Categories |
![]()
SECURITY
![]()
ARTIFICIAL INTELLIGENCE
![]()
COMMUNICATIONS
![]()
NETWORKING
|
Call for Papers |
||||||||||||
International Journal of Network Security & Its Applications - ERA, WJCI Listed, H index - 48 IJNSA is listed in ERA 2023 as per the Australian Research Council (ARC) Journal RankingThe International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas. Topics of Interest
Paper SubmissionAuthors are invited to submit papers for this journal through E-mail: [email protected] or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. Important Dates
NoteAIRCC's International Journal of Network Security & Its Applications (IJNSA) is dedicated to strengthen the field of Security & Its Applications and publishes only good quality papers. IJNSA is highly selective and maintains less than 20% acceptance rate. All accepted papers will be tested for plagiarism manually as well as by Docoloc . Papers published in IJNSA has received enormous citations and has been regarded as one of the best Journal in the Security research field. Current IssueNovember 2023, Volume 15, Number 6 Exploring Critical Vulnerabilities in SIEM Implementation and SOC Service Procurement: An In-Depth Analysis of High-Risk Scenarios Full Text A Framework for Securing Email Entrances and Mitigating Phishing Impersonation Attacks Full Text A Systematic Review on Machine Learning Insider Threat Detection Models, Datasets and Evaluation Metrics Full Text September 2023, Volume 15, Number 5 Invertible Neural Network for Inference Pipeline Anomaly Detection Full Text SPDZ-Based Optimistic Fair Multi-Party Computation Detection Full Text Exploring the Effectiveness of VPN Architecture in Enhancing Network Security for Mobile Networks: An Investigation Study Full Text July 2023, Volume 15, Number 4 Building a Continuously Integrating System with High Safety Full Text May 2023, Volume 15, Number 3 Near Ultrasonic Attack and Defensive Countermeasures Full Text Pseudo Random Key Generator using Fractal based Trellis Coded Genetic Algorithm for Image Encryption Full Text A Novel Alert Correlation Technique for Filtering Network Attacks Full Text The Relationship Between the Characteristics of Software Developers and Security Behavior Intention Full Text An Extended K-Means Cluster Head Selection Algorithm for Efficient Energy Consumption in Wireless Sensor Networks Full Text The Evolving Threat Landscape: An Overview of Attacks and Response Strategies Against Cybercrime in Saudi Arabia Full Text Advancements in Crowd-Monitoring System: A Comprehensive Analysis of Systematic Approaches and Automation Algorithms: State-of-the-Art Full Text March 2023, Volume 15, Number 2 Mechanisms for Digital Transformation in the Education and Healthcare Sectors Utilizing Decentralized Self-Sovereign Identity Full Text Cybercrime Awareness on Social Media: A Comparison Study Full Text A Countermeasure for Double Spending Attacks on Blockchain Technology in Smart Grid Full Text January 2023, Volume 15, Number 1 Analyzing Network Performance Parameters using Wireshark Full Text Metrics for Evaluating Alerts in Intrusion Detection Systems Full Text Optimizing Congestion Control by using Devices Authentication in Software-Defined Networks Full Text November 2022, Volume 14, Number 6 Turning the Disruptive Power of Blockchain in the Insurance Market into Innovative Opportunities Full Text A Resource-Efficient Collaborative System for DDOS Attack Detection and Victim Identification Full Text A Framework for the Detection of Banking Trojans in Android Full Text September 2022, Volume 14, Number 5 Encryption Modes Identification of Block Ciphers based on Machine Learning Full Text A Comprehensive Survey of Phishing Attacks and Defences: Human Factors, Training and the Role of Emotions Full Text Survey of United States Related Domains: Secure Network Protocol Analysis Full Text Future Ready Banking with Smart Contracts - CBDC and Impact on the Indian Economy Full Text An Extended Security Measurement Framework for Open-Source Enterprise Resource Planning Software Security Full Text July 2022, Volume 14, Number 4 An Efficient Deep Learning Approach for Network Intrusion Detection System on Software Defined Network Full Text Reputation-Based Consensus for Blockchain Technology in Smart Grid Full Text Distributed Denial of Service Attack Detection and Prevention Model for IoT based Computing Environment using Ensemble Machine Learning Approach Full Text May 2022, Volume 14, Number 3 An Evaluation of Security in Blockchain-based Sharing of Student Records in Higher Education Full Text Detecting Malware in Portable Executable Files using Machine Learning Approach Full Text Blockchain Security : Enhanced Control Evaluation Approach to Protect Organizations’ Accounting Information Full Text Cyber Security of Smart Watches : A Review of the Vulnerabilities with Recommendations Presented to Protect the Wearables Full Text Context-Aware Security Mechanism for Mobile Cloud Computing Full Text March 2022, Volume 14, Number 2 An Efficient Secure