![]() |
| |||||||||||||||
IJNSA 2021 : International Journal of Network Security & Its Applications- ERA Listed | |||||||||||||||
Link: http://airccse.org/journal/ijnsa.html | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
International Journal of Network Security & Its Applications (IJNSA) -- ERA Listed Citations, h-index, i10-index of IJNSA Call for PapersThe International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas. Topics of Interest
Paper SubmissionAuthors are invited to submit papers for this journal through E-mail: ijnsa@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. Important Dates
NoteAIRCC's International Journal of Network Security & Its Applications (IJNSA) is dedicated to strengthen the field of Security & Its Applications and publishes only good quality papers. IJNSA is highly selective and maintains less than 20% acceptance rate. All accepted papers will be tested for plagiarism manually as well as by Docoloc . Papers published in IJNSA has received enormous citations and has been regarded as one of the best Journal in the Security research field. Current IssueMarch 2021, Volume 13, Number 2 Comparison of Malware Classification Methods using Convolutional Neural Network based on API Call Stream Full Text Performance Evaluation of Machine Learning Techniques for DOS Detection in Wireless Sensor Network Full Text Applying the Health Belief Model to Cardiac Implanted Medical Device Patients Full Text A Literature Survey and Analysis on Social Engineering Defense Mechanisms and Infosec Policies Full Text Phishing Mitigation Techniques: A Literature Survey Full Text January 2021, Volume 13, Number 1 Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms Full Text Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset Full Text Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis Full Text Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys Full Text Game Theory Application Resources Management and Distribution in Blockchain Network Full Text November 2020, Volume 12, Number 6
Hybrid Chaotic Method for Medical Images Ciphering Full Text The Brazilian Law on Personal Data Protection Full Text September 2020, Volume 12, Number 5 Secured AODV to Protect WSN Against Malicious Intrusion Full Text
July 2020, Volume 12, Number 4 Enhanced Authentication for Web-Based Security using Keystroke Dynamics Full Text A Proposed Model for Dimensionality Reduction to Improve the Classification Capability of Intrusion Protection Systems Full Text Effective Method for Managing Automation and Monitoring in Multi-cloud Computing: Panacea for Multi-cloud Security Snags Full Text May 2020, Volume 12, Number 3 Ontology-based Model for Security Assessment: Predicting Cyberattacks through Threat Activity Analysis Full Text Advanced Multimedia Platform based on Big Data and Artificial Intelligence Improving Cybersecurity Full Text An Empirical Analysis of Email Forensics Tools Full Text PDMLP: Phishing Detection using Multilayer Perceptron Full Text March 2020, Volume 12, Number 2 Security Consideration in Peer-to-peer Networks with A Case Study Application Full Text Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dynamic Billing System in Smart Grid Using Permissioned Blockchain Full Text A Survey on Malware Detection and Analysis Tools Full Text An Enhanced User Authentication Framework in Cloud Computing Full Text January 2020, Volume 12, Number 1 A Survey on the Use of Data Clustering for Intrusion Detection System in Cybersecurity Full Text Self-organization and Autonomous Network Survey Full Text Editor in Chief
Associate Editor
Editorial Board Members
... More |
|