Articles pp. 1-7 Published: 2026-05-01 A Comparative Analysis of Image Encryption Techniques Based on Linear Feedback Shift Registers and Chaotic Systems Dr. Julian R. Cortez (Author) π 0 β¬οΈ 0 PDF View Article
Articles pp. 8-17 Published: 2026-05-02 A Longitudinal Analysis of Cybersecurity Technology and Innovation: A Technology Mining Approach Using Bibliometric and Patent Analysis Dr. Marcus A. Rodriguez (Author) π 0 β¬οΈ 0 PDF View Article
Articles pp. 18-26 Published: 2026-05-06 Applying Graph Theory to Detect Collusive Fraud Rings in Distributed Reward Systems Igor Litovsky (Author) https://doi.org/10.55640/ijctisn-v03i05-01 π 0 β¬οΈ 0 PDF View Article