posted by user: Busra || 11665 views || tracked by 11 users: [display]

IJNSA 2021 : International Journal of Network Security & Its Applications- ERA Listed

FacebookTwitterLinkedInGoogle

Link: http://airccse.org/journal/ijnsa.html
 
When N/A
Where N/A
Submission Deadline Apr 24, 2021
Notification Due May 24, 2021
Final Version Due May 31, 2021
Categories    security   cryptography   computer science   engineering
 

Call For Papers

International Journal of Network Security & Its Applications (IJNSA) -- ERA Listed

Citations, h-index, i10-index of IJNSA

Citations 7069   h-index 40   i10-index 154

Call for Papers

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojon Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through E-mail: ijnsa@airccse.org. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

Submission Deadline:April 24, 2021
Authors Notification:May 24, 2021
Final Manuscript Due:May 31, 2021
Publication Date:Determined by the Editor-in-Chief

Note

AIRCC's International Journal of Network Security & Its Applications (IJNSA) is dedicated to strengthen the field of Security & Its Applications and publishes only good quality papers. IJNSA is highly selective and maintains less than 20% acceptance rate. All accepted papers will be tested for plagiarism manually as well as by Docoloc . Papers published in IJNSA has received enormous citations and has been regarded as one of the best Journal in the Security research field.

Current Issue

March 2021, Volume 13, Number 2

Comparison of Malware Classification Methods using Convolutional Neural Network based on API Call Stream   Full Text
Matthew Schofield, Gulsum Alicioglu, Bo Sun, Russell Binaco, Paul Turner, Cameron Thatcher, Alex Lam and Anthony Breitzman, Rowan University, USA

Performance Evaluation of Machine Learning Techniques for DOS Detection in Wireless Sensor Network   Full Text
Lama Alsulaiman and Saad Al-Ahmadi, King Saud University, Saudi Arabia

Applying the Health Belief Model to Cardiac Implanted Medical Device Patients   Full Text
George W. Jackson1 and Shawon Rahman2, 1Capella University, USA, 2University of HawaiiHilo, USA

A Literature Survey and Analysis on Social Engineering Defense Mechanisms and Infosec Policies   Full Text
Dalal Alharthi and Amelia Regan, University of California Irvine, USA

Phishing Mitigation Techniques: A Literature Survey   Full Text
Wosah Peace Nmachi and Thomas Win, School of Computing & Engineering University of Gloucestershire, United Kingdom

January 2021, Volume 13, Number 1

Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms   Full Text
SWilliam R. Simpson and Kevin E. Foltz, The Institute for Defense Analyses (IDA), USA

Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset   Full Text
Geeta Kocher1 and Gulshan Kumar2, 1MRSPTU, India, 2SBSSTC, India

Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis   Full Text
Anna Georgiadou, Spiros Mouzakitis and Dimitrios Askounis, National Technical University of Athens, Greece

Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys   Full Text
Cheman Shaik, VISH Consulting Services Inc, USA

Game Theory Application Resources Management and Distribution in Blockchain Network   Full Text
Cong Hung Tran1, Dien Tam Le1, 2, Thanh Hieu Huynh3, 1Posts and Telecommunications Institute of Technology, Vietnam, 2Thu Duc Technology College, Vietnam, 3Saigon University, Vietnam

November 2019, Volume 11, Number 6

Quality Assessment of Access Security Controls over Financial Information   Full Text
Angel R. Otero, Christian Sonnenberg and LuAnn Bean, Florida Institute of Technology, USA

September 2019, Volume 11, Number 5

Machine Learning in Network Security Using KNIME Analytics   Full Text
Munther Abualkibash, Eastern Michigan University, USA

EUNICERT: Ethereum Based Digital Certificate Verification System   Full Text
Trong Thua Huynh1, Dang-Khoa Pham2, 1Posts and Telecommunications Institute of Technology, Vietnam and 2FPT Telecom, Vietnam

Map Reduce Implementation for Malicious Websites Classification   Full Text
Md Maminur Islam1, Subash Poudyal1 and Kishor Datta Gupta2, 1University of Memphis, USA and 2Lamar University, USA

July 2019, Volume 11, Number 4

Authentication Mechanism Enhancement Utilising Secure Repository for Passwordless Handshake   Full Text
Ioannis A. Pikrammenos, Panagiotis Tolis and Panagiotis Perakis, University of Derby, Greece

A Chaotic Confusion-Diffusion Image Encryption Based on Henon Map   Full Text
Ashraf Afifi, Taif University, Kingdom of Saudi Arabia

System Call Dependence Graph Based Behavior Decomposition of Android Applications   Full Text
Bin Zhao, JD.com Silicon Valley R&D Center, USA

A Novel Image Encryption Scheme with Huffman Encoding and Steganography Technique   Full Text
A Novel Image Encryption Scheme with Huffman Encoding and Steganography Technique

Exploring Challenges and Opportunities in Cybersecurity Risk and Threat Communications Related to the Medical Internet of Things (MIOT)   Full Text
George W. Jackson, Jr.1 and Shawon S. M. Rahman2, 1Capella University, USA and 2University of Hawaii-Hilo, USA

