+1(504) 784-5024
Login with ORCID /
Login /
Register /
Subscribe
Toggle navigation
Home
(current)
Journals
News
Contact us
About us
Toggle navigation
My Profile
(current)
My Articles
Add New Article
Journal of Cybersecurity and Information Management
ISSN (Online)
2690-6775
Volumes
View the Free-to-Download Articles
*
The Relation of Artificial Intelligence with Internet Of Things: A survey
*
Authenticating IoT Devices issues based on Blockchain
*
A Novel Fuzzy Bat Based Ambulance Detection and Traffic Counting Approach
*
Implicit Authentication Approach by Generating Strong Password through Visual Key Cryptography
*
Red Palm Weevil Detection Methods: A Survey
*
Data Mining Algorithms for Kidney Disease Stages Prediction
*
Full Version of Volume 1, Jan 2020, Journal of Cybersecurity and Information Management (JCIM)
*
Implementation of Crowd Sale using ERC-20 Tokens
*
Energy Efficiency Techniques in Heterogeneous Networks
*
Empirical Study of Function Point Analysis during Software Development Phase
*
A Validation Model for ERP systems
*
Energy efficient Laser based embedded system for blind turn traffic control
*
A novel approach for Spam Email Filtering Using Machine Learning
*
Pre-Cursor microRNAs from Different Species classification based on features extracted from the image
*
Incremental Research on Cyber Security metrics in Android applications by implementing the ML algorithms in Malware Classification and Detection
*
Security Challenges for IoT Based Applications & Solutions Using Fog Computing: A Survey
*
A Lightweight Privacy Preserving Keyword Search Over Encrypted Data in Cloud Computing
*
K-means Clustering Analysis of Crimes on Indian Women
*
Security and Privacy Challenges in Cloud Computing: A Review
*
A Web Based Document Encryption Application Software for Information Security in Tertiary Institutions
*
PARUDroid: Validation of Android Malware Detection Dataset
*
Survey on Deep Learning Approaches for Aspect Level Opinion Mining
*
A review into the evolution of HIPAA in response to evolving technological environments
*
A review on Privacy-Preserving Data Preprocessing
*
Full Version of Volume 4, Issue 2, SI 1, NOV 2020, Journal of Cybersecurity and Information Management (JCIM)
*
A Systematic Review of Privacy Preserving Healthcare Data Sharing on Blockchain
*
HomeTec Software for Security Aspects of Smart Home Devices Based on IOT
*
Design, development and performance estimation of 110 kW kinetic heating simulation facilities for material studies–Phase I
*
Information Security Assessment in Big Data Environment using Fuzzy Logic
*
Plagiarism Detection Algorithm Model Based on NLP Technology
Volume 1
Issue 1
Issue 2
Download Volume 1 (Full Version)
Volume 2
Issue 1
Issue 2
Volume 3
Issue 1
Issue 2
Volume 4
Issue 1
Issue 2 : Special Issue-RIDAPPH
Volume 5
Issue 1
Quick Links
ِASPG Ethics Guidelines
ASPG Mission and Feature
Author Guide
call-for-papers
Editors and Guest Editors Guide
Papers Template and Copyrights Form
Reviewer Guide
↑