![]() |
| |||||||||||||||
IJNSA 2021 : International Journal of Network Security & Its Applications- ERA Listed | |||||||||||||||
Link: http://airccse.org/journal/ijnsa.html | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
International Journal of Network Security & Its Applications (IJNSA) -- ERA Listed Citations, h-index, i10-index of IJNSA Call for PapersThe International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas. Topics of Interest
Paper SubmissionAuthors are invited to submit papers for this journal through E-mail: ijnsa@airccse.org. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. Important Dates
NoteAIRCC's International Journal of Network Security & Its Applications (IJNSA) is dedicated to strengthen the field of Security & Its Applications and publishes only good quality papers. IJNSA is highly selective and maintains less than 20% acceptance rate. All accepted papers will be tested for plagiarism manually as well as by Docoloc . Papers published in IJNSA has received enormous citations and has been regarded as one of the best Journal in the Security research field. Current IssueJanuary 2021, Volume 13, Number 1 Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms Full Text Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset Full Text Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis Full Text Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys Full Text Game Theory Application Resources Management and Distribution in Blockchain Network Full Text November 2019, Volume 11, Number 6
Quality Assessment of Access Security Controls over Financial Information Full Text September 2019, Volume 11, Number 5 Machine Learning in Network Security Using KNIME Analytics Full Text EUNICERT: Ethereum Based Digital Certificate Verification System Full Text Map Reduce Implementation for Malicious Websites Classification Full Text July 2019, Volume 11, Number 4 Authentication Mechanism Enhancement Utilising Secure Repository for Passwordless Handshake Full Text A Chaotic Confusion-Diffusion Image Encryption Based on Henon Map Full Text System Call Dependence Graph Based Behavior Decomposition of Android Applications Full Text A Novel Image Encryption Scheme with Huffman Encoding and Steganography Technique Full Text Exploring Challenges and Opportunities in Cybersecurity Risk and Threat Communications Related to the Medical Internet of Things (MIOT) Full Text Generalized Legendre Polynomials for Support Vector Machines (SVMS) Classification Full Text May 2019, Volume 11, Number 3 Enhancing the Wordpress System: from Role to Attribute-Based Access Control Full Text Classification Procedures for Intrusion Detection Based on KDD CUP 99 Data Set Full Text Xdoser, A Benchmarking Tool for System Load Measurement Using Denial of Service Features Full Text Multi-Layer Classifier for Minimizing False Intrusion Full Text Methods Toward Enhancing RSA Algorithm : A Survey Full Text Survey on Secure Routing in Vanets Full Text A Combination of Temporal Sequence Learning and Data Description for Anomaly - based NIDS Full Text March 2019, Volume 11, Number 2 Performance Analysis of Routing Protocols in MANET Under Malicious Attacks Full Text Dual Security Using Image Steganography Based Matrix Partition Full Text A Review of Selected Proposals for Improving Identity Privacy in UMTS Full Text KVEFS: Encrypted File System Based on Distributed Key-Value Stores and FUSE Full Text Security& Privacy Threats, Attacks and Countermeasures in Internet of Things Full Text January 2019, Volume 11, Number 1 Malware Detection Using Machine Learning Algorithms and Reverse Engineering of Android Java Code Full Text A Light Weight Solution for Detecting De-Authentication Attack Full Text A Multi-Layer Arabic Text Steganographic Method Based on Letter Shaping Full Text Performance Evaluation of Parallel International Data Encryption Algorithm on IMAN1 Super Computer Full Text A Survey on Optimization Based Spectrum Sensing Techniques to Reduce ISI and PAPR In OFDM Based Cognitive Radio System Full Text Editor in Chief
Associate Editor
Editorial Board Members
... More |
|