Monday, June 30, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: July 05, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Friday, June 27, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#network #optimization #database #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime


Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Thursday, June 26, 2025

6th International Conference on Natural Language Computing Advances (NLCA 2025)

#CallForPapers #CallForAbstracts #callforsubmissions #journal #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork



Submit Your Research Articles...!!!

6th International Conference on Natural Language Computing Advances (NLCA 2025)
September 20 ~ 21, 2025, Copenhagen, Denmark


Submission Deadline: June 28, 2025

Contact us:
Here's where you can reach us: nlca@itcse2025.org (or) nlca_conf@yahoo.com

Wednesday, June 25, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


A Multi-Layer Hybrid Text Steganography for Secret Communication Using Word Tagging and RGB Color Coding
Ali F. Al-Azzawi1, Philadelphia University, Jordan

Abstract
This paper introduces a multi-layer hybrid text steganography approach by utilizing word tagging and recoloring. Existing approaches are planned to be either progressive in getting imperceptibility, or high hiding limit, or robustness. The proposed approach does not use the ordinary sequential inserting process and overcome issues of the current approaches by taking a careful of getting imperceptibility, high hiding limit, and robustness through its hybrid work by using a linguistic technique and a format-based technique. The linguistic technique is used to divide the cover text into embedding layers where each layer consists of a sequence of words that has a single part of speech detected by POS tagger, while the format-based technique is used to recolor the letters of a cover text with a near RGB color coding to embed 12 bits from the secret message in each letter which leads to high hidden capacity and blinds the embedding, moreover, the robustness is accomplished through a multi-layer embedding process, and the generated stego key significantly assists the security of the embedding messages and its size. The experimental results comparison shows that the purpose approach is better than currently developed approaches in providing an ideal balance between imperceptibility, high hiding limit, and robustness criteria.

Keywords
Text Stenography, Python Programming language, Multi-layer encoding, Natural Language Prepossessing, Color space





Monday, June 23, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


June 2025 - Top 10 Read Articles in Network Security and Its Applications

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy




Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: June 28, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Friday, June 20, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


A Lightweight Network Intrusion Detection System for SMEs
Homam El-Ta, Mawadah Fahhad, Reeman Abumlha, Shadan Showman and Zaina Saab, Dar Al-Hekma University, Saudi Arabia

Abstract
Small and medium enterprises (SMEs) face increasing cybersecurity threats but often lack access to practical and affordable intrusion detection solutions. This article proposes a lightweight, modular Network Intrusion Detection System (NIDS) tailored to SME environments, emphasizing low resource consumption, ease of deployment, and scalable functionality. The system integrates signature-based detection with streamlined behavioural analysis to deliver strong threat identification without overwhelming infrastructure or administrative capacity. A structured evaluation framework and comparative benchmarking against existing lightweight IDS solutions demonstrate the system’s potential to achieve high detection accuracy, efficient resource usage, and real-time responsiveness. By aligning security capabilities with SME operational realities, the proposed solution aims to bridge a critical gap in cybersecurity resilience, enabling smaller organizations to strengthen their defences and contribute to broader digital ecosystem security.

Keywords
Small-to-Medium Enterprises (SMEs), Intrusion Detection Systems (IDS), Network-Based Intrusion Detection Systems (NIDS), Host-Based Intrusion Detection Systems (HIDS)





International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #p...