Editorial Leadership Update — Appointment of a New Editor-in-Chief
2026-03-04
2026-03-04
2026-03-04
Dear Editorial Board,
To further enhance the transparency and integrity of the Mesopotamian Journal of Cybersecurity (MJCS), we are pleased to announce the formalization of our editorial recruitment and accountability procedures.
Moving forward, all editorial members are required to submit an Editor Declaration. This declaration ensures transparency regarding:
We ask that you please review and complete the declaration form at your earliest convenience via the link below:
Fill out the Editor Declaration Form
These measures are part of our ongoing commitment to maintaining the highest standards of academic excellence and governance within our journal. We appreciate your cooperation and your continued contributions to MJCS.
Best regards,
The MJCS Editorial Office
2026-02-27
Mesopotamian Journal of Cybersecurity (MJCS) will soon transition its manuscript submission and peer review system to Elsevier’s Editorial Manager® following completion of website updates and publication data migration.
2025-07-14
Mesopotamian Journal of CyberSecurity
Effective from August 1, 2025
Dear Authors,
We would like to inform you that beginning August 1, 2025, all manuscripts submitted to the Mesopotamian Journal of CyberSecurity will be subject to a publication fee of 1000 USD (approximately 1,320,000 Iraqi Dinars).
This fee supports the journal’s ongoing efforts to ensure high-quality editorial services, peer review integrity, open-access dissemination, and indexing initiatives.
Key Points:
This applies to all new submissions received on or after August 1, 2025.
Submissions made before this date will not be subject to this fee.
The fee is payable only after acceptance of the manuscript.
We remain committed to maintaining academic excellence and appreciate your continued support and contributions to the advancement of cybersecurity research.
Sincerely,
Editorial Board
Mesopotamian Journal of CyberSecurity
2024-05-07
Dear Readers and Contributors,
We are thrilled to announce an important update that marks a significant milestone for the Mesopotamian Journal of CyberSecurity. In our continuous effort to enhance the dissemination of cutting-edge research and developments in the field of cybersecurity, we are increasing our publication frequency. Starting this year, the journal will now publish three issues annually.
Publication Dates:
This increase from our previous schedule will allow us to share the latest research and insights more frequently, keeping you informed and engaged with the most current trends and findings in cybersecurity.
We believe that this change will provide our contributors with more opportunities to publish their work and our readers with more regular updates on the latest in cybersecurity research. We are excited to continue serving our community with even more content and thank you for your ongoing support and contributions.
Stay tuned for our upcoming issues!
Warm regards,
2024-03-02
Transaction, Process, and Document Security in the Age of AI
Now-a-day, usage of AI technology is gaining momentum with growing concerns such as Deepfake. Despite these concerns, AI technologies are a powerful tool for fraud prevention and detection.
Transaction security ensures the safety and integrity of transactions and impacts consumer or buyer behavior in a business relation and trust level. While process security is the activity with the focus on preventing unexpected effects or events. Document security prevents document fraud that is defined as an intentional alteration or usage of fake or stolen documents in a system or transaction.
People in low- and middle-income countries (LMIC), particularly in Africa, have difficulty confirming ownership of their land. This fact morally, financially, and economically affects the population and the country in terms of poor urbanization, high criminality, and legal battles. People struggling for the proprieties could face physique harms or death.
Analyzing this problematic in the light of computer science, reveals that buyers lack information about the land, vendors can sell the same land to many people without them realizing the fraud. The city authorities lack information on each transaction.
Beyond this particular of fraud, many LMIC face several security issues in field of counterfeits drugs, food security issues in terms food quality, safety, and traceability, etc. The fight against counterfeit medicines is a global public health and safety concern. AI and Blockchain are technologies used for preventing and detecting fraud in the medicine supply chain. The food industry faces similar issues to the pharmaceutical industry.
Many other daily life domains also are facing frauds, information manipulation, document falsification that could consequently impact social, job, finance, food, transportation, agriculture, education, national security.
This special issue is looking to explore the concepts, fundamentals, applications of transaction, process, and document security in AI (including machine learning, deep learning) and blockchain in land acquisition process, health care services and process, agriculture, social engineering, food production, transportation, etc.
The goal of this special issue call is to gather excellent research articles, case studies, and/or practical demonstrations from scientists studying the security implications of AI technology use in everyday applications.
List of topics to be covered in this special issue:
Original contributions relating to security in general and to the era of AI in the following fields are most welcome:
Tentative Timeline for this special issue:
Scientific Committee for this special issue:
Acad. Antoine VIANOU\Université d’Abomey Calavi (UAC)\BÉNIN
Pr. Telex M. N. NGATCHED \McMaster University \CANADA
Pr. Ahmed Dooguy KORA\Ecole Supérieure Multinationale des Télécom. (ESMT)\SÉNÉGAL
Pr. Claude LISHOU\Université Cheikh Anta Diop \SÉNÉGAL
Pr. Christelle AUPETIT\Université de Limoges (UNILIM)\FRANCE
Pr. Hatem Ben Sta\Université de Tunis El Manar\TUNISIE
Pr Michel BABRI \Institut National Polytechnique Félix Houphouet -Boigny\CÔTE D’IVOIRE
Pr. Michel DOSSOU\Ecole Polytechnique d’Abomey Calavi (UAC)\BÉNIN
Pr. Tahirou DJARA\Ecole Polytechnique d’Abomey Calavi (UAC)\BÉNIN
Pr. Samuel OUYA \Ecole Supérieure Polytechnique (ESP)\SÉNÉGAL
Pr. Taha Bennani\Faculté des Sciences de Tunis\TUNISIE
Pr. Eugéne EZIN\Universite d'Abomey-Calavi\BÉNIN
Pr. Jules DEGILA\Universite d'Abomey-Calavi\BÉNIN
Mr Nicolas THON\Directeur Général de Sup Télécoms\BÉNIN
Thierry O. C. EDOH / RFW-UNIVERSITY BONN/GERMANY
Dr Patrick SOTINDJO \UNSTIM/BÉNIN
Dr Bah Aladé Habib SIDI\FRANCE
Ass. Prof. Haruna CHIROMA\University of Hafr Al Batin,
College of Computer Science and Engineering\SAUDI ARABIA
Guest editors
Pr. Telex M. N. NGATCHED
Email: ngatchet@mcmaster.ca
Telex M. N. Ngatched is an associate Professor at McMaster University and was affiliated Researcher at the Department of Electrical and Computer Engineering, University of Manitoba, Canada, as a Memorial University
He received the B.Sc. degree and the M.Sc. degree in electronics from the University of Yaoundé, Cameroon, in 1992 and 1993, respectively, the M.Sc. Eng. degree in electronic engineering from the University of Natal, Durban, South Africa, in 2002, and the Ph.D. degree in electronic engineering from the University of KwaZulu-Natal, Durban, where he was a Postdoctoral Fellow.
He is a Senior IEEE Member.
His research interests include:
He was a recipient of the Best Paper Award at the IEEE Wireless Communications and Networking Conference in 2019.
He is a Professional Engineer (P.Eng.) registered with the Professional Engineers Ontario, Toronto, ON, Canada.
He serves as an Area Editor for the IEEE Open Journal of the Communications Society, an Associate Technical Editor for the IEEE Communications Magazine, and an Editor for the IEEE Communications Society On-Line Content. (Based on document published on 27 December 2023).
Acad. Antoine VIANOU
Email: avianou@yahoo.fr
Acad. Antoine VIANOU is Full Professor of Engineering Sciences and Techniques at the University of Abomey-Calavi, founder Member of the Académie Nationale des Sciences, Arts et Lettres du Benin (ANSALB) and Science Ambassador of the Republic of Benin.
He was Head of the Research and Doctoral Training Department at the Ecole Polytechnique d'Abomey-Calavi; Permanent Secretary of the Mathematics and Physical Chemistry Scientific Committee of the Scientific Council of the University of Abomey-Calavi; Vice-Rector in charge of Academic Affairs and Professional Integration at the University of Abomey-Calavi from 2006-2012.
