Friday, April 10, 2026

International Journal of Network Security & Its Applications (IJNSA)

#research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork #CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers



International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Call for papers
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.


Submission Deadline: April 11, 2026


For More Details, Please Visit: https://airccse.org/journal/ijnsa.html

Thursday, April 9, 2026

International Journal of Network Security & Its Applications (IJNSA)

#CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: April 11, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Wednesday, April 8, 2026

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Designing Disaster Recovery Framework for Globally Distributed Cloud Applications
Ronak Jani, Lead DBA, USA

Abstract
This article examines the design of disaster recovery frameworks for globally distributed cloud applications operating under heterogeneous consensus models. The relevance of the study arises from the rapid geographic expansion of cloud infrastructures and the growth of transactional workloads that expose limitations of traditional leader-based mirroring. The scientific novelty lies in the integrated interpretation of cross-cluster broadcast semantics, cumulative quorum acknowledgments, and stake-aware scheduling as components of a unified recovery coordination layer. The paper describes linear sender–receiver rotation mechanisms, probabilistic retransmission bounds, and WAN-aware scalability strategies. Special attention is paid to bandwidth asymmetry, Byzantine fault resilience, and adaptive recovery policies in multi-cloud environments. The goal of the study is to systematize architectural principles for communication-efficient and fault-resilient cross-regional synchronization. Comparative and structural analysis methods were applied. The conclusions formulate design conditions for scalable geo-replication under heterogeneous deployment constraints and highlight their relevance for resilient networked infrastructures and distributed cloud systems.

Keywords
Disaster Recovery, Geo-Replication, Replicated State Machines, Quorum Acknowledgment, Distributed Databases






Tuesday, April 7, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: April 11, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Monday, April 6, 2026

5th International Conference on NLP and Machine Learning Trends (NLMLT 2026)

#NLP #machinelearning #naturallanguageprocessing #deeplearning #datascience #TextAnalytics #LLM #sentimentanalysis #textmining #dataanalytics #ArtificialIntelligence #bayesiannetwork #computervision #datamining #neuralnetwork #ubiquitous #engineering #informationtechnology #computerscience #education #technology #bigdata #developer #programming #robotics #cloudcomputing #softwaredeveloper #development #machinelearningalgorithms #IOT #CyberSecurity #webdevelopment #Ontology #phonology #morphology #semantics #informationretrieval #languagelearning #LanguageModels #SpeechRecognition #transferlearning #multilingual #Summarization #tokenization #virtualassistant #sentimentanalysis #ReinforcementLearning #Normalization #stemming #Lemmatization #LanguageModeling #SemanticAnalysis



Submit Your Research Articles...!!!

Welcome To NLMLT 2026

5th International Conference on NLP and Machine Learning Trends (NLMLT 2026)
August 15 ~ 16, 2026, Melbourne, Australia


Submission Deadline: April 18, 2026

Contact us:
Here's where you can reach us: nlmlt@nlmlt2026.org (or) nlmltconference@yahoo.com


Friday, April 3, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Citations 12273   h-index 52   i10-index 218

For More Information, Please Visit Us: https://airccse.org/journal/ijnsa.html

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Thursday, April 2, 2026

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Classification of Source Code Vulnerabilities and Analysis of Detection Methods: Evaluation, Comparison, and Proposed Approaches
Nin Ho Le Viet1,2, Chieu Ta Quang2, Cuong Nguyen Van3 and Tuan Nguyen Kim3, 1Duy Tan University, Vietnam, 2Thuyloi University, Vietnam, 3Phenikaa University, Vietnam

Abstract
Source code vulnerabilities are an important cause leading to many information security incidents in modern software systems. Due to the diversity of causes and technical characteristics, source code vulnerability detection is difficult to be effectively addressed by a single method. This paper focuses on classifying, evaluating, and comparing source code vulnerability detection methods in order to provide a systematic view of this problem. The first contribution of the paper is to develop a classification approach for source code vulnerabilities based on causes and technical characteristics, thereby clarifying the nature of each vulnerability group. Next, the paper analyzes and evaluates common detection method categories, including static analysis, dynamic analysis, and machine learning and deep learning based methods, with consideration of the application scope and characteristic limitations of each approach. On that basis, the paper conducts an overall comparison among the methods to indicate that there does not exist a single technique that can effectively detect every type of source code vulnerability. Finally, the paper proposes a combined approach to leverage the advantages of different methods in source code vulnerability detection. The results and analyses in the paper are expected to support researchers and software engineers in evaluating, selecting, and orienting the development of vulnerability detection solutions in the future.

Keywords
Source code vulnerabilities, Software security, Vulnerability detection, Static and dynamic analysis, Machine learning





Wednesday, April 1, 2026

International Journal of Network Security & Its Applications (IJNSA) - Current Issue: March 2026, Volume 18, Number 2

#networksecurity #security #network #blockchain #technology #cybersecurity #artificialintelligence #machinelearning #database #systemsecurity #optimization #internetsecurity #mobile #adhoc #sensors #protocols #Management #intrusion #detection #prevention



International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Current Issue: March 2026, Volume 18, Number 2

Classification of Source Code Vulnerabilities and Analysis of Detection Methods: Evaluation, Comparison, and Proposed Approaches
Nin Ho Le Viet1,2, Chieu Ta Quang2, Cuong Nguyen Van3 and Tuan Nguyen Kim3, 1Duy Tan University, Vietnam, 2Thuyloi University, Vietnam, 3Phenikaa University, Vietnam

Designing Disaster Recovery Framework for Globally Distributed Cloud Applications
Ronak Jani, Lead DBA, USA

Strategic Management of the Internal Audit Function in the Transition to a Realtime Mode
Eshan Nabeel, UAE

From Pipelines to Platforms: The Impact of Platform-Centric Data Architecture on Enterprise AI in Regulated Industries
Mohammed Arbaaz Shareef, Anblicks, USA

AI-Enhanced Network Traffic Analysis for Preventing Fraud Payment in Banks
Balavardhan Reddy1 and Amir Ahmed Ansari2, 1University of the Cumberlands, USA, 2Indiana Wesleyan University, USA

Concurrency and Performance Challenges in Large-Scale Distributed Applications
Matvii Horskyi, USA


Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com

Tuesday, March 31, 2026

International Journal of Network Security & Its Applications (IJNSA)

#CallForPapers #callforsubmissions #submission #Submit #SubmitYourPaper #submitnow #deadline #phdstudent #phdresearch #research #ResearchScholar #researchpaper #researchers #article #online #submissionsopen #RegisterNow #Register #Papersubmission



Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: April 05, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


For More Details, Please Visit Us: https://airccse.org/journal/ijnsa.html

7th International Conference on Big Data, IOT and Blockchain (BIBC 2026)



Call for Research Papers!!!

7th International Conference on Big Data, IOT and Blockchain (BIBC 2026)

August 22 ~ 23, 2026, Dubai, UAE


Submission URL: 

Submission Deadline:  April 04 , 2026

Contact Us
Here's where you can reach us :bibc@bibc2026.org 

#bigdata #datascience #machinelearning #technology #data #ai #artificialintelligence #iot #dataanalytics #analytics #python #tech #deeplearning #programming #coding #cloudcomputing #cloud #innovation #business #datascientist #software #cybersecurity #digitaltransformation #blockchain #datavisualization #developer #dataanalysis #computerscience #datacenter #automation

7th International Conference on Networks & IOT (NeTIOT 2026)

Submit Your Research Articles!!!!
 
#NeTIOT2026 #IoTConference #NetworkingResearch #InternetOfThings #SmartDevices #ConnectedWorld #EdgeAI #FogComputing #6G #IndustrialIoT #IIoT #SmartInfrastructure #SensorNetworks #EmbeddedSystems #CyberSecurity #IoTSecurity #DataAnalytics #BigDataIoT #CloudIoT #AIIntegration #DigitalTransformation #NextGenNetworks #UbiquitousComputing #TechInnovation #ResearchCommunity


 
7th International Conference on Networks & IOT (NeTIOT 2026)
 
August 15 ~ 16, 2026, Melbourne, Australia
 
 
Submission Deadline : April 18, 2026
 
 
Contact Us:
Here's where you can reach us : netiot@seau2026.org or netiotconf25@gmail.com

12th International Conference on Software Engineering (SEC 2026)

#SEC2026 #SoftwareEngineering #AI4SE #AIinSoftwareEngineering #SoftwareArchitecture #SoftwareTesting #QualityAssurance #DevOps #DevSecOps #CloudNative #DistributedSystems #SecureSoftware #PrivacyEngineering #FormalMethods #EmpiricalSE #SoftwareAnalytics #HumanCenteredSE #DeveloperProductivity #AgileMethods #SoftwareProcess #OpenSourceSE #CyberPhysicalSystems #MobileAndWebEngineering #BigDataSE #SoftwareSecurity


 
Submit Your Research Articles!!!!
 
12th International Conference on Software Engineering (SEC 2026)
 
May 16 ~ 17, 2026, Zurich, Switzerland
 
 
Submission Deadline : April 04, 2026
 

12th International Conference on Cryptography and Information Security (CRIS 2026)

#cryptography #cryptocurrency #crypto #bitcoin #cryptocurrencies #blockchain #cryptonews #cryptotrading #cryptomining #cryptolife #cryptoworld #cryptomeme #cryptocurrencynews #cryptoinvestor #cryptomoney #cryptowallet #cryptomemes #cryptocoin #cryptotrader #cryptotraders #cryptocurrencytrading #cryptos #cryptozoology #cryptotrade #cryptolifestyle #crypton #cryptokeys #cryptocoins #cryptorevolution #cybersecurity #informationsecurity #cybersecurity #infosec #security #hacking #ethicalhacking #cybercrime #cybersecurityawareness #cyberattack #datasecurity #cyber #technology #hackers #hacker #malware #dataprotection #pentesting #kalilinux #linux #privacy #ethicalhacker #programming #informationtechnology #hack #tech #coding #networksecurity #cybersecuritytraining #hacked #programmer


Call for Research Papers!

12th International Conference on Cryptography and Information Security (CRIS 2026)

May 16 ~ 17, 2026, Zurich, Switzerland


Submission Deadline: April 04, 2026


Here's where you can reach us: cris@cosit2026.org

Monday, March 30, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: April 05, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Friday, March 27, 2026

International Journal of Network Security & Its Applications (IJNSA)

#networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy #networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection



International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Thursday, March 26, 2026

International Journal of Network Security & Its Applications (IJNSA)

#researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork #CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Paper Submission
Authors are invited to submit papers for this journal through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.


Submission Deadline: March 28, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com

7th International Conference on Software Engineering, Security and Blockchain (SESBC 2026)

#blockchain #blockchainbacker #blockchaintechnology #blockchainmoneyman #blockchaindeveloper #blockchainbasement #blockchainand #blockchainandcryptocurrency #blockchainandai #blockchainandcryptocurrencyfullcourse #blockchainandcryptocurrencyexplained #blockchainandrealestate #blockchainandsmartcontracts #blockchainandcryptocurrencyforbeginners #blockchainandaiintegration #blockchainandweb3 #blockchainandquantumcomputers #blockchainandfintech #blockchainandweb3explained #blockchainandcryptoexplained #blockchainandhealthcare #security #securitybreach #securitycamera #security+ #DevOps #WebDevelopment #SoftwareArchitect #ProgrammingSkills #TechCareers #ITJobs #ComputerScience #AgileDevelopment #FullStackDeveloper #SoftwareSolutions #TechTrends #NetworkingEvent #TechConference


  
7th International Conference on Software Engineering, Security and Blockchain (SESBC 2026)
 
April 18 ~ 19, Melbourne, Australia
 
 
Paper Submission
 
Authors are invited to submit papers through the conference Submission System by March 28, 2026(Final Call). Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings (H index 46) in Computer Science & Information Technology (CS & IT) series (Confirmed).
 
Contact Us
 
Here's where you can reach us : sesbc@scom2026.org or sesbc_conf@yahoo.com
 

12th International Conference on Cryptography and Information Security (CRIS 2026)

#cryptography #cryptocurrency #crypto #bitcoin #cryptocurrencies #blockchain #cryptonews #cryptotrading #cryptomining #cryptolife #cryptoworld #cryptomeme #cryptocurrencynews #cryptoinvestor #cryptomoney #cryptowallet #cryptomemes #cryptocoin #cryptotrader #cryptotraders #cryptocurrencytrading #cryptos #cryptozoology #cryptotrade #cryptolifestyle #crypton #cryptokeys #cryptocoins #cryptorevolution #cybersecurity #informationsecurity #cybersecurity #infosec #security #hacking #ethicalhacking #cybercrime #cybersecurityawareness #cyberattack #datasecurity #cyber #technology #hackers #hacker #malware #dataprotection #pentesting #kalilinux #linux #privacy #ethicalhacker #programming #informationtechnology #hack #tech #coding #networksecurity #cybersecuritytraining #hacked #programmer



Call for Research Papers!

