Monday, February 2, 2026

International Journal of Network Security & Its Applications (IJNSA) - Current Issue: January 2026, Volume 18, Number 1

#networksecurity #security #network #blockchain #technology #cybersecurity #artificialintelligence #machinelearning #database #systemsecurity #optimization #internetsecurity #mobile #adhoc #sensors #protocols #Management #intrusion #detection #prevention



International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Current Issue: January 2026, Volume 18, Number 1

Empirical Telemetry-based Metrics for Evaluating Honeypot Realism and Deception Effectiveness
Teresita Noelia Nunez Migliorisi, University of Delaware, USA

Optimized Naive Bayes for Phishing Website Detection using Hybrid TF - IDF and Character Level URL Features
Hieu Ngo Van, Tin Trinh Quang, Phuong Nguyen Thi Thanh, Huong Mai Quoc and Dung Nguyen Thi Thuy, Duy Tan University, Vietnam

Advanced Graph Neural Network Mechanisms for IoT Network Intrusion Detection: A Comprehensive Study of Prototype-Based, Contrastive, and Structure Learning Approaches
Mehmet Baris Yaman, Foundational Technology, Turkey

Machine Learning for Network Intrusion Detection in Usa Critical Infrastructure: Challenges and Opportunities
Joy Selasi Agbesi 1, Abigail Nanayaa Otchill 2, Raymond Horlalie Tay 3 and Noah K. Bamfo 4 , 1Ohio University, USA, 2Foundation and Support, United States, 3College of Engineering Northeastern University, United States, 4Consulting Network Engineer, United States

OTN in the 5g Era: Transporting Massive Ip-Based Mobile Traffic
Joy Selasi Agbesi , Ohio University, USA


Contact us:
Here's where you can reach us : ijnsa@airccse.org or ijnsa@aircconline.com or ijnsajournl@gmail.com

Friday, January 30, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: January 31, 2026



Wednesday, January 28, 2026

International Journal of Network Security & Its Applications (IJNSA)

#CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork



Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Paper Submission
Authors are invited to submit papers for this journal through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. For paper format download the template here.





International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


System Call Dependence Graph Based Behavior Decomposition of Android Applications
Bin Zhao, JD.com Silicon Valley R&D Center, USA

Abstract
Millions of developers and third-party organizations have flooded into the Android ecosystem due to Android’s open-source feature and low barriers to entry for developers. .However, that also attracts many attackers. Over 90 percent of mobile malware is found targeted on Android. Though Android provides multiple security features and layers to protect user data and system resources, there are still some overprivileged applications in Google Play Store or third-party Android app stores at wild. In this paper, we proposed an approach to map system level behavior and Android APIs, based on the observation that system level behaviors cannot be avoided but sensitive Android APIs could be evaded.To the best of our knowledge, our approach provides the first work to decompose Android application behaviors based on system-level behaviors. We then map system level behaviors and Android APIs through System Call Dependence Graphs. The study also shows that our approach can effectively identify potential permission abusing, with an almost negligible performance impact.

Keywords
Behavior Representation, System Call Dependence Graph, Privilege Escalation, Android APIs





Monday, January 26, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: January 31, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Thursday, January 22, 2026

International Journal of Network Security & Its Applications (IJNSA)

#intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Citations 12161   h-index 52   i10-index 220


For More Details, Please Visit:  https://airccse.org/journal/ijnsa.html

Wednesday, January 21, 2026

7th International Conference on Signal Processing and Machine Learning (SIGML 2026)

#SignalProcessing #machinelearning #DigitalSignalProcessing #coding #transmission #communication #imageprocessing #storage #retrieval #computervision #patternrecognition #internetofthings #deeplearning #SIGNAL #Engineering #technology #audioprocessing #computerscience #neuralnetworks #robotics #softwaredeveloper #dataanalysis #DigitalTransformation #artificialintelligence #datascience #electronics #imageanalysis #embeddedsystems #objectdetection #ElectronicsEngineering



Call for Research Articles...!!!

7th International Conference on Signal Processing and Machine Learning (SIGML 2026)
March 14 ~ 15, 2026, Vienna, Austria


Paper Submission
Authors are invited to submit papers through the conference Submission System by January 24, 2026. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings (H index 45) in Computer Science & Information Technology (CS & IT) series (Confirmed).



International Journal of Network Security & Its Applications (IJNSA) - Current Issue: January 2026, Volume 18, Number 1

#networksecurity #security #network #blockchain #technology #cybersecurity #artificialintelligence #machinelearning #database #systemsecurit...