Announcements

Archiving Application with CLOCKSS - Mesopotamian Journal of Cybersecurity (MJCS)

We are pleased to inform our esteemed authors, reviewers, and readers that the Mesopotamian Journal of Cybersecurity (MJCS) is taking significant steps towards ensuring the long-term preservation and security of our valuable research publications.

In our commitment to providing perpetual access to our journal's scholarly contributions, MJCS has already taken strides by archiving our content through LOCKSS (Lots of Copies Keep Stuff Safe) via PKP PN. You can access our current archive through the following link: MJCS LOCKSS Archive.

While we are proud of this achievement, we are actively working towards obtaining membership with the Directory of Open Access Journals (DOAJ) within the next few months. DOAJ membership is one of the requirements to apply for archiving with CLOCKSS (Controlled Lots of Copies Keep Stuff Safe), an esteemed archival initiative known for its dedication to safeguarding scholarly content.

By pursuing DOAJ membership and subsequently applying for CLOCKSS archiving, we aim to solidify the enduring impact and accessibility of our publications. This endeavor represents a crucial milestone in preserving the scholarly achievements of our authors and further strengthens MJCS's position as a reliable source of cutting-edge research in the field of cybersecurity.

We extend our gratitude to all our contributors and stakeholders for their continued support in making this initiative possible. Together, we look forward to a future where our research remains secure, accessible, and influential for generations to come.

Thank you,

The Editorial Team Mesopotamian Journal of Cybersecurity (MJCS)

 

Call for Special Issue: Security issues in the days of AI

2024-03-02

Transaction, Process, and Document Security in the Age of AI

Now-a-day, usage of AI technology is gaining momentum with growing concerns such as Deepfake. Despite these concerns, AI technologies are a powerful tool for fraud prevention and detection.

Transaction security ensures the safety and integrity of transactions and impacts consumer or buyer behavior in a business relation and trust level. While process security is the activity with the focus on preventing unexpected effects or events. Document security prevents document fraud that is defined as an intentional alteration or usage of fake or stolen documents in a system or transaction.

People in low- and middle-income countries (LMIC), particularly in Africa, have difficulty confirming ownership of their land. This fact morally, financially, and economically affects the population and the country in terms of poor urbanization, high criminality, and legal battles. People struggling for the proprieties could face physique harms or death.

Analyzing this problematic in the light of computer science, reveals that buyers lack information about the land, vendors can sell the same land to many people without them realizing the fraud. The city authorities lack information on each transaction.

Beyond this particular of fraud, many LMIC face several security issues in field of counterfeits drugs, food security issues in terms food quality, safety, and traceability, etc. The fight against counterfeit medicines is a global public health and safety concern.  AI and Blockchain are technologies used for preventing and detecting fraud in the medicine supply chain. The food industry faces similar issues to the pharmaceutical industry.

Many other daily life domains also are facing frauds, information manipulation, document falsification that could consequently impact social, job, finance, food, transportation, agriculture, education, national security.

This special issue is looking to explore the concepts, fundamentals, applications of transaction, process, and document security in AI (including machine learning, deep learning) and blockchain in land acquisition process, health care services and process, agriculture, social engineering, food production, transportation, etc.

The goal of this special issue call is to gather excellent research articles, case studies, and/or practical demonstrations from scientists studying the security implications of AI technology use in everyday applications.

 

List of topics to be covered in this special issue:

Original contributions relating to security in general and to the era of AI in the following fields are most welcome:

  1. Blockchain application
  2. Education
  3. eGovernance
  4. Digital finance
  5. Territorial Integrity
  6. Networks security
  7. Big Data

 

Tentative Timeline for this special issue:

 

  • Manuscript Submission Date - 06.2024
  • Author Notification Date - 07.2024
  • Revised paper submission Date - 09.2024

 

 

 

Scientific Committee for this special issue:

 

Acad. Antoine VIANOU\Université d’Abomey Calavi (UAC)\BÉNIN

Pr. Telex M. N. NGATCHED \McMaster University \CANADA

Pr. Ahmed Dooguy KORA\Ecole Supérieure Multinationale des Télécom. (ESMT)\SÉNÉGAL

