Published: 2025-05-07

Integrating Law, Cybersecurity, and AI: Deep Learning for Securing Iris-Based Biometric Systems

Saif Alaa Hussein , Hasan Ali Al-Tameemi , Ghadeer Ghazi Shayea, Firas Jamal Shakir , Mohd Hazli Mohammed Zabil, Mustafa Abdulfattah Habeeb , Yahya Layth Khaleel

319-336

A Dynamic DNA Cryptosystem for Secure File Sharing

Kanaan J. Brakas, Mafaz Alanezi

424-435

Color Image Encryption Based on a New Symmetric Lightweight Algorithm

Ala’a Talib Khudhair, Abeer Tariq Maolood, Ekhlas Khalaf Gbashi

436-452

A Secure Password based Authentication with Variable Key Lengths Based on the Image Embedded Method

Seerwan Waleed Jirjees, Farah Flayyeh Alkhalid , Ahmed Mudheher Hasan , Amjad Jaleel Humaidi

491-500

Development of real-time threat detection systems with AI-driven cybersecurity in critical infrastructure

Noora Zidan Khalaf , Israa Ibraheem Al Barazanchi , Israa Ibraheem Al Barazanchi , A. D. Radhi , Sushma Parihar , Pritesh Shah , Ravi Sekhar

501-513

Cybersecurity risk assessment for identifying threats, vulnerabilities and countermeasures in the IoT

Mohammed Amin Almaiah, Rami Shehab , Tayseer Alkhdour , Mansour Obeidat, Theyazn H.H. Aldhyani

514-537

Intelligent Threat Hunting: A Systematic Literature Review and Meta-Analysis of the RSA Cryptosystem

Daniel Asiedu , Patrick Kwabena Mensah , Peter Appiahene , Isaac Kofi Nti

538-562

An Effective Feature Optimization Model for Android Malware Detection

Hussein K. Almulla, Hussam J. Mohammed , Nathan Clarke , Ahmed Adnan Hadi , Mazin Abed Mohammed

563-576

Enhancing User Authentication through the Implementation of the ForestPA Algorithm for Smart Healthcare Systems

Nurul Syafiqah Zaidi , Al-Fahim Mubarak Ali , Ahmad Firdaus , Adamu Abubakar Ibrahim , Ghassan Saleh AlDharhani, Mohd Faizal Ab Razak

577-589

Healthcare Security in Edge-Fog-Cloud Environment using Blockchain: A Systematic Review

Zaid J. Al-Araji, Mahmood S. AlKhaldee, Ammar Awad Mutlag, Zaid Ali Abdulkadhim , Hussein M. Farhood, Sharifah Sakinah Syed Ahmad, Namaa N. Hikmat , Ayad Yassen , Abdullah A. Ibrahim Al-Dulaimi, Najwa N. Hazem Al-Sheikh , Ammar Hashim Ali

606–635

CNNs in Image Forensics: A Systematic Literature Review of Copy-Move, Splicing, Noise Detection, and Data Poisoning Detection Methods

Mohammed R. Subhi , Salman Yussof, Liyana Adilla binti Burhanuddin Adilla binti Burhanuddin, Firas Layth Khaleel

636–656

A Stacked Ensemble Classifier for Email Spam Detection via an Evolutionary Algorithm

Salam Al-augby, Hasanen Alyasiri, Fahad Ghalib Abdulkadhim, Zahraa Ch. Oleiwi

657–670