Friday, January 30, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: January 31, 2026



Wednesday, January 28, 2026

International Journal of Network Security & Its Applications (IJNSA)

#CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork



Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Paper Submission
Authors are invited to submit papers for this journal through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. For paper format download the template here.





International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


System Call Dependence Graph Based Behavior Decomposition of Android Applications
Bin Zhao, JD.com Silicon Valley R&D Center, USA

Abstract
Millions of developers and third-party organizations have flooded into the Android ecosystem due to Android’s open-source feature and low barriers to entry for developers. .However, that also attracts many attackers. Over 90 percent of mobile malware is found targeted on Android. Though Android provides multiple security features and layers to protect user data and system resources, there are still some overprivileged applications in Google Play Store or third-party Android app stores at wild. In this paper, we proposed an approach to map system level behavior and Android APIs, based on the observation that system level behaviors cannot be avoided but sensitive Android APIs could be evaded.To the best of our knowledge, our approach provides the first work to decompose Android application behaviors based on system-level behaviors. We then map system level behaviors and Android APIs through System Call Dependence Graphs. The study also shows that our approach can effectively identify potential permission abusing, with an almost negligible performance impact.

Keywords
Behavior Representation, System Call Dependence Graph, Privilege Escalation, Android APIs





Monday, January 26, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: January 31, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Thursday, January 22, 2026

International Journal of Network Security & Its Applications (IJNSA)

#intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Citations 12161   h-index 52   i10-index 220


For More Details, Please Visit:  https://airccse.org/journal/ijnsa.html

Wednesday, January 21, 2026

7th International Conference on Signal Processing and Machine Learning (SIGML 2026)

#SignalProcessing #machinelearning #DigitalSignalProcessing #coding #transmission #communication #imageprocessing #storage #retrieval #computervision #patternrecognition #internetofthings #deeplearning #SIGNAL #Engineering #technology #audioprocessing #computerscience #neuralnetworks #robotics #softwaredeveloper #dataanalysis #DigitalTransformation #artificialintelligence #datascience #electronics #imageanalysis #embeddedsystems #objectdetection #ElectronicsEngineering



Call for Research Articles...!!!

7th International Conference on Signal Processing and Machine Learning (SIGML 2026)
March 14 ~ 15, 2026, Vienna, Austria


Paper Submission
Authors are invited to submit papers through the conference Submission System by January 24, 2026. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings (H index 45) in Computer Science & Information Technology (CS & IT) series (Confirmed).



Tuesday, January 20, 2026

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


A Chaotic Confusion-Diffusion Image Encryption Based on Henon Map
Ashraf Afifi, Taif University, Kingdom of Saudi Arabia

Abstract
This paper suggests chaotic confusion-diffusion image encryption based on the Henon map. The proposed chaotic confusion-diffusion image encryption utilizes image confusion and pixel diffusion in two levels. In the first level, the plainimage is scrambled by a modified Henon map for n rounds. In the second level, the scrambled image is diffused using Henon chaotic map. Comparison between the logistic map and modified Henon map is established to investigate the effectiveness of the suggested chaotic confusion-diffusion image encryption scheme. Experimental results showed that the suggested chaotic confusion-diffusion image encryption scheme can successfully encrypt/decrypt images using the same secret keys. Simulation results confirmed that the ciphered images have good entropy information and low correlation between coefficients. Besides the distribution of the gray values in the ciphered image has random-like behavior.

