SlideShare a Scribd company logo
1 of 2
Download to read offline
International Journal of Network Security & Its Applications (IJNSA) - ERA,
WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)
https://airccse.org/journal/ijnsa.html
Citations, h-index, i10-index
Citations 10519 h-index 48 i10-index 199
Scope & Topics
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly
open access peer-reviewed journal that publishes articles which contribute new results in all
areas of the computer Network Security & its applications. The journal focuses on all technical
and practical aspects of security and its applications for wired and wireless networks. The goal of
this journal is to bring together researchers and practitioners from academia and industry to focus
on understanding Modern security threats and countermeasures, and establishing new
collaborations in these areas.
Topics of Interest include, but are not limited to, the following
 Artificial intelligence, Machine Learning for Security
 Blockchain Technology, Cryptocurrencies and Cyber Security
 Cloud, Fog, Edge & Cognitive Security
 Cryptographic Protocols
 Cyber Physical System (CPS) Security (autonomous vehicles, industrial control systems)
 Data Center Network Control, Security and Optimization
 Database and System Security
 E-mail security, Spam, Phishing, E-mail fraud
 Hardware-Based Attacks
 Internet of Things (IoT) Security
 Internet Security & Applications (Social networking, crowd sourcing and Web based
applications, services security)
 Intrusion Detection and Prevention
 Mobile, Ad Hoc and Sensor Network Security
 Peer-to-Peer Network Security
 Performance Evaluations of Protocols & Security Application
 Security & Network Management
 Security for emerging networks (SDN, Home Networks, Body-area Networks, VANETs)
 Security of Virtual Machines
 Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
 Security, Trust and Privacy Challenges
 Smart City, Grid, Electronic Voting Security
 Network and Wireless Network Security
 Ubiquitous Computing Security
 Virus, worms, Trojan Protection
 Web 2.0 Security
Paper Submission
Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or
through Submission System. Submissions must be original and should not have been published
previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
 Submission Deadline: March 16, 2024
 Acceptance Notification: April 13, 2024
 Final Manuscript Due: April 20, 2024
 Publication Date: Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com
For other details, please visit: https://airccse.org/journal/ijnsa.html
Paper Submission Link: https://airccse.com/submissioncs/home.html

More Related Content

Similar to Research Article Submission - International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...IJNSA Journal
 
Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...IJNSA Journal
 
Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Research Paper Submission - International Journal of Network Security & Its A...
Research Paper Submission - International Journal of Network Security & Its A...Research Paper Submission - International Journal of Network Security & Its A...
Research Paper Submission - International Journal of Network Security & Its A...IJNSA Journal
 
Research Articles Submission - International Journal of Network Security & It...
Research Articles Submission - International Journal of Network Security & It...Research Articles Submission - International Journal of Network Security & It...
Research Articles Submission - International Journal of Network Security & It...IJNSA Journal
 
Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 

Similar to Research Article Submission - International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed (20)

Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...
 
Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...
 
Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Research Paper Submission - International Journal of Network Security & Its A...
Research Paper Submission - International Journal of Network Security & Its A...Research Paper Submission - International Journal of Network Security & Its A...
Research Paper Submission - International Journal of Network Security & Its A...
 
Research Articles Submission - International Journal of Network Security & It...
Research Articles Submission - International Journal of Network Security & It...Research Articles Submission - International Journal of Network Security & It...
Research Articles Submission - International Journal of Network Security & It...
 
Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 

Recently uploaded

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 

Research Article Submission - International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

  • 1. International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print) https://airccse.org/journal/ijnsa.html Citations, h-index, i10-index Citations 10519 h-index 48 i10-index 199 Scope & Topics The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas. Topics of Interest include, but are not limited to, the following  Artificial intelligence, Machine Learning for Security  Blockchain Technology, Cryptocurrencies and Cyber Security  Cloud, Fog, Edge & Cognitive Security  Cryptographic Protocols  Cyber Physical System (CPS) Security (autonomous vehicles, industrial control systems)  Data Center Network Control, Security and Optimization  Database and System Security  E-mail security, Spam, Phishing, E-mail fraud  Hardware-Based Attacks  Internet of Things (IoT) Security  Internet Security & Applications (Social networking, crowd sourcing and Web based applications, services security)  Intrusion Detection and Prevention  Mobile, Ad Hoc and Sensor Network Security  Peer-to-Peer Network Security  Performance Evaluations of Protocols & Security Application  Security & Network Management  Security for emerging networks (SDN, Home Networks, Body-area Networks, VANETs)  Security of Virtual Machines  Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)  Security, Trust and Privacy Challenges  Smart City, Grid, Electronic Voting Security  Network and Wireless Network Security  Ubiquitous Computing Security  Virus, worms, Trojan Protection  Web 2.0 Security Paper Submission Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
  • 2. Important Dates  Submission Deadline: March 16, 2024  Acceptance Notification: April 13, 2024  Final Manuscript Due: April 20, 2024  Publication Date: Determined by the Editor-in-Chief Contact Us Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com For other details, please visit: https://airccse.org/journal/ijnsa.html Paper Submission Link: https://airccse.com/submissioncs/home.html