Sunday, August 31, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: September 06, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Tuesday, August 26, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Citations 11798   h-index 51   i10-index 215

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Sunday, August 24, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy




Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: August 30, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Friday, August 22, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


International journal of Network Security & Its Applications



Thursday, August 21, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#CallForPapers #callforsubmissions #submission #Submit #SubmitYourPaper #submitnow #deadline #phdstudent #phdresearch #research #ResearchScholar #researchpaper #researchers #article #online #submissionsopen #RegisterNow #Register #Papersubmission #opencall #event #applynow #meetings



International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: August 23, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com

Wednesday, August 20, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Trust Without Exposure: Verifiable Observability with Capability-Native Webassembly at the Edge
Bala Subramanyan, Verifoxx, UK

Abstract
In modern data ecosystems, where edge autonomy, privacy, and verifiability are essential, enablingtrustworthy observability without compromising data control remains a significant challenge. This paper presents cWAMR, a capability-native WebAssembly runtime adapted for the CHERI (CapabilityHardware Enhanced RISC Instructions) architecture, enabling fine-grained, hardware-enforcedcompartmentalization of untrusted code.
We demonstrate how cWAMR enables the construction of Verifiable Observability Pipelines (VoP)—modular, staged execution flows deployed across edge environments. Each pipeline stage is implementedas an isolated WebAssembly module running in a CHERI-sealed cWAMR compartment, with capability- based delegation enforcing tamper-evident data flow and memory safety without shared linear memory or enclave-based trust models.
Deployed and validated on the Arm Morello platform under the UK DSbD initiative, cWAMR supports bothinterpreted and ahead-of-time WebAssembly execution, integrated with CHERI-aware systeminterfaces (cWASI). The result is a lightweight, privacy-aligned foundation for building observable, compliant edgepipelines—enabling cryptographically anchored provenance and lifecycle assurance without clouddependency or centralised attestation infrastructure.

Keywords
WebAssembly, CHERI, Capability-Based Security, Verifiable Observability, Memory Safety, DataProvenance, Privacy Preserving Pipelines, Data as a Product (DaaP)





Tuesday, August 19, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


August 2025 - Top 10 Read Articles in Network Security & Its Applications

Submission Deadline: August 23, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com

Monday, August 18, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: August 23, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Thursday, August 14, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: August 16, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Wednesday, August 13, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


A Systematic Review of Applications in Fraud Detection
Hashim Jameel Shareef Jarrar, Middle East University, Jordan

Abstract
The following systematic review aims to investigate the applications of data science techniques for fraud detection (FD), especially Machine Learning (ML), Deep Learning (DL), and the combination of both techniques in different domains, including credit card fraud and cyber (online) fraud. The increasing sophistication of fraudulent activities necessitates advanced detection methods, as traditional rule-based techniques often fall short. The review involves articles from 2022 to 2024, establishing various algorithms and techniques' efficiency. Some of the research findings show that the most frequently used FD algorithms are supervised ML algorithms like logistic regression, decision trees, and random forests, which have high accuracy. Also, DL techniques especially Long Short-Term Memory (LSTM) networks and convolutional neural networks (CNNs), have been reported to provide better results, especially in real-world problems, including e-commerce and online web-based FD. Some of the new trends that are increasingly being incorporated to improve FD capabilities are the hybrid models that integrate ML and DL methods. However, there are still some limitations associated with the use of ML for FD, such as class imbalance, interpretability of the trained model, and the evolving nature of fraud tactics. The review discusses the current trends, including real-time detection and the use of AI in FD systems; the review also provides further research directions for overcoming the challenges and improving the performance of FD systems. Overall, this review contributes to the growing body of knowledge in FD and emphasizes the importance of continuous innovation in data science applications.

Keywords
Data Science, Machine Learning, Deep Learning, Fraud Detection, Cyber Fraud





Tuesday, August 12, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: August 16, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Sunday, August 10, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Using Combination of Fuzzy Set and Gravitational Algorithm for Improving Intrusion Detection
Amin Dastanpour1 and Raja Azlina Raja Mahmood2, 1Kerman Institute of Higher Education, Iran, 2University Putra Malaysia, Malaysia

Abstract
An intrusion detection system (IDS) is a tool used by administrators to protect networks from unknown activities. In signature-based systems, the detection of attacks relies on predefined patterns or behaviours associated with known threats, triggering an alert upon identification of a match. Conversely, anomaly detection systems initiate their process by establishing a baseline profile that reflects the normal operational behaviour of the system or network. These systems possess the capability to identify previously unrecognized attacks, rendering them more effective than their signature-based counterparts. Nevertheless, anomaly-based IDS must consider numerous characteristics when pinpointing attacks Despite these difficulties, machine learning techniques have demonstrated a strong ability to achieve highly accurate anomaly detection and have been employed to identify attacks over the past few decades. Intrusion detection systems are widely used methods to maintain network security. In this paper, the proposed IDS employs machine learning approaches, namely FUZZY are initially applied, followed by optimization algorithms such as Gravitational Search Algorithm (GSA) to determine the optimal subset of detection features. Comparison study on the performance of the FUZZY and FUZZY-GSA models using KDD dataset with selected optimal 27 total features, shows that the proposed model achieves the highest detection rate with the lowest false alarm rate. The highest detection rate for FUZZY-GSA on the KDD dataset is 98.94% in comparison to other recognition algorithm. In summary, the proposed FUZZY-GSA model attains the highest attack recognition percentage with the lowest false positive rate in KDD dataset.

Keywords
Fuzzy, Gravitational Search Algorithm (GSA), Intrusion Detection System (IDS), Security, Networks




Friday, August 8, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#CallForPapers #CallForAbstracts #callforsubmissions #journal #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Thursday, August 7, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#network #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: August 10, 2025


Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com

Wednesday, August 6, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Smart Meter Security Issues: A Review Paper
Osama Alshannaq1, Mohd Rizuan Baharon1, Shekh Faisal Abdul Latip1, Hairol Nizam Mohd Shah1 and Áine MacDermott2, 1Universiti Teknikal Malaysia Melaka, Malaysia, 2Liverpool John Moores University, United Kingdom

Abstract
In recent decades, conventional electric power systems have seen escalating issues due to rising electrical consumption, leading to voltage instability, recurrent blackouts, and heightened carbon emissions. These challenges highlight the pressing necessity for a more efficient and sustainable energy infrastructure. The smart grid has emerged as a disruptive solution, providing improved energy distribution, real-time monitoring, and facilitating renewable integration. Central to this evolution are smart meters, which are essential elements of the Advanced Metering Infrastructure (AMI), facilitating precise energy monitoring, bidirectional connectivity, and remote oversight within smart households and grids. Nonetheless, despite their functionalities, smart meters provide potential security threats, including susceptibility to cyberattacks and physical interference. This review article seeks to examine the fundamental characteristics and functionalities of smart meters, identify significant security and implementation difficulties, and emphasise their role within the larger smart grid ecosystem. This paper conducts a thorough analysis of existing literature to analyse the communication technologies utilized, the possible threat landscape, and the significance of strong security frameworks. The results underscore the necessity for secure communication protocols, sophisticated encryption, and physical protections to guarantee the reliability and integrity of smart meter implementations in contemporary power systems.

Keywords
Smart grid, Secure smart meter, Attacks on data, network attacks, Physical hardware attacks





Tuesday, August 5, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: August 10, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Friday, August 1, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #security #network #blockchain #technology #cybersecurity #artificialintelligence #machinelearning #database #systemsecurity #optimization #internetsecurity #mobile #adhoc #sensors #protocols #Management #intrusion #detection #prevention



International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Current Issue: July 2025, Volume 17, Number 4

Smart Meter Security Issues: A Review Paper
Osama Alshannaq1, Mohd Rizuan Baharon1, Shekh Faisal Abdul Latip1, Hairol Nizam Mohd Shah1 and Áine MacDermott2, 1Universiti Teknikal Malaysia Melaka, Malaysia, 2Liverpool John Moores University, United Kingdom

Using Combination of Fuzzy Set and Gravitational Algorithm for Improving Intrusion Detection
Amin Dastanpour1 and Raja Azlina Raja Mahmood2, 1Kerman Institute of Higher Education, Iran, 2University Putra Malaysia, Malaysia


Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privac...