Main Navigation
Main Content
Sidebar
Register
Login
Toggle navigation
Mesopotamian Journal of CyberSecurity
Home
Current
Archives
Announcements
Publisher
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Search
Home
Archives
Vol. 5 No. 3 (2025)
Published:
2025-09-06
Articles
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
Nuha Mohammed Khassaf , Nada Hussein M. Ali
913–926
PDF
Enhanced Key Generation Method using Deep Q-Networks Algorithm with Chaotic Maps
Ali A. Mahdi , Mays M. Hoobi
927–952
PDF
Blockchain-Powered Dynamic Segmentation in Personal Health Record
Mishall Al-Zubaidie, Wid Alaa Jebbar
953–976
PDF
Comprehensive study of Integrating Clustering and Adversarial Learning for Enhanced Recommender Systems: A Systematic Review of Hybrid Methodologies and Applications
M. E. Alqaysi, Murtadha M. Hamad, Ahmed Subhi Abdalkafor
977–1041
PDF
Enhancing Internet of Things (IoT) Network Security: A Machine Learning-Driven Framework for Real-Time Intrusion Detection and Anomaly Classification
Loiy Alsbatin, Firas Zawaideh, Basem Mohamad Alrifai, Tareq A. Alawneh
1042–1056
PDF