Cryptography Scheme for New ML-based RPL Routing Protocol in Mobile IoT Environment Full Text The Effectiveness of Applying Different Strategies on Recognition and Recall Textual Password Full Text Hybridized Model for Data Security Based on Security Hash Analysis (SHA 512) and Salting Techniques Full Text January 2022, Volume 14, Number 1 A Robust Cybersecurity Topic Classification Tool Full Text Enablers to Boost Blockchain Adoption in EU Full Text Offline Signature Recognition via Convolutional Neural Network and Multiple Classifiers Full Text A Secure DNA Cryptosystem based on Steganography and Indexing Cipher Full Text November 2021, Volume 13, Number 6 Detection Method for Classifying Malicious Firmware Full Text Malicious Javascript Detection based on Clustering Techniques Full Text Understanding Traffic Patterns of Covid-19 IoC in Huge Academic Backbone Network SINET Full Text Improving Security and Fairness in Federated Learning Systems Full Text Improve Security in Smart Cities Based on IoT, Solve Cyber Electronic Attacks with Technology by using Packet Tracer Full Text System End-User Actions as a Threat to Information System Security Full Text Information and Communication Security Mechanisms For Microservices-based Systems Full Text Comparative Review of Malware Analysis Methodologies Full Text September 2021, Volume 13, Number 5 Evaluation of a Blockchain-Enabled Resource Management Mechanism for NGNs Full Text Secure Blockchain Decentralized Voting for Verified Users Full Text July 2021, Volume 13, Number 4 Use of MARKOV Chain for Early Detecting DDoS Attacks Full Text Constructing the 2-Element AGDS Protocol based on the Discrete Logarithm Problem Full Text Proof-of-Reputation: An Alternative Consensus Mechanism for Blockchain Systems Full Text Critical Infrastructure Cybersecurity Challenges: IoT in Perspective Full Text Collective Signature Protocols for Signing Groups based on Problem of Finding Roots Modulo Large Prime Number Full Text May 2021, Volume 13, Number 3 Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks Full Text Effect Man-In the Middle on the Network Performance in Various Attack Strategies Full Text Information-Centric Blockchain Technology for the Smart Grid Full Text A Survey on Federated Identity Management Systems Limitation and Solutions Full Text Comparison of Malware Classification Methods using Convolutional Neural Network based on API Call Stream Full Text Performance Evaluation of Machine Learning Techniques for DOS Detection in Wireless Sensor Network Full Text Applying the Health Belief Model to Cardiac Implanted Medical Device Patients Full Text A Literature Survey and Analysis on Social Engineering Defense Mechanisms and Infosec Policies Full Text Phishing Mitigation Techniques: A Literature Survey Full Text January 2021, Volume 13, Number 1 Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms Full Text Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset Full Text Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis Full Text Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys Full Text Game Theory Application Resources Management and Distribution in Blockchain Network Full Text November 2020, Volume 12, Number 6 Hybrid Chaotic Method for Medical Images Ciphering Full Text The Brazilian Law on Personal Data Protection Full Text September 2020, Volume 12, Number 5 Secured AODV to Protect WSN Against Malicious Intrusion Full Text Saad Al-Ahmadi and Abdulrahman Alseqyani, King Saud University, Saudi Arabia July 2020, Volume 12, Number 4 Enhanced Authentication for Web-Based Security using Keystroke Dynamics Full Text A Proposed Model for Dimensionality Reduction to Improve the Classification Capability of Intrusion Protection Systems Full Text Effective Method for Managing Automation and Monitoring in Multi-cloud Computing: Panacea for Multi-cloud Security Snags Full Text May 2020, Volume 12, Number 3 Ontology-based Model for Security Assessment: Predicting Cyberattacks through Threat Activity Analysis Full Text Advanced Multimedia Platform based on Big Data and Artificial Intelligence Improving Cybersecurity Full Text An Empirical Analysis of Email Forensics Tools Full Text PDMLP: Phishing Detection using Multilayer Perceptron Full Text March 2020, Volume 12, Number 2 Security Consideration in Peer-to-peer Networks with A Case Study Application Full Text Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dynamic Billing System in Smart Grid Using Permissioned Blockchain Full Text A Survey on Malware Detection and Analysis Tools Full Text An Enhanced User Authentication Framework in Cloud Computing Full Text January 2020, Volume 12, Number 1 A Survey on the Use of Data Clustering for Intrusion Detection System in Cybersecurity Full Text Self-organization and Autonomous Network Survey Full Text Editor in Chief
Associate Editor
Editorial Board Members
... More |
Citations 10407 h-index 48 i10-index 197
Credits and Sources |
[1] IJNSA 2024 : International Journal of Network Security & Its Applications - ERA, WJCI Listed, H index - 48 |