International Journal of Network Security & Its Applications - ERA, WJCI Listed, H index - 43

IJNSA 2022


Databases & Information Systems Information Theory





International Journal of Network Security & Its Applications (IJNSA) -- ERA Listed
World Journal Clout Index (WJCI) Impact Factor : 0.279 (2020); 0.139 (2019)
Citations, h-index, i10-index of IJNSA
Citations 8766   h-index 44   i10-index 171
Call for Papers
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Topics of Interest
Network and Wireless Network Security
Mobile, Ad Hoc and Sensor Network Security
Peer-to-Peer Network Security
Database and System Security
Intrusion Detection and Prevention
Internet Security & Applications
Security & Network Management
E-mail security, Spam, Phishing, E-mail fraud
Virus, worms, Trojon Protection
Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
Ubiquitous Computing Security
Web 2.0 security
Cryptographic protocols
Performance Evaluations of Protocols & Security Application
Paper Submission
Authors are invited to submit papers for this journal through E-mail:
ijnsa@airccse.org
or through
Submission System
. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
Submission Deadline
:
July 30, 2022
Authors Notification
:
August 24, 2022
Final Manuscript Due
:
August 27, 2022
Publication Date
:
Determined by the Editor-in-Chief
Note
AIRCC's International Journal of Network Security & Its Applications (IJNSA) is dedicated to strengthen the field of Security & Its Applications and publishes only good quality papers. IJNSA is highly selective and maintains less than 20% acceptance rate. All accepted papers will be tested for plagiarism manually as well as by Docoloc . Papers published in IJNSA has received enormous citations and has been regarded as one of the best Journal in the Security research field.
Current Issue
May 2022, Volume 14, Number 3
An Evaluation of Security in Blockchain-based Sharing of Student Records in Higher Education
Full Text
Timothy Arndt
1
, Angela Guercio
2
and Younghun Chae
2
,
1
Cleveland State University, USA,
2
Kent State University at Stark, USA
Detecting Malware in Portable Executable Files using Machine Learning Approach
Full Text
Tuan Nguyen Kim
1
, Ha Nguyen Hoang
2
and Nguyen Tran Truong Thien
1
,
1
Duy Tan University, Vietnam,
2
University of Sciences, Hue University, Vietnam
Blockchain Security : Enhanced Control Evaluation Approach to Protect Organizations’ Accounting Information
Full Text
Angel R. Otero, Florida Institute of Technology, USA
Cyber Security of Smart Watches : A Review of the Vulnerabilities with Recommendations Presented to Protect the Wearables
Full Text
Aaron James Webb, Macquarie University, Australia
Context-Aware Security Mechanism for Mobile Cloud Computing
Full Text
Cláudio Aroucha and Higo Felipe Pires, Federal University of Maranhão, Brazil
March 2022, Volume 14, Number 2
An Efficient Secure Cryptography Scheme for New ML-based RPL Routing Protocol in Mobile IoT Environment
Full Text
Kishore Golla and S. PallamSetty, Andhra University, India
The Effectiveness of Applying Different Strategies on Recognition and Recall Textual Password
Full Text
Hassan Wasfi and Richard Stone, Iowa State University, USA
Hybridized Model for Data Security Based on Security Hash Analysis (SHA 512) and Salting Techniques
Full Text
Felix Aranuwa
1
, Ford Olubodun
2
and David Akinwumi
1
,
1
Adekunle Ajasin University, Nigeria,
2
Auchi Polytechnic, Nigeria
January 2022, Volume 14, Number 1
