ISSN: A/F

The Janoli International Journal of Cyber Security (JIJCS) is dedicated to publishing cutting-edge research in the field of cybersecurity, covering theoretical foundations, applied techniques, and emerging threats in the digital world. Below are the key topics covered in the journal:


1. Cyber Threats and Attack Mitigation

  • Malware analysis and detection techniques
  • Ransomware, spyware, and zero-day attack prevention
  • Advanced persistent threats (APTs) and nation-state attacks
  • Botnets, phishing, and social engineering threats
  • Threat intelligence and cyber defense strategies

2. Cryptography and Secure Communications

  • Encryption algorithms and secure key management
  • Post-quantum cryptography and blockchain security
  • Secure multi-party computation and homomorphic encryption
  • Digital signatures and authentication protocols
  • Privacy-preserving cryptographic techniques

3. Network Security and Intrusion Detection

  • Intrusion detection and prevention systems (IDPS)
  • Firewalls, VPNs, and secure network architectures
  • Distributed Denial-of-Service (DDoS) attack detection and mitigation
  • Wireless network security (Wi-Fi, 5G, IoT security)
  • Network traffic analysis and anomaly detection

4. Cloud Security and Virtualization

  • Secure cloud computing architectures
  • Data privacy and security in cloud environments
  • Virtual machine security and hypervisor vulnerabilities
  • Cloud access security brokers (CASB)
  • Serverless computing and container security

5. Artificial Intelligence and Cybersecurity

  • AI-driven threat detection and response systems
  • Machine learning models for cybersecurity analytics
  • Automated malware classification and threat prediction
  • Deep learning techniques for anomaly detection
  • Adversarial AI and AI-driven cyberattacks

6. Internet of Things (IoT) Security

  • IoT device authentication and access control
  • Embedded system security and firmware attacks
  • Edge computing security challenges
  • Secure IoT communication protocols
  • Privacy concerns in smart cities and connected devices

7. Cyber Forensics and Incident Response

  • Digital evidence collection and forensic investigation
  • Cybercrime analysis and legal frameworks
  • Memory and disk forensics techniques
  • Reverse engineering of malware
  • Incident response and cyber crisis management

8. Web Security and Application Security

  • Web application vulnerabilities (OWASP Top 10)
  • Secure coding practices and DevSecOps
  • Cross-site scripting (XSS) and SQL injection attacks
  • API security and microservices security
  • Web authentication and session management

9. Cyber Risk Management and Compliance

  • Security governance and risk assessment frameworks
  • Compliance with cybersecurity regulations (GDPR, CCPA, HIPAA)
  • Cyber insurance and financial risk in cybersecurity
  • Supply chain security and third-party risk management
  • Enterprise security policies and best practices

10. Blockchain and Decentralized Security

  • Blockchain-based security protocols
  • Smart contract vulnerabilities and exploits
  • Secure digital identities and decentralized authentication
  • Blockchain in securing IoT and cloud infrastructures
  • Cryptocurrency security and fraud detection

11. Cybersecurity in Critical Infrastructures

  • Industrial control systems (ICS) and SCADA security
  • Cybersecurity in power grids and transportation systems
  • Healthcare and medical device security
  • Cyber threats in defense and military sectors
  • Securing financial institutions and banking systems

12. Ethical Hacking and Penetration Testing

  • Red teaming and ethical hacking methodologies
  • Exploit development and vulnerability research
  • Social engineering attack simulations
  • Wireless and mobile penetration testing
  • Bug bounty programs and responsible disclosure

13. Human Factors and Cybersecurity Awareness

  • Cybersecurity training and awareness programs
  • Behavioral analysis in cybersecurity
  • Psychological aspects of social engineering attacks
  • Usability and security in authentication systems
  • Cyber hygiene and personal security best practices