posted by user: aircc_cfp || 3639 views || tracked by 2 users: [display]

IJNSA 2023 : International Journal of Network Security & Its Applications - ERA, WJCI Listed, H index - 47


When N/A
Where N/A
Submission Deadline Oct 1, 2023
Notification Due Oct 27, 2023
Final Version Due Oct 31, 2023
Categories    security   artificial intelligence   communications   networking

Call For Papers

International Journal of Network Security & Its Applications - ERA, WJCI Listed, H index - 47

World Journal Clout Index (WJCI) Impact Factor : 0.279 (2020); 0.139 (2019)

Citations, h-index, i10-index of IJNSA

Citations 10099   h-index 47   i10-index 191

Call for Papers

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest

  • Artificial intelligence, Machine Learning for Security
  • Blockchain Technology, Cryptocurrencies and Cyber Security
  • Cloud, Fog, Edge & Cognitive Security
  • Cryptographic Protocols
  • Cyber Physical System (CPS) Security (autonomous vehicles, industrial control systems)
  • Data Center Network Control, Security and Optimization
  • Database and System Security
  • E-mail security, Spam, Phishing, E-mail fraud
  • Hardware-Based Attacks
  • Internet of Things (IoT) Security
  • Internet Security & Applications (Social networking, crowd sourcing and Web based applications, services security)
  • Intrusion Detection and Prevention
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Performance Evaluations of Protocols & Security Application
  • Security & Network Management
  • Security for emerging networks (SDN, Home Networks, Body-area Networks, VANETs)
  • Security of Virtual Machines
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Security, Trust and Privacy Challenges
  • Smart City, Grid, Electronic Voting Security
  • Network and Wireless Network Security
  • Ubiquitous Computing Security
  • Virus, worms, Trojan Protection
  • Web 2.0 Security

Paper Submission

Authors are invited to submit papers for this journal through E-mail: or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

Submission Deadline:October 01, 2023
Authors Notification: October 27, 2023
Final Manuscript Due: October 31, 2023
Publication Date:Determined by the Editor-in-Chief


AIRCC's International Journal of Network Security & Its Applications (IJNSA) is dedicated to strengthen the field of Security & Its Applications and publishes only good quality papers. IJNSA is highly selective and maintains less than 20% acceptance rate. All accepted papers will be tested for plagiarism manually as well as by Docoloc . Papers published in IJNSA has received enormous citations and has been regarded as one of the best Journal in the Security research field.

Current Issue

July 2023, Volume 15, Number 4

Building a Continuously Integrating System with High Safety Full Text
Tuan Nguyen Kim1, Ha Nguyen Hoang2 and Vy Huynh Trieu3, 1Duy Tan University, Viet Nam, 2Hue University, Vietnam, 3Phạm Van Dong University, Viet Nam

May 2023, Volume 15, Number 3

Near Ultrasonic Attack and Defensive Countermeasures Full Text
Forrest McKee and David Noever, PeopleTec, USA

Pseudo Random Key Generator using Fractal based Trellis Coded Genetic Algorithm for Image Encryption Full Text
Anusha .T and Venkatesan R, PSG College of Technology, India

A Novel Alert Correlation Technique for Filtering Network Attacks Full Text
Jane Kinanu Kiruki1,2, Geoffrey Muchiri Muketha1 and Gabriel Kamau1, 1Murang’a University of Technology, Kenya, 2Chuka University, Kenya

The Relationship Between the Characteristics of Software Developers and Security Behavior Intention Full Text
Wisdom Umeugo, Independent Researcher, Canada

An Extended K-Means Cluster Head Selection Algorithm for Efficient Energy Consumption in Wireless Sensor Networks Full Text
Peter Maina Mwangi, John Gichuki Ndia and Geoffrey Muchiri Muketha, Murang’a University of Technology, Kenya

The Evolving Threat Landscape: An Overview of Attacks and Response Strategies Against Cybercrime in Saudi Arabia Full Text
Homam El-Taj, Dar Al-Hekma University, Kingdom of Saudi Arabia

Advancements in Crowd-Monitoring System: A Comprehensive Analysis of Systematic Approaches and Automation Algorithms: State-of-the-Art Full Text
Mohammed Ameen and Richard Stone, Iowa State University, USA

March 2023, Volume 15, Number 2

Mechanisms for Digital Transformation in the Education and Healthcare Sectors Utilizing Decentralized Self-Sovereign Identity Full Text
Gregory H. Jackson1 and Karaitiana Taiuru2, 1Adayge Inc., Utah, U.S.A, 2University of Auckland, New Zealand