President of the Comité Scientifique Sectoriel des Sciences et Techniques de l'Ingénieur STI at the University of Abomey-Calavi and Director of Labo-CTMAE, Laboratoire de Caractérisation Thermophysique des Matériaux et d'Appropriation Energétique at the University of Abomey Calavi.
He is the author of numerous scientific articles in the fields of
Pr. Ahmed Dooguy KORA
Email: ahmed.kora@esmt.sn
Ahmed D. KORA is full Professor with the Ecole Superieure Multinationale de Télécommunications (ESMT) in Senegal in Telecommunication and currently the Director of teaching, training, and research and responsioble of the ESMT PhD program in partnership with Université Cheikh Anta Diop de Dakar.
He received a Ph. D degree in telecommunications from the University of Limoges, France
He is IEEE senior member and ITU consultant.
His research fields include:
Dr. Thierry EDOH
Email: Oscar.edoh@gmail.com
Thierry Edoh is an affiliated researcher at the University of Bonn (Germany) and associate professor at ESMT/Dakar-Senegal.
He was affiliated at Bundeswehr university Munich/Germany, and Technical University of Munich/department of Applied Software Engineering (Germany). Visiting lecturer at several African and Indian universities.
He received his Diploma in computer sciences from the Technical University of Munich and hold a Ph.D. at the German Federal Army University and performed postdoctoral research works at the University of Bonn (Germany)/department of pharmacy.
He was an award-winner at the 1st International Health Informatics Conference IHI ACM in Washington in 2010 and 2013 at the Afrinic conference in Indonesia.
He has authored 40+ papers in high-impact factor journals 02 books. He co-authored and co- editor 03 books and several book chapters. Member of several editorial review board in high factor impact journals.
His research-fields:
Editorial board member at Internet Technology Letters (Willey journal)
He has initiated the annual International Conference on Rural and Elderly Health Informatics Conference and has contributed to organizing several other conferences
Ass. Prof. Haruna Chiroma
haruna.chiroma@acm.org
charuna@uhb.edu.sa
chiromaharun@fcetgombe.edu.ng
Haruna Chiroma is an Assistant Professor at University of Hafr Al Batin, College of Computer Science and Engineering, Saudi Arabia. He received B.Tech., M.Sc., and Ph.D. in computer science and Artificial Intelligence from Abubakar Tafawa Balewa University, Bayero University Kanoand University of Malaya, respectively. He is ranked in the Top 2% most influential scientists by Stanford University & Elsevier. He is an academic editor Computational and Mathematical Methods in Medicine (ISI WoS/Scopus Indexed) 2022 - date, associate editor – IEEE Access (ISI WoS/Scopus Indexed) 2018 – 2021. Editorial board member – IAES International Journal of Artificial Intelligence, (Scopus Indexed), Associate Editor
– TELKOMNIKA, Indonesia – (Scopus Indexed),
Editorial board member – Recent advances in Computer Science and Communications, (Scopus Indexed). Currently guest editing 3 special issues in ISI/Scopus indexed journals. Editor of 3 Edited Books (Scopus indexed) by Springer Berlin Heidelberg. His research interest includes Artificial neural networks, machine learning with emphasis on deep learning, nature inspired algorithms and their applications in internet of vehicles, self-driving vehicles, big data analytics, emerging cloud computing architecture, NLP and IoT. Also, as a teacher he has a special interest in technology enhanced learning. He has published over 160 academic articles relevant to his research interest in different venues including ISI WoS/Scopus indexed journals but not limited to Neural Network World, Artificial Intelligence Review (Springer), Applied Soft Computing (Elsevier), Neural Computing and Applications (Springer) and Journal of ambient intelligence and humanized computing (Springer). He is an invited reviewer for over 70 ISI WoS/Scopus indexed journals such as IEEE Transactions on Neural Networks and Learning Systems, Artificial Intelligence Review (Springer), IEEE Transaction on Intelligent Transportation Systems, Applied Soft Computing (Elsevier), Expert Systems with Applications (Elsevier), Knowledge-Based System (Elsevier), Soft Computing (Springer), International Journal of Bio-inspired Computation (Inderscience), Neural Computing and Applications (Springer), etc. He has been a technical programme committee member for more than 40 international conferences, workshops and symposium. He was invited by QS world universities ranking in 2017, 2018, 2019, 2020 & 2021 to evaluate research strength of universities in computer science. Participated in 2022 Times Higher Education World University Rankings Survey. Presently, chiroma is supervising 15 M.Sc. students and 4 Ph.Ds., He graduated 10 M.Sc. and 2 Ph.D. students
2024-03-02
This special issue thoroughly investigates the intersection of cybersecurity and generative artificial intelligence (AI), exploring the complex relationship between these fields and highlighting the importance of fairness.
1. Ethically-minded advancements in adversarial techniques:
- Conventional approaches: As cybersecurity deals with weaknesses, the integration of generative AI, namely via Generative Adversarial Networks (GANs), brings forward new ethical concerns. Adversarial assaults now use Generative Adversarial Networks (GANs) to create highly misleading counterfeit data, which poses a significant challenge to conventional security measures and emphasises the need of ethical concerns in AI-based defence systems.
- The ethical implications of the evolution of cyber threats include malicious individuals using Generative Adversarial Networks (GANs) to produce convincing phishing materials, imitate genuine login interfaces, and construct advanced malware. This prompts us to consider ethical considerations. The conventional cybersecurity toolbox encounters ethical dilemmas while identifying and combating these emergent threats.
2. Strengthening Defenses with Fairness in Focus:
- Sophisticated Threat Environment: In an unexpected turn, generative AI emerges as a tool to enhance cybersecurity defences, setting higher standards for fairness. AI-powered systems demonstrate exceptional proficiency in analysing information, recognising trends, and finding irregularities, all while prioritising fairness in algorithmic decision-making. This signifies a proactive stance towards cybersecurity that prioritises justice as its fundamental principle.
- Equitable Anomaly Identification: GANs enhance fairness by producing artificial data that captures several facets of typical system functioning. By incorporating a well-proportioned combination of genuine and artificially generated data into the training process of security systems, the improvement of intrusion detection techniques is accompanied by the integration of fairness as a fundamental aspect.
3. Examining the Fairness Implications of Biometric Security Challenges:
The user did not provide any text. Principles of Facial Recognition: The convergence of generative artificial intelligence (AI) with biometric security, specifically in the context of using face recognition for identification, presents novel obstacles when considering the concept of fairness. The advent of lifelike deepfake photos gives rise to problems of fair accessibility and impartial verification. Ensuring the inclusion of biometric systems necessitates prioritising fairness in innovations.
4. Dimensions pertaining to ethics, privacy, and fairness:
- Implications for privacy: The incorporation of generative AI into cybersecurity raises privacy issues, underscoring the need of equitable data management. Achieving a fair balance between implementing effective security measures and respecting user privacy is of utmost importance.
- Fair and Ethical Imperatives: In addition to ethical issues, it is crucial to prioritise fairness while using generative AI in cybersecurity. Measures to prevent abuse must be in line with ideals of justice in order to build confidence in these developing technologies.
This special issue highlights the merging of generative AI with cybersecurity, with a particular focus on the importance of fairness. The ethical concerns, competitive developments, and protective tactics in this field are examined from the perspective of fairness, emphasising the need for fair, impartial, and inclusive methods to navigate the changing world of cyber risks and AI progress. Continued cooperation between the cybersecurity and AI groups is crucial for promoting equity in technical advancement.
This special issue is handled is handled by:
1. Guest Editor: Assist.Prof.Dr.Mohd Arfian Ismail, Faculty of Computing, College of Computing and Applied Sciences, Universiti Malaysia Pahang, Malaysia
Email: arfian@ump.edu.my
2. Guest Editor: Mohammed A. Fadhel
Email: m.fadhel@uos.edu.iq
College of Computer Science & Information Technology, University of Sumer, IRAQ