posted by user: Busra || 9795 views || tracked by 6 users: [display]

IJNSA 2021 : International Journal of Network Security & Its Applications- ERA Listed

FacebookTwitterLinkedInGoogle

Link: http://airccse.org/journal/ijnsa.html
 
When N/A
Where N/A
Submission Deadline Oct 23, 2021
Notification Due Nov 23, 2021
Final Version Due Dec 1, 2021
Categories    security   computer science   network security   information security
 

Call For Papers

International Journal of Network Security & Its Applications (IJNSA) -- ERA Listed

Citations, h-index, i10-index of IJNSA

Citations 7733   h-index 42   i10-index 167

Call for Papers

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojon Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through E-mail: ijnsa@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

Submission Deadline:October 23, 2021
Authors Notification: November 23, 2021
Final Manuscript Due: December 01, 2021
Publication Date:Determined by the Editor-in-Chief

Note

AIRCC's International Journal of Network Security & Its Applications (IJNSA) is dedicated to strengthen the field of Security & Its Applications and publishes only good quality papers. IJNSA is highly selective and maintains less than 20% acceptance rate. All accepted papers will be tested for plagiarism manually as well as by Docoloc . Papers published in IJNSA has received enormous citations and has been regarded as one of the best Journal in the Security research field.

Current Issue


September 2021, Volume 13, Number 5

Evaluation of a Blockchain-Enabled Resource Management Mechanism for NGNs   Full Text
Michael Xevgenis, Dimitrios G. Kogias, Ioannis Christidis, Charalampos Patrikakis and Helen C. Leligou, University of West Attica, Greece

Secure Blockchain Decentralized Voting for Verified Users   Full Text
Piotr Pospiech, Aleksander Marianski and Michal Kedziora, Wroclaw University of Science and Technology, Poland

July 2021, Volume 13, Number 4

Use of MARKOV Chain for Early Detecting DDoS Attacks   Full Text
Chin-Ling Chen1 and Jian-Ming Chen2, 1National Pingtung University, Taiwan, 2Genesis Technology, Inc., Taiwan

Constructing the 2-Element AGDS Protocol based on the Discrete Logarithm Problem   Full Text
Tuan Nguyen Kim1, Duy Ho Ngoc2 and Nikolay A. Moldovyan3, 1Duy Tan University, Vietnam, 2Ha Noi, Vietnam,3St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia

Proof-of-Reputation: An Alternative Consensus Mechanism for Blockchain Systems   Full Text
Oladotun Aluko1 and Anton Kolonin2, 1Novosibirsk State University, Russia, 2Aigents Group, Russia

Critical Infrastructure Cybersecurity Challenges: IoT in Perspective   Full Text
Akwetey Henry Matey1, Paul Danquah2, Godfred Yaw Koi-Akrofi1 and Isaac Asampana1, 1University of Professional Studies Accra, 2Heritage Christian University

Collective Signature Protocols for Signing Groups based on Problem of Finding Roots Modulo Large Prime Number   Full Text
Tuan Nguyen Kim1, Duy Ho Ngoc2 and Nikolay A. Moldovyan3, 1Duy Tan University, Vietnam, 2Ha Noi, Vietnam, 3St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia

May 2021, Volume 13, Number 3

Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks   Full Text
David A. Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA

Effect Man-In the Middle on the Network Performance in Various Attack Strategies   Full Text
Iyas Alodat, Jerash University, Jordan

Information-Centric Blockchain Technology for the Smart Grid   Full Text
Lanqin Sang and Henry Hexmoor, Southern Illinois University, USA

A Survey on Federated Identity Management Systems Limitation and Solutions   Full Text
Maha Aldosary and Norah Alqahtani, Imam Mohammad Ibn Saud Islamic University, KSA

March 2021, Volume 13, Number 2

Comparison of Malware Classification Methods using Convolutional Neural Network based on API Call Stream   Full Text
Matthew Schofield, Gulsum Alicioglu, Bo Sun, Russell Binaco, Paul Turner, Cameron Thatcher, Alex Lam and Anthony Breitzman, Rowan University, USA

Performance Evaluation of Machine Learning Techniques for DOS Detection in Wireless Sensor Network   Full Text
Lama Alsulaiman and Saad Al-Ahmadi, King Saud University, Saudi Arabia

Applying the Health Belief Model to Cardiac Implanted Medical Device Patients   Full Text
George W. Jackson1 and Shawon Rahman2, 1Capella University, USA, 2University of HawaiiHilo, USA

A Literature Survey and Analysis on Social Engineering Defense Mechanisms and Infosec Policies   Full Text
Dalal Alharthi and Amelia Regan, University of California Irvine, USA

Phishing Mitigation Techniques: A Literature Survey   Full Text
Wosah Peace Nmachi and Thomas Win, School of Computing & Engineering University of Gloucestershire, United Kingdom

January 2021, Volume 13, Number 1

Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms   Full Text
SWilliam R. Simpson and Kevin E. Foltz, The Institute for Defense Analyses (IDA), USA

Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset   Full Text
Geeta Kocher1 and Gulshan Kumar2, 1MRSPTU, India, 2SBSSTC, India

Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis   Full Text
Anna Georgiadou, Spiros Mouzakitis and Dimitrios Askounis, National Technical University of Athens, Greece

Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys   Full Text
Cheman Shaik, VISH Consulting Services Inc, USA

Game Theory Application Resources Management and Distribution in Blockchain Network   Full Text
Cong Hung Tran1, Dien Tam Le1, 2, Thanh Hieu Huynh3, 1Posts and Telecommunications Institute of Technology, Vietnam, 2Thu Duc Technology College, Vietnam, 3Saigon University, Vietnam

November 2020, Volume 12, Number 6

Hybrid Chaotic Method for Medical Images Ciphering   Full Text
Seham Muawadh Ali Ebrahim, Modern Academy for Engineering and Information Technology, Egypt

The Brazilian Law on Personal Data Protection   Full Text
Jonatas S. de Souza1, 2, Jair M. Abe1, Luiz A. de Lima1, 2 and Nilson A. de Souza2, 3, 1Paulista University, São Paulo, Brazil,2National Association of Data Privacy Professionals, ANPPD, Brazil, 3São Paulo State Supplementary Pension Foundation, PREVCOM, Brazil

September 2020, Volume 12, Number 5

Secured AODV to Protect WSN Against Malicious Intrusion   Full Text
Saad Al-Ahmadi and Abdulrahman Alseqyani, King Saud University, Saudi Arabia

July 2020, Volume 12, Number 4

Enhanced Authentication for Web-Based Security using Keystroke Dynamics   Full Text
Siti Rahayu Selamat1, Teh Teck Guan2 and Robiah Yusof1, 1Universiti Teknikal Malaysia Melaka, Malaysia, 2Infineon Technologies Melaka, Malaysia

A Proposed Model for Dimensionality Reduction to Improve the Classification Capability of Intrusion Protection Systems   Full Text
Hajar Elkassabi, Mohammed Ashour and Fayez Zaki, Mansoura University, Egypt

Effective Method for Managing Automation and Monitoring in Multi-cloud Computing: Panacea for Multi-cloud Security Snags   Full Text
Uchechukwu Emejeamara1, Udochukwu Nwoduh2 and Andrew Madu2, 1IEEE Computer Society, Connecticut Section, USA,2Federal Polytechnic Nekede, Nigeria

May 2020, Volume 12, Number 3

Ontology-based Model for Security Assessment: Predicting Cyberattacks through Threat Activity Analysis   Full Text
Pavel Yermalovich and Mohamed Mejri, Université Laval, Canada

Advanced Multimedia Platform based on Big Data and Artificial Intelligence Improving Cybersecurity   Full Text
Alessandro Massaro1*, Gaetano Panarosa1, Nicola Savino1, Simone Buonopane2 and Angelo Galiano1, 1Dyrecta Lab, IT Research Laboratory, Italy, 2Spacertron srl, Italy

An Empirical Analysis of Email Forensics Tools   Full Text
Ahmad Ghafarian, Ash Mady and Kyung Park, University of North Georgia, USA

PDMLP: Phishing Detection using Multilayer Perceptron   Full Text
Saad Al-Ahmadi and Tariq Lasloum, King Saud University, Saudi Arabia

March 2020, Volume 12, Number 2

Security Consideration in Peer-to-peer Networks with A Case Study Application   Full Text
Nick Rahimi, Southern Illinois University, USA

Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dynamic Billing System in Smart Grid Using Permissioned Blockchain   Full Text
Ozgur Oksuz, Adiyaman University, Turkey

A Survey on Malware Detection and Analysis Tools   Full Text
Sajedul Talukder1 and Zahidur Talukder2, 1Edinboro University, USA and 2University of Texas at Arlington, USA

An Enhanced User Authentication Framework in Cloud Computing   Full Text
Hasan Al-Refai, Khaldoun Batiha, Ahmad M. Al-Refai, Philadelphia University, Jordan

January 2020, Volume 12, Number 1

A Survey on the Use of Data Clustering for Intrusion Detection System in Cybersecurity   Full Text
Binita Bohara1, Jay Bhuyan1, Fan Wu1 and Junhua Ding2, 1Tuskegee University, USA and 2University of North Texas, USA

Self-organization and Autonomous Network Survey   Full Text
Houneida SAKLY, Campus University of Mannouba, Tunisia

Editor in Chief

Associate Editor

Editorial Board Members

... More

Related Resources

S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
NSEC 2021   5th International Conference on Networks and Security
EI-CFAIS 2021   2021 International Conference on Frontiers of Artificial Intelligence and Statistics (CFAIS 2021)
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
ICISSP 2022   8th International Conference on Information Systems Security and Privacy
blockchain_ml_iot 2021   Network and Electronics (MDPI) Joint Special Issue - Blockchain and Machine Learning for IoT: Security and Privacy Challenges
ICCSEA 2021   11th International Conference on Computer Science, Engineering and Applications
IEEE Network 2021   IEEE Network Magazine Special Issue Call for Paper: Trust, Security and Privacy of 6G
CAIML 2022   3rd International Conference on Artificial Intelligence and Machine Learning
ACM--BDE--Ei Compendex, Scopus 2022   ACM--2022 4th International Conference on Big Data Engineering (BDE 2022)--Ei Compendex, Scopus