Thursday, July 31, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: August 03, 2025


Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Tuesday, July 29, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


A Light Weight Solution for Detecting De-Authentication Attack
Rajinder Singh and Satish Kumar, PUSSGRC Hoshiarpur, Punjab, India

Abstract
Nowadays Wireless local area networks (WLANs) are growing very rapidly. Due to the popularity of 802.11 networks, possibilities of various attacks to the wireless network have also increased. In this paper, a special type of attack De-Authentication/disassociation attack has been investigated. In a normal scenario, a wireless client or user sends a de-authentication frame when it wants to terminate the connection. These frames are in plain text and are not encrypted. These are not authenticated by the access point. Attackers take advantage of this, and spoof these packets and disable the communication between the connected client and access point. In this paper, an algorithm based on radio-tap header information is suggested to identify whether there is a De-Authentication attack on the client or not.

Keywords
De-Authentication Attack, Kali Linux, Scapy, Python




6th International Conference on Artificial Intelligence and Machine Learning (CAIML 2025)

#engineering #computerscience #BigData #deeplearning #dataanalytics #AI #informationtechnology #IoT #softwaredeveloper #analytics #computerengineering #artificialintelligence #machinelearning #bioinformatics #datamining #informationretrieval #multimedia #neuralnetworks #naturallanguageprocessing #patternrecognition #programming #robotics #SemanticWeb #softcomputing #computervision #FuzzyLogic #DataScience #technology



Submit Your Research Articles...!!!

6th International Conference on Artificial Intelligence and Machine Learning (CAIML 2025)
September 20 ~ 21, 2025, Copenhagen, Denmark


Submission Deadline: August 02, 2025


Contact us:
Here's where you can reach us: caiml@itcse2025.org (or) caimlconfere@yahoo.com

Sunday, July 27, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: August 03, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Friday, July 25, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Scope
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Submission Deadline: July 26, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Thursday, July 24, 2025

15th International Conference on Computer Science, Engineering and Applications (ICCSEA 2025)



Submit Your Research Articles...!!!

Welcome To ICCSEA 2025

15th International Conference on Computer Science, Engineering and Applications (ICCSEA 2025)
November 22 ~ 23, 2025, London, United Kingdom


Submission Deadline: July 26, 2025

Contact us:
Here's where you can reach us: iccsea@iccsea2025.org


#computerscience #engineering #artificialintelligence #softcomputing #BigData #communication #blockchain #deeplearning #internetofthings #datamining #machinelearning #database #modeling #simulation #multimedia #security #networking #softwareengineering #Programming #performance #evaluation #NLP #neuralnetworks #fuzzy #Bioinformatics #ubiquitouscomputing #operatingsystem #mobilecomputing

Wednesday, July 23, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Malware Detection Using Machine Learning Algorithms and Reverse Engineering of Android Java Code
Michal Kedziora, Paulina Gawin, Michal Szczepanik and Ireneusz Jozwiak, University of Science and Technology Wroclaw, Poland

Abstract
This research paper is focused on the issue of mobile application malware detection by Reverse Engineering of Android java code and use of Machine Learning algorithms. The malicious software characteristics were identified based on a collected set of total number of 1958 applications (including 996 malware applications). During research a unique set of features was chosen, then three attribute selection algorithms and five classification algorithms (Random Forest, K Nearest Neighbors, SVM, Nave Bayes and Logistic Regression) were examined to choose algorithms that would provide the most effective rate of malware detection.

Keywords
Malware Detection, Random Forest, Android, SVM, Naive Bayes, K-NN, Logistic Regression





Tuesday, July 22, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Citations 11675   h-index 51   i10-index 214

Submission Deadline: July 26, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Sunday, July 20, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#CallForPapers #CallForAbstracts #callforsubmissions #journal #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: July 26, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Friday, July 18, 2025

July 2025: Top 10 Read Articles in Network Security and Its Applications

#mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


July 2025: Top 10 Read Articles in Network Security and Its Applications

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Thursday, July 17, 2025

6th International Conference on Artificial Intelligence and Machine Learning (CAIML 2025)

#artificialintelligence #machinelearning #bioinformatics #datamining #informationretrieval #multimedia #neuralnetworks #naturallanguageprocessing #patternrecognition #programming #robotics #SemanticWeb #softcomputing #computervision #FuzzyLogic #DataScience #technology #engineering #computerscience #BigData #deeplearning #dataanalytics #AI #informationtechnology #IoT #softwaredeveloper #analytics #computerengineering


Submit Your Research Articles...!!!

