+1(504)-881-0104
Log In /
Submit Your Paper
Toggle navigation
Title
Author
Journal
Published Year
Home
(current)
Journals
News
Contact us
About us
Toggle navigation
My Profile
(current)
My Articles
Add New Article
Journal of Cybersecurity and Information Management
ISSN (Online)
2690-6775
ISSN (Print)
2769-7851
Volumes
View the Free-to-Download Articles
*
Remote Laboratory System for Automatic Engineering
*
The Relationship between Artificial Intelligence and Internet of Things: A quick review
*
Authenticating IoT Devices issues based on Blockchain
*
A Novel Fuzzy Bat Based Ambulance Detection and Traffic Counting Approach
*
Implicit Authentication Approach by Generating Strong Password through Visual Key Cryptography
*
Red Palm Weevil Detection Methods: A Survey
*
Data Mining Algorithms for Kidney Disease Stages Prediction
*
Implementation of Crowd Sale using ERC-20 Tokens
*
Energy Efficiency Techniques in Heterogeneous Networks
*
Empirical Study of Function Point Analysis during Software Development Phase
*
A Validation Model for ERP systems
*
Energy efficient Laser based embedded system for blind turn traffic control
*
A novel approach for Spam Email Filtering Using Machine Learning
*
Pre-Cursor microRNAs from Different Species classification based on features extracted from the image
*
Incremental Research on Cyber Security metrics in Android applications by implementing the ML algorithms in Malware Classification and Detection
*
Security Challenges for IoT Based Applications & Solutions Using Fog Computing: A Survey
*
Cyber Attacks Evaluation Targeting Internet Facing IoT: An Experimental Evaluation
*
Systematic Literature Review on Quantum Cryptography
*
A Proposed Predictive Model for Business Telemarketing Information Management
*
A Lightweight Privacy Preserving Keyword Search Over Encrypted Data in Cloud Computing
*
K-means Clustering Analysis of Crimes on Indian Women
*
Security and Privacy Challenges in Cloud Computing: A Review
*
A Web Based Document Encryption Application Software for Information Security in Tertiary Institutions
*
PARUDroid: Validation of Android Malware Detection Dataset
*
Survey on Deep Learning Approaches for Aspect Level Opinion Mining
*
A review into the evolution of HIPAA in response to evolving technological environments
*
A review on Privacy-Preserving Data Preprocessing
*
An Energy Efficient Clustering Protocol using Enhanced Rain Optimization Algorithm in Mobile Adhoc Networks
*
A Systematic Review of Privacy Preserving Healthcare Data Sharing on Blockchain
*
HomeTec Software for Security Aspects of Smart Home Devices Based on IoT
*
Information Security Assessment in Big Data Environment using Fuzzy Logic
*
Plagiarism Detection Algorithm Model Based on NLP Technology
*
A Study of Internet of Medical Things (IoMT) Used in Pandemic Covid-19 For Healthcare Monitoring Services
*
Analysis of Various Credit Card Fraud Detection Techniques
*
A Novel Artificial Face Mask based Nanofibers with Special Intelligent Engineered Nanocomposite Against Covid-19
*
Managing a Secure JSON Web Token Implementation By Handling Cryptographic Key Management for JWT Signature in REST API: : A survey
*
Image Classification Based On CNN: A Survey
*
Explaining feature detection Mechanisms: A Survey
*
Parasitic overview on different key management schemes for protection of Patients Health Records
*
An Efficient Smartphone Assisted Indoor Localization with Tracking Approach using Glowworm Swarm Optimization Algorithm
*
Impact of Cyber Attack on Saudi Aramco
*
Audit, Validation, Verification and Assessment for Safety and Security Standards
*
Smart Model for Securing Software Defined Networks
*
A New Chaos-based Approach for Robust Image Encryption
*
BioPay: A Secure Payment Gateway through Biometrics
*
An Optimal Teaching and Learning based Optimization with Multi-Key Homomorphic Encryption for Image Security
*
Intelligent Feature Subset Selection with Machine Learning based Risk Management for DAS Prediction
*
Modeling of Deep Learning based Intrusion Detection System in Internet of Things Environment
*
An Efficient Machine Learning based Cervical Cancer Detection and Classification
*
Modeling of Optimal Adaptive Weighted Clustering Protocol for Vehicular Ad hoc Networks
*
A Novel Hybrid Bio-Inspiration Technique for Service Composition
*
Utilizing Service Oriented Architecture (SOA) in IoT Smart Applications
*
Deep Learning Model for Digital Sales Increasing and Forecasting: Towards Smart E-Commerce
*
An Artificial Intelligence-based Intrusion Detection System
*
Cybersecurity in Networking Devices
*
Design of Optimal Machine Learning based Cybersecurity Intrusion Detection Systems
*
Performance Analysis of Machine Learning based Botnet Detection and Classification Models for Information Security
*
