Focus and Scope

The journal aims to publish high-quality, original research articles that contribute to the fields of Cyber Security and Cryptology. It serves as a platform for researchers, practitioners, and educators to disseminate innovative ideas, methodologies, and findings that advance the understanding and application of security technologies and cryptographic techniques. The following areas are of particular interest, but are not limited to:

  • Cybersecurity Fundamentals: Research on foundational concepts, principles, and practices in cybersecurity, including threat modeling and risk assessment.
  • Cryptography: Studies on encryption methods, cryptographic protocols, and their applications in securing communications and data.
  • Network Security: Investigations into securing networks against unauthorized access, attacks, and vulnerabilities, including intrusion detection and prevention systems.
  • Digital Forensics: Research focused on methodologies for investigating cyber incidents, evidence collection, and analysis techniques.
  • Information Assurance: Studies on ensuring the integrity, availability, and confidentiality of information systems and data.
  • Emerging Threats and Vulnerabilities: Exploration of new and evolving cyber threats, including malware, ransomware, and social engineering attacks.
  • Security in Cloud Computing: Research on securing cloud environments, including data protection, access control, and compliance issues.
  • IoT Security: Investigations into securing Internet of Things devices and networks, addressing unique challenges posed by their deployment.
  • Blockchain and Distributed Ledger Technologies: Studies on the application of blockchain for enhancing security and privacy in various domains.
  • Policy and Governance: Research on cybersecurity policies, legal frameworks, and governance structures that influence security practices.
  • Data Science and Artificial Intelligence: Exploration and modeling of data from the field of cyber security and cryptography, Threat Detection and Analysis by AI/ML model
  • Informatics : Information System, Secure Software Developtment study