SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
International Journal of Network Security & Its Applications (IJNSA) - ERA,
WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)
https://airccse.org/journal/ijnsa.html
Citations, h-index, i10-index
Citations 9732 h-index 47 i10-index 187
Scope & Topics
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly
open access peer-reviewed journal that publishes articles which contribute new results in all
areas of the computer Network Security & its applications. The journal focuses on all technical
and practical aspects of security and its applications for wired and wireless networks. The goal of
this journal is to bring together researchers and practitioners from academia and industry to focus
on understanding Modern security threats and countermeasures, and establishing new
collaborations in these areas.
Topics of Interest include, but are not limited to, the following
 Artificial intelligence, Machine Learning for Security
 Blockchain Technology, Cryptocurrencies and Cyber Security
 Cloud, Fog, Edge & Cognitive Security
 Cryptographic Protocols
 Cyber Physical System (CPS) Security (autonomous vehicles, industrial control systems)
 Data Center Network Control, Security and Optimization
 Database and System Security
 E-mail security, Spam, Phishing, E-mail fraud
 Hardware-Based Attacks
 Internet of Things (IoT) Security
 Internet Security & Applications (Social networking, crowd sourcing and Web based
applications, services security)
 Intrusion Detection and Prevention
 Mobile, Ad Hoc and Sensor Network Security
 Peer-to-Peer Network Security
 Performance Evaluations of Protocols & Security Application
 Security & Network Management
 Security for emerging networks (SDN, Home Networks, Body-area Networks, VANETs)
 Security of Virtual Machines
 Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
 Security, Trust and Privacy Challenges
 Smart City, Grid, Electronic Voting Security
 Network and Wireless Network Security
 Ubiquitous Computing Security
 Virus, worms, Trojan Protection
 Web 2.0 Security
Paper Submission
Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or
through Submission System. Submissions must be original and should not have been published
previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
 Submission Deadline: May 27, 2023
 Acceptance Notification: June 27, 2023
 Final Manuscript Due: July 04, 2023
 Publication Date: Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com
For other details, please visit: https://airccse.org/journal/ijnsa.html

Mais conteúdo relacionado

Semelhante a International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

Semelhante a International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed (20)

Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
 
Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Online Paper Submission - International Journal of Network Security & Its App...
Online Paper Submission - International Journal of Network Security & Its App...Online Paper Submission - International Journal of Network Security & Its App...
Online Paper Submission - International Journal of Network Security & Its App...
 
Online Paper Submission - International Journal of Network Security & Its App...
Online Paper Submission - International Journal of Network Security & Its App...Online Paper Submission - International Journal of Network Security & Its App...
Online Paper Submission - International Journal of Network Security & Its App...
 
Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...
 
Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...
 
Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Research Paper Submission - International Journal of Network Security & Its A...
Research Paper Submission - International Journal of Network Security & Its A...Research Paper Submission - International Journal of Network Security & Its A...
Research Paper Submission - International Journal of Network Security & Its A...
 
Research Articles Submission - International Journal of Network Security & It...
Research Articles Submission - International Journal of Network Security & It...Research Articles Submission - International Journal of Network Security & It...
Research Articles Submission - International Journal of Network Security & It...
 

Último

21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
rahulmanepalli02
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
drjose256
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
Kamal Acharya
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
Madan Karki
 

Último (20)

21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
AI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdfAI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdf
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
Piping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdfPiping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdf
 
Low Altitude Air Defense (LAAD) Gunner’s Handbook
Low Altitude Air Defense (LAAD) Gunner’s HandbookLow Altitude Air Defense (LAAD) Gunner’s Handbook
Low Altitude Air Defense (LAAD) Gunner’s Handbook
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
 

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

  • 1. International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print) https://airccse.org/journal/ijnsa.html Citations, h-index, i10-index Citations 9732 h-index 47 i10-index 187 Scope & Topics The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas. Topics of Interest include, but are not limited to, the following  Artificial intelligence, Machine Learning for Security  Blockchain Technology, Cryptocurrencies and Cyber Security  Cloud, Fog, Edge & Cognitive Security  Cryptographic Protocols  Cyber Physical System (CPS) Security (autonomous vehicles, industrial control systems)  Data Center Network Control, Security and Optimization  Database and System Security  E-mail security, Spam, Phishing, E-mail fraud  Hardware-Based Attacks  Internet of Things (IoT) Security  Internet Security & Applications (Social networking, crowd sourcing and Web based applications, services security)  Intrusion Detection and Prevention  Mobile, Ad Hoc and Sensor Network Security  Peer-to-Peer Network Security  Performance Evaluations of Protocols & Security Application  Security & Network Management  Security for emerging networks (SDN, Home Networks, Body-area Networks, VANETs)  Security of Virtual Machines  Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)  Security, Trust and Privacy Challenges  Smart City, Grid, Electronic Voting Security  Network and Wireless Network Security  Ubiquitous Computing Security  Virus, worms, Trojan Protection  Web 2.0 Security Paper Submission Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
  • 2. Important Dates  Submission Deadline: May 27, 2023  Acceptance Notification: June 27, 2023  Final Manuscript Due: July 04, 2023  Publication Date: Determined by the Editor-in-Chief Contact Us Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com For other details, please visit: https://airccse.org/journal/ijnsa.html