12th International Conference on Cryptography and Information Security (CRIS 2026)
May 16 ~ 17, 2026, Zurich, Switzerland


Submission Deadline: March 28, 2026


Here's where you can reach us: cris@cosit2026.org

Wednesday, March 25, 2026

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Generalized Legendre Polynomials for Support Vector Machines (SVMS) Classification
Ashraf Afifi1 and E.A.Zanaty2, 1Taif University, Kingdom of Saudi Arabia and 2Sohag University, Egypt

Abstract
In this paper, we introduce a set of new kernel functions derived from the generalized Legendre polynomials to obtain more robust and higher support vector machine (SVM) classification accuracy. The generalized Legendre kernel functions are suggested to provide a value of how two given vectors are like each other by changing the inner product of these two vectors into a greater dimensional space. The proposed kernel functions satisfy the Mercer’s condition and orthogonality properties for reaching the optimal result with low number support vector (SV). For that, the new set of Legendre kernel functions could be utilized in classification applications as effective substitutes to those generally used like Gaussian, Polynomial and Wavelet kernel functions. The suggested kernel functions are calculated in compared to the current kernels such as Gaussian, Polynomial, Wavelets and Chebyshev kernels by application to various non-separable data sets with some attributes. It is seen that the suggested kernel functions could give competitive classification outcomes in comparison with other kernel functions. Thus, on the basis test outcomes, we show that the suggested kernel functions are more robust about the kernel parameter change and reach the minimal SV number for classification generally.

Keywords
Legendre Polynomials, Kernel Functions, Functional Analysis, SVMS, Classification Problem





18th International Conference on Networks & Communications (NeCoM 2026)

#networks #networking #networksecurity #security #machinelarning #artificialintelligence #cybersecurity #cryptographicprotocols #database #sdn #networkcontrol #featureselection #IoT #IoTsecurity #wirelessnetworksecurity #cybersecurity #cloudcomputing #softwaredefinednetworks #intrusiondetectionsystem #DigitalCommunication



Call for Research Papers......!!

18th International Conference on Networks & Communications (NeCoM 2026)
April 25 ~ 26, 2026, Copenhagen, Denmark
 
Web Page URL : https://necom2026.org/
 
Submission Deadline : March 28, 2026
 

7th International Conference on Big Data, Blockchain and Security (BDBS 2026)

#bigdata #datascience #machinelearning #technology #data #ai #artificialintelligence #iot #dataanalytics #analytics #python #tech #deeplearning #programming #coding #cloudcomputing #cloud #innovation #business #datascientist #software #cybersecurity #digitaltransformation #blockchain #datavisualization #developer #dataanalysis #computerscience #datacenter #automation



Call for Research Papers!!!
 
7th International Conference on Big Data, Blockchain and Security (BDBS 2026)
 
April 25 ~ 26, 2026, Copenhagen, Denmark
 
Web page link:https://bdbs2026.org/
 
Submission Deadline: March 28, 2026
 
Submission link: 
 
Contact Us:

13th International Conference on Advanced Computing (ADCO 2026)

#ArtificialIntelligence #AI #MachineLearning #TechInnovation #DigitalTransformation #AICommunity #FutureOfTech #DataScience #NLP #DeepLearning #AIAnxiety #Automation #SmartTech #AIForGood #Robotics #AugmentedIntelligence #AITrends #TechAdvancements #AIResearch #MachineIntelligence
 


Welcome to ADCO 2026

13th International Conference on Advanced Computing (ADCO 2026)
April 25 ~ 26, 2026, Copenhagen, Denmark


Submission Deadline : March 28, 2026

Tuesday, March 24, 2026

International Journal of Network Security & Its Applications (IJNSA)

#CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork



Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: March 28, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Monday, March 23, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: March 28, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Friday, March 20, 2026

International Journal of Network Security & Its Applications (IJNSA)

#submitnow #deadline #phdstudent #phdresearch #research #ResearchScholar #researchpaper #researchers #article #online #submissionsopen #RegisterNow #Register #Papersubmission #opencall #event #applynow #CallForPapers #callforsubmissions #submission #Submit #SubmitYourPaper



International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


March 2026: Top 10 Read Articles in Network Security and Its Applications

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Wednesday, March 18, 2026

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Exploring Challenges and Opportunities in Cybersecurity Risk and Threat Communications Related to the Medical Internet of Things (MIOT)
George W. Jackson, Jr.1 and Shawon S. M. Rahman2, 1Capella University, USA and 2University of Hawaii-Hilo, USA

Abstract
As device interconnectivity and ubiquitous computing continues to proliferate healthcare, the Medical Internet of Things (MIoT), also well known as the, Internet of Medical Things (IoMT) or the Internet of Healthcare Things (IoHT), is certain to play a major role in the health, and well-being of billions of people across the globe. When it comes to issues of cybersecurity risks and threats connected to the IoT in all of its various flavors the emphasis has been on technical challenges and technical solution. However, especially in the area of healthcare, there is another substantial and potentially grave challenge. It is the challenge of thoroughly and accurately communicating the nature and extent of cybersecurity risks and threats to patients who are reliant upon these interconnected healthcare technologies to improve and even preserve their lives. This case study was conducted to assess the scope and depth of cybersecurity risk and threat communications delivered to an extremely vulnerable patient population, semi-structured interviews were held with cardiac medical device specialists across the United States. This research contributes to scientific data in the field of healthcare cybersecurity and assists scholars and practitioners in advancing education and research in the field of MIoT patient communications.