Generalized Legendre Polynomials for Support Vector Machines (SVMS) Classification   Full Text
Ashraf Afifi1 and E.A.Zanaty2, 1Taif University, Kingdom of Saudi Arabia and 2Sohag University, Egypt

May 2019, Volume 11, Number 3

Enhancing the Wordpress System: from Role to Attribute-Based Access Control   Full Text
Lifeng Cao, Jia Ying Ou and Amirhossein Chinaei, York University, Canada

Classification Procedures for Intrusion Detection Based on KDD CUP 99 Data Set   Full Text
Shaker El-Sappagh, Ahmed Saad Mohammed and Tarek Ahmed AlSheshtawy, Benha University, Egypt

Xdoser, A Benchmarking Tool for System Load Measurement Using Denial of Service Features   Full Text
AKM Bahalul Haque, Rabeya Sultana, Mohammad Sajid Fahad , MD Nasif Latif and Md. Amdadul Bari, North South University, Bangladesh

Multi-Layer Classifier for Minimizing False Intrusion   Full Text
Shaker El-Sappagh, Ahmed saad Mohammed and Tarek Ahmed AlSheshtawy, Benha University, Egypt

Methods Toward Enhancing RSA Algorithm : A Survey   Full Text
Shaheen Saad Al-Kaabi and Samir Brahim Belhaouari, Hamad Bin Khalifa University (HBKU), Qatar

Survey on Secure Routing in Vanets   Full Text
Afef Slama1 and Ilhem Lengliz2, 1University of Manouba, Tunisia and 2Military Academy, Tunisia

A Combination of Temporal Sequence Learning and Data Description for Anomaly - based NIDS   Full Text
Nguyen Thanh Van1,2, Tran Ngoc Thinh1 and Le Thanh Sach1, 1Ho Chi Minh City University of Technology, VietNam and
2Ho Chi Minh City University of Technology and Education, VietNam

March 2019, Volume 11, Number 2

Performance Analysis of Routing Protocols in MANET Under Malicious Attacks   Full Text
Gorine1 and Rabia Saleh, 1Gloucestershire University, England

Dual Security Using Image Steganography Based Matrix Partition   Full Text
Huda H.Al.Ghuraify, Ali A.Al-Bakry, Ahmad T. Al-Jayashi, al-furat al-awsat university, Iraq

A Review of Selected Proposals for Improving Identity Privacy in UMTS   Full Text
Hiten Choudhury, Cotton University, India

KVEFS: Encrypted File System Based on Distributed Key-Value Stores and FUSE   Full Text
Giau Ho Kim, Son Hai Le, Trung Manh Nguyen, Vu Thi Ly, Thanh Nguyen Kim, Nguyen Van Cuong, Thanh Nguyen Trung, and Ta Minh Thanh, Le Quy Don Technical University, Vietnam

Security& Privacy Threats, Attacks and Countermeasures in Internet of Things   Full Text
Faheem Masoodi1, Shadab Alam2 and Shams Tabrez Siddiqui2, 1University of Kashmir, India and 2Jazan University, KSA

January 2019, Volume 11, Number 1

Malware Detection Using Machine Learning Algorithms and Reverse Engineering of Android Java Code   Full Text
Michal Kedziora, Paulina Gawin, Michal Szczepanik and Ireneusz Jozwiak, University of Science and Technology Wroclaw, Poland

A Light Weight Solution for Detecting De-Authentication Attack   Full Text
Rajinder Singh and Satish Kumar, PUSSGRC Hoshiarpur, Punjab, India

A Multi-Layer Arabic Text Steganographic Method Based on Letter Shaping   Full Text
A.F. Al Azzawi, Philadelphia University, Jordan

Performance Evaluation of Parallel International Data Encryption Algorithm on IMAN1 Super Computer   Full Text
Ahmad Bany Doumi and Mohammad Qatawneh, University of Jordan, Amman-Jordan

A Survey on Optimization Based Spectrum Sensing Techniques to Reduce ISI and PAPR In OFDM Based Cognitive Radio System   Full Text
1B.Maheswara Rao, 2S.Baskar, 1Research scholar and 2Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology

Editor in Chief

Associate Editor

Editorial Board Members

... More

Related Resources

IEEE COINS 2021   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
IJNSA 2021   International Journal of Network Security & Its Applications- ERA Listed
IJACEEE 2021   International Journal of Applied Control, Electrical and Electronics Engineering
SNSA-SI-MDPI 2021   Sensor Networks Security and Applications
IJAD 2021   International Journal of Advanced Dermatology
AEIJ 2021   Advanced Energy: An International Journal
CBW 2021   2nd International Conference on Cloud, Big Data and Web Services
blockchain_ml_iot 2021   Network and Electronics (MDPI) Joint Special Issue - Blockchain and Machine Learning for IoT: Security and Privacy Challenges
SI-D2CSCAI 2021   CfP - Special Issue Data-Driven Cybersecurity and Safety for Critical Applications and Infrastructures (MDPI Sensors - IF= 3.275)
SITAIBA 2021   SITAIBA 2021 : 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications