Monday, June 30, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: July 05, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Friday, June 27, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#network #optimization #database #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime


Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Thursday, June 26, 2025

6th International Conference on Natural Language Computing Advances (NLCA 2025)

#CallForPapers #CallForAbstracts #callforsubmissions #journal #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork



Submit Your Research Articles...!!!

6th International Conference on Natural Language Computing Advances (NLCA 2025)
September 20 ~ 21, 2025, Copenhagen, Denmark


Submission Deadline: June 28, 2025

Contact us:
Here's where you can reach us: nlca@itcse2025.org (or) nlca_conf@yahoo.com

Wednesday, June 25, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


A Multi-Layer Hybrid Text Steganography for Secret Communication Using Word Tagging and RGB Color Coding
Ali F. Al-Azzawi1, Philadelphia University, Jordan

Abstract
This paper introduces a multi-layer hybrid text steganography approach by utilizing word tagging and recoloring. Existing approaches are planned to be either progressive in getting imperceptibility, or high hiding limit, or robustness. The proposed approach does not use the ordinary sequential inserting process and overcome issues of the current approaches by taking a careful of getting imperceptibility, high hiding limit, and robustness through its hybrid work by using a linguistic technique and a format-based technique. The linguistic technique is used to divide the cover text into embedding layers where each layer consists of a sequence of words that has a single part of speech detected by POS tagger, while the format-based technique is used to recolor the letters of a cover text with a near RGB color coding to embed 12 bits from the secret message in each letter which leads to high hidden capacity and blinds the embedding, moreover, the robustness is accomplished through a multi-layer embedding process, and the generated stego key significantly assists the security of the embedding messages and its size. The experimental results comparison shows that the purpose approach is better than currently developed approaches in providing an ideal balance between imperceptibility, high hiding limit, and robustness criteria.

Keywords
Text Stenography, Python Programming language, Multi-layer encoding, Natural Language Prepossessing, Color space





Monday, June 23, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


June 2025 - Top 10 Read Articles in Network Security and Its Applications

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy




Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: June 28, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Friday, June 20, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


A Lightweight Network Intrusion Detection System for SMEs
Homam El-Ta, Mawadah Fahhad, Reeman Abumlha, Shadan Showman and Zaina Saab, Dar Al-Hekma University, Saudi Arabia

Abstract
Small and medium enterprises (SMEs) face increasing cybersecurity threats but often lack access to practical and affordable intrusion detection solutions. This article proposes a lightweight, modular Network Intrusion Detection System (NIDS) tailored to SME environments, emphasizing low resource consumption, ease of deployment, and scalable functionality. The system integrates signature-based detection with streamlined behavioural analysis to deliver strong threat identification without overwhelming infrastructure or administrative capacity. A structured evaluation framework and comparative benchmarking against existing lightweight IDS solutions demonstrate the system’s potential to achieve high detection accuracy, efficient resource usage, and real-time responsiveness. By aligning security capabilities with SME operational realities, the proposed solution aims to bridge a critical gap in cybersecurity resilience, enabling smaller organizations to strengthen their defences and contribute to broader digital ecosystem security.

Keywords
Small-to-Medium Enterprises (SMEs), Intrusion Detection Systems (IDS), Network-Based Intrusion Detection Systems (NIDS), Host-Based Intrusion Detection Systems (HIDS)





Thursday, June 19, 2025

6th International Conference on Advances in Artificial Intelligence Techniques (ArIT 2025)

#ArtificialIntelligence #MachineLearning #datamining #bioinformatics #cloudcomputing #IoT #cybersecurity #deeplearning #fuzzy #engineering #patternrecognition #informationretrieval #computerscience #technology #datascience #AI #BigData #dataanalytics #programming #Robotics



Submit Your Research Articles...!!!