Welcome To CAIML 2025

6th International Conference on Artificial Intelligence and Machine Learning (CAIML 2025)
September 20 ~ 21, 2025, Copenhagen, Denmark


Submission Deadline: July 19, 2025

Contact us:
Here's where you can reach us: caiml@itcse2025.org (or) caimlconfere@yahoo.com


Tuesday, July 15, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Biometric Smartcard Authentication for Fog Computing
Kashif Munir and Lawan A. Mohammed, University of Hafr Al Batin, KSA

Abstract
In the IoT scenario, things at the edge can create significantly large amounts of data. Fog Computing has recently emerged as the paradigm to address the needs of edge computing in the Internet of Things (IoT) and Industrial Internet of Things (IIoT) applications. In a Fog Computing environment, much of the processing would take place closer to the edge in a router device, rather than having to be transmitted to the Fog. Authentication is an important issue for the security of fog computing since services are offered to massive-scale end users by front fog nodes.Fog computing faces new security and privacy challenges besides those inherited from cloud computing. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data and there have been instances when the password-based authentication has been manipulated to gain access into the data. Since the conventional methods such as passwords do not serve the purpose of data security, research worksare focused on biometric user authentication in fog computing environment. In this paper, we present biometric smartcard authentication to protect the fog computing environment.

Keywords
Biometric Authentication, Fog Computing, Security





International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Academia URL:

Sunday, July 13, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: July 19, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Friday, July 11, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Citations 11742   h-index 51   i10-index 215

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Thursday, July 10, 2025

6th International Conference on Machine Learning Techniques and Data Science (MLDS 2025)

#MachineLearning #datascience #ArtificialIntelligence #deeplearning #computerscience #technology #IoT #dataanalytics #neuralnetworks #Robotics #computervision #AI #engineering #BigData #datamining #FuzzyLogic #datascientist #cloudcomputing #development #programming #coding #education #datavisualization #softwaredeveloper #analytics #computerengineering #informationtechnology 



Submit Your Research Articles...!!!

Welcome To MLDS 2025

6th International Conference on Machine Learning Techniques and Data Science (MLDS 2025)
November 22 ~ 23, 2025, London, United Kingdom


Submission Deadline: July 26, 2025

Contact us:
Here's where you can reach us: mlds@iccsea2025.org (or) mldsconfe@yahoo.com


Wednesday, July 9, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


IOT and Security-Privacy Concerns: A Systematic Mapping Study
Moussa WITTI and Dimitri KONSTANTAS, Information Science Institute University of Geneva, Switzerland

Abstract
The increase of smart devices has accelerated sensitive data exchange on the Internet using most of the time unsecured channels. Since a massive use of RFID (Radio-frequency Identification) tags in the transportation and construction industries from 1980 to 1990, with the expanded use of the Internet with 2G/3G or 4G since 2000, we are witnessing a new era of connected objects. A huge number of heterogeneous sensors may collect and dispatch sensitive data from an endpoint to worldwide network on the Internet. Privacy concerns in IOT remain important issues in the research. In this paper, we aim to evaluate current research state related to privacy and security in IOT by identifying existing approaches and publications trends. Therefore, we have conducted a systematic mapping study using automated searches from selected relevant academics databases. The result of this mapping highlights research type and contribution in different facets and research activities trends in the topic of “security and privacy” in IoT edge, cloud and fog environment.



Keywords
Internet of Thing, privacy, security, the mapping study



Tuesday, July 8, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: July 12, 2025


Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Sunday, July 6, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: July 12, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Friday, July 4, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


Thursday, July 3, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#ddos #trust #privacy #wirelessnetwork #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention



Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Wednesday, July 2, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Secure Third Party Auditor(TPA) for Ensuring Data Integrity in Fog Computing
KashifMunir and Lawan A. Mohammed, University of Hafr Al Batin, KSA

Abstract
Fog computing is an extended version of Cloud computing. It minimizes the latency by incorporating Fog servers as intermediates between Cloud Server and users. It also provides services similar to Cloud like Storage, Computation and resources utilization and security.Fog systems are capable of processing large amounts of data locally, operate on-premise, are fully portable, and can be installed on the heterogeneous hardware. These features make the Fog platform highly suitable for time and location-sensitive applications. For example, the Internet of Things (IoT) devices isrequired to quickly process a large amount of data. The Significance of enterprise data and increased access rates from low-resource terminal devices demands for reliable and low- cost authentication protocols. Lots of researchers have proposed authentication protocols with varied efficiencies.As a part of our contribution, we propose a protocol to ensure data integrity which is best suited for fog computing environment.

Keywords
Protocol, Authentication, Fog Computing, Security Threats, IoT




Tuesday, July 1, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Citations 11702   h-index 51   i10-index 215

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org


International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan ...