Attention cybersecurity scholars and researchers! The Mesopotamian Journal of Cybersecurity has successfully launched and is rapidly gaining recognition in the academic community. With three impactful issues already published, our journal is attracting attention from respected publishers such as Scopus, Taylor & Francis, and others. We invite you to contribute your cutting-edge research and insights to our esteemed publication.

Important Announcement Regarding Publication Fees

2025-07-14

Mesopotamian Journal of CyberSecurity
Effective from August 1, 2025

Dear Authors,

We would like to inform you that beginning August 1, 2025, all manuscripts submitted to the Mesopotamian Journal of CyberSecurity will be subject to a publication fee of 1000 USD (approximately 1,320,000 Iraqi Dinars).

This fee supports the journal’s ongoing efforts to ensure high-quality editorial services, peer review integrity, open-access dissemination, and indexing initiatives.

Key Points:

  • This applies to all new submissions received on or after August 1, 2025.

  • Submissions made before this date will not be subject to this fee.

  • The fee is payable only after acceptance of the manuscript.

We remain committed to maintaining academic excellence and appreciate your continued support and contributions to the advancement of cybersecurity research.

Sincerely,
Editorial Board
Mesopotamian Journal of CyberSecurity

Vol. 5 No. 2 (2025)

Published: 2025-05-07

A Dynamic DNA Cryptosystem for Secure File Sharing

Kanaan J. Brakas, Mafaz Alanezi

424-435

Color Image Encryption Based on a New Symmetric Lightweight Algorithm

Ala’a Talib Khudhair, Abeer Tariq Maolood, Ekhlas Khalaf Gbashi

436-452

A Secure Password based Authentication with Variable Key Lengths Based on the Image Embedded Method

Seerwan Waleed Jirjees, Farah Flayyeh Alkhalid , Ahmed Mudheher Hasan , Amjad Jaleel Humaidi

491-500

Development of real-time threat detection systems with AI-driven cybersecurity in critical infrastructure

Noora Zidan Khalaf , Israa Ibraheem Al Barazanchi , Israa Ibraheem Al Barazanchi , A. D. Radhi , Sushma Parihar , Pritesh Shah , Ravi Sekhar

501-513

Cybersecurity risk assessment for identifying threats, vulnerabilities and countermeasures in the IoT

Mohammed Amin Almaiah, Rami Shehab , Tayseer Alkhdour , Mansour Obeidat, Theyazn H.H. Aldhyani

514-537

Intelligent Threat Hunting: A Systematic Literature Review and Meta-Analysis of the RSA Cryptosystem

Daniel Asiedu , Patrick Kwabena Mensah , Peter Appiahene , Isaac Kofi Nti

538-562

An Effective Feature Optimization Model for Android Malware Detection

Hussein K. Almulla, Hussam J. Mohammed , Nathan Clarke , Ahmed Adnan Hadi , Mazin Abed Mohammed

563-576

Enhancing User Authentication through the Implementation of the ForestPA Algorithm for Smart Healthcare Systems

Nurul Syafiqah Zaidi , Al-Fahim Mubarak Ali , Ahmad Firdaus , Adamu Abubakar Ibrahim , Ghassan Saleh AlDharhani, Mohd Faizal Ab Razak

577-589

Healthcare Security in Edge-Fog-Cloud Environment using Blockchain: A Systematic Review

Zaid J. Al-Araji, Mahmood S. AlKhaldee, Ammar Awad Mutlag, Zaid Ali Abdulkadhim , Hussein M. Farhood, Sharifah Sakinah Syed Ahmad, Namaa N. Hikmat , Ayad Yassen , Abdullah A. Ibrahim Al-Dulaimi, Najwa N. Hazem Al-Sheikh , Ammar Hashim Ali

606–635

CNNs in Image Forensics: A Systematic Literature Review of Copy-Move, Splicing, Noise Detection, and Data Poisoning Detection Methods

Mohammed R. Subhi , Salman Yussof, Liyana Adilla binti Burhanuddin Adilla binti Burhanuddin, Firas Layth Khaleel

636–656

A Stacked Ensemble Classifier for Email Spam Detection via an Evolutionary Algorithm

Salam Al-augby, Hasanen Alyasiri, Fahad Ghalib Abdulkadhim, Zahraa Ch. Oleiwi

657–670

Optimized Deep Learning Model Using Binary Particle Swarm Optimization for Phishing Attack Detection: A Comparative Study

El-Sayed M. El-Kenawy, Marwa M. Eid , Hussein Lafta Hussein , Ahmed M. Osman , Ahmed M. Elshewey

685–703

Ensure Privacy-Preserving Using Deep Learning

Abeer Dawood Salman , Ruqayah Rabeea Al-Dahhan

703-720

Blockchain and Federated Learning in Edge-Fog-Cloud Computing Environments for Smart Logistics

Guma Ali , Adebo Thomas, Maad M. Mijwil , Kholoud Al-Mahzoum, Malik Sallam, Ayodeji Olalekan Salau, Ioannis Adamopoulos , Indu Bala, Aseed Yaseen Rashid Al-jubori

735–769

A Systematic Review of Metaverse Cybersecurity: Frameworks, Challenges, and Strategic Approaches in a Quantum-Driven Era

Hasan Ali Al-Tameemi , Ghadeer Ghazi Shayea, Mishall Al-Zubaidie , Yahya Layth Khaleel , Mustafa Abdulfattah Habeeb, Noor Al-Huda K. Hussein , Raad Z. Homod, Mohammad Aljanabi, O.S Albahri , A. H. Alamoodi , Maad M. Mijwil, Mohammed A. Fadhel , Iman Mohamad Sharaf , Mohanad G. Yaseen , Ahmed Hussein Ali, U. S. Mahmoud, Saleh M. Mohammed , A. S. Albahri

770–803

Integrating Law, Cybersecurity, and AI: Deep Learning for Securing Iris-Based Biometric Systems

Saif Alaa Hussein , Hasan Ali Al-Tameemi , Ghadeer Ghazi Shayea, Firas Jamal Shakir , Mohd Hazli Mohammed Zabil, Mustafa Abdulfattah Habeeb , Yahya Layth Khaleel

319-336

View All Issues