Pr. Claude LISHOU\Université Cheikh Anta Diop \SÉNÉGAL

Pr. Christelle AUPETIT\Université de Limoges (UNILIM)\FRANCE

Pr. Hatem Ben Sta\Université de Tunis El Manar\TUNISIE

Pr Michel BABRI \Institut National Polytechnique Félix Houphouet -Boigny\CÔTE D’IVOIRE

Pr. Michel DOSSOU\Ecole Polytechnique d’Abomey Calavi (UAC)\BÉNIN

Pr. Tahirou DJARA\Ecole Polytechnique d’Abomey Calavi (UAC)\BÉNIN

Pr. Samuel OUYA \Ecole Supérieure Polytechnique (ESP)\SÉNÉGAL

Pr. Taha Bennani\Faculté des Sciences de Tunis\TUNISIE

Pr. Eugéne EZIN\Universite d'Abomey-Calavi\BÉNIN

Pr. Jules DEGILA\Universite d'Abomey-Calavi\BÉNIN

Mr Nicolas THON\Directeur Général de Sup Télécoms\BÉNIN

Thierry O. C. EDOH / RFW-UNIVERSITY BONN/GERMANY

Dr Patrick SOTINDJO \UNSTIM/BÉNIN

Dr Bah Aladé Habib SIDI\FRANCE

Ass. Prof. Haruna CHIROMA\University of Hafr Al Batin,

College of Computer Science and Engineering\SAUDI ARABIA

 

 

Guest editors

 

Pr. Telex M. N. NGATCHED

Email: ngatchet@mcmaster.ca

            Telex M. N. Ngatched is an associate Professor at McMaster University and was affiliated Researcher at the Department of Electrical and Computer Engineering, University of Manitoba, Canada, as a Memorial University

He received the B.Sc. degree and the M.Sc. degree in electronics from the University of Yaoundé, Cameroon, in 1992 and 1993, respectively, the M.Sc. Eng. degree in electronic engineering from the University of Natal, Durban, South Africa, in 2002, and the Ph.D. degree in electronic engineering from the University of KwaZulu-Natal, Durban, where he was a Postdoctoral Fellow.

He is a Senior IEEE Member.

His research interests include:

  • Artificial Intelligence and Machine Learning for Communications, And Underwater Communications
  • 5g and 6g Enabling Technologies
  • Optical Wireless Communications
  • Hybrid Optical Wireless and Radio-Frequency Communications

 

He was a recipient of the Best Paper Award at the IEEE Wireless Communications and Networking Conference in 2019.

He is a Professional Engineer (P.Eng.) registered with the Professional Engineers Ontario, Toronto, ON, Canada.

He serves as an Area Editor for the IEEE Open Journal of the Communications Society, an Associate Technical Editor for the IEEE Communications Magazine, and an Editor for the IEEE Communications Society On-Line Content. (Based on document published on 27 December 2023).

 

Acad. Antoine VIANOU

Email: avianou@yahoo.fr

            Acad. Antoine VIANOU is Full Professor of Engineering Sciences and Techniques at the University of Abomey-Calavi, founder Member of the Académie Nationale des Sciences, Arts et Lettres du Benin (ANSALB) and Science Ambassador of the Republic of Benin.

He was Head of the Research and Doctoral Training Department at the Ecole Polytechnique d'Abomey-Calavi; Permanent Secretary of the Mathematics and Physical Chemistry Scientific Committee of the Scientific Council of the University of Abomey-Calavi; Vice-Rector in charge of Academic Affairs and Professional Integration at the University of Abomey-Calavi from 2006-2012.

President of the Comité Scientifique Sectoriel des Sciences et Techniques de l'Ingénieur STI at the University of Abomey-Calavi and Director of Labo-CTMAE, Laboratoire de Caractérisation Thermophysique des Matériaux et d'Appropriation Energétique at the University of Abomey Calavi.

He is the author of numerous scientific articles in the fields of

  • Electrical and Energy Engineering
  • Thermophysical characterization of local building materials;
  • Renewable energies ;
  • Thermal Comfort of Housing;
  • - Electronics and Telecommunications;
  • Artificial Intelligence.