Cybercrime Awareness on Social Media: A Comparison Study Full Text
Wisdom Umeugo, Independent researcher, Canada

A Countermeasure for Double Spending Attacks on Blockchain Technology in Smart Grid Full Text
Lanqin Sang and Henry Hexmoor, Southern Illinois University, USA

January 2023, Volume 15, Number 1

Analyzing Network Performance Parameters using Wireshark Full Text
Ruchi Tuli, Jubail Industrial College, Kingdom of Saudi Arabia

Metrics for Evaluating Alerts in Intrusion Detection Systems Full Text
Jane Kinanu Kiruki1,2, Geoffrey Muchiri Muketha1 and Gabriel Kamau1, 1Murang’a University of Technology, Kenya, 2Chuka University, Kenya

Optimizing Congestion Control by using Devices Authentication in Software-Defined Networks Full Text
Tamer Barakat, Hanan Eljawhri, Mohamed Merzban and Mahmoud Elbayoumi, Fayoum University, Egypt

November 2022, Volume 14, Number 6

Turning the Disruptive Power of Blockchain in the Insurance Market into Innovative Opportunities Full Text
Wadnerson Boileau, University of South Florida (USF), USA

A Resource-Efficient Collaborative System for DDOS Attack Detection and Victim Identification Full Text
Fei Wang, Zhenxing Li and Xiaofeng Wang, National University of Defense Technology, China

A Framework for the Detection of Banking Trojans in Android Full Text
Subarna Adhikari, Sushil Nepal and Rabindra Bista, Kathmandu University, Nepal

September 2022, Volume 14, Number 5

Encryption Modes Identification of Block Ciphers based on Machine Learning Full Text
Ruiqi Xia1, Manman Li2 and Shaozhen Chen2, 1Information Engineering University, China, 2State Key Laboratory of Mathematical Engineering and Advanced Computing, Kexue Avenue, China

A Comprehensive Survey of Phishing Attacks and Defences: Human Factors, Training and the Role of Emotions Full Text
Mousa Jari, Newcastle University, UK & King Saud University, Saudi Arabia

Survey of United States Related Domains: Secure Network Protocol Analysis Full Text
DeJean Dunbar, Patrick Hill, and Yu-Ju Lin, Charleston Southern University, USA

Future Ready Banking with Smart Contracts - CBDC and Impact on the Indian Economy Full Text
Bibhu Dash1, Meraj F. Ansari1, Pawankumar Sharma1 and Swati Swayam siddha2, 1School of Computer and Information Sciences, USA, 2KIIT University, India

An Extended Security Measurement Framework for Open-Source Enterprise Resource Planning Software Security Full Text
Jane Wanjiru Njuki, Geoffrey Muchiri Muketha and John Gichuki Ndia, Murang’a University of Technology, Kenya

July 2022, Volume 14, Number 4

An Efficient Deep Learning Approach for Network Intrusion Detection System on Software Defined Network Full Text
Mhmood Radhi Hadi and Adnan Saher Mohammed, Karabuk University, Turkey

Reputation-Based Consensus for Blockchain Technology in Smart Grid Full Text
Lanqin Sang, Henry Hexmoor, Southern Illinois University, USA

Distributed Denial of Service Attack Detection and Prevention Model for IoT based Computing Environment using Ensemble Machine Learning Approach Full Text
Nicholas Oluwole Ogini1, Wilfred Adigwe2 and Noah Oghenefego Ogwara3, 1Delta State University, Nigeria, 2Delta State University of Science and Technology, Nigeria, 3Auckland University of Technology, New Zealand

May 2022, Volume 14, Number 3

An Evaluation of Security in Blockchain-based Sharing of Student Records in Higher Education Full Text
Timothy Arndt1, Angela Guercio2 and Younghun Chae2, 1Cleveland State University, USA, 2Kent State University at Stark, USA

Detecting Malware in Portable Executable Files using Machine Learning Approach Full Text
Tuan Nguyen Kim1, Ha Nguyen Hoang2 and Nguyen Tran Truong Thien1, 1Duy Tan University, Vietnam, 2University of Sciences, Hue University, Vietnam

Blockchain Security : Enhanced Control Evaluation Approach to Protect Organizations’ Accounting Information Full Text
Angel R. Otero, Florida Institute of Technology, USA

Cyber Security of Smart Watches : A Review of the Vulnerabilities with Recommendations Presented to Protect the Wearables Full Text
Aaron James Webb, Macquarie University, Australia