6th International Conference on Advances in Artificial Intelligence Techniques (ArIT 2025)
July 19 ~ 20, 2025, Toronto, Canada



Submission Deadline: June 21, 2025 [Final call : (Submissions after June 16, 2025)]

Contact us:
Here's where you can reach us: arit@cseit2025.org (or) arit_conf@yahoo.com

Wednesday, June 18, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Static Testing Tools Architecture in OpenMP for Exascale Systems
Samah Alajmani, Taif University, Saudi Arabia

Abstract
In the coming years, exascale systems are expected to be deployed at scale, offering unprecedented computational capabilities. These systems will address many significant challenges related to parallel programming and developer productivity, distinguishing themselves through massive performance and scalability. Considerable research efforts have been dedicated to this field, with a central focus on enhancing system performance. However, the inherent parallelism and complexity of exascale systems introduce new challenges, particularly in programming correctness and efficiency. Modern architectures often employ multicore processors to achieve high performance, increasing the need for robust development tools. In this paper, we present the design of a static testing tool architecture in OpenMP tailored for exascale systems. The primary objective of this architecture is to detect and resolve static errors that may occur during code development. Such errors can affect both program correctness and execution performance. Our proposed architecture aims to assist developers in writing correct and efficient OpenMP code, thereby improving overall software reliability in exascale computing environments.

Keywords
Exascale Systems, Software Testing, OpenMP, Static Testing Toolsand Programming Models




Tuesday, June 17, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Welcome To IJNSA [July 2025, Volume 17, Number 4]

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Citations 11658   h-index 51   i10-index 215

Submission Deadline: June 21, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Sunday, June 15, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: June 21, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Friday, June 13, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Scalability Analysis of IoT-DAG Distributed Ledgers using Preferential Attachment Topology: A Simulation Approach
Peter Kimemiah Mwangi, Stephen T. Njenga and Gabriel Ndung’u Kamau, Murang’a University of Technology, Murang’a, Kenya

Abstract
Directed Acyclic Graph (DAG) based Distributed Ledger Technologies (DLTs) are being explored to address the scalability and energy efficiency challenges of traditional blockchain in IoT applications. The objective of this research was to gain insight into algorithms predicting how IoT-DAG DLT horizontal scalability changes with increasing node count in a heterogeneous ecosystem of full and light nodes. It specifically questioned how incorporating preferential attachment topology impacts IoT network scalability and performance, focusing on transaction throughput and energy efficiency. Using an AgentBased Modelling (ABM) simulation, the study evaluated a heterogeneous 1:10 full/light node network with Barabási Albert Preferential Attachment (PA-2.3) across increasing node counts (100-6400). Performance was measured by Confirmed Transactions Per Second (CTPS) and Mean Transaction Latency (MTL). Results showed CTPS scales linearly with node count (R² ≈ 1.000), exhibiting robust predictability. MTL increased logarithmically (R² ≈ 0.970), becoming more predictable as the network grew. Horizontal scalability showed exponential decay. The study confirms that IoT-DAG DLTs with preferential attachment can achieve predictable, near-linear throughput horizontal scalability, highlighting that topology matters and optimising CTPS yields the highest throughput gains.

Keywords
Direct Acyclic Distributed Ledger, Horizontal Scalability, Internet of Things, NetLogo, Model Simulation, Preferential Attachment Topology





Thursday, June 12, 2025

6th International Conference on Artificial Intelligence and Machine Learning (CAIML 2025)

#artificialintelligence #machinelearning #bioinformatics #datamining #informationretrieval #multimedia #neuralnetworks #naturallanguageprocessing #patternrecognition #programming #robotics #SemanticWeb #softcomputing #computervision #FuzzyLogic #DataScience #technology #engineering #computerscience #BigData #deeplearning #dataanalytics #AI #informationtechnology #IoT #softwaredeveloper #analytics #computerengineering



Submit Your Research Articles...!!!

6th International Conference on Artificial Intelligence and Machine Learning (CAIML 2025)
September 20 ~ 21, 2025, Copenhagen, Denmark


Submission Deadline: June 14, 2025

Contact us:
Here's where you can reach us: caiml@itcse2025.org (or) caiml_conf@yahoo.com


Tuesday, June 10, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: June 15, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Monday, June 9, 2025

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Deep Learning Solutions for Source Code Vulnerability Detection
Nin Ho Le Viet, Long Phan, Hieu Ngo Van and Tin Trinh Quang, Duy Tan University, Vietnam

Abstract
Detecting vulnerabilities in software source code has become a critical aspect of developing secure systems. Traditional methods are increasingly limited in processing complex code structures and generalizing to previously unseen scenarios. In response, advanced deep learning models such as CNN, LSTM, Bi-LSTM, Self-Supervised Learning (SSL), and Transformer have demonstrated potential in automatically capturing the semantic and contextual characteristics embedded in code. This paper serves as both a guided review and a quantitative comparison of the performance of deep learning models for vulnerability detection. Key evaluation indicators, such as accuracy, F1-score, and computational cost, are used to benchmark the models. Results highlight that Transformer achieves the highest accuracy (96.8%), while CNN remains favorable in low-resource environments. The paper concludes with model selection guidelines and suggestions for future enhancements in real-world deployment.

