, Saudi Arabia
-
Journal of Information Security and Cybercrimes Research Vol. 3 No. 1 (2020) - Original Research articles
Integrating Light-Weight Cryptography with Diacritics Arabic Text Steganography Improved for Practical Security Applications
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 4 No. 1 (2021) - Review Article
Defense mechanisms against Distributed Denial of Service attacks:Comparative Review
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 4 No. 1 (2021) - Review Article
A Systematic Review of Machine Learning Algorithms in Cyberbullying Detection: Future Directions and Challenges
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 4 No. 2 (2021) - Original Research articles
A Strategic Vision for Combating Cyberterrorism
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 5 No. 1 (2022) - Original Research articles
The Factors Influencing the Use of Password Managers
Abstract Pdf -
Journal of Information Security and Cybercrimes Research Vol. 5 No. 2 (2022) - Original Research articles
Cyberthreats Facing High School Students and Methods of Addressing them
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 5 No. 2 (2022) - Original Research articles
The Effect of Applying Information Security Awareness Concept of MOH Employees on Cybersecurity Department – Ministry of Health-Riyadh
Abstract Pdf -
Journal of Information Security and Cybercrimes Research Vol. 5 No. 2 (2022) - Review Article
Investigating the Factors Influencing the Use of Cloud Computing
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 6 No. 1 (2023) - Original Research articles
Users' Information Security Awareness of Home Closed-Circuit Television Surveillance
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 6 No. 2 (2023) - Original Research articles
An Extra Security Measurement for Android Mobile Applications Using the Fingerprint Authentication Methodology
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 7 No. 1 (2024) - Original Research articles
Cyber Security Incident Response
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 7 No. 1 (2024) - Original Research articles
Adopting Automated Penetration Testing Tools
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 8 No. 1 (2025) - Original Research articles
Comparative Performance Evaluation of Real-Time Webcam and HOG-Based Facial Recognition Systems for Children's Screen Time Management
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 7 No. 1 (2024) - Original Research articles
Enhancing Malware Detection by Integrating Machine Learning with Cuckoo Sandbox
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 7 No. 1 (2024) - Original Research articles
Cybersecurity and Forensic Analysis of IP-Cameras Used in Saudi Arabia
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 7 No. 2 (2024) - Original Research articles
Enhancing IoT Security in 5G Networks
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 8 No. 1 (2025) - Case Study
CrowdStrike Causes Global Microsoft Outage
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 7 No. 2 (2024) - Original Research articles
A Comparative Evaluation of Machine Learning-Based Intrusion Detection Systems for Securing Cloud Environments
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 7 No. 2 (2024) - Review Article
Social Work in Cybersecurity
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 1 No. 1 (2018) - Original Research articles
Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 1 No. 1 (2018) - Original Research articles
Automatic Intrusion Detection System Using Deep Recurrent Neural Network Paradigm
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 1 No. 1 (2018) - Original Research articles
Overview of Cyberattack on Saudi Organizations
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 1 No. 1 (2018) - Original Research articles
Parental Role in Protecting Children and Dangers of Social Networks Sites
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 1 No. 1 (2018) - Original Research articles
Survey on Updating IDSs’ Signatures Databases
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 1 No. 1 (2018) - Original Research articles
The Distinguish Between Information Security and Privacy
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 1 No. 1 (2018) - Original Research articles
Trust Modeling in Wireless Sensor Networks: State of the Art
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 2 No. 1 (2019) - Original Research articles
A URL with Image-based Feature Extraction for Preventing Phishing Attacks
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 2 No. 1 (2019) - Original Research articles
Comparative Study of Database Security In Cloud Computing Using AES and DES Encryption Algorithms
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 2 No. 1 (2019) - Original Research articles
Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 2 No. 1 (2019) - Original Research articles
Vertical Fragmentation for Database Using FPClose Algorithm
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 3 No. 1 (2020) - Original Research articles
Cybersecurity Management for Virtual Private Network (VPN) Applications: A Proposed Framework for the Governance of their Use in the Kingdom of Saudi Arabia
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 3 No. 1 (2020) - Original Research articles
DDOS Botnets Attacks Detection in Anomaly Traffic: A Comparative Study.
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 3 No. 1 (2020) - Original Research articles
A New Secured E-Government Efficiency Model for Sustainable Services Provision
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 3 No. 1 (2020) - Original Research articles
The Role of Governance in Achieving Sustainable Cybersecurity for Business Corporations
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 3 No. 1 (2020) - Original Research articles
Enhanced Classification Method for Phishing Emails Detection
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 4 No. 1 (2021) - Review Article
Cyberthreats on Implantable Medical Devices
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 4 No. 2 (2021) - Case Report
Web Application based Image Geolocation Analysis to Detect Human Trafficking
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 4 No. 2 (2021) - Original Research articles
User Acceptance of Password Manager Software: Evidence from Australian Microbusinesses
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 4 No. 2 (2021) - Original Research articles
Software Optimisation of Lightweight Klein Encryption in the Internet of Things
Abstract PDF -
Journal of Information Security and Cybercrimes Research Vol. 3 No. 1 (2020) - Original Research articles
A Study on Threat Modeling in Smart Greenhouses
Abstract PDF