SlideShare a Scribd company logo
1 of 2
Download to read offline
7th
International Conference on Networks and Security (NSEC 2023)
August 26 ~ 27, 2023, Dubai, UAE
https://inwes2023.org/nsec/index
Scope & Topics
7th
International Conference on Networks and Security (NSEC 2023) will provide an excellent
international forum for sharing knowledge and results in theory, methodology and applications of
Networks and Communications security. The aim of the conference is to provide a platform to the
researchers and practitioners from both academia as well as industry to meet and share cutting-edge
development in the field.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results,
projects, surveying works and industrial experiences that describe significant advances in the following
areas, but are not limited to.
Topics of interest include, but are not limited to, the following:
 Access control, Anonymity, Audit and audit reduction & Authentication and authorization
 Algorithms and Bioinformatics
 Applied cryptography, Cryptanalysis, Digital Signatures
 Big Data Security, Privacy and Trust
 Bio metric security
 Blockchain and Distributed Ledger
 Boundary control devices
 Certification and accreditation
 Cross-layer design for security
 Data and System Integrity, Database security
 Data Mining
 Defensive Information Warfare
 Distributed Systems Security
 Electronic Commerce
 E-mail Security, Spam, Phishing, E-mail fraud, Virus, Worms, Trojan Protection
 Grid Security
 Information Hiding and Watermarking & Information Survivability
 Insider Threat Protection, Integrity
 Intellectual Property Protection
 Internet of Things (IoT) Security
 Internet/Intranet Security
 Key Management and key Recovery
 Language-based Security
 Machine Learning & AI based Security
 Mobile and Wireless Security
 Mobile, Ad Hoc and Sensor Network Security
 Monitoring and Surveillance
 Multimedia Security ,Operating System Security, Peer-To-Peer Security
 NLP for Security
 Performance Evaluations of Protocols & Security Application
 Privacy and Data Protection
 Product Evaluation Criteria and Compliance
 Risk Evaluation and Security certification
 Risk/vulnerability Assessment
 Security & Network Management
 Security and Information Hiding in Data Mining
 Security Models & Protocols
 Security Threats & Countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
 Trusted Computing
 Ubiquitous Computing Security
Paper Submission
Authors are invited to submit papers through the conference Submission System by August 12, 2023.
Submissions must be original and should not have been published previously or be under consideration
for publication while being evaluated for this conference. The proceedings of the conference will be
published by Computer Science Conference Proceedings in Computer Science & Information
Technology (CS & IT) series (Confirmed).
Selected papers from NSEC 2023, after further revisions, will be published in the special issues of the
following journals
 International Journal of Computer Networks & Communications (IJCNC) - ERA, WJCI,
Scopus Indexed
 International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI,
Indexed
 Information Technology in Industry (ITII)
Important Dates
 Submission Deadline : August 12, 2023
 Authors Notification : August 20, 2023
 Registration & Camera-Ready Paper Due : August 22, 2023
Contact Us
Here's where you can reach us :nsec@inwes2023.org or nsecconf@gmail.com
Submission Link:
https://inwes2023.org/submission/index.php

More Related Content

Similar to FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)

International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Conference on Security & Applications (SECURA 2023)
International Conference on Security & Applications (SECURA 2023)International Conference on Security & Applications (SECURA 2023)
International Conference on Security & Applications (SECURA 2023)ijwmn
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)MiajackB
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...ijdms
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)ijcga
 
International Conference on Security & Applications (SECURA 2023)
International Conference on Security & Applications (SECURA 2023)International Conference on Security & Applications (SECURA 2023)
International Conference on Security & Applications (SECURA 2023)ijwmn
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 

Similar to FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023) (20)

International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Conference on Security & Applications (SECURA 2023)
International Conference on Security & Applications (SECURA 2023)International Conference on Security & Applications (SECURA 2023)
International Conference on Security & Applications (SECURA 2023)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
International Conference on Security & Applications (SECURA 2023)
International Conference on Security & Applications (SECURA 2023)International Conference on Security & Applications (SECURA 2023)
International Conference on Security & Applications (SECURA 2023)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Ijwns
IjwnsIjwns
Ijwns
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)

  • 1. 7th International Conference on Networks and Security (NSEC 2023) August 26 ~ 27, 2023, Dubai, UAE https://inwes2023.org/nsec/index Scope & Topics 7th International Conference on Networks and Security (NSEC 2023) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Networks and Communications security. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to. Topics of interest include, but are not limited to, the following:  Access control, Anonymity, Audit and audit reduction & Authentication and authorization  Algorithms and Bioinformatics  Applied cryptography, Cryptanalysis, Digital Signatures  Big Data Security, Privacy and Trust  Bio metric security  Blockchain and Distributed Ledger  Boundary control devices  Certification and accreditation  Cross-layer design for security  Data and System Integrity, Database security  Data Mining  Defensive Information Warfare  Distributed Systems Security  Electronic Commerce  E-mail Security, Spam, Phishing, E-mail fraud, Virus, Worms, Trojan Protection  Grid Security  Information Hiding and Watermarking & Information Survivability  Insider Threat Protection, Integrity  Intellectual Property Protection  Internet of Things (IoT) Security  Internet/Intranet Security  Key Management and key Recovery  Language-based Security  Machine Learning & AI based Security  Mobile and Wireless Security  Mobile, Ad Hoc and Sensor Network Security  Monitoring and Surveillance  Multimedia Security ,Operating System Security, Peer-To-Peer Security  NLP for Security  Performance Evaluations of Protocols & Security Application  Privacy and Data Protection
  • 2.  Product Evaluation Criteria and Compliance  Risk Evaluation and Security certification  Risk/vulnerability Assessment  Security & Network Management  Security and Information Hiding in Data Mining  Security Models & Protocols  Security Threats & Countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)  Trusted Computing  Ubiquitous Computing Security Paper Submission Authors are invited to submit papers through the conference Submission System by August 12, 2023. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed). Selected papers from NSEC 2023, after further revisions, will be published in the special issues of the following journals  International Journal of Computer Networks & Communications (IJCNC) - ERA, WJCI, Scopus Indexed  International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI, Indexed  Information Technology in Industry (ITII) Important Dates  Submission Deadline : August 12, 2023  Authors Notification : August 20, 2023  Registration & Camera-Ready Paper Due : August 22, 2023 Contact Us Here's where you can reach us :nsec@inwes2023.org or nsecconf@gmail.com Submission Link: https://inwes2023.org/submission/index.php