Noise Detection, and Data Poisoning Detection Methods
Mohammed R. Subhi, Salman Yussof, Liyana Adilla binti Burhanuddin Adilla binti Burhanuddin, Firas Layth Khaleel, and Firas Layth Khaleel
A Stacked Ensemble Classifier for Email Spam Detection via an Evolutionary Algorithm
Salam Al-augby, Hasanen Alyasiri, Fahad Ghalib Abdulkadhim, Zahraa Ch. Oleiwi, and Zahraa Ch. Oleiwi
SDN-Cloud Incident Detection & Response with Segmented Federated Learning for the IoT
Anas Harchi, Hicham Toumi, and Mohamed Talea
Optimized Deep Learning Model Using Binary Particle Swarm Optimization for Phishing Attack Detection: A Comparative Study
El-Sayed M. El-Kenawy, Marwa M. Eid, Hussein Lafta Hussein, Ahmed M. Osman, and Ahmed M. Osman
Ensure Privacy-Preserving Using Deep Learning
Abeer Dawood Salman and Ruqayah Rabeea Al-Dahhan
An Efficient Distributed Intrusion Detection System that Combines Traditional Machine Learning Techniques with Advanced Deep Learning
Wisam Ali Hussein Salman and CHAN HUAH YONG
Blockchain and Federated Learning in Edge-Fog-Cloud Computing Environments for Smart Logistics
Guma Ali, Adebo Thomas, Maad M. Mijwil, Kholoud Al-Mahzoum, Kholoud Al-Mahzoum, Ayodeji Olalekan Salau, Ioannis Adamopoulos, Indu Bala, and Aseed Yaseen Rashid Al-jubori
A Systematic Review of Metaverse Cybersecurity: Frameworks, Challenges, and Strategic Approaches in a Quantum-Driven Era
Hasan Ali Al-Tameemi, Ghadeer Ghazi Shayea, Mishall Al-Zubaidie, Yahya Layth Khaleel, Yahya Layth Khaleel, Noor Al-Huda K. Hussein, Raad Z. Homod, Mohammad Aljanabi, O. S. Albahri, A. H. Alamoodi, Maad M. Mijwil, Mohammed A. Fadhel, Iman Mohamad Sharaf, Mohanad G. Yaseen, Ahmed Hussein Ali, U. S. Mahmoud, Saleh M. Mohammed, and A. S. Albahri
An Artificial Intelligence-based System for Detecting Meta Fake Profiles via Gradient Boosting and Multilayer Perception
Ruaa A. Al-Falluji, Marwan Ali Albahar, and Ahmad Mousa Altamimi
Anti-Cyber Childhood Exploitation: An Online Game Chat Monitoring System
Saja J. Mohammed, Awos K. Ali, and Ibrahim M. Ahmed
A Novel Diffusion-Based Cryptographic Method for Cyber Security
Kamaran Adil Ibrahim, Basim Najim Al-Din Abed, and Sura Abed Sarab Hussien
Adversarial Attacks on Hybrid Attention Integrated Transfer Learning for Lung Cancer CT Classification
Omar Ibrahim Obaid and Abdulbasit alazawi
Optimizing Cybersecurity in 5G-Enabled IoT Networks via a Resource-Efficient Random Forest Model
Zainab Ali Abbood, Aysar Hadi Oleiwi, Raghad Tariq Al-Hassani, Jenan Ayad, and Jenan Ayad
Enhancing Multifactor Authentication Using Machine Learning Techniques
Rafea Mohammed Ibrahim