International Journal of Network Security & Its Applications- ERA Listed

IJNSA 2021


Engineering & Computer Science (General)





International Journal of Network Security & Its Applications (IJNSA) -- ERA Listed
Citations, h-index, i10-index of IJNSA
Citations 7069   h-index 40   i10-index 154
Call for Papers
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Topics of Interest
Network and Wireless Network Security
Mobile, Ad Hoc and Sensor Network Security
Peer-to-Peer Network Security
Database and System Security
Intrusion Detection and Prevention
Internet Security & Applications
Security & Network Management
E-mail security, Spam, Phishing, E-mail fraud
Virus, worms, Trojon Protection
Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
Ubiquitous Computing Security
Web 2.0 security
Cryptographic protocols
Performance Evaluations of Protocols & Security Application
Paper Submission
Authors are invited to submit papers for this journal through E-mail:
ijnsa@airccse.org
or through
Submission System
. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
Submission Deadline
:
March 06, 2021
Authors Notification
:
April 06, 2021
Final Manuscript Due
:
April 14, 2021
Publication Date
:
Determined by the Editor-in-Chief
Note
AIRCC's International Journal of Network Security & Its Applications (IJNSA) is dedicated to strengthen the field of Security & Its Applications and publishes only good quality papers. IJNSA is highly selective and maintains less than 20% acceptance rate. All accepted papers will be tested for plagiarism manually as well as by Docoloc . Papers published in IJNSA has received enormous citations and has been regarded as one of the best Journal in the Security research field.
Current Issue
January 2021, Volume 13, Number 1
Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms
Full Text
SWilliam R. Simpson and Kevin E. Foltz, The Institute for Defense Analyses (IDA), USA
Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset
Full Text
Geeta Kocher
1
and Gulshan Kumar
2
,
1
MRSPTU, India,
2
SBSSTC, India
Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis
Full Text
Anna Georgiadou, Spiros Mouzakitis and Dimitrios Askounis, National Technical University of Athens, Greece
Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys
Full Text
Cheman Shaik, VISH Consulting Services Inc, USA
Game Theory Application Resources Management and Distribution in Blockchain Network
Full Text
Cong Hung Tran
1
, Dien Tam Le
1, 2
, Thanh Hieu Huynh
3
,
1
Posts and Telecommunications Institute of Technology, Vietnam,
2
Thu Duc Technology College, Vietnam,
3
Saigon University, Vietnam
November 2020, Volume 12, Number 6
Hybrid Chaotic Method for Medical Images Ciphering
Full Text
Seham Muawadh Ali Ebrahim, Modern Academy for Engineering and Information Technology, Egypt
The Brazilian Law on Personal Data Protection
Full Text
Jonatas S. de Souza
1, 2
, Jair M. Abe
1
, Luiz A. de Lima
1, 2
and Nilson A. de Souza
2, 3
,
1
Paulista University, São Paulo, Brazil,
2
National Association of Data Privacy Professionals, ANPPD, Brazil,
3
São Paulo State Supplementary Pension Foundation, PREVCOM, Brazil
September 2020, Volume 12, Number 5
Secured AODV to Protect WSN Against Malicious Intrusion
Full Text
Saad Al-Ahmadi and Abdulrahman Alseqyani, King Saud University, Saudi Arabia
July 2020, Volume 12, Number 4
Enhanced Authentication for Web-Based Security using Keystroke Dynamics
Full Text
Siti Rahayu Selamat
1
, Teh Teck Guan
2
and Robiah Yusof
1
,
1
Universiti Teknikal Malaysia Melaka, Malaysia,
2
Infineon Technologies Melaka, Malaysia
A Proposed Model for Dimensionality Reduction to Improve the Classification Capability of Intrusion Protection Systems
Full Text
Hajar Elkassabi, Mohammed Ashour and Fayez Zaki, Mansoura University, Egypt
Effective Method for Managing Automation and Monitoring in Multi-cloud Computing: Panacea for Multi-cloud Security Snags
Full Text
Uchechukwu Emejeamara
1
, Udochukwu Nwoduh
2
and Andrew Madu
2
,
1
IEEE Computer Society, Connecticut Section, USA,
2
Federal Polytechnic Nekede, Nigeria
May 2020, Volume 12, Number 3
Ontology-based Model for Security Assessment: Predicting Cyberattacks through Threat Activity Analysis
Full Text
Pavel Yermalovich and Mohamed Mejri, Université Laval, Canada
Advanced Multimedia Platform based on Big Data and Artificial Intelligence Improving Cybersecurity
Full Text
Alessandro Massaro
1*
, Gaetano Panarosa
1
, Nicola Savino
1
, Simone Buonopane
2
and Angelo Galiano
1
,
1
Dyrecta Lab, IT Research Laboratory, Italy,
2
Spacertron srl, Italy
An Empirical Analysis of Email Forensics Tools
Full Text
Ahmad Ghafarian, Ash Mady and Kyung Park, University of North Georgia, USA
PDMLP: Phishing Detection using Multilayer Perceptron
Full Text
Saad Al-Ahmadi and Tariq Lasloum, King Saud University, Saudi Arabia
March 2020, Volume 12, Number 2
Security Consideration in Peer-to-peer Networks with A Case Study Application
Full Text
Nick Rahimi, Southern Illinois University, USA
Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dynamic Billing System in Smart Grid Using Permissioned Blockchain
Full Text
Ozgur Oksuz, Adiyaman University, Turkey
A Survey on Malware Detection and Analysis Tools
Full Text
Sajedul Talukder
1
and Zahidur Talukder
2
,
1
Edinboro University, USA and
2
University of Texas at Arlington, USA
An Enhanced User Authentication Framework in Cloud Computing
Full Text
Hasan Al-Refai, Khaldoun Batiha, Ahmad M. Al-Refai, Philadelphia University, Jordan
January 2020, Volume 12, Number 1
A Survey on the Use of Data Clustering for Intrusion Detection System in Cybersecurity
Full Text
Binita Bohara
1
, Jay Bhuyan
1
, Fan Wu
1
and Junhua Ding
2
,
1
Tuskegee University, USA and
2
University of North Texas, USA
Self-organization and Autonomous Network Survey
Full Text
Houneida SAKLY, Campus University of Mannouba, Tunisia
Editor in Chief
Jae-Kwang Lee
, Hannam University, South Korea
Associate Editor
Dhinaharan Nagamalai
, Wireilla Net Solutions, Australia
Shawon S.M. Rahman
, University of Hawaii-Hilo, USA
N. Jeyanthi
, VIT University, India
Editorial Board Members
Vatsa A.K
, Shobhit University, India
Alireza Nemaney Pour
, Islamic Azad University of Abhar, Iran
Amizah Malip
, University of Malaya, Malaya
Anas Abou El Kalam
, UCA/ENSA of Marrakesh, Morocco
Annamma Abraham
, B M S Institute of Technology, India
... More