Context-Aware Security Mechanism for Mobile Cloud Computing Full Text
Cláudio Aroucha and Higo Felipe Pires, Federal University of Maranhão, Brazil

March 2022, Volume 14, Number 2

An Efficient Secure Cryptography Scheme for New ML-based RPL Routing Protocol in Mobile IoT Environment Full Text
Kishore Golla and S. PallamSetty, Andhra University, India

The Effectiveness of Applying Different Strategies on Recognition and Recall Textual Password Full Text
Hassan Wasfi and Richard Stone, Iowa State University, USA

Hybridized Model for Data Security Based on Security Hash Analysis (SHA 512) and Salting Techniques Full Text
Felix Aranuwa1, Ford Olubodun2 and David Akinwumi1, 1Adekunle Ajasin University, Nigeria, 2Auchi Polytechnic, Nigeria

January 2022, Volume 14, Number 1

A Robust Cybersecurity Topic Classification Tool Full Text
Elijah Pelofske1, Lorie M. Liebrock1 and Vincent Urias2, 1New Mexico Institute of Mining and Technology, USA, 2Sandia National Laboratories, New Mexico, USA

Enablers to Boost Blockchain Adoption in EU Full Text
Artemis Voulkidis1, Theodore Zahariadis1,2, Andreas Papadakis3 and Charalambos Ipektsidis4, 1Synelixis SA, Greece, 2National and Kapodistrian University of Athens, Greece, 3School of Pedagogical and Technological Education (ASPETE), Greece, 4Intrasoft International SA, Luxembourg

Offline Signature Recognition via Convolutional Neural Network and Multiple Classifiers Full Text
Fadi Mohammad Alsuhimat and Fatma Susilawati Mohamad, Universiti Sultan Zainal Abidin, Malaysia

A Secure DNA Cryptosystem based on Steganography and Indexing Cipher Full Text
Tamer Barakat1, Nahed Mahmoud1, Ihab. A. Ali2 and Mohamed Hamdi1, 1Fayoum University, Egypt, 2Helwan University, Egypt

November 2021, Volume 13, Number 6

Detection Method for Classifying Malicious Firmware  Full Text
David Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA

Malicious Javascript Detection based on Clustering Techniques  Full Text
Nguyen Hong Son1 and Ha Thanh Dung2, 1Faculty of Information Technology Posts and Telecommunications Institute of Technology, Vietnam, 2Saigon University, Vietnam

Understanding Traffic Patterns of Covid-19 IoC in Huge Academic Backbone Network SINET  Full Text
Ruo Ando1, Youki Kadobayashi2, Hiroki Takakura1 and Hiroshi Itoh3, 1National Institute of Informatics, Japan, 2Nara Institute of Science and Technology, Japan, 3National Institute of Information and Communications Technology, Japan

Improving Security and Fairness in Federated Learning Systems  Full Text
Andrew R. Short1, Τheofanis G. Orfanoudakis2 and Helen C. Leligou1, 1University of West Attica, Greece, 2Hellenic Open University, Greece

Improve Security in Smart Cities Based on IoT, Solve Cyber Electronic Attacks with Technology by using Packet Tracer  Full Text
Raed Al-hamarneh, University of Almaarefa, Kingdom of Saudi Arabia

System End-User Actions as a Threat to Information System Security  Full Text
Paulus Kautwima, Titus Haiduwa, Kundai Sai, Valerianus Hashiyana and Nalina Suresh, University of Namibia, Namibia

Information and Communication Security Mechanisms For Microservices-based Systems  Full Text
Lenin Leines-Vite, Juan Carlos Pérez-Arriaga and Xavier Limón, Universidad Veracruzana, Mexico

Comparative Review of Malware Analysis Methodologies  Full Text
Ioannis G. Kiachidis and Dimitrios A. Baltatzis, International Hellenic University, Greece

September 2021, Volume 13, Number 5

Evaluation of a Blockchain-Enabled Resource Management Mechanism for NGNs   Full Text
Michael Xevgenis, Dimitrios G. Kogias, Ioannis Christidis, Charalampos Patrikakis and Helen C. Leligou, University of West Attica, Greece

Secure Blockchain Decentralized Voting for Verified Users   Full Text
Piotr Pospiech, Aleksander Marianski and Michal Kedziora, Wroclaw University of Science and Technology, Poland

