Fri. Jun 28th, 2024

Volume 13 Issue 2 February 2024

Title: Cyberbullying Detection: A Comparative Study of Classification Algorithms

Authors: Parthav Nuthalapati; Srinivas Aditya Abbaraju; G. Hemanth Varma; Sitanath Biswas

Country: India

DOI: 10.47760/ijcsmc.2024.v13i02.001

View/Download-PDF


Title: LSB8 using DSF to Hide Secret Message

Authors: Prof. Ziad Al Qadi; Hussein Najeeb Hatamleh

Country: Jordan

DOI: 10.47760/ijcsmc.2024.v13i02.002

View/Download-PDF


Title: Proposed LSB4 of Data Steganography

Authors: E. Mazen Abdel Aziz Hamdan; E. Bassam Moh’d Saleem Subaih; Prof. Ziad AlQadi

Country: Jordan

DOI: 10.47760/ijcsmc.2024.v13i02.003

View/Download-PDF


Title: Message Binary Matrix Reshaping and Rotating Left to Encrypt-Decrypt Secret Message

Authors: E. Bassam Moh’d Saleem Subaih; E. Mazen Abdel Aziz Hamdan; Prof. Ziad AlQadi

Country: Jordan

DOI: 10.47760/ijcsmc.2024.v13i02.004

View/Download-PDF


Title: Test to Code Traceability

Authors: Emin Dukic; Nejdet Dogru

Country: Bosnia and Herzegovina

DOI: 10.47760/ijcsmc.2024.v13i02.005

View/Download-PDF


Title: Building Organizational Defense: A Comprehensive Approach to Implementing IT Controls for Sox Compliance

Authors: Omar Shareef

Country: USA

DOI: 10.47760/ijcsmc.2024.v13i02.006

View/Download-PDF


Title: A Building Model for Enhancing Information Systems Security

Authors: Nawal Hamood A.H. Hadi; Abdualmajed A.G. Al-Khulaidi; Saleh Noman Al-Assali

Country: Yemen

DOI: 10.47760/ijcsmc.2024.v13i02.007

View/Download-PDF


Title: A Framework for Mobile Forensic Readiness in Yemen

Authors: Hamedah Ali Al-Shabani; Nagi Ali Al-Shibany

Country: Yemen

DOI: 10.47760/ijcsmc.2024.v13i02.008

View/Download-PDF