##plugins.themes.bootstrap3.accessible_menu.label##
##plugins.themes.bootstrap3.accessible_menu.main_navigation##
##plugins.themes.bootstrap3.accessible_menu.main_content##
##plugins.themes.bootstrap3.accessible_menu.sidebar##
English
العربية
Register
Login
NAUSS
Home
About us
Editorial Team
About the Journal
Aim and Scope
Authors Guidelines
Contact Us
Articles & Issues
Current
Ahead of print
Archives
Indexing/Abstracting
Policies
Principles of Publishing Ethics
Privacy Statement
Publication Frequency
Process Charges
Conflicts of Interest
Crossmark Policy
Open Access and Copyright
Peer Review Process
Malpractice and Ethics Statement
Archiving Policy
Announcements
Search
English
العربية
Register
Login
Vol. 6 No. 2 (2023)
Home
Archives
Vol. 6 No. 2 (2023)
Volume 6 Issue (2) December 2023
DOI:
https://doi.org/10.26735/UQQX9145
Letter to the Editor
AI in the Era of Fakes and Deepfakes: Risk of Fabricated Photographs and Identities in Academic Publishing
Jaime A. Teixeira da Silva
PDF
Original Research articles
A Model-agnostic XAI Approach for Developing Low-cost IoT Intrusion Detection Dataset
Enoch Opanin Gyamfi, Zhiguang Qin, Daniel Adu-Gyamfi, Juliana Mantebea Danso, Judith Ayekai Browne, Dominic Kwasi Adom, Francis Effirim Botchey, Nelson Opoku-Mensah
PDF
A Novel Hybrid Method for Effective Identification and Extraction of Digital Evidence Masked by Steganographic Techniques in WAV and MP3 Files
Mohamed C. Ghanem, Maider D. Uribarri, Ramzi Djemai, Dipo Dunsin, Istteffanny I. Araujo
PDF
Analyzing Autoencoder-Based Intrusion Detection System Performance : Impact of Hidden Layers
Seiba Alhassan, Gaddafi Abdul-Salaam, Michael Asante, Yaw Missah, Ernest Ganaa
PDF
The Potential Benefits and Challenges of a BRICS+ Agency for Cybersecurity Intelligence Exchange
Masike Malatji, Walter Matl
PDF
Social Media Users Cyberhate Reporting Intentions: Does Users’ Perceptions of Police Effectiveness Matter?
Samuel Mung'ale Wafula, Peterson Mwai Kariuki , Cyprian Ondieki Omari
PDF
An Extra Security Measurement for Android Mobile Applications Using the Fingerprint Authentication Methodology
Mohammad Algarni
PDF
Review Article
The Internet of Things (IoT) Forensic Investigation Process : A State-of-the-Art Review, Challenges and Future Directions
Maryam AlShaer, Khawla AlShehhi, Samia Abdulla
PDF