Keywords
Source Code Vulnerability, Deep Learning, CodeBERT, GraphCodeBERT, GPT-4





Sunday, June 8, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: June 15, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Friday, June 6, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Access Detection System on Web Cameras and Microphones
Homam El-Taj, Amena Khoja, Basmah Alsharif, Dana Alsulami and Jumaina Abdulmajed, Dar Al-Hekma University, Saudi Arabia

Abstract
The proliferation of unauthorized access to webcams and microphones poses significant risks to user privacy and security. Current tools in the market fail to provide comprehensive detection and prevention mechanisms, often lacking hybrid capabilities and quick responses. SilentEye is a proposed system designed to address these gaps by integrating active monitoring, a database-driven detection approach, and automated mitigation features. Built for Windows PCs, SilentEye combines PowerShell scripts, Python-based interfaces, and MySQL databases to detect and respond to both known and unknown threats. This paper outlines the architecture, workflow, and proposed functionality of SilentEye, highlighting its ability to disable compromised devices, notify users of unauthorized access, and adapt dynamically through its evolving database. Though currently limited in platform scope and attack coverage, SilentEye lays the groundwork for a scalable, AI-enhanced detection framework. By addressing critical vulnerabilities and setting new standards for privacy protection, SilentEye demonstrates its potential as a robust tool in the evolving landscape of cybersecurity. Future work will focus on testing, cross-platform expansion, and integration of advanced machine learning techniques to further enhance its capabilities.

Keywords
Unauthorized access detection, Webcam security, Microphone security, PowerShell





Thursday, June 5, 2025

7th International Conference on Machine Learning & Applications (CMLA 2025)

#CallForPapers #callforsubmissions #submission #Submit #SubmitYourPaper #submitnow #deadline #phdstudent #phdresearch #research #ResearchScholar #researchpaper #researchers #article #online #submissionsopen #RegisterNow #Register #Papersubmission #opencall #event #applynow #meetings



7th International Conference on Machine Learning & Applications (CMLA 2025)
July 19 ~ 20, 2025, Toronto, Canada


Submission Deadline: June 07, 2025

Contact us:
Here's where you can reach us: cmla@cseit2025.org (or) cmla_conf@yahoo.com

Wednesday, June 4, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Detecting Malicious URLs: Trends, Challenges and the Role of Browser Extensions
Homam Eltaj and Maria Ajaj, Dar Al-Hekma University, Saudi Arabia

Abstract
Malicious URLs continue to pose a significant cybersecurity threat, frequently bypassing conventional detection systems through URL masking and rapid domain switching. This paper proposes a conceptual framework for a lightweight, real-time browser extension designed to block harmful URLs using a dynamically updated blacklist. Beyond detection, the system integrates a user-awareness module offering contextual security guidance and regulatory resources, promoting safer online behavior. The proposed extension aims to address key limitations in existing tools by offering client-side protection with minimal performance overhead and a community driven reporting mechanism. Although the current design employs deterministic logic, future development will incorporate machine learning to enhance adaptability and improve classification of emerging threats. By combining real-time detection, user education, and planned AI integration, the proposed solution contributes a practical and forward-looking approach to strengthening browserlevel web security.

Keywords
Malicious URL Detection, Browser Extensions, Phishing Prevention, AI-Based Security, Cybersecurity Awareness





Tuesday, June 3, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: June 08, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Monday, June 2, 2025

International Journal of Network Security & Its Applications (IJNSA) - Current Issue: May 2025, Volume 17, Number 3

#networksecurity #security #network #blockchain #technology #cybersecurity #artificialintelligence #machinelearning #database #systemsecurity #optimization #internetsecurity #mobile #adhoc #sensors #protocols #Management #intrusion #detection #prevention



International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Current Issue: May 2025, Volume 17, Number 3

Detecting Malicious URLs: Trends, Challenges and the Role of Browser Extensions
Homam Eltaj and Maria Ajaj, Dar Al-Hekma University, Saudi Arabia

Access Detection System on Web Cameras and Microphones
Homam El-Taj, Amena Khoja, Basmah Alsharif, Dana Alsulami and Jumaina Abdulmajed, Dar Al-Hekma University, Saudi Arabia

