Tuesday, August 26, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Citations 11798   h-index 51   i10-index 215

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Sunday, August 24, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy




Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: August 30, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Friday, August 22, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


International journal of Network Security & Its Applications



Thursday, August 21, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#CallForPapers #callforsubmissions #submission #Submit #SubmitYourPaper #submitnow #deadline #phdstudent #phdresearch #research #ResearchScholar #researchpaper #researchers #article #online #submissionsopen #RegisterNow #Register #Papersubmission #opencall #event #applynow #meetings



International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: August 23, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com

Wednesday, August 20, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Trust Without Exposure: Verifiable Observability with Capability-Native Webassembly at the Edge
Bala Subramanyan, Verifoxx, UK

Abstract
In modern data ecosystems, where edge autonomy, privacy, and verifiability are essential, enablingtrustworthy observability without compromising data control remains a significant challenge. This paper presents cWAMR, a capability-native WebAssembly runtime adapted for the CHERI (CapabilityHardware Enhanced RISC Instructions) architecture, enabling fine-grained, hardware-enforcedcompartmentalization of untrusted code.
We demonstrate how cWAMR enables the construction of Verifiable Observability Pipelines (VoP)—modular, staged execution flows deployed across edge environments. Each pipeline stage is implementedas an isolated WebAssembly module running in a CHERI-sealed cWAMR compartment, with capability- based delegation enforcing tamper-evident data flow and memory safety without shared linear memory or enclave-based trust models.
Deployed and validated on the Arm Morello platform under the UK DSbD initiative, cWAMR supports bothinterpreted and ahead-of-time WebAssembly execution, integrated with CHERI-aware systeminterfaces (cWASI). The result is a lightweight, privacy-aligned foundation for building observable, compliant edgepipelines—enabling cryptographically anchored provenance and lifecycle assurance without clouddependency or centralised attestation infrastructure.

Keywords
WebAssembly, CHERI, Capability-Based Security, Verifiable Observability, Memory Safety, DataProvenance, Privacy Preserving Pipelines, Data as a Product (DaaP)





Tuesday, August 19, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


August 2025 - Top 10 Read Articles in Network Security & Its Applications

Submission Deadline: August 23, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com

Monday, August 18, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: August 23, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Thursday, August 14, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: August 16, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Wednesday, August 13, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


A Systematic Review of Applications in Fraud Detection
Hashim Jameel Shareef Jarrar, Middle East University, Jordan

Abstract
The following systematic review aims to investigate the applications of data science techniques for fraud detection (FD), especially Machine Learning (ML), Deep Learning (DL), and the combination of both techniques in different domains, including credit card fraud and cyber (online) fraud. The increasing sophistication of fraudulent activities necessitates advanced detection methods, as traditional rule-based techniques often fall short. The review involves articles from 2022 to 2024, establishing various algorithms and techniques' efficiency. Some of the research findings show that the most frequently used FD algorithms are supervised ML algorithms like logistic regression, decision trees, and random forests, which have high accuracy. Also, DL techniques especially Long Short-Term Memory (LSTM) networks and convolutional neural networks (CNNs), have been reported to provide better results, especially in real-world problems, including e-commerce and online web-based FD. Some of the new trends that are increasingly being incorporated to improve FD capabilities are the hybrid models that integrate ML and DL methods. However, there are still some limitations associated with the use of ML for FD, such as class imbalance, interpretability of the trained model, and the evolving nature of fraud tactics. The review discusses the current trends, including real-time detection and the use of AI in FD systems; the review also provides further research directions for overcoming the challenges and improving the performance of FD systems. Overall, this review contributes to the growing body of knowledge in FD and emphasizes the importance of continuous innovation in data science applications.

