##plugins.themes.bootstrap3.accessible_menu.label##
##plugins.themes.bootstrap3.accessible_menu.main_navigation##
##plugins.themes.bootstrap3.accessible_menu.main_content##
##plugins.themes.bootstrap3.accessible_menu.sidebar##
English
العربية
Register
Login
NAUSS
Home
About us
Editorial Team
About the Journal
Aim and Scope
Authors Guidelines
Contact Us
Articles & Issues
Current
Ahead of print
Archives
Indexing/Abstracting
Policies
Principles of Publishing Ethics
Privacy Statement
Publication Frequency
Process Charges
Conflicts of Interest
Crossmark Policy
Open Access and Copyright
Peer Review Process
Malpractice and Ethics Statement
Archiving Policy
Announcements
Search
English
العربية
Register
Login
Vol. 8 No. 2 (2025)
Home
Archives
Vol. 8 No. 2 (2025)
Volume 8 Issue (2) December 2025
DOI:
https://doi.org/10.26735/TXER1429
Original Research articles
XAI for Improving the Security of ML-based Spoofing Email Detectors
Niddal Hassan Imam
PDF
AI Hallucinations in Information Security : A Bibliometric and Grounded Study Perspective
Kennedy Njenga, Rujeko Macheka Madzinga
PDF
Assessing the Effectiveness of Open-Source Network Intrusion Detection Systems for Small-to-Medium-Sized Enterprises
Ghadi M. A. Alzahrani, Nizar H. Alsharif, Moez Krichen
PDF
A Deep Learning Based Approach for License Plate Recognition
Raghad Khalid Alfehaid, Samar Matar Almutairi, Qazi Emad Ul Haq
PDF
Smart Security Analysis System : A Machine Learning-Based Framework for Crime Prediction and Visualization
Abdulghani Abdulwaheed, Yamen Megdiche, Qazi Emad Ul Haq
PDF
Review Article
Addressing Inadequate Forensic Training and Resources for Law Enforcement National Strategy in Drone based Investigations
Syed Usman Jamil, M. A. Rahman, M. Arif Khan, Muhammad Adeel, Muhammad Ali Paracha
PDF