A Robust Cybersecurity Topic Classification Tool
Full Text
Elijah Pelofske
1
, Lorie M. Liebrock
1
and Vincent Urias
2
,
1
New Mexico Institute of Mining and Technology, USA,
2
Sandia National Laboratories, New Mexico, USA
Enablers to Boost Blockchain Adoption in EU
Full Text
Artemis Voulkidis
1
, Theodore Zahariadis
1,2
, Andreas Papadakis
3
and Charalambos Ipektsidis
4
,
1
Synelixis SA, Greece,
2
National and Kapodistrian University of Athens, Greece,
3
School of Pedagogical and Technological Education (ASPETE), Greece,
4
Intrasoft International SA, Luxembourg
Offline Signature Recognition via Convolutional Neural Network and Multiple Classifiers
Full Text
Fadi Mohammad Alsuhimat and Fatma Susilawati Mohamad, Universiti Sultan Zainal Abidin, Malaysia
A Secure DNA Cryptosystem based on Steganography and Indexing Cipher
Full Text
Tamer Barakat
1
, Nahed Mahmoud
1
, Ihab. A. Ali
2
and Mohamed Hamdi
1
,
1
Fayoum University, Egypt,
2
Helwan University, Egypt
November 2021, Volume 13, Number 6
Detection Method for Classifying Malicious Firmware
Full Text
David Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA
Malicious Javascript Detection based on Clustering Techniques
Full Text
Nguyen Hong Son
1
and Ha Thanh Dung
2
,
1
Faculty of Information Technology Posts and Telecommunications Institute of Technology, Vietnam,
2
Saigon University, Vietnam
Understanding Traffic Patterns of Covid-19 IoC in Huge Academic Backbone Network SINET
Full Text
Ruo Ando
1
, Youki Kadobayashi
2
, Hiroki Takakura
1
and Hiroshi Itoh
3
,
1
National Institute of Informatics, Japan,
2
Nara Institute of Science and Technology, Japan,
3
National Institute of Information and Communications Technology, Japan
Improving Security and Fairness in Federated Learning Systems
Full Text
Andrew R. Short
1
, Τheofanis G. Orfanoudakis
2
and Helen C. Leligou
1
,
1
University of West Attica, Greece,
2
Hellenic Open University, Greece
Improve Security in Smart Cities Based on IoT, Solve Cyber Electronic Attacks with Technology by using Packet Tracer
Full Text
Raed Al-hamarneh, University of Almaarefa, Kingdom of Saudi Arabia
System End-User Actions as a Threat to Information System Security
Full Text
Paulus Kautwima, Titus Haiduwa, Kundai Sai, Valerianus Hashiyana and Nalina Suresh, University of Namibia, Namibia
Information and Communication Security Mechanisms For Microservices-based Systems
Full Text
Lenin Leines-Vite, Juan Carlos Pérez-Arriaga and Xavier Limón, Universidad Veracruzana, Mexico
Comparative Review of Malware Analysis Methodologies
Full Text
Ioannis G. Kiachidis and Dimitrios A. Baltatzis, International Hellenic University, Greece
September 2021, Volume 13, Number 5
Evaluation of a Blockchain-Enabled Resource Management Mechanism for NGNs
Full Text
Michael Xevgenis, Dimitrios G. Kogias, Ioannis Christidis, Charalampos Patrikakis and Helen C. Leligou, University of West Attica, Greece
Secure Blockchain Decentralized Voting for Verified Users
Full Text
Piotr Pospiech, Aleksander Marianski and Michal Kedziora, Wroclaw University of Science and Technology, Poland
July 2021, Volume 13, Number 4
Use of MARKOV Chain for Early Detecting DDoS Attacks
Full Text
Chin-Ling Chen
1
and Jian-Ming Chen
2
, 1National Pingtung University, Taiwan,
2
Genesis Technology, Inc., Taiwan
Constructing the 2-Element AGDS Protocol based on the Discrete Logarithm Problem
Full Text
Tuan Nguyen Kim
1
, Duy Ho Ngoc
2
and Nikolay A. Moldovyan
3
,
1
Duy Tan University, Vietnam,
2
Ha Noi, Vietnam,
3
