Journal of Cyber Security and Risk Auditing

Journal Information

Details
TitleJournal of Cyber Security and Risk Auditing
ISSN3079-5354 (Online)
PublisherSmart Technologies Academic Press (STAP)
FrequencyQuarterly
Submission StatusOpen
Editor in ChiefProf. Youakim Badr

The Pennsylvania State University, United States, USA

Review Speed4 weeks
Call for Papers - ${common.JournalTitle}

Call for Papers - Volume 2025 Issue 2

Welcome to the manuscript submission for the Journal of Cyber Security and Risk Auditing.

We invite researchers, practitioners, and academics to submit their original work for consideration in Volume 2025, Issue 2 .

Submit your manuscript via email to:

editor.jcsra@thestap.com

Editor in Chief:Prof. Youakim Badr

Publisher: Smart Technologies Academic Press (STAP)

Topics Covered

The JCSRA covers a wide range of topics, including but not limited to:

  • Cyber threat intelligence and incident response
  • Risk assessment frameworks and methodologies
  • Governance, risk, and compliance (GRC)
  • Auditing and assurance in cybersecurity
  • Privacy and data protection strategies
  • Emerging threats in AI, IoT, and cloud computing
  • Blockchain and distributed ledger security
  • Legal, ethical, and societal implications of cybersecurity
JCSRA Logo

Recent Articles Volume 2025 Issue 2

Unveiling the Causes of Fatal Road Accidents in Iraq: An Association Rule Mining Approach Using the Apriori Algorithm

By Malath Riyadh Alboalebrah, Salam Al-augby

Faculty of Computer Science and Mathematics, University of Kufa, Najaf, Iraq

clockPublished: 2025/04/02
Analyzing Cybersecurity Risks and Threats in IT Infrastructure based on NIST Framework

By Osama Aljumaiah, Weiwei Jiang, Santosh Reddy Addula, Mohammed Amin Almaiah

Department of Computer Networks and Communications, King Faisal University, Al-Ahsa 31982, Saudi Arabia

Beijing University of Posts and Telecommunications, Beijing, China

Department of Information Technology, University of the Cumberlands, Williamsburg, Kentucky, USA

King Abdullah the II IT School, The University of Jordan, Amman 11942, Jordan

clockPublished: 2025/04/04
Classification of threats and countermeasures of cloud computing

By Rasha Almanasir, Deyaa Al-solomon, Saif Indrawes, Mohammed Almaiah, Umar Islam, Marwan Alshar'e

King Abdullah the II IT School, The University of Jordan, Amman 11942, Jordan

Department of Computer Science, IQRA National University, Swat Campus, Swat 19220, Pakistan

Faculty of Computing and IT, Sohar University, Sohar, Oman

clockPublished: 2025/04/08
Secure IoT-Based Real-Time Water Level Monitoring System Using ESP32 for Critical Infrastructure

By Mahmood A. Al-Shareeda, Ahmed Mohammed Ali, Mustafa Adel Hammoud, Zaid Haider Muhammad Kazem, Muslim Aqeel Hussein

Basra Technical Institute Southern Technical University Basra, Iraq

Communication Engineering, Iraq University College Basra, Iraq

clockPublished: 2025/04/10