Attention cybersecurity scholars and researchers! The Mesopotamian Journal of Cybersecurity has successfully launched and is rapidly gaining recognition in the academic community. With three impactful issues already published, our journal is attracting attention from respected publishers such as Scopus, Taylor & Francis, and others. We invite you to contribute your cutting-edge research and insights to our esteemed publication.

Increased Publication Frequency at Mesopotamian Journal of CyberSecurity

2024-05-07

Dear Readers and Contributors,

We are thrilled to announce an important update that marks a significant milestone for the Mesopotamian Journal of CyberSecurity. In our continuous effort to enhance the dissemination of cutting-edge research and developments in the field of cybersecurity, we are increasing our publication frequency. Starting this year, the journal will now publish three issues annually.

Publication Dates:

  • April 30
  • August 30
  • December 30

This increase from our previous schedule will allow us to share the latest research and insights more frequently, keeping you informed and engaged with the most current trends and findings in cybersecurity.

We believe that this change will provide our contributors with more opportunities to publish their work and our readers with more regular updates on the latest in cybersecurity research. We are excited to continue serving our community with even more content and thank you for your ongoing support and contributions.

Stay tuned for our upcoming issues!

Warm regards,

Vol. 5 No. 2 (2025)

Published: 2025-05-07

Integrating Law, Cybersecurity, and AI: Deep Learning for Securing Iris-Based Biometric Systems

Saif Alaa Hussein , Hasan Ali Al-Tameemi , Ghadeer Ghazi Shayea, Firas Jamal Shakir , Mohd Hazli Mohammed Zabil, Mustafa Abdulfattah Habeeb , Yahya Layth Khaleel

319-336

A Dynamic DNA Cryptosystem for Secure File Sharing

Kanaan J. Brakas, Mafaz Alanezi

424-435

Color Image Encryption Based on a New Symmetric Lightweight Algorithm

Ala’a Talib Khudhair, Abeer Tariq Maolood, Ekhlas Khalaf Gbashi

436-452

A Secure Password based Authentication with Variable Key Lengths Based on the Image Embedded Method

Seerwan Waleed Jirjees, Farah Flayyeh Alkhalid , Ahmed Mudheher Hasan , Amjad Jaleel Humaidi

491-500

Development of real-time threat detection systems with AI-driven cybersecurity in critical infrastructure

Noora Zidan Khalaf , Israa Ibraheem Al Barazanchi , Israa Ibraheem Al Barazanchi , A. D. Radhi , Sushma Parihar , Pritesh Shah , Ravi Sekhar

501-513

Cybersecurity risk assessment for identifying threats, vulnerabilities and countermeasures in the IoT

Mohammed Amin Almaiah, Rami Shehab , Tayseer Alkhdour , Mansour Obeidat, Theyazn H.H. Aldhyani

514-537

Intelligent Threat Hunting: A Systematic Literature Review and Meta-Analysis of the RSA Cryptosystem

Daniel Asiedu , Patrick Kwabena Mensah , Peter Appiahene , Isaac Kofi Nti

538-562

An Effective Feature Optimization Model for Android Malware Detection

Hussein K. Almulla, Hussam J. Mohammed , Nathan Clarke , Ahmed Adnan Hadi , Mazin Abed Mohammed

563-576

Enhancing User Authentication through the Implementation of the ForestPA Algorithm for Smart Healthcare Systems

Nurul Syafiqah Zaidi , Al-Fahim Mubarak Ali , Ahmad Firdaus , Adamu Abubakar Ibrahim , Ghassan Saleh AlDharhani, Mohd Faizal Ab Razak

577-589

Healthcare Security in Edge-Fog-Cloud Environment using Blockchain: A Systematic Review

Zaid J. Al-Araji, Mahmood S. AlKhaldee, Ammar Awad Mutlag, Zaid Ali Abdulkadhim , Hussein M. Farhood, Sharifah Sakinah Syed Ahmad, Namaa N. Hikmat , Ayad Yassen , Abdullah A. Ibrahim Al-Dulaimi, Najwa N. Hazem Al-Sheikh , Ammar Hashim Ali

606–635

CNNs in Image Forensics: A Systematic Literature Review of Copy-Move, Splicing, Noise Detection, and Data Poisoning Detection Methods

Mohammed R. Subhi , Salman Yussof, Liyana Adilla binti Burhanuddin Adilla binti Burhanuddin, Firas Layth Khaleel

636–656

A Stacked Ensemble Classifier for Email Spam Detection via an Evolutionary Algorithm

Salam Al-augby, Hasanen Alyasiri, Fahad Ghalib Abdulkadhim, Zahraa Ch. Oleiwi

657–670

View All Issues