Friday, April 10, 2026

International Journal of Network Security & Its Applications (IJNSA)

#research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork #CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers



International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Call for papers
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.


Submission Deadline: April 11, 2026


For More Details, Please Visit: https://airccse.org/journal/ijnsa.html

Thursday, April 9, 2026

International Journal of Network Security & Its Applications (IJNSA)

#CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: April 11, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Wednesday, April 8, 2026

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Designing Disaster Recovery Framework for Globally Distributed Cloud Applications
Ronak Jani, Lead DBA, USA

Abstract
This article examines the design of disaster recovery frameworks for globally distributed cloud applications operating under heterogeneous consensus models. The relevance of the study arises from the rapid geographic expansion of cloud infrastructures and the growth of transactional workloads that expose limitations of traditional leader-based mirroring. The scientific novelty lies in the integrated interpretation of cross-cluster broadcast semantics, cumulative quorum acknowledgments, and stake-aware scheduling as components of a unified recovery coordination layer. The paper describes linear sender–receiver rotation mechanisms, probabilistic retransmission bounds, and WAN-aware scalability strategies. Special attention is paid to bandwidth asymmetry, Byzantine fault resilience, and adaptive recovery policies in multi-cloud environments. The goal of the study is to systematize architectural principles for communication-efficient and fault-resilient cross-regional synchronization. Comparative and structural analysis methods were applied. The conclusions formulate design conditions for scalable geo-replication under heterogeneous deployment constraints and highlight their relevance for resilient networked infrastructures and distributed cloud systems.

Keywords
Disaster Recovery, Geo-Replication, Replicated State Machines, Quorum Acknowledgment, Distributed Databases






Tuesday, April 7, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: April 11, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Monday, April 6, 2026

5th International Conference on NLP and Machine Learning Trends (NLMLT 2026)

#NLP #machinelearning #naturallanguageprocessing #deeplearning #datascience #TextAnalytics #LLM #sentimentanalysis #textmining #dataanalytics #ArtificialIntelligence #bayesiannetwork #computervision #datamining #neuralnetwork #ubiquitous #engineering #informationtechnology #computerscience #education #technology #bigdata #developer #programming #robotics #cloudcomputing #softwaredeveloper #development #machinelearningalgorithms #IOT #CyberSecurity #webdevelopment #Ontology #phonology #morphology #semantics #informationretrieval #languagelearning #LanguageModels #SpeechRecognition #transferlearning #multilingual #Summarization #tokenization #virtualassistant #sentimentanalysis #ReinforcementLearning #Normalization #stemming #Lemmatization #LanguageModeling #SemanticAnalysis



Submit Your Research Articles...!!!

Welcome To NLMLT 2026

5th International Conference on NLP and Machine Learning Trends (NLMLT 2026)
August 15 ~ 16, 2026, Melbourne, Australia


Submission Deadline: April 18, 2026

Contact us:
Here's where you can reach us: nlmlt@nlmlt2026.org (or) nlmltconference@yahoo.com


Friday, April 3, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Citations 12273   h-index 52   i10-index 218

For More Information, Please Visit Us: https://airccse.org/journal/ijnsa.html

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Thursday, April 2, 2026

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Classification of Source Code Vulnerabilities and Analysis of Detection Methods: Evaluation, Comparison, and Proposed Approaches
Nin Ho Le Viet1,2, Chieu Ta Quang2, Cuong Nguyen Van3 and Tuan Nguyen Kim3, 1Duy Tan University, Vietnam, 2Thuyloi University, Vietnam, 3Phenikaa University, Vietnam

Abstract
Source code vulnerabilities are an important cause leading to many information security incidents in modern software systems. Due to the diversity of causes and technical characteristics, source code vulnerability detection is difficult to be effectively addressed by a single method. This paper focuses on classifying, evaluating, and comparing source code vulnerability detection methods in order to provide a systematic view of this problem. The first contribution of the paper is to develop a classification approach for source code vulnerabilities based on causes and technical characteristics, thereby clarifying the nature of each vulnerability group. Next, the paper analyzes and evaluates common detection method categories, including static analysis, dynamic analysis, and machine learning and deep learning based methods, with consideration of the application scope and characteristic limitations of each approach. On that basis, the paper conducts an overall comparison among the methods to indicate that there does not exist a single technique that can effectively detect every type of source code vulnerability. Finally, the paper proposes a combined approach to leverage the advantages of different methods in source code vulnerability detection. The results and analyses in the paper are expected to support researchers and software engineers in evaluating, selecting, and orienting the development of vulnerability detection solutions in the future.

Keywords
Source code vulnerabilities, Software security, Vulnerability detection, Static and dynamic analysis, Machine learning





International Journal of Network Security & Its Applications (IJNSA)

#research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #sub...