SlideShare a Scribd company logo
International Journal of Information Security and Applications(IJISA)
ISSN 0974 - 624N (Online) ; 0175 - 2190 (Print)
http://skycs.org/jounals/ijisa/Home.html
Scope
International Journal of Information Security and Applications(IJISA) is a open access journal
that publishes articles which contribute new results in all areas Information Security and Applications.
The journal focuses on all technical and practical aspects of Information Security and Applications.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results,
projects, surveying works and industrial experiences that describe significant advances in the
Information Security and Applications.
Topics of interest include, but are not limited to, the following
 Cryptographic protocols
 Cryptography and Coding
 Untraceability
 Privacy and authentication
 Key management
 Authentication
 Trust Management
 Quantum cryptography
 Computational Intelligence in Security
 Artificial Immune Systems
 Biological & Evolutionary Computation
 Intelligent Agents and Systems
 Reinforcement & Unsupervised Learning
 Autonomy-Oriented Computing
 Coevolutionary Algorithms
 Fuzzy Systems
 Biometric Security
 Trust models and metrics
 Regulation and Trust Mechanisms
 Data Integrity
 Models for Authentication, Trust and Authorization
 Wireless Network Security
 Information Hiding
 Data & System Integrity
 E- Commerce
 Access Control and Intrusion Detection
 Intrusion Detection and Vulnerability
Assessment
 Authentication and Non-repudiation
 Identification and Authentication
 Insider Threats and Countermeasures
 Intrusion Detection & Prevention
 Secure Cloud Computing
 Security Information Systems Architecture and
Design and Security Patterns
 Security Management
 Security Requirements (threats,vulnerabilities,
risk, formal methods, etc.)
 Sensor and Mobile Ad Hoc Network Security
 Service and Systems Design and QoS Network
Security
 Software Security
 Security and Privacy in Mobile Systems
 Security and Privacy in Pervasive/Ubiquitous
Computing
 Security and Privacy in Web Sevices
 Security and Privacy Policies
 Security Area Control
 Security Deployment
 Security Engineering

Distributed Systems
PaperSubmission
Authors are invited to submit papers for this journal through Submission System. Submissions must
be original and should not have been published previously or be under consideration for publication
while being evaluated for this Journal.
Important Dates
 Submission Deadline :May 16, 2020
 Notification :May 25, 2020
 Final Manuscript Due :May 31, 2020
 Publication Date : Determined by the Editor-in-Chief
TO SUBMIT YOUR PAPER, PLEASE CLICK THE FOLLOWING LINK Submission System.
Contacts
Here's where you can reach us: ijcsijournal@yahoo.com

More Related Content

What's hot

International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
MiajackB
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)
MiajackB
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
MiajackB
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
MiajackB
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
MiajackB
 
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa

What's hot (17)

International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 

Similar to International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
MiajackB
 
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)
MiajackB
 
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
ijfcst journal
 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)
ijcisjournal
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security  (IJCIS)International Journal on Cryptography and Information Security  (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
ijcisjournal
 

Similar to International Journal of Network Security & Its Applications (IJNSA) (13)

International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security  (IJCIS)International Journal on Cryptography and Information Security  (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
 

More from ijfcst journal

International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)
ijfcst journal
 
International Journal of Education (IJE)
International Journal of Education (IJE)International Journal of Education (IJE)
International Journal of Education (IJE)
ijfcst journal
 
International Journal of Education (IJE)
International Journal of Education (IJE)International Journal of Education (IJE)
International Journal of Education (IJE)
ijfcst journal
 
International Journal of Computer Networks &(IJCNC)
International Journal of Computer Networks &(IJCNC)International Journal of Computer Networks &(IJCNC)
International Journal of Computer Networks &(IJCNC)
ijfcst journal
 
International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)
ijfcst journal
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)
ijfcst journal
 
International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)
ijfcst journal
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
ijfcst journal
 
International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)
ijfcst journal
 
International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)
ijfcst journal
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)
ijfcst journal
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
ijfcst journal
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
ijfcst journal
 
International Journal of Education (IJE)
International Journal of Education (IJE)International Journal of Education (IJE)
International Journal of Education (IJE)
ijfcst journal
 
