Published: 2025-05-07

Integrating Law, Cybersecurity, and AI: Deep Learning for Securing Iris-Based Biometric Systems

Saif Alaa Hussein , Hasan Ali Al-Tameemi , Ghadeer Ghazi Shayea, Firas Jamal Shakir , Mohd Hazli Mohammed Zabil, Mustafa Abdulfattah Habeeb , Yahya Layth Khaleel

319-336

A Dynamic DNA Cryptosystem for Secure File Sharing

Kanaan J. Brakas, Mafaz Alanezi

424-435

Color Image Encryption Based on a New Symmetric Lightweight Algorithm

Ala’a Talib Khudhair, Abeer Tariq Maolood, Ekhlas Khalaf Gbashi

436-452

A Secure Password based Authentication with Variable Key Lengths Based on the Image Embedded Method

Seerwan Waleed Jirjees, Farah Flayyeh Alkhalid , Ahmed Mudheher Hasan , Amjad Jaleel Humaidi

491-500

Development of real-time threat detection systems with AI-driven cybersecurity in critical infrastructure

Noora Zidan Khalaf , Israa Ibraheem Al Barazanchi , Israa Ibraheem Al Barazanchi , A. D. Radhi , Sushma Parihar , Pritesh Shah , Ravi Sekhar

501-513

Cybersecurity risk assessment for identifying threats, vulnerabilities and countermeasures in the IoT

Mohammed Amin Almaiah, Rami Shehab , Tayseer Alkhdour , Mansour Obeidat, Theyazn H.H. Aldhyani

514-537

Intelligent Threat Hunting: A Systematic Literature Review and Meta-Analysis of the RSA Cryptosystem

Daniel Asiedu , Patrick Kwabena Mensah , Peter Appiahene , Isaac Kofi Nti

538-562

An Effective Feature Optimization Model for Android Malware Detection

Hussein K. Almulla, Hussam J. Mohammed , Nathan Clarke , Ahmed Adnan Hadi , Mazin Abed Mohammed

563-576

Enhancing User Authentication through the Implementation of the ForestPA Algorithm for Smart Healthcare Systems

Nurul Syafiqah Zaidi , Al-Fahim Mubarak Ali , Ahmad Firdaus , Adamu Abubakar Ibrahim , Ghassan Saleh AlDharhani, Mohd Faizal Ab Razak

577-589

Healthcare Security in Edge-Fog-Cloud Environment using Blockchain: A Systematic Review

Zaid J. Al-Araji, Mahmood S. AlKhaldee, Ammar Awad Mutlag, Zaid Ali Abdulkadhim , Hussein M. Farhood, Sharifah Sakinah Syed Ahmad, Namaa N. Hikmat , Ayad Yassen , Abdullah A. Ibrahim Al-Dulaimi, Najwa N. Hazem Al-Sheikh , Ammar Hashim Ali

606–635

CNNs in Image Forensics: A Systematic Literature Review of Copy-Move, Splicing, Noise Detection, and Data Poisoning Detection Methods

Mohammed R. Subhi , Salman Yussof, Liyana Adilla binti Burhanuddin Adilla binti Burhanuddin, Firas Layth Khaleel

636–656

A Stacked Ensemble Classifier for Email Spam Detection via an Evolutionary Algorithm

Salam Al-augby, Hasanen Alyasiri, Fahad Ghalib Abdulkadhim, Zahraa Ch. Oleiwi

657–670

Optimized Deep Learning Model Using Binary Particle Swarm Optimization for Phishing Attack Detection: A Comparative Study

El-Sayed M. El-Kenawy, Marwa M. Eid , Hussein Lafta Hussein , Ahmed M. Osman , Ahmed M. Elshewey

685–703

Ensure Privacy-Preserving Using Deep Learning

Abeer Dawood Salman , Ruqayah Rabeea Al-Dahhan

703-720

Blockchain and Federated Learning in Edge-Fog-Cloud Computing Environments for Smart Logistics

Guma Ali , Adebo Thomas, Maad M. Mijwil , Kholoud Al-Mahzoum, Malik Sallam, Ayodeji Olalekan Salau, Ioannis Adamopoulos , Indu Bala, Aseed Yaseen Rashid Al-jubori

735–769

A Systematic Review of Metaverse Cybersecurity: Frameworks, Challenges, and Strategic Approaches in a Quantum-Driven Era

Hasan Ali Al-Tameemi , Ghadeer Ghazi Shayea, Mishall Al-Zubaidie , Yahya Layth Khaleel , Mustafa Abdulfattah Habeeb, Noor Al-Huda K. Hussein , Raad Z. Homod, Mohammad Aljanabi, O.S Albahri , A. H. Alamoodi , Maad M. Mijwil, Mohammed A. Fadhel , Iman Mohamad Sharaf , Mohanad G. Yaseen , Ahmed Hussein Ali, U. S. Mahmoud, Saleh M. Mohammed , A. S. Albahri

770–803