 

 

Pr. Ahmed Dooguy KORA

Email: ahmed.kora@esmt.sn

            Ahmed D. KORA is full Professor with the Ecole Superieure Multinationale de Télécommunications (ESMT) in Senegal in Telecommunication and currently the Director of teaching, training, and research and responsioble of the ESMT PhD program in partnership with Université Cheikh Anta Diop de Dakar.

He received a Ph. D degree in telecommunications from the University of Limoges, France

He is IEEE senior member and ITU consultant.

His research fields include:

  • Artificial Intelligence
  • Communication Systems and Networks,
  • Free Space Optics,
  • Fiber Optics,
  • Quality Of Service,
  • Universal Access,
  • SDN
  • Emerging Technologies.

 

 

Dr. Thierry EDOH

Email: Oscar.edoh@gmail.com

            Thierry Edoh is an affiliated researcher at the University of Bonn (Germany) and associate professor at ESMT/Dakar-Senegal.

He was affiliated at Bundeswehr university Munich/Germany, and Technical University of Munich/department of Applied Software Engineering (Germany). Visiting lecturer at several African and Indian universities.

He received his Diploma in computer sciences from the Technical University of Munich and hold a Ph.D. at the German Federal Army University and performed postdoctoral research works at the University of Bonn (Germany)/department of pharmacy.

He was an award-winner at the 1st International Health Informatics Conference IHI ACM in Washington in 2010 and 2013 at the Afrinic conference in Indonesia.

He has authored 40+ papers in high-impact factor journals 02 books. He co-authored and co- editor 03 books and several book chapters. Member of several editorial review board in high factor impact journals.

His research-fields:

  • Blockchain to prevent medicine counterfeit, drug abuse, access to opioid.
  • EHR/EMR and blockchain
  • Diseases surveillance and risk prevention using IoT technology.
  • Health literacy impact on patient health outcomes
  • Patient-centric data impacts on patient health outcomes
  • Impact of medical education on screening test-outcomes
  • Elderly health care

 

Editorial board member at Internet Technology Letters (Willey journal)

He has initiated the annual International Conference on Rural and Elderly Health Informatics Conference and has contributed to organizing several other conferences

 

 

Ass. Prof. Haruna Chiroma

haruna.chiroma@acm.org

charuna@uhb.edu.sa

chiromaharun@fcetgombe.edu.ng

            Haruna Chiroma is an Assistant Professor at University of Hafr Al Batin, College of Computer Science and Engineering, Saudi Arabia. He received B.Tech., M.Sc., and Ph.D. in computer science and Artificial Intelligence from Abubakar Tafawa Balewa University, Bayero University Kanoand University of Malaya, respectively. He is ranked in the Top 2% most influential scientists by Stanford University & Elsevier. He is an academic editor Computational and Mathematical Methods in Medicine (ISI WoS/Scopus Indexed) 2022 - date, associate editor – IEEE Access (ISI WoS/Scopus Indexed) 2018 – 2021. Editorial board member – IAES International Journal of Artificial Intelligence, (Scopus Indexed), Associate Editor

– TELKOMNIKA, Indonesia – (Scopus Indexed),

Editorial board member – Recent advances in Computer Science and Communications, (Scopus Indexed). Currently guest editing 3 special issues in ISI/Scopus indexed journals. Editor of 3 Edited Books (Scopus indexed) by Springer Berlin Heidelberg. His research interest includes Artificial neural networks, machine learning with emphasis on deep learning, nature inspired algorithms and their applications in internet of vehicles, self-driving vehicles, big data analytics, emerging cloud computing architecture, NLP and IoT. Also, as a teacher he has a special interest in technology enhanced learning. He has published over 160 academic articles relevant to his research interest in different venues including ISI WoS/Scopus indexed journals but not limited to Neural Network World, Artificial Intelligence Review (Springer), Applied Soft Computing (Elsevier), Neural Computing and Applications (Springer) and Journal of ambient intelligence and humanized computing (Springer). He is an invited reviewer for over 70 ISI WoS/Scopus indexed journals such as IEEE Transactions on Neural Networks and Learning Systems, Artificial Intelligence Review (Springer), IEEE Transaction on Intelligent Transportation Systems, Applied Soft Computing (Elsevier), Expert Systems with Applications (Elsevier), Knowledge-Based System (Elsevier), Soft Computing (Springer), International Journal of Bio-inspired Computation (Inderscience), Neural Computing and Applications (Springer), etc. He has been a technical programme committee member for more than 40 international conferences, workshops and symposium. He was invited by QS world universities ranking in 2017, 2018, 2019, 2020 & 2021 to evaluate research strength of universities in computer science. Participated in 2022 Times Higher Education World University Rankings Survey. Presently, chiroma is supervising 15 M.Sc. students and 4 Ph.Ds., He graduated 10 M.Sc. and 2 Ph.D. students

