Journal of Cybersecurity and Information Management

ISSN (Online)

2690-6775


ISSN (Print)

2769-7851


Editor in Chief

Prof. Mohammad Hammoudeh

Professor of Cyber Security, Manchester Metropolitan University, UK

Prof. Salah-ddine KRIT

Professor of Computer Science, Ibn Zohr University, Agadir, Morocco


Frequency

Quarterly (January, April, July, October).

Accepted papers will be published online directly


Contact Information

Managing Editor:

Editorial Office

Dr. Ahmed A. Elngar

Faculty of Computers & Artificial Intelligence , Beni-Suef University, Egypt

Emailahmedelnagar@fcis.bsu.edu.eg

Phone+201007400752

Ms. N Saad

Phone: +1(504) 784-5024

Email:editorialoffice@americaspg.com

Mailing Address: 625 Wright Ave, Gretna, LA 70056, USA


Journal DOI

https://doi.org/10.54216/JCIM


Publishing Mode and Access Fees

·      No article processing or publishing charges.

·      Readers need a subscription to access JCIM contents published in 2022.

·      All published contents (2019-2021) are available for free.


Publishing Options

JCIM offers authors two options ( Open Access or Subscription ) to publish their research


 

Journal of Cybersecurity and Information Management (JCIM) is a peer-reviewed journal published and managed by ASPG, USA. This Journal is free with no article processing or publishing charges, but it supports Open Access (OA) Publishing according to ASPG Open Access Policy when requested by the author. The journal aims to publish high-quality papers related to Cybersecurity and Information management and all other relevant areas. JCIM aims to foster novel, transformative and multidisciplinary approaches that ensure the security of current and emerging information systems by considering the unique challenges present in the new innovative environment, i.e., smart cities applications. JCIM also aims to foster a research community committed to advancing research and education at the confluence of cybersecurity, privacy, and cyber-physical systems and transition its findings into engineering practice. JCIMI is a quarterly published journal that publishes high-quality papers four times a year (January, April, July, October). However, accepted papers will be published online directly.  

 

JCIM publishes high-quality research articles, surveys as well as case studies. Separate sections are Recent Literature and the Bulletin, which offers research reports, book reviews, conference announcements, and various news items. Invited review articles on topics of general interest are included, and special issues are published regularly. Researchers are welcome to submit papers to JCIM after preparing them according to the ASPG  template (Download from here) and following the ASPG Publishing Ethics and Malpractice Statement (See this page). JCIM follows the ASPG peer-review process in handling all submitted papers (see this page for more details). By submitting their paper to JCIM, authors confirm their agreement to ASPG terms, conditions, and publication ethics (please check for author page) and (Copyrights page).

 

For more details, please get in touch with JCIM managing editor or ASPG editorial office:

Ms. N Saad

Phone: +1(504) 784-5024

Fax: +1-888-417-7465

Email: editorialoffice@americaspg.com

Mailing Address: 625 Wright Ave, Gretna, LA 70056, USA

 

 

Aim and Scope:

Cybersecurity and privacy threats exploit the increased complexity and connectivity of critical infrastructure systems, placing the Nation’s security, economy, public safety, and health at risk. As technology becomes increasingly ubiquitous in daily life, cybercrime and cybersecurity tools and techniques evolve concurrently. This fuels the need to develop innovative managerial, technological and strategic solutions.  Due to the constant evolution of cybercrimes and technologies advancements, identifying and validating technical solutions in order to access data from new technologies, investigating the impact of these solutions and understanding how technologies can be abused is crucial to the viability of government, commercial, academic, and legal communities, all of which affect national security. Accordingly, This journal focuses on cutting-edge research from both academia and industry, with a particular emphasis on interdisciplinary approaches and novel techniques to increase the security posture of the Internet- and Cloud-of-Things devices. It will focus on the research agendas that investigate vulnerabilities, attacks and associated mitigation strategies for devices that belong to the ‘Cyber-of-Things’ (e.g. Cyber-Physical Systems, and the Internet of Things) and research agendas that identify cyber-crimes, digital forensics issues, security vulnerabilities, solutions and approaches to improving the cybercrime investigation process. In addition, legal and privacy aspects of collecting, correlating and analyzing big-data from the Internet- and Cloud-of-Things devices including cost-effective retrieval, analysis, and evaluation. Moreover, secure information system and information management challenges, requirements, and methodologies will be covered. 

 

Topics of Interest:

JCIM promotes research and reflects the most recent advances of security and privacy in cybersecurity systems, with emphasis on the following aspects, but certainly not limited to:

Cybersecurity: The Current Threat and Future Challenges

Secure Data Encryption Models

Secure Information Systems: Challenges and Requirements

Security Procedures for Smart Networks Applications

Security Challenges for IoT based Applications

Secure Interfaces, protocols, and associated ad-hoc/sensor networks

Security and fault tolerance for embedded or ubiquitous systems

Sensor network security issues in mobile cloud computing

Ambient intelligence and intelligent service systems in secure IoT

Secure Geo-processing, Localization, and Location Based Services

Secure spatial data techniques and tools for analytics

Secure Smart city services and applications platforms

Secure Smart city applications: mobility, energy, public administration & governance, economy, health, security and environment

Secure, Fast and complexity-awareness algorithms for real-time computing for network