Deep Learning Solutions for Source Code Vulnerability Detection
Nin Ho Le Viet, Long Phan, Hieu Ngo Van and Tin Trinh Quang, Duy Tan University, Vietnam

Scalability Analysis of IoT-DAG Distributed Ledgers using Preferential Attachment Topology: A Simulation Approach
Peter Kimemiah Mwangi, Stephen T. Njenga and Gabriel Ndung’u Kamau, Murang’a University of Technology, Murang’a, Kenya

Static Testing Tools Architecture in OpenMP for Exascale Systems
Samah Alajmani, Taif University, Saudi Arabia

A Lightweight Network Intrusion Detection System for SMEs
Homam El-Ta, Mawadah Fahhad, Reeman Abumlha, Shadan Showman and Zaina Saab, Dar Al-Hekma University, Saudi Arabia


Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Friday, May 30, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Citations 11601   h-index 51   i10-index 215

Submission Deadline: May 31, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Thursday, May 29, 2025

6th International Conference on Natural Language Computing Advances (NLCA 2025)

#CallForPapers #CallForAbstracts #callforsubmissions #journal #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork



Submit Your Research Articles...!!!

6th International Conference on Natural Language Computing Advances (NLCA 2025)
September 20 ~ 21, 2025, Copenhagen, Denmark


Submission Deadline: May 31, 2025

Contact us:
Here's where you can reach us: nlca@itcse2025.org (or) nlca_conf@yahoo.com


Wednesday, May 28, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

A Tiered Blockchain Framework for Vehicular Forensics

Marcel C. Ugwu1, Izunna U. Okpala2, Collins I. Oham3 and Cosmas I. Nwakanma3, 1Seamfix Nigeria Limited, Nigeria, 2National Institute for Nigerian Languages, Nigeria and 3Federal University of Technology, Nigeria

Abstract

In this paper, we present a tiered vehicular forensics framework based on permission BlockChain. We integrate all entities involved in the forensics process and record their interactions in the BlockChain to generate comprehensive evidence for settling disputes and appropriating blame. We incorporate a watchdog entity in our tiered framework to prevent collusive tendencies of potentiality liable entities and to prevent exploitation of evidence. Also, we incorporate a state mechanism to prove the state of a smart vehicle when an accident occurs. Furthermore, we conduct a security analysis to demonstrate the resilience of our framework against identified attacks and describe security mechanisms used to achieve key requirements for vehicular forensics. Finally, we comparatively evaluate our framework against existing proposals.

Keywords

BlockChain, Smart Vehicles, Dispute settlement, Vehicular forensics

Original Source URL: https://aircconline.com/ijnsa/V10N5/10518ijnsa03.pdf

Volume URL: https://airccse.org/journal/jnsa18_current.html


Tuesday, May 27, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: May 31, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Monday, May 26, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy

Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Submission Deadline: May 31, 2025

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL: https://airccse.com/submissioncs/home.html


Friday, May 23, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Google Scholar URL: https://scholar.google.co.in/citations?hl=en&user=lhj_6AYAAAAJ

Citations 11584   h-index 51   i10-index 214

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL: https://airccse.com/submissioncs/home.html


Thursday, May 22, 2025

6th International Conference on Advances in Artificial Intelligence Techniques (ArIT 2025)

#CallForPapers #callforsubmissions #submission #Submit #SubmitYourPaper #submitnow #deadline #phdstudent #phdresearch #research #ResearchScholar #researchpaper #researchers #article #online #submissionsopen #RegisterNow #Register #Papersubmission #opencall #event #applynow #meetings



Submit Your Research Articles...!!!

6th International Conference on Advances in Artificial Intelligence Techniques (ArIT 2025)
July 19 ~ 20, 2025, Toronto, Canada


Submission Deadline: May 24, 2025

Contact us:
Here's where you can reach us: arit@cseit2025.org (or) arit_conf@yahoo.com

