Back to Top
Go Back
Journal Photo for INTERNATIONAL JOURNAL OF CYBER SECURITY
Peer reviewed only Open Access

INTERNATIONAL JOURNAL OF CYBER SECURITY (IJCS)

Publisher : IAEME Publication
Cyber attacks Software Security Hardware Security
e-ISSN 2145-6523
Issue Frequency Monthly
Impact Factor 2.40
Est. Year 2023
Mobile 9884798314
Country India
Language English
APC YES
Impact Factor Assignee Google Scholar
Email editor@iaeme.com

Journal Descriptions

The INTERNATIONAL JOURNAL OF CYBER SECURITY (IJCS) serves as an online, accessible, and peer-reviewed platform dedicated to the sharing of research in the diverse technical realms of cybersecurity. With a deliberate intent to comprehensively address all facets of cybersecurity, the journal is committed to presenting insights on matters of cyberspace security, cutting-edge research findings, and practical implementations of security technologies. IJCS extends an invitation to researchers for the submission of papers that delve into progressive methodologies and tools aimed at enhancing cybersecurity within the realm of Information and Communication Technology (ICT). In this pursuit, the journal actively seeks pioneering contributions within the realm of cyber security.

INTERNATIONAL JOURNAL OF CYBER SECURITY (IJCS) is :-

  • International, Peer-Reviewed, Open Access, Refereed, Cyber attacks, Software Security, Hardware Security, Intelligent Transportation Systems (ITS), Machine learning, cyber security, Emerging trends in cyber security, Cyber security in Internet of Things (IoT), Cyber security in Cloud, Quantum-safe encryption algorithms, Cybersecurity data analytics, IoT Security, AI Security, Software and system security , Online , Monthly Journal

  • UGC Approved, ISSN Approved: P-ISSN E-ISSN: 2145-6523, Established: 2023, Impact Factor: 2.40
  • Does Not Provide Crossref DOI
  • Not indexed in Scopus, WoS, DOAJ, PubMed, UGC CARE

Indexing

Publications of IJCS

Research Scholar October, 2024
As cyber threats continue to evolve, the casino industry is increasingly targeted by ransomware attacks, which pose a significant risk to both operational continuity and financial stability....
Hanna Alkaf February, 2025
Cloud computing has revolutionized the IT industry, providing scalable, flexible, and cost-effective solutions for businesses and individuals. However, the shift to cloud environments has al...
Bhargav Reddy February, 2024
In an increasingly digitalized healthcare landscape, the intersection of healthcare customer experience and cybersecurity has emerged as a critical concern. This abstract provides a concise ...
Riyya Hari March, 2024
This study highlights the pressing need for cybersecurity awareness in today's digitally interconnected world. With the pervasive use of electronic devices and smartphones, privacy and secur...
Sai Teja February, 2024
The proliferation of remote work and the need for secure, private access to corporate resources have heightened the necessity for robust Virtual Private Network (VPN) solutions, particularly...
Katie Moussouris April, 2025
As cybersecurity measures grow more sophisticated, so too do the threats they aim to counter. Among the most pernicious are obfuscated malware and zero-day exploits, which together pose crit...
Rajiv Katos February, 2025
With the rise in sophisticated cyber threats, traditional security measures have proven insufficient in addressing real-time security risks. Dynamic risk assessment (DRA) models leverage pre...
Rahul Sharma July, 2023
In the face of increasing cyber threats, organizations invest heavily in security policies and awareness programs. However, the success of these measures largely depends on employees' adhere...
Katharine Kemp January, 2023
The rise of global cloud computing has introduced significant challenges in securing data privacy, particularly in cross-border data flows. With multiple jurisdictions involved, the risk of ...
Camille Dubois July, 2022
Small and Medium Enterprises (SMEs) are increasingly vulnerable to cybersecurity threats, yet often lack the structural capabilities and resources to mitigate risk effectively. This paper pr...