SIRg Journals

Journal of CYBER SECURITY and Information Management (JCIM)

We would like to invite all Friends, Researchers, colleagues, and Students to submit their papers to be published in volume (5).

Deadline: 31 Aug. 2020.


Journal of CYBER SECURITY and Information Management (JCIM)

Journal of Cybersecurity and Information Management (JCIM) has been released its volume (4), July 2020. Thanks to all authors, editors for their contributions.

Journal of CYBER SECURITY and Information Management (JCIM)

We would like to invite all Friends, Researchers, colleagues, and Students to submit their papers to be published in volume (4).

Deadline: 15 June 2020.

Journal of CYBER SECURITY and Information Management (JCIM)

Journal of Cybersecurity and Information Management (JCIM) has been released its volume (3), May 2020. Thanks to all authors, editors for their contributions.

Journal of CYBER SECURITY and Information Management (JCIM)

We would like to invite all Friends, Researchers, colleagues, and Students to submit their papers to be published in volume (3).

Deadline: 30 April 2020.

Journal of CYBER SECURITY and Information Management (JCIM)

Journal of Cybersecurity and Information Management (JCIM) has been released its volume (2), April 2020. Thanks to all authors, editors for their contributions.

Journal of CYBER SECURITY and Information Management (JCIM)

We would like to invite all Friends, Researchers, colleagues, and Students to submit their papers to be published in volume (2).

Deadline: 20 April 2020.

Journal of CYBER SECURITY and Information Management (JCIM)

Journal of Cybersecurity and Information Management (JCIM) has released its volume (1), January 2020. Thanks to all authors, editors for their contributions.

Journal of CYBER SECURITY and Information Management (JCIM)

We would like to invite all Friends, Researchers, colleagues, and Students to prepare 4-6 pages in English in connection with the computer field to publish it for free in the this journal

Journal of Cybersecurity and Information Management (JCIM)

Full Version of Volume 1, Jan 2020.

http://americaspg.com/articleinfo/2/show/21

1- Implicit Authentication Approach by Generating Strong Password through Visual Key Cryptography, Ajay B. Gadicha, Vijay B. Gadicha, Vol. 1, Issue 1, PP: 5-16, 2020.

http://americaspg.com/articleinfo/2/show/15

2- Red Palm Weevil Detection Methods: A Survey, Hanan Ahmed, Vol. 1, Issue 1, PP: 17-20, 2020.

http://americaspg.com/articleinfo/2/show/16

3- Data Mining Algorithms for Kidney Disease Stages Prediction, Abdelrahim Koura, Hany S. Elnashar, Vol. 1, Issue 1, PP: 21-29, 2020.

http://americaspg.com/articleinfo/2/show/17

4- The Relation Of Artificial Intelligence With Internet Of Things: A survey, Esraa Mohamed, Vol. 1, Issue 1, PP: 30-24, 2020.

http://americaspg.com/articleinfo/2/show/18

5- Authenticating IoT Devices issues based on Blockchain, Hosny Abo Emira, Vol. 1, Issue 2, PP: 35-40, 2020.

http://americaspg.com/articleinfo/2/show/19

6- A Novel Fuzzy Bat Based Ambulance Detection and Traffic Counting Approach, Hossam M. Moftah, Taha M. Mohamed, Vol. 1, Issue 2, PP: 41-54, 2020.

http://americaspg.com/articleinfo/2/show/20

Full Version of Volume 2, April 2020.

http://americaspg.com/articleslist/2/48/47

1- Implementation of Crowd Sale using ERC-20 Tokens, Ashish Sharma, Yogesh Sharma, Radhika Bansal, Sushant Verma, Vol. 2, Issue 1, PP: 5-12, 2020.

http://americaspg.com/articleinfo/2/show/287

2- Energy Efficiency Techniques in Heterogeneous Networks, Ashish Sharma, Sandeep Tayal, Radhika Bansal, Sushant Verma, Volume 2, Issue 1, PP: 13-19, 2020.

http://americaspg.com/articleinfo/2/show/290

3- Empirical Study of Function Point Analysis during Software Development Phase, Ashish Sharma, Yogesh Sharma, Radhika Bansal, Sushant Verma, Volume 2, Issue 1, PP: 20-24, 2020.

http://americaspg.com/articleinfo/2/show/292

4- A Validation Model for ERP systems, Nada M. Alhakkak, Volume 2, Issue 1, PP: 25-34, 2020.

http://americaspg.com/articleinfo/2/show/293

5- Energy efficient Laser based embedded system for blind turn traffic control, Deepak Prashar, Gouri Shankar Chakraborty, Sudan Jha, Vol. 2, Issue 2, PP: 35-43, 2020.

http://americaspg.com/articleinfo/2/show/294

6- A novel approach for Spam Email Filtering Using Machine Learning, Subhalaxmi Sahoo, Sudan Jha, Deepak Prashar, Vol. 2, Issue 2, PP: 44-57, 2020.

http://americaspg.com/articleinfo/2/show/296

Full Version of Volume 3, April 2020.

http://americaspg.com/articleslist/2/63/62

1- Pre-Cursor microRNAs from Different Species classification based on features extracted from the image, Rabeb Touati, Imen Ferchichi, Imen Messaoudi, Afef Elloumi Oueslati, Zied Lachiri, Vol. 3, Issue 1, PP: 5-13, 2020.

http://americaspg.com/articleinfo/2/show/361

2- Incremental Research on Cyber Security metrics in Android applications by implementing the ML algorithms in Malware Classification and Detection, Sreejith Vignesh B P, Vol. 3, Issue 1, PP: 14-20, 2020.

http://americaspg.com/articleinfo/2/show/362

3- Security Challenges for IoT Based Applications & Solutions Using Fog Computing: A Survey, Sayali Karmode, Vol. 3, Issue 1, PP: 21-28, 2020.

http://americaspg.com/articleinfo/2/show/363

Full Version of Volume 4, July 2020.

1- K-means Clustering Analysis of Crimes on Indian Women, Rishabh Singh, Rishabh Reddy, Vidhi Kapoor, Prathamesh Churi, Vol. 4, Issue 1, PP: 05-25 , 2020.

http://americaspg.com/articleinfo/2/show/533

2- Security and Privacy Challenges in Cloud Computing: A Review, Miss. Sayali Karmode Yelpale, Vol. 4, Issue 1, PP: 36-45, 2020.

http://americaspg.com/articleinfo/2/show/535

3- A Web Based Document Encryption Application Software for Information Security in Tertiary Institutions, Ibeneme-Sabinus Ifeoma Livina, Ekedebe Nnanna, Nwokonkwo Obi, Ibeneme Sabinus Ikechukwu, Ajah Benjamin Ogonnaya, Amadi Emmanuel Chukwudi, Vol. 4, Issue 1, PP: 26-35, 2020.

http://americaspg.com/articleinfo/2/show/536