Wednesday, May 21, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

The Effect of Information Technology Using Enterprise Security Risk Management

Michael O. Adekanye and Shawon S. M. Rahman, University of Hawaii-Hilo, USA

Abstract

The philosophy of Enterprise Security Risk Management (ESRM) drives a risk-based approach to managing any security risks, physical or logical and holistically applies to every security process. There are globally established risk principles that are common among any developed risk management standard. This model associates the relationship of risk principles to the practice of managing security risks. The ESRM processes, when successfully and consistently adapted to a security program, will define what a progressive security program looks like, drive strategic through initiatives, build the business understanding of security’s role to develop a budgeting strategy, and initiate board-level, risk-based reporting. The management security leader's role in ESRM is to manage risks and unthinkable harm to enterprise assets and stockholder in partnership with the business leaders whose assets are exposed to those risks management. ESRM is part of educating business leaders on the realistic of impacts. These identified risks, presenting any potential strategies to mitigate those impacts, and enacting the option chosen by the business in line with acceptable levels of business risk tolerance. The present data should be used to showcase how our service helps identify, evaluate, and mitigate risks at face value that would be detrimental to a company’s long-term prosperity. We need to show how using our security risk management will ultimately benefit the company's work by improving policies and procedures and reducing other expenses through the use of risk principles management.

Keywords

Enterprises Security Risk Management, ESRM, Maturation of a Profession, Unfettered Rules, Risk Mitigation, Risk Mechanism, Enterprise Risk Management, Risk Principles Management, Manage Security Programs

Original Source URL: https://aircconline.com/ijnsa/V10N5/10518ijnsa02.pdf

Volume URL: https://airccse.org/journal/jnsa18_current.html

Tuesday, May 20, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

May 2025 - Top 10 Read Articles in Network Security and Its Applications

https://www.academia.edu/129443872/May_2025_Top_10_Read_Articles_in_Network_Security_and_Its_Applications

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL: https://airccse.com/submissioncs/home.html

Sunday, May 18, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy

Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Submission Deadline: May 24, 2025

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL: https://airccse.com/submissioncs/home.html


Friday, May 16, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy

Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Allconferencecfpalerts URL: https://allconferencecfpalerts.com/cfp/view.php?eno=65065

Submission Deadline: May 17, 2025

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL: https://airccse.com/submissioncs/home.html


Thursday, May 15, 2025

6th International Conference on Artificial Intelligence and Machine Learning (CAIML 2025)

#CallForPapers #CallForAbstracts #callforsubmissions #journal #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork


Submit Your Research Articles...!!!

6th International Conference on Artificial Intelligence and Machine Learning (CAIML 2025)

September 20 ~ 21, 2025, Copenhagen, Denmark

Webpage URL: https://itcse2025.org/caiml/index

Submission Deadline: May 18, 2025

Contact us:

Here's where you can reach us: caiml@itcse2025.org (or) caimlconfe@yahoo.com

Submission URL: https://itcse2025.org/submission/index


Wednesday, May 14, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions

Nicholas J. Miller and Mehrdad Aliasgari, California State University Long Beach, USA

Abstract

Anomaly-based Intrusion Detection Systems (IDS) have gained increased popularity over time. There are many proposed anomaly-based systems using different Machine Learning (ML) algorithms and techniques, however there is no standard benchmark to compare them based on quantifiable measures. In this paper, we propose a benchmark that measures both accuracy and performance to produce objective metrics that can be used in the evaluation of each algorithm implementation. We then use this benchmark to compare accuracy as well as the performance of four different Anomaly-based IDS solutions based on various ML algorithms. The algorithms include Naive Bayes, Support Vector Machines, Neural Networks, and K-means Clustering. The benchmark evaluation is performed on the popular NSL-KDD dataset. The experimental results show the differences in accuracy and performance between these Anomaly-based IDS solutions on the dataset. The results also demonstrate how this benchmark can be used to create useful metrics for such comparisons.

Keywords

Anomaly-based Detection, Intrusion Detection, Benchmarks

Original Source URL: https://aircconline.com/ijnsa/V10N5/10518ijnsa01.pdf

Volume URL: https://airccse.org/journal/jnsa18_current.html

Tuesday, May 13, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy

Submit Your Research Articles...!!!

Welcome To IJNSA [Current Issue - May 2025, Volume 17, Number 3]

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Current Issue URL: https://airccse.org/journal/jnsa25_current.html

Submission Deadline: May 17, 2025

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL: https://airccse.com/submissioncs/home.html


Monday, May 12, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy

Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Submission Deadline: May 17, 2025

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL: https://airccse.com/submissioncs/home.html


Thursday, May 8, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy

Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Google Scholar URL: https://scholar.google.co.in/citations?hl=en&user=lhj_6AYAAAAJ

Citations 11551   h-index 51   i10-index 214

Submission Deadline: May 10, 2025

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL: https://airccse.com/submissioncs/home.html


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #p...