A Novel Image Encryption with Deep Learning Model for Secure Content based Image Retrieval
*
Mitigating DDoS Attacks in Wireless Sensor Networks using Heuristic Feature Selection with Deep Learning Model
*
Mitigating Hot Spot Problem in Wireless Sensor Networks using Political Optimizer Based Unequal Clustering Technique
*
Advancements in Encryption Techniques for Enhanced Data Security Over Cloud
*
Dragonfly Algorithm with Gated Recurrent Unit for Cybersecurity in Social Networking
*
An investigation into the effect of cybersecurity on attack prevention strategies
*
History, Present 2021 and Future of Cyber Attacks
*
A Comprehensive Analysis of Cyber Security Protection Approaches for Financial Firms: A Case of Al Rajhi Bank, Saudi Arabia
*
Brain Storm Optimization with Long Short Term Memory Enabled Phishing Webpage Classification for Cybersecurity
*
An Intelligent Spatial Military Intrusion Detection using Reactive Mobility Unmanned Vehicles Based on IoT and metaheuristic Optimization Algorithm
*
A Framework for creating a Safety and Security Management System (SSMS)
*
Trust Aware Aquila Optimizer based Secure Data Transmission for Information Management in Wireless Sensor Networks
*
An analytical approach for evaluating sustainable supply chain solutions during the COVID-19 pandemic: Benefits and better explanations
*
Re-Evaluating the Necessity of Third-Party Antivirus Software on Windows Operating System
*
Machine Learning-based Information Security Model for Botnet Detection
*
Detection and Classification of Malware Using Guided Whale Optimization Algorithm for Voting Ensemble
*
A Novel Intrusion Detection Framework (IDF) using Machine Learning Methods
*
An Enhanced Hybrid Chaotic Technique for Protecting Medical Images
*
Chaos Based Stego Color Image Encryption
*
Coded DCO-OFDM Techniques in Intensity Modulation/Direct Detection (IM/DD) Systems
*
Securing the Internet of Things (IoT) with Blockchain: A Proof-of-Concept Implementation and Analysis
*
A Machine Learning Approach to Detecting Deepfake Videos: An Investigation of Feature Extraction Techniques
*
Enhancing Cyber Threat Intelligence Sharing through a Privacy-Preserving Federated Learning Approach
*
A Comprehensive Study of Cybersecurity Threats and Countermeasures: Strategies for Mitigating Risks in the Digital Age
*
A Neutrosophic Proposed Model for Evaluation Blockchain Technology in Secure Enterprise Distributed Applications
*
Information Security Management Framework for Cloud Computing Environments
*
Managing Information Security Risks in the Age of IoT
*
A Deep Learning Framework for Securing IoT Against Malwares
*
Guardians of the IoT Galaxy: Using Deep Learning to Secure IoT Networks Against Botnet Attacks
*
Securing the IoT: An Efficient Intrusion Detection System Using Convolutional Network
*
Detecting In-Vehicle Attacks with Deep Learning: An Applied Approach
*
The Cost of Progress: Exploring Privacy Nightmares for AI in Precision Medicine
*
Data Driven Machine Learning For Fault Detection And Classification In Binary Distillation Column
*
Machine Learning framework for Information Security Management in Big Data Applications
*
Balancing Security and Information Management in the Digital Workplace
*
Data Security in Healthcare Systems: Integration of Information Security and Information Management
*
Securing Information Management in Collaborative Environments Using Machine Learning
*
A Proposed Blockchain based System for Secure Data Management of Computer Networks
*
An Improved Image Encryption Consuming Fusion Transmutation and Edge Operator
*
Lightweight Symmetric Encryption and Attribute Based Encryption Method to Increase Information Safety in Wireless Sensor Network
*
An Encrypted Rules and Extreme Learning Machine Approach for Enhancement of Data Security
*
A Concentrated Energy Consumption Wireless Sensor Network by Symmetric Encryption and Attribute Based Encryption Technique
*
An Upgraded Data Security Based on Homomorphic Encryption and Aggregate Signature Method in Wireless Sensor Network
*
An Improved Analysis of Secured Permutation and Substitution based Image Encryption
Volume 0
Issue 1
Issue 2
Volume 1
Issue 1
Issue 2
Volume 2
Issue 1
Issue 2
Volume 3
Issue 1
Issue 2
Volume 4
Issue 1
Issue 2 : Special Issue-RIDAPPH
Volume 5
Issue 1
Issue 2 : Special Issue CITCOVID-19
Volume 6
Issue 1
Issue 2
Volume 7
Issue 1
Issue 2
Volume 8
Issue 1
Issue 2
Volume 9
Issue 1
Issue 2
Volume 10
Issue 1
Issue 2
Volume 11
Issue 1
Issue 2
Volume 12
Issue 1
Quick Links
ASPG Membership
Open Access
Peer Review Process
ASPG Author Services
Reviewer Guide
Editors and Guest Editors Guide
Author Guide
Papers Template and Copyrights Form
ASPG Pubwin Award
Publishing Ethics and Malpractice Statement
ASPG Mission and Feature
Appeals and Complaints
↑