July 2021, Volume 13, Number 4

Use of MARKOV Chain for Early Detecting DDoS Attacks   Full Text
Chin-Ling Chen1 and Jian-Ming Chen2, 1National Pingtung University, Taiwan, 2Genesis Technology, Inc., Taiwan

Constructing the 2-Element AGDS Protocol based on the Discrete Logarithm Problem   Full Text
Tuan Nguyen Kim1, Duy Ho Ngoc2 and Nikolay A. Moldovyan3, 1Duy Tan University, Vietnam, 2Ha Noi, Vietnam,3St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russi

Proof-of-Reputation: An Alternative Consensus Mechanism for Blockchain Systems   Full Text
Oladotun Aluko1 and Anton Kolonin2, 1Novosibirsk State University, Russia, 2Aigents Group, Russia

Critical Infrastructure Cybersecurity Challenges: IoT in Perspective   Full Text
Akwetey Henry Matey1, Paul Danquah2, Godfred Yaw Koi-Akrofi1 and Isaac Asampana1, 1University of Professional Studies Accra, 2Heritage Christian University

Collective Signature Protocols for Signing Groups based on Problem of Finding Roots Modulo Large Prime Number   Full Text
Tuan Nguyen Kim1, Duy Ho Ngoc2 and Nikolay A. Moldovyan3, 1Duy Tan University, Vietnam, 2Ha Noi, Vietnam, 3St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia

May 2021, Volume 13, Number 3

Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks   Full Text
David A. Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA

Effect Man-In the Middle on the Network Performance in Various Attack Strategies   Full Text
Iyas Alodat, Jerash University, Jordan

Information-Centric Blockchain Technology for the Smart Grid   Full Text
Lanqin Sang and Henry Hexmoor, Southern Illinois University, USA

A Survey on Federated Identity Management Systems Limitation and Solutions   Full Text
Maha Aldosary and Norah Alqahtani, Imam Mohammad Ibn Saud Islamic University, KSA

March 2021, Volume 13, Number 2

Comparison of Malware Classification Methods using Convolutional Neural Network based on API Call Stream   Full Text
Matthew Schofield, Gulsum Alicioglu, Bo Sun, Russell Binaco, Paul Turner, Cameron Thatcher, Alex Lam and Anthony Breitzman, Rowan University, USA

Performance Evaluation of Machine Learning Techniques for DOS Detection in Wireless Sensor Network   Full Text
Lama Alsulaiman and Saad Al-Ahmadi, King Saud University, Saudi Arabia

Applying the Health Belief Model to Cardiac Implanted Medical Device Patients   Full Text
George W. Jackson1 and Shawon Rahman2, 1Capella University, USA, 2University of HawaiiHilo, USA

A Literature Survey and Analysis on Social Engineering Defense Mechanisms and Infosec Policies   Full Text
Dalal Alharthi and Amelia Regan, University of California Irvine, USA

Phishing Mitigation Techniques: A Literature Survey   Full Text
Wosah Peace Nmachi and Thomas Win, School of Computing & Engineering University of Gloucestershire, United Kingdom

January 2021, Volume 13, Number 1

Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms   Full Text
SWilliam R. Simpson and Kevin E. Foltz, The Institute for Defense Analyses (IDA), USA

Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset   Full Text
Geeta Kocher1 and Gulshan Kumar2, 1MRSPTU, India, 2SBSSTC, Indi

Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis   Full Text
Anna Georgiadou, Spiros Mouzakitis and Dimitrios Askounis, National Technical University of Athens, Greec

Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys   Full Text
Cheman Shaik, VISH Consulting Services Inc, US

Game Theory Application Resources Management and Distribution in Blockchain Network   Full Text
Cong Hung Tran1, Dien Tam Le1, 2, Thanh Hieu Huynh3, 1Posts and Telecommunications Institute of Technology, Vietnam, 2Thu Duc Technology College, Vietnam, 3Saigon University, Vietnam

November 2020, Volume 12, Number 6

Hybrid Chaotic Method for Medical Images Ciphering   Full Text
Seham Muawadh Ali Ebrahim, Modern Academy for Engineering and Information Technology, Egypt

The Brazilian Law on Personal Data Protection   Full Text
Jonatas S. de Souza1, 2, Jair M. Abe1, Luiz A. de Lima1, 2 and Nilson A. de Souza2, 3, 1Paulista University, São Paulo, Brazil,2National Association of Data Privacy Professionals, ANPPD, Brazil, 3São Paulo State Supplementary Pension Foundation, PREVCOM, Brazi