St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russi
Proof-of-Reputation: An Alternative Consensus Mechanism for Blockchain Systems
Full Text
Oladotun Aluko
1
and Anton Kolonin
2
,
1
Novosibirsk State University, Russia,
2
Aigents Group, Russia
Critical Infrastructure Cybersecurity Challenges: IoT in Perspective
Full Text
Akwetey Henry Matey
1
, Paul Danquah
2
, Godfred Yaw Koi-Akrofi1 and Isaac Asampana
1
, 1University of Professional Studies Accra,
2
Heritage Christian University
Collective Signature Protocols for Signing Groups based on Problem of Finding Roots Modulo Large Prime Number
Full Text
Tuan Nguyen Kim
1
, Duy Ho Ngoc
2
and Nikolay A. Moldovyan
3
,
1
Duy Tan University, Vietnam,
2
Ha Noi, Vietnam,
3
St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia
May 2021, Volume 13, Number 3
Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks
Full Text
David A. Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA
Effect Man-In the Middle on the Network Performance in Various Attack Strategies
Full Text
Iyas Alodat, Jerash University, Jordan
Information-Centric Blockchain Technology for the Smart Grid
Full Text
Lanqin Sang and Henry Hexmoor, Southern Illinois University, USA
A Survey on Federated Identity Management Systems Limitation and Solutions
Full Text
Maha Aldosary and Norah Alqahtani, Imam Mohammad Ibn Saud Islamic University, KSA
March 2021, Volume 13, Number 2
Comparison of Malware Classification Methods using Convolutional Neural Network based on API Call Stream
Full Text
Matthew Schofield, Gulsum Alicioglu, Bo Sun, Russell Binaco, Paul Turner, Cameron Thatcher, Alex Lam and Anthony Breitzman, Rowan University, USA
Performance Evaluation of Machine Learning Techniques for DOS Detection in Wireless Sensor Network
Full Text
Lama Alsulaiman and Saad Al-Ahmadi, King Saud University, Saudi Arabia
Applying the Health Belief Model to Cardiac Implanted Medical Device Patients
Full Text
George W. Jackson
1
and Shawon Rahman
2
,
1
Capella University, USA,
2
University of HawaiiHilo, USA
A Literature Survey and Analysis on Social Engineering Defense Mechanisms and Infosec Policies
Full Text
Dalal Alharthi and Amelia Regan, University of California Irvine, USA
Phishing Mitigation Techniques: A Literature Survey
Full Text
Wosah Peace Nmachi and Thomas Win, School of Computing & Engineering University of Gloucestershire, United Kingdom
January 2021, Volume 13, Number 1
Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms
Full Text
SWilliam R. Simpson and Kevin E. Foltz, The Institute for Defense Analyses (IDA), USA
Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset
Full Text
Geeta Kocher
1
and Gulshan Kumar
2
,
1
MRSPTU, India,
2
SBSSTC, Indi
Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis
Full Text
Anna Georgiadou, Spiros Mouzakitis and Dimitrios Askounis, National Technical University of Athens, Greec
Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys
Full Text
Cheman Shaik, VISH Consulting Services Inc, US
Game Theory Application Resources Management and Distribution in Blockchain Network
Full Text
Cong Hung Tran
1
, Dien Tam Le
1, 2
, Thanh Hieu Huynh
3
,
1
Posts and Telecommunications Institute of Technology, Vietnam,
2
Thu Duc Technology College, Vietnam,
3
Saigon University, Vietnam
November 2020, Volume 12, Number 6
Hybrid Chaotic Method for Medical Images Ciphering
Full Text
Seham Muawadh Ali Ebrahim, Modern Academy for Engineering and Information Technology, Egypt
The Brazilian Law on Personal Data Protection
Full Text