Call for Special Issue: Navigating Fairness in the Convergence of Cybersecurity and Generative AI (NFCCG-AI)

2024-03-02

This special issue thoroughly investigates the intersection of cybersecurity and generative artificial intelligence (AI), exploring the complex relationship between these fields and highlighting the importance of fairness.

1. Ethically-minded advancements in adversarial techniques:

   - Conventional approaches: As cybersecurity deals with weaknesses, the integration of generative AI, namely via Generative Adversarial Networks (GANs), brings forward new ethical concerns. Adversarial assaults now use Generative Adversarial Networks (GANs) to create highly misleading counterfeit data, which poses a significant challenge to conventional security measures and emphasises the need of ethical concerns in AI-based defence systems.

   - The ethical implications of the evolution of cyber threats include malicious individuals using Generative Adversarial Networks (GANs) to produce convincing phishing materials, imitate genuine login interfaces, and construct advanced malware. This prompts us to consider ethical considerations. The conventional cybersecurity toolbox encounters ethical dilemmas while identifying and combating these emergent threats.

2. Strengthening Defenses with Fairness in Focus:

- Sophisticated Threat Environment: In an unexpected turn, generative AI emerges as a tool to enhance cybersecurity defences, setting higher standards for fairness. AI-powered systems demonstrate exceptional proficiency in analysing information, recognising trends, and finding irregularities, all while prioritising fairness in algorithmic decision-making. This signifies a proactive stance towards cybersecurity that prioritises justice as its fundamental principle.

   - Equitable Anomaly Identification: GANs enhance fairness by producing artificial data that captures several facets of typical system functioning. By incorporating a well-proportioned combination of genuine and artificially generated data into the training process of security systems, the improvement of intrusion detection techniques is accompanied by the integration of fairness as a fundamental aspect.

3. Examining the Fairness Implications of Biometric Security Challenges:

   The user did not provide any text. Principles of Facial Recognition: The convergence of generative artificial intelligence (AI) with biometric security, specifically in the context of using face recognition for identification, presents novel obstacles when considering the concept of fairness. The advent of lifelike deepfake photos gives rise to problems of fair accessibility and impartial verification. Ensuring the inclusion of biometric systems necessitates prioritising fairness in innovations.

4. Dimensions pertaining to ethics, privacy, and fairness:

   - Implications for privacy: The incorporation of generative AI into cybersecurity raises privacy issues, underscoring the need of equitable data management. Achieving a fair balance between implementing effective security measures and respecting user privacy is of utmost importance.

   - Fair and Ethical Imperatives: In addition to ethical issues, it is crucial to prioritise fairness while using generative AI in cybersecurity. Measures to prevent abuse must be in line with ideals of justice in order to build confidence in these developing technologies.

 

This special issue highlights the merging of generative AI with cybersecurity, with a particular focus on the importance of fairness. The ethical concerns, competitive developments, and protective tactics in this field are examined from the perspective of fairness, emphasising the need for fair, impartial, and inclusive methods to navigate the changing world of cyber risks and AI progress. Continued cooperation between the cybersecurity and AI groups is crucial for promoting equity in technical advancement.

This special issue is handled is handled by:

1. Guest Editor: Assist.Prof.Dr.Mohd Arfian Ismail, Faculty of Computing, College of Computing and Applied Sciences, Universiti Malaysia Pahang, Malaysia

Email: arfian@ump.edu.my

2. Guest Editor: Assist.Prof.Dr. Mohammad Aljanabi

Email: mohammad.aljanabi@aliraqia.edu.iq

Department of Computer, College of Education, Al-Iraqia University, IRAQ

3. Guest Editor: Mohammed A. Fadhel

 Email: m.fadhel@uos.edu.iq

 College of Computer Science & Information Technology, University of Sumer, IRAQ