Keywords
Internet of Things, IoT Security, Medical Internet of Things, Healthcare Cybersecurity, Thematic Analysis





Tuesday, March 17, 2026

International Journal of Network Security & Its Applications (IJNSA)

#CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork



Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: March 21, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Monday, March 16, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: March 21, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com

Friday, March 13, 2026

International Journal of Network Security & Its Applications (IJNSA)

#publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork #CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication



International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Citations 12231   h-index 52   i10-index 218


Thursday, March 12, 2026

International Journal of Network Security & Its Applications (IJNSA)

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Scope
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Submission Deadline: March 14, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Wednesday, March 11, 2026

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


A Novel Image Encryption Scheme with Huffman Encoding and Steganography Technique
Manju Kumari1, Vipin Pawar2 and Pawan Kumar3, 1YMCA University of Science and Technology, India, 2Deenbandhu Chotu Ram University of Science and Technology, India and 3University of Delhi, India

Abstract
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.

Keywords
Cryptography, Steganography, Huffman Coding, Data Compression





Tuesday, March 10, 2026

International Journal of Network Security & Its Applications (IJNSA)

#CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork



International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: March 14, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Monday, March 9, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: March 14, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Friday, March 6, 2026

International Journal of Network Security & Its Applications (IJNSA)

#ResearchScholar #researchpaper #researchers #article #online #submissionsopen #RegisterNow #Register #Papersubmission #opencall #event #applynow #meetings #CallForPapers #callforsubmissions #submission #Submit #SubmitYourPaper #submitnow #deadline #phdstudent #phdresearch #research



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: March 07, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Thursday, March 5, 2026

International Journal of Network Security & Its Applications (IJNSA)

#internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot



Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Abstracting & Indexing Services:
The articles of IJNSA are indexed/abstracted in the following index services. https://airccse.org/journal/jnsa_index.html

Submission Deadline: March 07, 2026



Wednesday, March 4, 2026

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


OTN in the 5g Era: Transporting Massive Ip-Based Mobile Traffic
Joy Selasi Agbesi , Ohio University, USA

Abstract
Fifth-generation (5G) mobile networks impose unprecedented transport demands—high bandwidth, deterministic latency, and precise synchronization—driven by disaggregated RAN architectures (C-RAN/vRAN) and diverse service classes (eMBB, URLLC, mMTC) (Larsen et al., 2019; Zhang et al., 2020; Nakamura et al., 2018; Wijethilaka & Liyanage, 2021). This paper evaluates Optical Transport Network (OTN) as a foundation for 5G fronthaul and backhaul, focusing on protocol transparency, hierarchical grooming, latency determinism, operations/maintenance tooling, and carrier-grade protection (ITU-T, 2016; Cvijetic et al., 2017; Li et al., 2021). Using a synthesis of standards, deployments, and modeling, we show that OTN efficiently maps heterogeneous 5G traffic (e.g., CPRI/eCPRI, Ethernet), sustains microsecond-level latency and low jitter under load, and scales via ODUflex-based bandwidth granularity while meeting synchronization targets required by TDD and CoMP (Pizzinat et al., 2015; Velasco et al., 2014; ITU-T, 2020). Economic assessment indicates competitive lifecycle cost for high-capacity routes despite higher initial capex, especially where grooming efficiency and operational simplicity offset packet-only alternatives (Chen et al., 2019). We also discuss hybrid architectures pairing OTN with packet transport and SDN control to accelerate service provisioning and enable slice-aware automation (Raza et al., 2017; Taleb et al., 2017). The results provide an integrated framework and practical guidance for operators planning 5G transport, confirming OTN’s suitability for metro-scale fronthaul and aggregation backhaul today and its relevance as requirements evolve toward 6G (Zhang et al., 2020).

Keywords
Optical Transport Network, 5G networks, fronthaul, backhaul, network transport, bandwidth management, mobile networks, fiber optics, network architecture, telecommunications infrastructure





Monday, March 2, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork



Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: March 07, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


International Journal of Network Security & Its Applications (IJNSA)

#research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #sub...