Keywords
Data Science, Machine Learning, Deep Learning, Fraud Detection, Cyber Fraud





Tuesday, August 12, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: August 16, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Sunday, August 10, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Using Combination of Fuzzy Set and Gravitational Algorithm for Improving Intrusion Detection
Amin Dastanpour1 and Raja Azlina Raja Mahmood2, 1Kerman Institute of Higher Education, Iran, 2University Putra Malaysia, Malaysia

Abstract
An intrusion detection system (IDS) is a tool used by administrators to protect networks from unknown activities. In signature-based systems, the detection of attacks relies on predefined patterns or behaviours associated with known threats, triggering an alert upon identification of a match. Conversely, anomaly detection systems initiate their process by establishing a baseline profile that reflects the normal operational behaviour of the system or network. These systems possess the capability to identify previously unrecognized attacks, rendering them more effective than their signature-based counterparts. Nevertheless, anomaly-based IDS must consider numerous characteristics when pinpointing attacks Despite these difficulties, machine learning techniques have demonstrated a strong ability to achieve highly accurate anomaly detection and have been employed to identify attacks over the past few decades. Intrusion detection systems are widely used methods to maintain network security. In this paper, the proposed IDS employs machine learning approaches, namely FUZZY are initially applied, followed by optimization algorithms such as Gravitational Search Algorithm (GSA) to determine the optimal subset of detection features. Comparison study on the performance of the FUZZY and FUZZY-GSA models using KDD dataset with selected optimal 27 total features, shows that the proposed model achieves the highest detection rate with the lowest false alarm rate. The highest detection rate for FUZZY-GSA on the KDD dataset is 98.94% in comparison to other recognition algorithm. In summary, the proposed FUZZY-GSA model attains the highest attack recognition percentage with the lowest false positive rate in KDD dataset.

Keywords
Fuzzy, Gravitational Search Algorithm (GSA), Intrusion Detection System (IDS), Security, Networks




Friday, August 8, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#CallForPapers #CallForAbstracts #callforsubmissions #journal #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Thursday, August 7, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#network #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: August 10, 2025


Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com

Wednesday, August 6, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Smart Meter Security Issues: A Review Paper
Osama Alshannaq1, Mohd Rizuan Baharon1, Shekh Faisal Abdul Latip1, Hairol Nizam Mohd Shah1 and Áine MacDermott2, 1Universiti Teknikal Malaysia Melaka, Malaysia, 2Liverpool John Moores University, United Kingdom

Abstract
In recent decades, conventional electric power systems have seen escalating issues due to rising electrical consumption, leading to voltage instability, recurrent blackouts, and heightened carbon emissions. These challenges highlight the pressing necessity for a more efficient and sustainable energy infrastructure. The smart grid has emerged as a disruptive solution, providing improved energy distribution, real-time monitoring, and facilitating renewable integration. Central to this evolution are smart meters, which are essential elements of the Advanced Metering Infrastructure (AMI), facilitating precise energy monitoring, bidirectional connectivity, and remote oversight within smart households and grids. Nonetheless, despite their functionalities, smart meters provide potential security threats, including susceptibility to cyberattacks and physical interference. This review article seeks to examine the fundamental characteristics and functionalities of smart meters, identify significant security and implementation difficulties, and emphasise their role within the larger smart grid ecosystem. This paper conducts a thorough analysis of existing literature to analyse the communication technologies utilized, the possible threat landscape, and the significance of strong security frameworks. The results underscore the necessity for secure communication protocols, sophisticated encryption, and physical protections to guarantee the reliability and integrity of smart meter implementations in contemporary power systems.

Keywords
Smart grid, Secure smart meter, Attacks on data, network attacks, Physical hardware attacks





Tuesday, August 5, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: August 10, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Friday, August 1, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #security #network #blockchain #technology #cybersecurity #artificialintelligence #machinelearning #database #systemsecurity #optimization #internetsecurity #mobile #adhoc #sensors #protocols #Management #intrusion #detection #prevention



International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Current Issue: July 2025, Volume 17, Number 4

Smart Meter Security Issues: A Review Paper
Osama Alshannaq1, Mohd Rizuan Baharon1, Shekh Faisal Abdul Latip1, Hairol Nizam Mohd Shah1 and Áine MacDermott2, 1Universiti Teknikal Malaysia Melaka, Malaysia, 2Liverpool John Moores University, United Kingdom

Using Combination of Fuzzy Set and Gravitational Algorithm for Improving Intrusion Detection
Amin Dastanpour1 and Raja Azlina Raja Mahmood2, 1Kerman Institute of Higher Education, Iran, 2University Putra Malaysia, Malaysia


Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Thursday, July 31, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: August 03, 2025


Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Tuesday, July 29, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


A Light Weight Solution for Detecting De-Authentication Attack
Rajinder Singh and Satish Kumar, PUSSGRC Hoshiarpur, Punjab, India

Abstract
Nowadays Wireless local area networks (WLANs) are growing very rapidly. Due to the popularity of 802.11 networks, possibilities of various attacks to the wireless network have also increased. In this paper, a special type of attack De-Authentication/disassociation attack has been investigated. In a normal scenario, a wireless client or user sends a de-authentication frame when it wants to terminate the connection. These frames are in plain text and are not encrypted. These are not authenticated by the access point. Attackers take advantage of this, and spoof these packets and disable the communication between the connected client and access point. In this paper, an algorithm based on radio-tap header information is suggested to identify whether there is a De-Authentication attack on the client or not.

Keywords
De-Authentication Attack, Kali Linux, Scapy, Python




6th International Conference on Artificial Intelligence and Machine Learning (CAIML 2025)

#engineering #computerscience #BigData #deeplearning #dataanalytics #AI #informationtechnology #IoT #softwaredeveloper #analytics #computerengineering #artificialintelligence #machinelearning #bioinformatics #datamining #informationretrieval #multimedia #neuralnetworks #naturallanguageprocessing #patternrecognition #programming #robotics #SemanticWeb #softcomputing #computervision #FuzzyLogic #DataScience #technology



Submit Your Research Articles...!!!

6th International Conference on Artificial Intelligence and Machine Learning (CAIML 2025)
September 20 ~ 21, 2025, Copenhagen, Denmark


Submission Deadline: August 02, 2025


Contact us:
Here's where you can reach us: caiml@itcse2025.org (or) caimlconfere@yahoo.com

Sunday, July 27, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: August 03, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Friday, July 25, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Scope
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Submission Deadline: July 26, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Thursday, July 24, 2025

15th International Conference on Computer Science, Engineering and Applications (ICCSEA 2025)



Submit Your Research Articles...!!!

Welcome To ICCSEA 2025

15th International Conference on Computer Science, Engineering and Applications (ICCSEA 2025)
November 22 ~ 23, 2025, London, United Kingdom


Submission Deadline: July 26, 2025

Contact us:
Here's where you can reach us: iccsea@iccsea2025.org


#computerscience #engineering #artificialintelligence #softcomputing #BigData #communication #blockchain #deeplearning #internetofthings #datamining #machinelearning #database #modeling #simulation #multimedia #security #networking #softwareengineering #Programming #performance #evaluation #NLP #neuralnetworks #fuzzy #Bioinformatics #ubiquitouscomputing #operatingsystem #mobilecomputing

Wednesday, July 23, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Malware Detection Using Machine Learning Algorithms and Reverse Engineering of Android Java Code
Michal Kedziora, Paulina Gawin, Michal Szczepanik and Ireneusz Jozwiak, University of Science and Technology Wroclaw, Poland

Abstract
This research paper is focused on the issue of mobile application malware detection by Reverse Engineering of Android java code and use of Machine Learning algorithms. The malicious software characteristics were identified based on a collected set of total number of 1958 applications (including 996 malware applications). During research a unique set of features was chosen, then three attribute selection algorithms and five classification algorithms (Random Forest, K Nearest Neighbors, SVM, Nave Bayes and Logistic Regression) were examined to choose algorithms that would provide the most effective rate of malware detection.

Keywords
Malware Detection, Random Forest, Android, SVM, Naive Bayes, K-NN, Logistic Regression





Tuesday, July 22, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Citations 11675   h-index 51   i10-index 214

Submission Deadline: July 26, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Sunday, July 20, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#CallForPapers #CallForAbstracts #callforsubmissions #journal #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: July 26, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Friday, July 18, 2025

July 2025: Top 10 Read Articles in Network Security and Its Applications

#mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


July 2025: Top 10 Read Articles in Network Security and Its Applications

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Thursday, July 17, 2025

6th International Conference on Artificial Intelligence and Machine Learning (CAIML 2025)

#artificialintelligence #machinelearning #bioinformatics #datamining #informationretrieval #multimedia #neuralnetworks #naturallanguageprocessing #patternrecognition #programming #robotics #SemanticWeb #softcomputing #computervision #FuzzyLogic #DataScience #technology #engineering #computerscience #BigData #deeplearning #dataanalytics #AI #informationtechnology #IoT #softwaredeveloper #analytics #computerengineering


Submit Your Research Articles...!!!

