SlideShare a Scribd company logo
1 of 2
International Journal of Information Security and Applications(IJISA)
ISSN 0974 - 624N (Online) ; 0175 - 2190 (Print)
http://skycs.org/jounals/ijisa/Home.html
Scope
International Journal of Information Security and Applications(IJISA) is a open access journal
that publishes articles which contribute new results in all areas Information Security and Applications.
The journal focuses on all technical and practical aspects of Information Security and Applications.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results,
projects, surveying works and industrial experiences that describe significant advances in the
Information Security and Applications.
Topics of interest include, but are not limited to, the following
 Cryptographic protocols
 Cryptography and Coding
 Untraceability
 Privacy and authentication
 Key management
 Authentication
 Trust Management
 Quantum cryptography
 Computational Intelligence in Security
 Artificial Immune Systems
 Biological & Evolutionary Computation
 Intelligent Agents and Systems
 Reinforcement & Unsupervised Learning
 Autonomy-Oriented Computing
 Coevolutionary Algorithms
 Fuzzy Systems
 Biometric Security
 Trust models and metrics
 Regulation and Trust Mechanisms
 Data Integrity
 Models for Authentication, Trust and Authorization
 Wireless Network Security
 Information Hiding
 Data & System Integrity
 E- Commerce
 Access Control and Intrusion Detection
 Intrusion Detection and Vulnerability
Assessment
 Authentication and Non-repudiation
 Identification and Authentication
 Insider Threats and Countermeasures
 Intrusion Detection & Prevention
 Secure Cloud Computing
 Security Information Systems Architecture and
Design and Security Patterns
 Security Management
 Security Requirements (threats,vulnerabilities,
risk, formal methods, etc.)
 Sensor and Mobile Ad Hoc Network Security
 Service and Systems Design and QoS Network
Security
 Software Security
 Security and Privacy in Mobile Systems
 Security and Privacy in Pervasive/Ubiquitous
Computing
 Security and Privacy in Web Sevices
 Security and Privacy Policies
 Security Area Control
 Security Deployment
 Security Engineering

Distributed Systems
PaperSubmission
Authors are invited to submit papers for this journal through Submission System. Submissions must
be original and should not have been published previously or be under consideration for publication
while being evaluated for this Journal.
Important Dates
 Submission Deadline :May 23, 2020
 Notification :June 25, 2020
 Final Manuscript Due :June 30, 2020
 Publication Date : Determined by the Editor-in-Chief
TO SUBMIT YOUR PAPER, PLEASE CLICK THE FOLLOWING LINK Submission System.
Contacts
Here's where you can reach us: ijcsijournal@yahoo.com

More Related Content

What's hot

International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)MiajackB
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)ijfcst journal
 
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)MiajackB
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) MiajackB
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) MiajackB
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) MiajackB
 
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)MiajackB
 

What's hot (17)

International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
Ijisa
IjisaIjisa
Ijisa
 
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 

Similar to International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)ijfcst journal
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) MiajackB
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)ijcisjournal
 
International Journal of Wireless Network (IJWNS)
International Journal of Wireless Network (IJWNS)  International Journal of Wireless Network (IJWNS)
International Journal of Wireless Network (IJWNS) jackson130
 

Similar to International Journal of Network Security & Its Applications (IJNSA) (13)

International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)
 
International Journal of Wireless Network (IJWNS)
International Journal of Wireless Network (IJWNS)  International Journal of Wireless Network (IJWNS)
International Journal of Wireless Network (IJWNS)
 

More from ijfcst journal

International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)ijfcst journal
 
International Journal of Education (IJE)
International Journal of Education (IJE)International Journal of Education (IJE)
International Journal of Education (IJE)ijfcst journal
 
International Journal of Education (IJE)
International Journal of Education (IJE)International Journal of Education (IJE)
International Journal of Education (IJE)ijfcst journal
 
International Journal of Computer Networks &(IJCNC)
International Journal of Computer Networks &(IJCNC)International Journal of Computer Networks &(IJCNC)
International Journal of Computer Networks &(IJCNC)ijfcst journal
 
International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)ijfcst journal
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)ijfcst journal
 
International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)ijfcst journal
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)ijfcst journal
 
International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)ijfcst journal
 
International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)ijfcst journal
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)ijfcst journal
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)ijfcst journal
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)ijfcst journal
 
International Journal of Education (IJE)
International Journal of Education (IJE)International Journal of Education (IJE)
International Journal of Education (IJE)ijfcst journal
 
International Journal of Computer Networks & Communications(IJCNC)
International Journal of Computer Networks & Communications(IJCNC)International Journal of Computer Networks & Communications(IJCNC)
International Journal of Computer Networks & Communications(IJCNC)ijfcst journal
 
International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)ijfcst journal
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)ijfcst journal
 
International Journal of Software Engineering &Applications (IJSEA)
International Journal of Software Engineering &Applications (IJSEA)International Journal of Software Engineering &Applications (IJSEA)
International Journal of Software Engineering &Applications (IJSEA)ijfcst journal
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC) 
International Journal of Artificial Intelligence and Soft Computing (IJAISC) International Journal of Artificial Intelligence and Soft Computing (IJAISC) 
International Journal of Artificial Intelligence and Soft Computing (IJAISC) ijfcst journal
 
International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)ijfcst journal
 

More from ijfcst journal (20)

International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)
 
International Journal of Education (IJE)
International Journal of Education (IJE)International Journal of Education (IJE)
International Journal of Education (IJE)
 
International Journal of Education (IJE)
International Journal of Education (IJE)International Journal of Education (IJE)
International Journal of Education (IJE)
 
International Journal of Computer Networks &(IJCNC)
International Journal of Computer Networks &(IJCNC)International Journal of Computer Networks &(IJCNC)
International Journal of Computer Networks &(IJCNC)
 
International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)
 
International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
 
International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)
 
International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
 
International Journal of Education (IJE)
International Journal of Education (IJE)International Journal of Education (IJE)
International Journal of Education (IJE)
 
International Journal of Computer Networks & Communications(IJCNC)
International Journal of Computer Networks & Communications(IJCNC)International Journal of Computer Networks & Communications(IJCNC)
International Journal of Computer Networks & Communications(IJCNC)
 
International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)
 
International Journal of Software Engineering &Applications (IJSEA)
International Journal of Software Engineering &Applications (IJSEA)International Journal of Software Engineering &Applications (IJSEA)
International Journal of Software Engineering &Applications (IJSEA)
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC) 
International Journal of Artificial Intelligence and Soft Computing (IJAISC) International Journal of Artificial Intelligence and Soft Computing (IJAISC) 
International Journal of Artificial Intelligence and Soft Computing (IJAISC) 
 
International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

International Journal of Network Security & Its Applications (IJNSA)

  • 1. International Journal of Information Security and Applications(IJISA) ISSN 0974 - 624N (Online) ; 0175 - 2190 (Print) http://skycs.org/jounals/ijisa/Home.html Scope International Journal of Information Security and Applications(IJISA) is a open access journal that publishes articles which contribute new results in all areas Information Security and Applications. The journal focuses on all technical and practical aspects of Information Security and Applications. Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Information Security and Applications. Topics of interest include, but are not limited to, the following  Cryptographic protocols  Cryptography and Coding  Untraceability  Privacy and authentication  Key management  Authentication  Trust Management  Quantum cryptography  Computational Intelligence in Security  Artificial Immune Systems  Biological & Evolutionary Computation  Intelligent Agents and Systems  Reinforcement & Unsupervised Learning  Autonomy-Oriented Computing  Coevolutionary Algorithms  Fuzzy Systems  Biometric Security  Trust models and metrics  Regulation and Trust Mechanisms  Data Integrity  Models for Authentication, Trust and Authorization  Wireless Network Security  Information Hiding  Data & System Integrity  E- Commerce  Access Control and Intrusion Detection  Intrusion Detection and Vulnerability Assessment  Authentication and Non-repudiation  Identification and Authentication  Insider Threats and Countermeasures  Intrusion Detection & Prevention  Secure Cloud Computing  Security Information Systems Architecture and Design and Security Patterns  Security Management  Security Requirements (threats,vulnerabilities, risk, formal methods, etc.)  Sensor and Mobile Ad Hoc Network Security  Service and Systems Design and QoS Network Security  Software Security  Security and Privacy in Mobile Systems  Security and Privacy in Pervasive/Ubiquitous Computing  Security and Privacy in Web Sevices  Security and Privacy Policies  Security Area Control  Security Deployment  Security Engineering  Distributed Systems
  • 2. PaperSubmission Authors are invited to submit papers for this journal through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. Important Dates  Submission Deadline :May 23, 2020  Notification :June 25, 2020  Final Manuscript Due :June 30, 2020  Publication Date : Determined by the Editor-in-Chief TO SUBMIT YOUR PAPER, PLEASE CLICK THE FOLLOWING LINK Submission System. Contacts Here's where you can reach us: ijcsijournal@yahoo.com