Aim & Scope
Aim
The ISCSITR - International Journal of Cyber Security (ISCSITR-IJCS) aims to provide a platform for researchers, academicians, and industry professionals to publish and share innovative research and technological advancements in the field of cybersecurity. The journal seeks to promote the understanding and development of secure systems and solutions to address evolving threats in the digital landscape. ISCSITR-IJCS strives to advance knowledge in cybersecurity through high-quality research and to support the creation of secure and resilient digital environments.
Scope
The journal welcomes original research articles, review papers, technical reports, and case studies in all areas of cybersecurity, including but not limited to:
- Network Security – Secure network design, intrusion detection and prevention, firewall technologies, and virtual private networks (VPN).
- Cryptography and Encryption – Secure communication protocols, data encryption techniques, and cryptanalysis.
- Data Protection and Privacy – Data masking, anonymization, secure data storage, and access control.
- Cyber Threat Detection and Analysis – Malware detection, vulnerability assessment, and penetration testing.
- Application and Web Security – Secure software development, web application firewalls, and mobile app security.
- Ethical Hacking and Penetration Testing – Tools, techniques, and strategies for identifying and fixing security vulnerabilities.
- Security in Cloud Computing – Cloud security frameworks, access management, and virtualization security.
- IoT and Embedded Systems Security – Secure design of IoT devices, network security for IoT, and firmware protection.
- Artificial Intelligence and Machine Learning in Cybersecurity – AI-based threat detection, automated response systems, and predictive analysis.
- Identity and Access Management (IAM) – Multi-factor authentication, single sign-on (SSO), and role-based access control.
- Cybersecurity Policies and Governance – Regulatory compliance, risk assessment, and incident response planning.
- Blockchain and Cybersecurity – Use of blockchain technology for secure transactions, identity management, and data integrity.
- Social Engineering and Human Factors – Phishing, manipulation techniques, and user behavior analysis in security breaches.
The journal encourages interdisciplinary research that combines cybersecurity with other fields such as artificial intelligence, data science, blockchain, and cloud computing. ISCSITR-IJCS seeks to promote research that enhances the security and integrity of information systems and helps organizations mitigate the risks posed by cyber threats.