September 2020, Volume 12, Number 5

Secured AODV to Protect WSN Against Malicious Intrusion   Full Text

Saad Al-Ahmadi and Abdulrahman Alseqyani, King Saud University, Saudi Arabia

July 2020, Volume 12, Number 4

Enhanced Authentication for Web-Based Security using Keystroke Dynamics   Full Text
Siti Rahayu Selamat1, Teh Teck Guan2 and Robiah Yusof1, 1Universiti Teknikal Malaysia Melaka, Malaysia, 2Infineon Technologies Melaka, Malaysia

A Proposed Model for Dimensionality Reduction to Improve the Classification Capability of Intrusion Protection Systems   Full Text
Hajar Elkassabi, Mohammed Ashour and Fayez Zaki, Mansoura University, Egypt

Effective Method for Managing Automation and Monitoring in Multi-cloud Computing: Panacea for Multi-cloud Security Snags   Full Text
Uchechukwu Emejeamara1, Udochukwu Nwoduh2 and Andrew Madu2, 1IEEE Computer Society, Connecticut Section, USA,2Federal Polytechnic Nekede, Nigeria

May 2020, Volume 12, Number 3

Ontology-based Model for Security Assessment: Predicting Cyberattacks through Threat Activity Analysis   Full Text
Pavel Yermalovich and Mohamed Mejri, Université Laval, Canada

Advanced Multimedia Platform based on Big Data and Artificial Intelligence Improving Cybersecurity   Full Text
Alessandro Massaro1*, Gaetano Panarosa1, Nicola Savino1, Simone Buonopane2 and Angelo Galiano1, 1Dyrecta Lab, IT Research Laboratory, Italy, 2Spacertron srl, Italy

An Empirical Analysis of Email Forensics Tools   Full Text
Ahmad Ghafarian, Ash Mady and Kyung Park, University of North Georgia, USA

PDMLP: Phishing Detection using Multilayer Perceptron   Full Text
Saad Al-Ahmadi and Tariq Lasloum, King Saud University, Saudi Arabia

March 2020, Volume 12, Number 2

Security Consideration in Peer-to-peer Networks with A Case Study Application   Full Text
Nick Rahimi, Southern Illinois University, USA

Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dynamic Billing System in Smart Grid Using Permissioned Blockchain   Full Text
Ozgur Oksuz, Adiyaman University, Turkey

A Survey on Malware Detection and Analysis Tools   Full Text
Sajedul Talukder1 and Zahidur Talukder2, 1Edinboro University, USA and 2University of Texas at Arlington, USA

An Enhanced User Authentication Framework in Cloud Computing   Full Text
Hasan Al-Refai, Khaldoun Batiha, Ahmad M. Al-Refai, Philadelphia University, Jordan

January 2020, Volume 12, Number 1

A Survey on the Use of Data Clustering for Intrusion Detection System in Cybersecurity   Full Text
Binita Bohara1, Jay Bhuyan1, Fan Wu1 and Junhua Ding2, 1Tuskegee University, USA and 2University of North Texas, USA

Self-organization and Autonomous Network Survey   Full Text
Houneida SAKLY, Campus University of Mannouba, Tunisia

Editor in Chief

Associate Editor

Editorial Board Members

... More

Related Resources

RTME 2024   9th International Conference on Recent Trends in Mechanical Engineering
IEEE Xplore-Ei/Scopus-CSPIT 2023   2023 Asia Conference on Communications, Signal Processing and Information Technology (CSPIT 2023) -EI Compendex
IEEE Xplore-Ei/Scopus-DMCSE 2023   2023 International Conference on Data Mining, Computing and Software Engineering (DMCSE 2023) -EI Compendex
MLAIJ 2023   Machine Learning and Applications: An International Journal
IEEE Xplore-Ei/Scopus-CACEE 2023   2023 International Conference on Automation, Control and Electronics Engineering (CACEE 2023) -EI Compendex
NLDML 2024   3rd International Conference on NLP, Data Mining and Machine Learning
IEEE Xplore-Ei/Scopus-AICME 2023   2023 International Conference on Artificial Intelligence, Communications and Mechatronics (AICME 2023) -EI Compendex
International Conference on Health 2024   Fourteenth International Conference on Health, Wellness & Society- Health, Wellness, and Society Research Network and Malmö University, Malmö, Sweden
JCICE 2024   2024 International Joint Conference on Information and Communication Engineering(JCICE 2024)
blockchain_ml_iot 2023   Network (MDPI) Special Issue - Blockchain and Machine Learning for IoT: Security and Privacy Challenges