Keywords
Chaos, Encryptions, Henon map, Shuffle, Confusion, Diffusion





Monday, January 19, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy #networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter



Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


January 2026 - Top 10 Read Articles in Network Security and Its Applications

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Sunday, January 18, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: January 25, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Tuesday, January 13, 2026

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Authentication Mechanism Enhancement Utilising Secure Repository for Passwordless Handshake
Ioannis A. Pikrammenos, Panagiotis Tolis and Panagiotis Perakis, University of Derby, Greece

Abstract
In this paper the idea of an enhanced security authentication procedure is presented. This procedure prohibits the transmission of the user’s password over the network while still providing the same authentication service. To achieve that, Kerberos Protocol and a secure password repository are adopted, namely a smart card. The conditional access to a smart card system provides a secure place to keep credentials safe. Then, by referencing to them through identifiers, an authentication system may perform its scope without revealing the secrets at all. This elevates the trustworthiness of the mechanism while at the same time it achieves to reduce the overhead of the authentication systems due to the elaborate encryptions procedures.

Keywords
Kerberos v5, LDAP, authentication, password handling, smart card





Monday, January 12, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#CallForPapers #callforsubmissions #submission #Submit #SubmitYourPaper #submitnow #deadline #phdstudent #phdresearch #research #ResearchScholar #researchpaper #researchers #article #online #submissionsopen #RegisterNow #Register #Papersubmission



Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: January 17, 2026


Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Sunday, January 11, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: January 17, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Thursday, January 8, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Citations 12142   h-index 52   i10-index 220



Wednesday, January 7, 2026

7th International Conference on Cloud and Internet of Things (ICCIoT 2026)

#CloudComputing #internetofthings #BigData #cloudsecurity #networking #datastorage #programming #security #opensource #cloudstorage #cloudarchitecture #IoT #cloudmanagement #cloudservices #technology #DevOps #machinelearning #datascience #informationtechnology #datacenter #networksecurity #dataprotection #webdevelopment #datanalysis #Software #clouds #analytics #Serverless #multicloud #MicrosoftAzure #EdgeComputing #Engineering #computerscience



Submit Your Research Articles...!!!

Welcome To ICCIoT 2026

7th International Conference on Cloud and Internet of Things (ICCIoT 2026)
March 14 ~ 15, 2026, Vienna, Austria


Submission Deadline: January 10, 2026

Contact us:
Here's where you can reach us: icciot@ccseit2026.org (or) icciot_confe@yahoo.com


Tuesday, January 6, 2026

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


A Combination of Temporal Sequence Learning and Data Description for Anomaly - based NIDS
Nguyen Thanh Van1,2, Tran Ngoc Thinh1 and Le Thanh Sach1, 1Ho Chi Minh City University of Technology, VietNam and 2Ho Chi Minh City University of Technology and Education, VietNam

Abstract
Through continuous observation and modelling of normal behavior in networks, Anomaly-based Network Intrusion Detection System (A-NIDS) offers a way to find possible threats via deviation from the normal model. The analysis of network traffic based on time series model has the advantage of exploiting the relationship between packages within network traffic and observing trends of behaviors over a period of time. It will generate new sequences with good features that support anomaly detection in network traffic and provide the ability to detect new attacks. Besides, an anomaly detection technique, which focuses on the normal data and aims to build a description of it, will be an effective technique for anomaly detection in imbalanced data. In this paper, we propose a combination model of Long Short Term Memory (LSTM) architecture for processing time series and a data description Support Vector Data Description (SVDD) for anomaly detection in A-NIDS to obtain the advantages of them. This model helps parameters in LSTM and SVDD are jointly trained with joint optimization method. Our experimental results with KDD99 dataset show that the proposed combined model obtains high performance in intrusion detection, especially DoS and Probe attacks with 98.0% and 99.8%, respectively.

Keywords
Anomaly-based network intrusion detection system, temporal sequence, data description




Monday, January 5, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork



Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Paper Submission
Authors are invited to submit papers for this journal through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.




Sunday, January 4, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: January 10, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Thursday, January 1, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#CallForPapers #callforsubmissions #submission #Submit #SubmitYourPaper #submitnow #deadline #phdstudent #phdresearch #research #ResearchScholar #researchpaper #researchers #article #online #submissionsopen #RegisterNow #Register #Papersubmission #opencall #event #applynow



Welcome To IJNSA [January 2026, Volume 18, Number 1]

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)





International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #p...