Back to Top

INTERNATIONAL JOURNAL OF CYBER SECURITY (IJCS)

Publisher :

IAEME Publication

Scopus Profile
Peer reviewed only
Scopus Profile
Open Access
  • Cyber attacks
  • Software Security
  • Hardware Security
  • +11

e-ISSN :

2145-6523

Issue Frequency :

Monthly

Impact Factor :

2.40

Est. Year :

2023

Mobile :

9884798314

Country :

India

Language :

English

APC :

YES

Impact Factor Assignee :

Google Scholar

Email :

editor@iaeme.com

Journal Descriptions

The INTERNATIONAL JOURNAL OF CYBER SECURITY (IJCS) serves as an online, accessible, and peer-reviewed platform dedicated to the sharing of research in the diverse technical realms of cybersecurity. With a deliberate intent to comprehensively address all facets of cybersecurity, the journal is committed to presenting insights on matters of cyberspace security, cutting-edge research findings, and practical implementations of security technologies. IJCS extends an invitation to researchers for the submission of papers that delve into progressive methodologies and tools aimed at enhancing cybersecurity within the realm of Information and Communication Technology (ICT). In this pursuit, the journal actively seeks pioneering contributions within the realm of cyber security.


INTERNATIONAL JOURNAL OF CYBER SECURITY (IJCS) is :

International, Peer-Reviewed, Open Access, Refereed, Cyber attacks, Software Security, Hardware Security, Intelligent Transportation Systems (ITS), Machine learning, cyber security, Emerging trends in cyber security, Cyber security in Internet of Things (IoT), Cyber security in Cloud, Quantum-safe encryption algorithms, Cybersecurity data analytics, IoT Security, AI Security, Software and system security , Online Monthly Journal

UGC Approved, ISSN Approved: P-ISSN , E-ISSN - 2145-6523, Established in - 2023, Impact Factor - 2.40

Not Provide Crossref DOI

Not indexed in Scopus, WoS, DOAJ, PubMed, UGC CARE

Publications of IJCS

  • dott image Research Scholar
  • dott image October, 2024

HIGH STAKES, HIGHER RISKS: COMBATING RANSOMWARE IN THE CASINO ECOSYSTEM

As cyber threats continue to evolve, the casino industry is increasingly targeted by ransomware attacks, which pose a significant risk to both operational continuity and financial stability....

  • dott image February, 2025

ENHANCING CYBER SECURITY IN CLOUD COMPUTING THROUGH ADVANCED THREAT DETECTION AND MITIGATION STRATEGIES

Cloud computing has revolutionized the IT industry, providing scalable, flexible, and cost-effective solutions for businesses and individuals. However, the shift to cloud environments has al...

  • dott image February, 2024

HEALTHCARE CUSTOMER EXPERIENCE AND CYBERSECURITY: PROTECTING PATIENT DATA IN A DIGITAL ERA

In an increasingly digitalized healthcare landscape, the intersection of healthcare customer experience and cybersecurity has emerged as a critical concern. This abstract provides a concise ...

  • dott image March, 2024

CYBERSECURITY AND ITS ASSOCIATED THREATS

This study highlights the pressing need for cybersecurity awareness in today's digitally interconnected world. With the pervasive use of electronic devices and smartphones, privacy and secur...

  • dott image February, 2024

LOW-COST, SELF-HOSTED SECURE ACCESS SERVICE EDGE (SASE) SOLUTION USING AWS CLOUD INFRASTRUCTURE

The proliferation of remote work and the need for secure, private access to corporate resources have heightened the necessity for robust Virtual Private Network (VPN) solutions, particularly...

  • dott image April, 2025

Investigating the Proliferation of Sophisticated Cyber Threats Through Malware Obfuscation and Zero-Day Exploitation in Distributed Networks

As cybersecurity measures grow more sophisticated, so too do the threats they aim to counter. Among the most pernicious are obfuscated malware and zero-day exploits, which together pose crit...

  • dott image February, 2025

Dynamic Risk Assessment Models for Predictive Threat Intelligence and Proactive Incident Response in Complex Cybersecurity Ecosystems

With the rise in sophisticated cyber threats, traditional security measures have proven insufficient in addressing real-time security risks. Dynamic risk assessment (DRA) models leverage pre...

  • dott image July, 2023

Assessing the Impact of Employee Cyber Hygiene Practices on the Effectiveness of Organizational Security Policies and Awareness Programs

In the face of increasing cyber threats, organizations invest heavily in security policies and awareness programs. However, the success of these measures largely depends on employees' adhere...

  • dott image January, 2023

Evaluation of Data Privacy Risks in Cross-Border Cloud Storage Systems and Legal Implications Under International Cyber Law

The rise of global cloud computing has introduced significant challenges in securing data privacy, particularly in cross-border data flows. With multiple jurisdictions involved, the risk of ...

  • dott image July, 2022

Implementing a Cybersecurity Maturity Model to Improve Risk Management Practices in Small and Medium Enterprises

Small and Medium Enterprises (SMEs) are increasingly vulnerable to cybersecurity threats, yet often lack the structural capabilities and resources to mitigate risk effectively. This paper pr...

Establish Your Own Journal Without the Expense!

OJSCloud offers a complete, free setup to get you publishing.

Start Your Free Journal!
free profile