Journal of Information Security and Cybercrimes Research
Published by Naif University Publishing House (Journal Finder)
ISSN : 1658-7782 eISSN : 1658-7790
Abbreviation : J. Inf. Secur. Cybercrime Res.
Aims & Scope
Journal of Information Security and Cybercrimes Research publishes research in: computer and network security, cybercrime laws, digital forensics, data science security, multimedia & mobile security. View Aims & ScopeAbstracting & Indexing
Journal is indexed in leading academic databases, ensuring global visibility and accessibility of our peer-reviewed research.
Subjects & Keywords
Journal’s research areas, covering key disciplines and specialized sub-topics in Computer Science and Social Sciences, designed to support cutting-edge academic discovery.
Licensing & Copyright
This journal operates under an Open Access model. Articles are freely accessible to the public immediately upon publication. The content is licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0), allowing users to share and adapt the work with proper attribution.
Copyright remains with the author(s), and no permission is required for non-commercial use, provided the original source is cited.
Policy Links
This section provides access to essential policy documents, guidelines, and resources related to the journal’s publication and submission processes.
APC Details
The journal’s Article Processing Charge (APC) policies support open access publishing in Computer Science and Social Sciences, ensuring accessibility and quality in research dissemination.
This journal does not charge a mandatory Article Processing Charge (APC). However, optional open access publication may incur fees based on the publisher’s policies. Learn more.
Explore journals without APCs for alternative publishing options.
Most Cited Articles
The Most Cited Articles section features the journal's most impactful research, based on citation counts. These articles have been referenced frequently by other researchers, indicating their significant contribution to their respective fields.
-
A Systematic Review of Machine Learning Algorithms in Cyberbullying Detection: Future Directions and Challenges
Citation: 36
Authors: Muhammad
-
Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography
Citation: 32
Authors: Nouf A., Adnan A., Esam A.
-
Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination
Citation: 26
Authors: Muneera, Daniah, Budoor, Manal, Adnan
-
A New Secured E-Government Efficiency Model for Sustainable Services Provision
Citation: 24
Authors: Youseef
-
Analysis of Mobile Malware: A Systematic Review of Evolution and Infection Strategies
Citation: 22
Authors: Moses, Sarah
-
Automatic Intrusion Detection System Using Deep Recurrent Neural Network Paradigm
Citation: 18
Authors: Ahmed
-
Integrating Light-Weight Cryptography with Diacritics Arabic Text Steganography Improved for Practical Security Applications
Citation: 11
Authors: Malak G., Adnan A.
-
Comparative Study of Database Security In Cloud Computing Using AES and DES Encryption Algorithms
Citation: 9
Authors: Nora Abdullah, Sultan
-
Overview of the Impact of Human Error on Cybersecurity based on ISO/IEC 27001 Information Security Management
Citation: 8
Authors: Amar Yasser