Help ?

IGMIN: We're glad you're here. Please click 'create a new query' if you are a new visitor to our website and need further information from us.

If you are already a member of our network and need to keep track of any developments regarding a question you have already submitted, click 'take me to my Query.'

Subjects/Topics

Welcome to IgMin Research – an Open Access journal uniting Biology Group, Medicine Group, and Engineering Group. We’re dedicated to advancing global knowledge and fostering collaboration across scientific fields.

Members

We focus on accelerating knowledge through shared interdisciplinary collaboration.

Articles

We focus on accelerating knowledge through shared interdisciplinary collaboration.

Explore Content

We focus on accelerating knowledge through shared interdisciplinary collaboration.

Identify Us

We focus on accelerating knowledge through shared interdisciplinary collaboration.

IgMin Corporation

Welcome to IgMin, a leading platform dedicated to enhancing knowledge dissemination and professional growth across multiple fields of science, technology, and the humanities. We believe in the power of open access, collaboration, and innovation. Our goal is to provide individuals and organizations with the tools they need to succeed in the global knowledge economy.

Publications Support
[email protected]
E-Books Support
[email protected]
Webinars & Conferences Support
[email protected]
Content Writing Support
[email protected]
IT Support
[email protected]

Search

Explore Section

Content for the explore section slider goes here.

Engineering

Cybersecurity at IgMin Research | Engineering Group

We focus on accelerating knowledge through shared interdisciplinary collaboration.

About

Cybersecurity has emerged as a critical discipline within engineering and general sciences, fundamentally shaping how we design, implement, and manage technology in an interconnected world. The proliferation of digital devices and the Internet of Things (IoT) has expanded the attack surface for malicious actors, making the protection of data and systems more complex and imperative than ever. Advances in artificial intelligence and machine learning offer both new tools for defense and new vectors for attack, necessitating a robust, interdisciplinary approach to cybersecurity research and application.

In the biomedical field, cybersecurity is vital for safeguarding sensitive patient data and ensuring the integrity of medical devices and healthcare systems. As telemedicine and electronic health records become standard, protecting against cyber threats is essential to maintain patient trust and safety. "IgMin Research - A Biomed & Engineering Open Access Journal" seeks to foster innovation and collaboration in this arena, encouraging the exploration of novel security frameworks, encryption methods, and protocols that can withstand evolving cyber challenges while supporting technological advancement in medicine and engineering.

Network Security Cryptography Cyber-Physical Systems Security IoT Security Cloud Security Artificial Intelligence in Cybersecurity Cybersecurity in Healthcare Medical Device Security Electronic Health Records Security Biometric Security Systems Blockchain Applications in Cybersecurity Cybersecurity Policy and Governance Cybersecurity Risk Management Secure Software Development Malware Detection and Prevention Intrusion Detection Systems Data Privacy and Protection Cybersecurity in Biomedical Engineering Ethical Hacking and Penetration Testing Cyber Threat Intelligence Cybersecurity Education and Training Cybersecurity in Critical Infrastructure Mobile Security Cybersecurity for Smart Grids Secure Wireless Communication Quantum Cryptography Cybersecurity in Autonomous Systems Secure Machine Learning Human Factors in Cybersecurity Cyber Forensics Cybersecurity in Telemedicine Security of Wearable Devices Cybersecurity Regulations and Compliance Application Security Cybersecurity in Supply Chain Cybersecurity for Industrial Control Systems Secure Cloud Computing in Healthcare Privacy-Preserving Data Mining Distributed Denial of Service (DDoS) Protection Secure Network Protocols Security in 5G Networks Cybersecurity Economics Cybersecurity in Social Networks Security in Virtual and Augmented Reality Systems Cybersecurity in E-commerce Cybersecurity Incident Response Cybersecurity Analytics Secure Coding Practices Cybersecurity in Embedded Systems Cybersecurity Awareness and Culture.

Engineering Group (4)

Research Article Article ID: igmin169
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

Cyber Threat Analysis (CTA) in Current Conflicts
by Zbigniew Ciekanowski and Sławomir Żurawski
Cybersecurity
Research Article Article ID: igmin165
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

Application of Virtual Reality (VR) in Facility Management Competency-based Training (CBT) in the Era of Industrie 5.0
by Ng Wei Xuan, Cheng Zhuo Yuan and Luke Peh Lu Chang
Educational Technology Cybersecurity
Review Article Article ID: igmin145
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

The Conceptual View of the Department of Combat use of Communication Units on the Creation of a Training Game Complex for Training Military Specialists on the Basis of Leadership
by Igor Kozubtsov and Oleksandr Nesterov
Educational Technology Information TechnologyCybersecurity
Review Article Article ID: igmin149
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

Strengthening IoT Network Protocols: A Model Resilient Against Cyber Attacks
by Guy Leshem and Menachem Domb
Cybersecurity Information TechnologyData Engineering
Cybersecurity
PUBLISH YOUR RESEARCH

We publish a wide range of article types in biology, medicine and engineering with no editorial biases.

Submit

See Manuscript Guidelines and APC

Explore the IgMin Subjects
Google Scholar
welcome Image

Google Scholar, beta-launched in November 2004, acts as an academic navigator through vast scholarly seas. It covers peer-reviewed journals, books, conference papers, theses, dissertations, preprints, abstracts, technical reports, court opinions, and patents. Search IgMin Articles