Thursday, April 30, 2026

International Journal of Network Security & Its Applications (IJNSA)

#cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime



International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Over 63% of the IJNSA published articles cited.

For More Details, Please Visit Us: https://airccse.org/journal/ijnsa.html

Wednesday, April 29, 2026

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


AI-Enhanced Network Traffic Analysis for Preventing Fraud Payment in Banks
Balavardhan Reddy1 and Amir Ahmed Ansari2, 1University of the Cumberlands, USA, 2Indiana Wesleyan University, USA

Abstract
The expansion in the use of digital banking, mobile payment services, and online financial services has put tremendous pressure on banking networks, making them vulnerable to sophisticated payment fraud schemes. The inflexibility of rule-based systems in detecting sophisticated payment fraud has led to the need for smarter solutions to detect payment fraud in banking networks. This study presents a framework for artificial intelligence-based network traffic analysis to detect payment fraud in banking networks. The proposed framework utilizes artificial intelligence to process vast amounts of data regarding network activities in real-time to detect payment fraud in banking networks. The study presents artificial intelligence-based network traffic analysis to detect payment fraud in banking networks. The proposed framework utilizes artificial intelligence to process vast amounts of data regarding network activities in real-time to detect payment fraud in banking networks. The proposed framework has been found to improve the accuracy of payment fraud detection in banking networks compared to rule-based systems. The proposed framework has been found to improve the accuracy of payment fraud detection in banking networks compared to rule-based systems.

Keywords
In the digital finance domain, AI is responsible for intelligent network traffic analysis, which increases payment fraud detection and improves banking cybersecurity. Machine learning is the basis for anomaly detection, providing financial security and improving digital banking fraud prevention






Tuesday, April 28, 2026

International Journal of Network Security & Its Applications (IJNSA)

#CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork



International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: May 02, 2026


Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com

Monday, April 27, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: May 02, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com

Friday, April 24, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52

#CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork



Welcome To IJNSA [May 2026, Volume 18, Number 3]

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Paper Submission
Authors are invited to submit papers for this journal through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.


Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com

Wednesday, April 22, 2026

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


From Pipelines to Platforms: The Impact of Platform-Centric Data Architecture on Enterprise AI in Regulated Industries
Mohammed Arbaaz Shareef, Anblicks, USA

Abstract
The article discusses the transition from pipeline-oriented data engineering to platform-centric data management as enterprises scale AI operations under regulatory constraints. The practical motivation stems from the rising complexity of heterogeneous sources, the growing demand for traceability, and operational friction caused by isolated ETL pipelines that fragment quality controls and accountability. Scientific novelty lies in aligning platform concepts (lakehouse unification, data products, mesh/fabric logics, and governed feature stores) with governance requirements for auditability and trustworthy AI lifecycle oversight. The article aims to analytically substantiate how platform-centric data design affects delivery speed, reuse economics, and compliance posture compared to pipeline-first operating models. The study relies on a comparative synthesis of recent peer-reviewed literature on open data platforms, data products, data fabric paradigms, and feature store architectures, complemented by governance research on data quality management and responsible AI governance. The conclusion formulates structured implications for regulated enterprises designing AI-ready data foundations.

Keywords
platform-centric data architecture, data platform, lakehouse, data products, data mesh




Tuesday, April 21, 2026

International Journal of Network Security & Its Applications (IJNSA)

#intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

April 2026 - Top 10 Read Articles in Network Security and Its Applications

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com

For More Details, Please Visit: https://airccse.org/journal/ijnsa.html

Monday, April 20, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: April 25, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com

Friday, April 17, 2026

International Journal of Network Security & Its Applications (IJNSA)

#CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Citations 12292   h-index 52   i10-index 218



Thursday, April 16, 2026

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:
https://airccse.org/journal/ijnsa.html

Strategic Management of the Internal Audit Function in the Transition to a Realtime Mode
Eshan Nabeel, UAE

Abstract
Internal audit of digitally integrated business processes, transactional data flows, and related control environments is undergoing transformation from periodic review toward near real time assurance. Drawing on Agency Theory and Institutional Theory, the study is oriented toward managerial practice and is based on theoretical generalization and analytical interpretation of contemporary approaches to continuous auditing under accelerating digital business processes. The research addresses the critical intersection of data governance, information security, and assurance frameworks essential for organizations operating in digitally interconnected environments. The limitations of the traditional internal audit model based on periodic reviews and sample based testing are examined, and the need to move toward a more dynamic form of assurance that enables timely risk identification is substantiated. Central attention is given to the managerial dimension of internal audit transformation, including changes in the role of the function, revisions of the organizational model, data and technology governance frameworks, competency requirements, and safeguards for preserving independence. The study demonstrates that the practical effectiveness of near real time auditing is determined not by the level of analytical tool adoption, but by their integration into a reproducible control loop with formalized response and escalation conditions. From an operational perspective, such a control loop requires the integration of enterprise data infrastructures with automated monitoring mechanisms. In practice, this involves the use of enterprise resource planning (ERP) systems, security monitoring platforms, and data governance procedures that enable near real time access to transactional information while maintaining strict access controls. The effectiveness of this architecture depends on the coordination between internal audit, information security teams, and data governance structures. Particular emphasis is placed on the cybersecurity and data integrity prerequisites that must be established before continuous monitoring capabilities can be safely deployed. Managerial effects of the transformation related to expanded audit coverage and increased relevance of audit findings are analyzed. Institutional constraints on scaling are also considered, arising from requirements for data controllability and the preservation of the independent status of the internal audit function.

Keywords
internal audit, continuous auditing, strategic management, organizational model, audit independence
 

Wednesday, April 15, 2026

International Journal of Network Security & Its Applications (IJNSA)

#cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime



Over 63% of the IJNSA published articles cited.

International Journal of Network Security & Its Applications (IJNSA)

Tuesday, April 14, 2026

International Journal of Network Security & Its Applications (IJNSA)

#researchers #article #online #submissionsopen #RegisterNow #Register #Papersubmission #CallForPapers #callforsubmissions #submission #Submit #SubmitYourPaper #submitnow #deadline #phdstudent #phdresearch #research #ResearchScholar #researchpaper



Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: April 18, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Monday, April 13, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: April 18, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Friday, April 10, 2026

International Journal of Network Security & Its Applications (IJNSA)

#research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork #CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers



International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Call for papers
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.


Submission Deadline: April 11, 2026


For More Details, Please Visit: https://airccse.org/journal/ijnsa.html

Thursday, April 9, 2026

International Journal of Network Security & Its Applications (IJNSA)

#CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: April 11, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Wednesday, April 8, 2026

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Designing Disaster Recovery Framework for Globally Distributed Cloud Applications
Ronak Jani, Lead DBA, USA

Abstract
This article examines the design of disaster recovery frameworks for globally distributed cloud applications operating under heterogeneous consensus models. The relevance of the study arises from the rapid geographic expansion of cloud infrastructures and the growth of transactional workloads that expose limitations of traditional leader-based mirroring. The scientific novelty lies in the integrated interpretation of cross-cluster broadcast semantics, cumulative quorum acknowledgments, and stake-aware scheduling as components of a unified recovery coordination layer. The paper describes linear sender–receiver rotation mechanisms, probabilistic retransmission bounds, and WAN-aware scalability strategies. Special attention is paid to bandwidth asymmetry, Byzantine fault resilience, and adaptive recovery policies in multi-cloud environments. The goal of the study is to systematize architectural principles for communication-efficient and fault-resilient cross-regional synchronization. Comparative and structural analysis methods were applied. The conclusions formulate design conditions for scalable geo-replication under heterogeneous deployment constraints and highlight their relevance for resilient networked infrastructures and distributed cloud systems.

Keywords
Disaster Recovery, Geo-Replication, Replicated State Machines, Quorum Acknowledgment, Distributed Databases






Tuesday, April 7, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: April 11, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Monday, April 6, 2026

5th International Conference on NLP and Machine Learning Trends (NLMLT 2026)

#NLP #machinelearning #naturallanguageprocessing #deeplearning #datascience #TextAnalytics #LLM #sentimentanalysis #textmining #dataanalytics #ArtificialIntelligence #bayesiannetwork #computervision #datamining #neuralnetwork #ubiquitous #engineering #informationtechnology #computerscience #education #technology #bigdata #developer #programming #robotics #cloudcomputing #softwaredeveloper #development #machinelearningalgorithms #IOT #CyberSecurity #webdevelopment #Ontology #phonology #morphology #semantics #informationretrieval #languagelearning #LanguageModels #SpeechRecognition #transferlearning #multilingual #Summarization #tokenization #virtualassistant #sentimentanalysis #ReinforcementLearning #Normalization #stemming #Lemmatization #LanguageModeling #SemanticAnalysis



Submit Your Research Articles...!!!

Welcome To NLMLT 2026

5th International Conference on NLP and Machine Learning Trends (NLMLT 2026)
August 15 ~ 16, 2026, Melbourne, Australia


Submission Deadline: April 18, 2026

Contact us:
Here's where you can reach us: nlmlt@nlmlt2026.org (or) nlmltconference@yahoo.com


Friday, April 3, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Citations 12273   h-index 52   i10-index 218

For More Information, Please Visit Us: https://airccse.org/journal/ijnsa.html

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Thursday, April 2, 2026

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Classification of Source Code Vulnerabilities and Analysis of Detection Methods: Evaluation, Comparison, and Proposed Approaches
Nin Ho Le Viet1,2, Chieu Ta Quang2, Cuong Nguyen Van3 and Tuan Nguyen Kim3, 1Duy Tan University, Vietnam, 2Thuyloi University, Vietnam, 3Phenikaa University, Vietnam

Abstract
Source code vulnerabilities are an important cause leading to many information security incidents in modern software systems. Due to the diversity of causes and technical characteristics, source code vulnerability detection is difficult to be effectively addressed by a single method. This paper focuses on classifying, evaluating, and comparing source code vulnerability detection methods in order to provide a systematic view of this problem. The first contribution of the paper is to develop a classification approach for source code vulnerabilities based on causes and technical characteristics, thereby clarifying the nature of each vulnerability group. Next, the paper analyzes and evaluates common detection method categories, including static analysis, dynamic analysis, and machine learning and deep learning based methods, with consideration of the application scope and characteristic limitations of each approach. On that basis, the paper conducts an overall comparison among the methods to indicate that there does not exist a single technique that can effectively detect every type of source code vulnerability. Finally, the paper proposes a combined approach to leverage the advantages of different methods in source code vulnerability detection. The results and analyses in the paper are expected to support researchers and software engineers in evaluating, selecting, and orienting the development of vulnerability detection solutions in the future.

Keywords
Source code vulnerabilities, Software security, Vulnerability detection, Static and dynamic analysis, Machine learning





Wednesday, April 1, 2026

International Journal of Network Security & Its Applications (IJNSA) - Current Issue: March 2026, Volume 18, Number 2

#networksecurity #security #network #blockchain #technology #cybersecurity #artificialintelligence #machinelearning #database #systemsecurity #optimization #internetsecurity #mobile #adhoc #sensors #protocols #Management #intrusion #detection #prevention



International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Current Issue: March 2026, Volume 18, Number 2

Classification of Source Code Vulnerabilities and Analysis of Detection Methods: Evaluation, Comparison, and Proposed Approaches
Nin Ho Le Viet1,2, Chieu Ta Quang2, Cuong Nguyen Van3 and Tuan Nguyen Kim3, 1Duy Tan University, Vietnam, 2Thuyloi University, Vietnam, 3Phenikaa University, Vietnam

Designing Disaster Recovery Framework for Globally Distributed Cloud Applications
Ronak Jani, Lead DBA, USA

Strategic Management of the Internal Audit Function in the Transition to a Realtime Mode
Eshan Nabeel, UAE

From Pipelines to Platforms: The Impact of Platform-Centric Data Architecture on Enterprise AI in Regulated Industries
Mohammed Arbaaz Shareef, Anblicks, USA

AI-Enhanced Network Traffic Analysis for Preventing Fraud Payment in Banks
Balavardhan Reddy1 and Amir Ahmed Ansari2, 1University of the Cumberlands, USA, 2Indiana Wesleyan University, USA

Concurrency and Performance Challenges in Large-Scale Distributed Applications
Matvii Horskyi, USA


Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com

International Journal of Network Security & Its Applications (IJNSA)

#cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy #intrusion #detection #preventi...