Jonatas S. de Souza
1, 2
, Jair M. Abe
1
, Luiz A. de Lima
1, 2
and Nilson A. de Souza
2, 3
,
1
Paulista University, São Paulo, Brazil,
2
National Association of Data Privacy Professionals, ANPPD, Brazil,
3
São Paulo State Supplementary Pension Foundation, PREVCOM, Brazi
September 2020, Volume 12, Number 5
Secured AODV to Protect WSN Against Malicious Intrusion
Full Text
Saad Al-Ahmadi and Abdulrahman Alseqyani, King Saud University, Saudi Arabia
July 2020, Volume 12, Number 4
Enhanced Authentication for Web-Based Security using Keystroke Dynamics
Full Text
Siti Rahayu Selamat
1
, Teh Teck Guan
2
and Robiah Yusof
1
,
1
Universiti Teknikal Malaysia Melaka, Malaysia,
2
Infineon Technologies Melaka, Malaysia
A Proposed Model for Dimensionality Reduction to Improve the Classification Capability of Intrusion Protection Systems
Full Text
Hajar Elkassabi, Mohammed Ashour and Fayez Zaki, Mansoura University, Egypt
Effective Method for Managing Automation and Monitoring in Multi-cloud Computing: Panacea for Multi-cloud Security Snags
Full Text
Uchechukwu Emejeamara
1
, Udochukwu Nwoduh
2
and Andrew Madu
2
,
1
IEEE Computer Society, Connecticut Section, USA,
2
Federal Polytechnic Nekede, Nigeria
May 2020, Volume 12, Number 3
Ontology-based Model for Security Assessment: Predicting Cyberattacks through Threat Activity Analysis
Full Text
Pavel Yermalovich and Mohamed Mejri, Université Laval, Canada
Advanced Multimedia Platform based on Big Data and Artificial Intelligence Improving Cybersecurity
Full Text
Alessandro Massaro
1*
, Gaetano Panarosa
1
, Nicola Savino
1
, Simone Buonopane
2
and Angelo Galiano
1
,
1
Dyrecta Lab, IT Research Laboratory, Italy,
2
Spacertron srl, Italy
An Empirical Analysis of Email Forensics Tools
Full Text
Ahmad Ghafarian, Ash Mady and Kyung Park, University of North Georgia, USA
PDMLP: Phishing Detection using Multilayer Perceptron
Full Text
Saad Al-Ahmadi and Tariq Lasloum, King Saud University, Saudi Arabia
March 2020, Volume 12, Number 2
Security Consideration in Peer-to-peer Networks with A Case Study Application
Full Text
Nick Rahimi, Southern Illinois University, USA
Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dynamic Billing System in Smart Grid Using Permissioned Blockchain
Full Text
Ozgur Oksuz, Adiyaman University, Turkey
A Survey on Malware Detection and Analysis Tools
Full Text
Sajedul Talukder
1
and Zahidur Talukder
2
,
1
Edinboro University, USA and
2
University of Texas at Arlington, USA
An Enhanced User Authentication Framework in Cloud Computing
Full Text
Hasan Al-Refai, Khaldoun Batiha, Ahmad M. Al-Refai, Philadelphia University, Jordan
January 2020, Volume 12, Number 1
A Survey on the Use of Data Clustering for Intrusion Detection System in Cybersecurity
Full Text
Binita Bohara
1
, Jay Bhuyan
1
, Fan Wu
1
and Junhua Ding
2
,
1
Tuskegee University, USA and
2
University of North Texas, USA
Self-organization and Autonomous Network Survey
Full Text
Houneida SAKLY, Campus University of Mannouba, Tunisia
Editor in Chief
Jae-Kwang Lee
, Hannam University, South Korea
Associate Editor
Dhinaharan Nagamalai
, Wireilla Net Solutions, Australia
Shawon S.M. Rahman
, University of Hawaii-Hilo, USA
N. Jeyanthi
, VIT University, India
Editorial Board Members
Vatsa A.K
, Shobhit University, India
Alireza Nemaney Pour
, Islamic Azad University of Abhar, Iran
Amizah Malip
, University of Malaya, Malaya
Anas Abou El Kalam
, UCA/ENSA of Marrakesh, Morocco
Annamma Abraham
, B M S Institute of Technology, India
... More