About IOJCC

Iris Online Journal of Cyber security & Computing technology (IOJCC) journal is dedicated to advancing the field of cybersecurity through the application of computational techniques. It disseminates a diverse array of research that delves into both theoretical and practical dimensions of cybersecurity, emphasizing the role of computational methods in strengthening security measures. The journal covers a variety of topics, including cryptography, network defense strategies, secure software development, machine learning-based threat detection, privacy-preserving algorithms, and the implementation of emerging technologies such as blockchain and quantum computing in cybersecurity. With the objective of bridging the gap between research and real-world applications, the journal provides innovative solutions to address the challenges posed by evolving cyber threats. IOJCC underscores the significance of computational applications across diverse sectors such as finance, healthcare, and government, where cybersecurity remains paramount. The journal showcases case studies demonstrating the successful implementation of advanced computational techniques to safeguard digital infrastructures. By promoting collaboration among academia, industry, and policymakers, IOJCC aims to offer actionable insights and resources to enhance cybersecurity systems, thus ensuring the privacy and integrity of digital environments amid escalating cyber risks. IOJCC is a monthly published journal which provides a forum to submit their all types of articles like Editorial, Letter to Editor, Research, Review, Case Report, Short Communication, Perspectives, Mini Review, Opinion, e-Books, Video articles etc.,

Classification

  • Algorithms & Data Structures
  • Automotive and smart device security
  • Big-O notation
  • Blockchain security
  • Cloud computing
  • Confidentiality, Integrity, Availability (CIA Triad)
  • CPU design & instruction sets
  • Cryptography
  • Database design & normalization
  • Digital signatures & certificates
  • Dynamic programming
  • Evidence collection & preservation
  • File systems
  • Front-end & Back-end
  • Functional programming
  • Graph algorithms
  • Input/output systems
  • Intrusion Detection & Prevention Systems
  • JavaScript
  • Memory hierarchy
  • Memory management
  • Microprocessors & embedded systems
  • Mobile app development
  • Network protocols
  • Network security
  • Network security
  • Object-oriented programming (OOP)
  • Parallel computing & multicore systems
  • Programming
  • Public Key Infrastructure
  • Python
  • Reinforcement learning
  • Robotics & automation
  • Secure coding practices
  • Secure network architecture
  • Secure software development lifecycle
  • Security models and frameworks
  • Security policies & standards
  • Social engineering
  • Software Development
  • Software engineering
  • Sorting and searching algorithms
  • SQL & NoSQL databases
  • Symmetric and asymmetric encryption
  • Threads & concurrency
  • Threat intelligence
  • Threats, vulnerabilities, and risks
  • Types of cyber attacks
  • User interface (UI) design
  • Virtualization and container security
  • Viruses, worms, ransomware, trojans
  • Vulnerability assessment
  • Web development
  • Wireless and mobile networks
  • Zero Trust networks
Scroll to Top