Scientific computing and secure data management

Protecting Information Resources

Threats to Information Security

Wireless Security

Security assurance in information systems

Security procedures to ensure the integrity of information systems

Recent methodologies and techniques for security in Smart Cities Applications

Recent secure data aggregation and distribution algorithms

Key distribution algorithms

Protecting SCADA systems

Securely executing multilevel transactions

Adaptive attack mitigation for Cyber-Physical System

Data security and privacy for Cyber-Physical System

Security and privacy in industrial control systems

Smart grid security

Urban transportation system security

Secure data aggregation

Information Management and related topics

 

 

Editor in Chief (s)

Prof. Mohammad Hammoudeh

Professor of Cyber Security, Manchester Metropolitan University, UK

Email: m.hammoudeh@mmu.ac.uk

Prof. Salah-ddine KRIT

Professor of Computer Science, Ibn Zohr University, Agadir, Morocco

Email: Salahddine.krit@gmail.com  

 

Editorial Board

Prof. Ali Kashif Bashir, Professor of Networks and Security, Manchester Metropolitan University, UK

Prof. Vishal Jain, Associate Professor, Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM), A-4, Paschim Vihar, New Delhi-63, India

Dr. Fahmi Khalifa, Mansoura University, Egypt and University of Louisville, Louisville KY 40292, USA

Prof. Valentina Emilia Balas, Full Professor at “Aurel Vlaicu” University of Arad, Romania

Prof. Surapong Bangphan, Department of Industrial Engineering, Faculty of Engineering, Rajamangala University of Technology Lanna

Prof. Yagyanath Rimal, Faculty of Science and Technology, Department of Computing Science, Pokhara University, Pokhara Lekhnath, Nepal

Prof. Enes Zengin, DUMPLUPINAR University, Turkey

Prof. Hasan Rashaideh, Applied Belqa University, Jordan

Prof. Raghvendra Kumar Agrawal, Lakshmi Narain College of Technology, Bhopal

Prof. PANIGRAHI SRIKANTH, GMR Institute of Technology (GMRIT)

Prof. Rohit Sharma, SRM Institute of Science and Technology, India

Prof. Adriana Burlea-Schiopoiu, University of Craiova, Romania

Prof. Chuan-Ming Liu, Professor, Dept. of Computer Science and Information Engineering, National Taipei University of Technology (Taipei Tech), Taipei 106, TAIWAN

Prof. Krishna Kant Singh, KIET Group of Institutions, Ghaziabad, India

Prof. Mohamed Elhoseny, American University in the Emirates, Dubai, United Arab Emirates

Dr. Akansha Singh, Associate Professor, Department of CSE, ASET, Amity University Uttar Pradesh, Noida, India

Dr. Sheng-Lung Peng, Professor, Department of Computer Science and Information Engineering, National Dong Hwa University, Hualien, Taiwan

Dr. Hamed Daei Kasmaei, Computational mathematics and computer science, Islamic Azad University Central Tehran Branch, Tehran, Iran

Dr. Rabeb Touati, LR99ES10 Human Genetics Laboratory, Faculty of Medicine of Tunis, University of Tunis El Manar, Tunisia

Dr. Mohd Helmy Abd Wahab, Universiti Tun Hussein Onn Malaysia, MALAYSIA

Dr. Mohammed. I.alghamdi, Al-Baha University, Saudi Arabia

Prof. Xiaojing Yuan, University of Houston, USA

Prof. Xuan Guo, University of North Texas, USA

Prof. Baofu Fang, Hefei University of Technology, China

Prof. Jianfang Shi, Taiyuan University of Technology, China

Dr. Pourya Shamsolmoali, Huawei Technologies Corporate, Shanghai, China

Prof. Matthias Weippert, Rostock University, Germany

Dr. Mohamed Abouhawwash, Michigan State University, USA

Dr. Syed Hassan Ahmed, Georgia Southern University, USA

Dr. Alaa Tharwat, Frankfurt University of Applied Sciences, Germany

 

 

Managing Editor:

Editorial Office

Dr. Ahmed A. Elngar

Faculty of Computers & Artificial Intelligence , Beni-Suef University, Egypt

Emailahmedelnagar@fcis.bsu.edu.eg

Tel+201007400752

Ms. N Saad

Phone: +1(504) 784-5024

Email:editorialoffice@americaspg.com

Mailing Address: 625 Wright Ave, Gretna, LA 70056, USA

 

 

Researchers are welcome to submit papers to this journal after preparing their papers according the ASPG  template (Download from hereand Publishing Ethics and Malpractice Statement (See this page)

 

All submissions are subject to a strict peer review process (check this page), drawing upon the expertise of a range of academic and industry experts to ensure the validity and relevance of the resulting journal content. Besides, an initial review process will be conducted by the Editor in Chief before sending the paper to the reviewers. 

 

 To submit a new paper (or to track the status of a previous submission), please log in to your account on our ASPG online submission System via this link https://www.americaspg.com/login

Make sure to choose the journal name Journal of Cybersecurity and Information Management (JCIM) from the dropdown list when submitting your paper.

Then follow the steps

 

Journal of Cybersecurity and Information Management (JCIM) is indexed in the following Databases

 

- GoogleScholar

- Microsoft Academic

- WorldCat

- Crossref