2690-6775
2769-7851
Professor of Cyber Security, Manchester Metropolitan University, UK
Professor of Computer Science, Ibn Zohr University, Agadir, Morocco
Irregular
Accepted papers will be published online directly
Mr. R Danis
JCIM Managinng Editor
Email: editorial@americaspg.com
Author should pay 450 USD as APC fees (for accepted papers only, to be paid after acceptance)
JCIM offers authors two modes (Subscription with no fees or Open Access with OA fees ) to publish their research
Journal of Cybersecurity and Information Management (JCIM) is a peer-reviewed journal that aims to publish high-quality papers related to Cybersecurity and Information management and all other relevant areas. JCIM aims to foster novel, transformative and multidisciplinary approaches that ensure the security of current and emerging information systems by considering the unique challenges present in the new innovative environment, i.e., smart cities applications. Researchers are welcome to submit papers to JCIM after preparing them according to the ASPG template (Download from here) and following the ASPG Publishing Ethics and Malpractice Statement (See this page). JCIM follows the ASPG peer-review process in handling all submitted papers (see this page for more details). By submitting their paper to JCIM, authors confirm their agreement to ASPG terms, conditions, and publication ethics (please check for author page) and (Copyrights page).
For more details, please get in touch with JCIM managing editor or ASPG editorial office:
Ms. N Saad
Email: editorial@americaspg.com
Aim and Scope:
Cybersecurity and privacy threats exploit the increased complexity and connectivity of critical infrastructure systems, placing the Nation’s security, economy, public safety, and health at risk. As technology becomes increasingly ubiquitous in daily life, cybercrime and cybersecurity tools and techniques evolve concurrently. This fuels the need to develop innovative managerial, technological and strategic solutions. Due to the constant evolution of cybercrimes and technologies advancements, identifying and validating technical solutions in order to access data from new technologies, investigating the impact of these solutions and understanding how technologies can be abused is crucial to the viability of government, commercial, academic, and legal communities, all of which affect national security. Accordingly, This journal focuses on cutting-edge research from both academia and industry, with a particular emphasis on interdisciplinary approaches and novel techniques to increase the security posture of the Internet- and Cloud-of-Things devices. It will focus on the research agendas that investigate vulnerabilities, attacks and associated mitigation strategies for devices that belong to the ‘Cyber-of-Things’ (e.g. Cyber-Physical Systems, and the Internet of Things) and research agendas that identify cyber-crimes, digital forensics issues, security vulnerabilities, solutions and approaches to improving the cybercrime investigation process. In addition, legal and privacy aspects of collecting, correlating and analyzing big-data from the Internet- and Cloud-of-Things devices including cost-effective retrieval, analysis, and evaluation. Moreover, secure information system and information management challenges, requirements, and methodologies will be covered.
Topics of Interest:
JCIM promotes research and reflects the most recent advances of security and privacy in cybersecurity systems, with emphasis on the following aspects, but certainly not limited to:
Cybersecurity: The Current Threat and Future Challenges
Secure Data Encryption Models
Secure Information Systems: Challenges and Requirements
Security Procedures for Smart Networks Applications
Security Challenges for IoT based Applications
Secure Interfaces, protocols, and associated ad-hoc/sensor networks
Security and fault tolerance for embedded or ubiquitous systems
Sensor network security issues in mobile cloud computing
Ambient intelligence and intelligent service systems in secure IoT
Secure Geo-processing, Localization, and Location Based Services
Secure spatial data techniques and tools for analytics
Secure Smart city services and applications platforms
Secure Smart city applications: mobility, energy, public administration & governance, economy, health, security and environment
Secure, Fast and complexity-awareness algorithms for real-time computing for network
Scientific computing and secure data management
Protecting Information Resources
Threats to Information Security
Wireless Security
Security assurance in information systems
Security procedures to ensure the integrity of information systems
Recent methodologies and techniques for security in Smart Cities Applications
Recent secure data aggregation and distribution algorithms
Key distribution algorithms
Protecting SCADA systems
Securely executing multilevel transactions
Adaptive attack mitigation for Cyber-Physical System
Data security and privacy for Cyber-Physical System
Security and privacy in industrial control systems
Smart grid security
Urban transportation system security
Secure data aggregation
Information Management and related topics
Editor in Chief (s)
Professor of Cyber Security, Manchester Metropolitan University, UK
Email: m.hammoudeh@mmu.ac.uk
Professor of Computer Science, Ibn Zohr University, Agadir, Morocco
Email: Salahddine.krit@gmail.com
Editorial Board
Prof. Ali Kashif Bashir, Professor of Networks and Security, Manchester Metropolitan University, UK
