Journal of Cybersecurity and Information Management

Volume 13, Issue 1

ISSN (Online) :

2690-6775

ISSN (Print) :

2769-7851

In This Issue (8 articles)

An Improved K-Means Clustering Process Solicitation for Mine Blood Donors Information

Anil Audumbar Pise , Ganesh Shivaji Pise , Saurabh Singh , Hemachandran K. , Jude Imuede , Sandip Shinde

Doi :https://doi.org/10.54216/JCIM.130101

Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage

Anil Audumbar Pise , Saurabh Singh , Hemachandran K. , Shraddhesh Gadilkar , Zakka Benisemeni Esther , Ganesh Shivaji Pise , Jude Imuede

Doi :https://doi.org/10.54216/JCIM.130105

A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments

Khder Alakkari , Alhumaima Ali Subhi , Hussein Alkattan , Ammar Kadi , Artem Malinin , Irina Potoroko , Mostafa Abotaleb , El-Sayed M El-kenawy

Doi :https://doi.org/10.54216/JCIM.130107

Enhancing K-Nearest Neighbors Algorithm in Wireless Sensor Networks through Stochastic Fractal Search and Particle Swarm Optimization

Ahmed Mohamed Zaki , Abdelaziz A. Abdelhamid , Abdelhameed Ibrahim , Marwa M. Eid , El-Sayed M. El-Kenawy

Doi :https://doi.org/10.54216/JCIM.130108