Welcome To CAIML 2025

6th International Conference on Artificial Intelligence and Machine Learning (CAIML 2025)
September 20 ~ 21, 2025, Copenhagen, Denmark


Submission Deadline: July 19, 2025

Contact us:
Here's where you can reach us: caiml@itcse2025.org (or) caimlconfere@yahoo.com


Tuesday, July 15, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Biometric Smartcard Authentication for Fog Computing
Kashif Munir and Lawan A. Mohammed, University of Hafr Al Batin, KSA

Abstract
In the IoT scenario, things at the edge can create significantly large amounts of data. Fog Computing has recently emerged as the paradigm to address the needs of edge computing in the Internet of Things (IoT) and Industrial Internet of Things (IIoT) applications. In a Fog Computing environment, much of the processing would take place closer to the edge in a router device, rather than having to be transmitted to the Fog. Authentication is an important issue for the security of fog computing since services are offered to massive-scale end users by front fog nodes.Fog computing faces new security and privacy challenges besides those inherited from cloud computing. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data and there have been instances when the password-based authentication has been manipulated to gain access into the data. Since the conventional methods such as passwords do not serve the purpose of data security, research worksare focused on biometric user authentication in fog computing environment. In this paper, we present biometric smartcard authentication to protect the fog computing environment.

Keywords
Biometric Authentication, Fog Computing, Security





International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Academia URL:

Sunday, July 13, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: July 19, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Friday, July 11, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Citations 11742   h-index 51   i10-index 215

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Thursday, July 10, 2025

6th International Conference on Machine Learning Techniques and Data Science (MLDS 2025)

#MachineLearning #datascience #ArtificialIntelligence #deeplearning #computerscience #technology #IoT #dataanalytics #neuralnetworks #Robotics #computervision #AI #engineering #BigData #datamining #FuzzyLogic #datascientist #cloudcomputing #development #programming #coding #education #datavisualization #softwaredeveloper #analytics #computerengineering #informationtechnology 



Submit Your Research Articles...!!!

Welcome To MLDS 2025

6th International Conference on Machine Learning Techniques and Data Science (MLDS 2025)
November 22 ~ 23, 2025, London, United Kingdom


Submission Deadline: July 26, 2025

Contact us:
Here's where you can reach us: mlds@iccsea2025.org (or) mldsconfe@yahoo.com


Wednesday, July 9, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


IOT and Security-Privacy Concerns: A Systematic Mapping Study
Moussa WITTI and Dimitri KONSTANTAS, Information Science Institute University of Geneva, Switzerland

Abstract
The increase of smart devices has accelerated sensitive data exchange on the Internet using most of the time unsecured channels. Since a massive use of RFID (Radio-frequency Identification) tags in the transportation and construction industries from 1980 to 1990, with the expanded use of the Internet with 2G/3G or 4G since 2000, we are witnessing a new era of connected objects. A huge number of heterogeneous sensors may collect and dispatch sensitive data from an endpoint to worldwide network on the Internet. Privacy concerns in IOT remain important issues in the research. In this paper, we aim to evaluate current research state related to privacy and security in IOT by identifying existing approaches and publications trends. Therefore, we have conducted a systematic mapping study using automated searches from selected relevant academics databases. The result of this mapping highlights research type and contribution in different facets and research activities trends in the topic of “security and privacy” in IoT edge, cloud and fog environment.



Keywords
Internet of Thing, privacy, security, the mapping study



Tuesday, July 8, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: July 12, 2025


Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Sunday, July 6, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: July 12, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Friday, July 4, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Thursday, July 3, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#ddos #trust #privacy #wirelessnetwork #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention



Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan ...