This issue has been available online since 15th December 2025 for the regular issue of 2025. All articles in this issue (19 original research articles) were authored/co-authored by 55 authors from 20 countries (UK, Lebanon, Serbia, Iran, Uganda, Ethiopia, India, Morocco, Nigeria, Albania, Greece, Russia, Kenya, Turkey, Saudi Arabia, Australia, United Arab Emirates, Sweden, Jordan, and Iraq)

Published: 2025-12-15

DOI: https://doi.org/10.58496/BJN/2025/001
DOI: https://doi.org/10.58496/BJN/2025/002

Evaluation of Information Security through Networks traffic traces for machine learning classification

Tamara saad Mohamed, Saad mohammed khalifah, Ridwan Marqas , Saman M. Almufti , Renas R Asaad

25-42

DOI: https://doi.org/10.58496/BJN/2025/003
DOI: https://doi.org/10.58496/BJN/2025/004
DOI: https://doi.org/10.58496/BJN/2025/005
DOI: https://doi.org/10.58496/BJN/2025/006
DOI: https://doi.org/10.58496/BJN/2025/007
DOI: https://doi.org/10.58496/BJN/2025/008
DOI: https://doi.org/10.58496/BJN/2025/009
DOI: https://doi.org/10.58496/BJN/2025/010
DOI: https://doi.org/10.58496/BJN/2025/011
DOI: https://doi.org/10.58496/BJN/2025/012
DOI: https://doi.org/10.58496/BJN/2025/013

Recognizing Node Intrusion Tendencies in IoT Environments via Deep Learning and Network-Level Feature Analysis

Ioannis Adamopoulos , Aida Vafae Eslahi, Harshit Mishra , Niki Syrou , Tirus Muya

154–163

DOI: https://doi.org/10.58496/BJN/2025/014

Leveraging Artificial Intelligence to Address Network Congestion Challenges in IoT Systems

Fredrick Kayusi , Harshit Mishra , Petros Chavula , Kassem Hamze

164–174

DOI: https://doi.org/10.58496/BJN/2025/015

Enhancing Wireless Sensor Network Lifetime through Fuzzy-Based Execution of the LEACH Protocol

Zakaria Benlalia , Toufik Mzili , Mustapha Hankar , Ahmed abatal , Mourad Mzili , Nebojsa Bacanin , Momina Shaheen , Musaria Karim Mahmood

175–184

DOI: https://doi.org/10.58496/BJN/2025/016

Optimized Solutions for Robust and Efficient Two-Factor Authentication in Networking Environments

Hussein Alkattan , Raad S. Alhumaima, Amr Badr , Peter Mwangi

185–196

DOI: https://doi.org/10.58496/BJN/2025/017

Smart Hybrid Intrusion Detection for IoT Networks Using Machine Learning and Neural Networks

Klodian Dhoska , Panagiotis Kyratsis , Marek Dudek , Phani Praveen Surapaneni , Aaron Mogeni oirere

197–206

DOI: https://doi.org/10.58496/BJN/2025/018

Blockchain and Deep Q-Learning for Trusted Cloud-Enabled Drone Network in Smart Forestry: A Survey

Guma Ali, Wamusi Robert , Maad M. Mijwil, Hassan A. Hameed Al-Hamzawi , Ali S. Abed Al Sailawi , Ayodeji Olalekan Salau

207–241

DOI: https://doi.org/10.58496/BJN/2025/019