Dr. Bharat Rawalkshatriya, Associate Professor, Cybersecurity, Gannon University, USA
Dr. Khan Muhammad, Sejong University, Republic of Korea
Prof. Muhammad Sajjad, NTNU, Norway
Dr. Amin Ullah, Oregon State University, United States
Prof. Irfan Mehmood, University of Bradford, UK
Dr. Ijaz Ul Haq, Sejong University, Republic of Korea
Dr. Hamza Rafik, NICT, Japan
Dr. SHAHAB BAND, Future Technology Research Center, College of Future, National Yunlin University of Science and Technology, Douliou, Taiwan, ROC
Dr. Zouheir Trabelsi, College of Information Technology, UAE University, Al Ain, United Arab Emirates
Dr. Rita Zgheib, Faculty of Engineering, Applied Science and Technology , Canadian University Dubai, Dubai, UAE
Dr. Zafar Ali, Southeast University, Nanjing, China
Dr. Prayag Tiwari, Aalto University, Finland
Dr. Ramadhan Mstafa, University of Bridgeport, USA
Prof. Vishal Jain, Associate Professor, Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM), A-4, Paschim Vihar, New Delhi-63, India
Prof. Valentina Emilia Balas, Full Professor at “Aurel Vlaicu” University of Arad, Romania
Dr. Fahmi Khalifa, Mansoura University, Egypt and University of Louisville, Louisville KY 40292, USA
Prof. Surapong Bangphan, Department of Industrial Engineering, Faculty of Engineering, Rajamangala University of Technology Lanna
Prof. Yagyanath Rimal, Faculty of Science and Technology, Department of Computing Science, Pokhara University, Pokhara Lekhnath, Nepal
Dr. Ahmed Soliman, University of Louisvile, USA
Prof. Enes Zengin, DUMPLUPINAR University, Turkey
Dr. Ahmed Salem , Department chair of Computer Science and Information Technology, Hood College, USA
Prof. Hasan Rashaideh, Applied Belqa University, Jordan
Dr. Said ELNAFFAR, Faculty of Engineering, Applied Science and Technology, Canadian University Dubai, Dubai, United Arab Emirates
Prof. Raghvendra Kumar Agrawal, Lakshmi Narain College of Technology, Bhopal
Prof. PANIGRAHI SRIKANTH, GMR Institute of Technology (GMRIT)
Prof. Rohit Sharma, SRM Institute of Science and Technology, India
Prof. Adriana Burlea-Schiopoiu, University of Craiova, Romania
Prof. Chuan-Ming Liu, Professor, Dept. of Computer Science and Information Engineering, National Taipei University of Technology (Taipei Tech), Taipei 106, TAIWAN
Prof. Krishna Kant Singh, KIET Group of Institutions, Ghaziabad, India
Dr. Akansha Singh, Associate Professor, Department of CSE, ASET, Amity University Uttar Pradesh, Noida, India
Prof. Mohamed Elhoseny, American University in the Emirates, Dubai, United Arab Emirates
Dr. Sheng-Lung Peng, Professor, Department of Computer Science and Information Engineering, National Dong Hwa University, Hualien, Taiwan
Dr. Hamed Daei Kasmaei, Computational mathematics and computer science, Islamic Azad University Central Tehran Branch, Tehran, Iran
Dr. Rabeb Touati, LR99ES10 Human Genetics Laboratory, Faculty of Medicine of Tunis, University of Tunis El Manar, Tunisia
Dr. Mohd Helmy Abd Wahab, Universiti Tun Hussein Onn Malaysia, MALAYSIA
Dr. Mohammed. I.alghamdi, Al-Baha University, Saudi Arabia
Prof. Xiaojing Yuan, University of Houston, USA
Prof. Xuan Guo, University of North Texas, USA
Prof. Baofu Fang, Hefei University of Technology, China
Dr. Saddaf Rubab, College of Computing ad Informatics, University of Sharjah, United Arab Emirates
Prof. Jianfang Shi, Taiyuan University of Technology, China
Dr. Esmeralda Kazia, Department of Applied And Computer Sciences, Barleti University, Albania
Dr. Pourya Shamsolmoali, Huawei Technologies Corporate, Shanghai, China
Prof. Matthias Weippert, Rostock University, Germany
Dr. Mohamed Abouhawwash, Michigan State University, USA
Dr. Syed Hassan Ahmed, Georgia Southern University, USA
Dr. Alaa Tharwat, Frankfurt University of Applied Sciences, Germany
Dr. Adel Ben Mnaouer, Faculty of Engineering, Canadian University Dubai, Dubai, United Arab Emirates
Sagar Sidana, Principal Software Engineer, McKinsey & Company, Dallas, USA
Researchers are welcome to submit papers to this journal after preparing their papers according the ASPG template (Download from here) and Publishing Ethics and Malpractice Statement (See this page)
JCIM journal is using ASPG OJS editorial system for quality in the peer-review process. ASPG OJS editorial system is an online manuscript submission, review and tracking systems. Review processing is performed by the editorial board members of JCIM Affairs or outside experts; at least two independent reviewers approval followed by editor approval is required for acceptance of any citable manuscript. Authors may submit manuscripts and track their progress through the system, hopefully to publication. Reviewers can download manuscripts and submit their opinions to the editor. Editors can manage the whole submission/review/revise/publish process.
All submissions are subject to a strict peer review process (check this page), drawing upon the expertise of a range of academic and industry experts to ensure the validity and relevance of the resulting journal content. Besides, an initial review process will be conducted by the Editor in Chief before sending the paper to the reviewers.
To submit a new paper (or to track the status of a previous submission), please log in to your account on our ASPG OJS submission System via this link
https://reviewaspg.com/index.php/JCIM/about/submissions
Then follow the steps.....
- GoogleScholar
- EBSCO
- Microsoft Academic
- WorldCat
- Crossref