International Journal of Computer Networks & Communications(IJCNC)
International Journal of Computer Networks & Communications(IJCNC)International Journal of Computer Networks & Communications(IJCNC)
International Journal of Computer Networks & Communications(IJCNC)
ijfcst journal
 
International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)
ijfcst journal
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)
ijfcst journal
 
International Journal of Software Engineering &Applications (IJSEA)
International Journal of Software Engineering &Applications (IJSEA)International Journal of Software Engineering &Applications (IJSEA)
International Journal of Software Engineering &Applications (IJSEA)
ijfcst journal
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC) 
International Journal of Artificial Intelligence and Soft Computing (IJAISC) International Journal of Artificial Intelligence and Soft Computing (IJAISC) 
International Journal of Artificial Intelligence and Soft Computing (IJAISC) 
ijfcst journal
 
International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)
ijfcst journal
 

More from ijfcst journal (20)

International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)
 
International Journal of Education (IJE)
International Journal of Education (IJE)International Journal of Education (IJE)
International Journal of Education (IJE)
 
International Journal of Education (IJE)
International Journal of Education (IJE)International Journal of Education (IJE)
International Journal of Education (IJE)
 
International Journal of Computer Networks &(IJCNC)
International Journal of Computer Networks &(IJCNC)International Journal of Computer Networks &(IJCNC)
International Journal of Computer Networks &(IJCNC)
 
International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)
 
International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
 
International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)
 
International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
 
International Journal of Education (IJE)
International Journal of Education (IJE)International Journal of Education (IJE)
International Journal of Education (IJE)
 
International Journal of Computer Networks & Communications(IJCNC)
International Journal of Computer Networks & Communications(IJCNC)International Journal of Computer Networks & Communications(IJCNC)
International Journal of Computer Networks & Communications(IJCNC)
 
International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)
 
International Journal of Software Engineering &Applications (IJSEA)
International Journal of Software Engineering &Applications (IJSEA)International Journal of Software Engineering &Applications (IJSEA)
International Journal of Software Engineering &Applications (IJSEA)
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC) 
International Journal of Artificial Intelligence and Soft Computing (IJAISC) International Journal of Artificial Intelligence and Soft Computing (IJAISC) 
International Journal of Artificial Intelligence and Soft Computing (IJAISC) 
 
International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)
 

Recently uploaded

Bayesian Decision Theory details ML.pptx
Bayesian Decision Theory details ML.pptxBayesian Decision Theory details ML.pptx
Bayesian Decision Theory details ML.pptx
amrita chaturvedi
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
Kamal Acharya
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
PIMR BHOPAL
 
Introduction to verilog basic modeling .ppt
Introduction to verilog basic modeling   .pptIntroduction to verilog basic modeling   .ppt
Introduction to verilog basic modeling .ppt
AmitKumar730022
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Addu25809
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
CVCSOfficial
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
Prakhyath Rai
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 

Recently uploaded (20)

Bayesian Decision Theory details ML.pptx
Bayesian Decision Theory details ML.pptxBayesian Decision Theory details ML.pptx
Bayesian Decision Theory details ML.pptx
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
 
Introduction to verilog basic modeling .ppt
Introduction to verilog basic modeling   .pptIntroduction to verilog basic modeling   .ppt
Introduction to verilog basic modeling .ppt
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 

International Journal of Network Security & Its Applications (IJNSA)

  • 1. International Journal of Information Security and Applications(IJISA) ISSN 0974 - 624N (Online) ; 0175 - 2190 (Print) http://skycs.org/jounals/ijisa/Home.html Scope International Journal of Information Security and Applications(IJISA) is a open access journal that publishes articles which contribute new results in all areas Information Security and Applications. The journal focuses on all technical and practical aspects of Information Security and Applications. Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Information Security and Applications. Topics of interest include, but are not limited to, the following  Cryptographic protocols  Cryptography and Coding  Untraceability  Privacy and authentication  Key management  Authentication  Trust Management  Quantum cryptography  Computational Intelligence in Security  Artificial Immune Systems  Biological & Evolutionary Computation  Intelligent Agents and Systems  Reinforcement & Unsupervised Learning  Autonomy-Oriented Computing  Coevolutionary Algorithms  Fuzzy Systems  Biometric Security  Trust models and metrics  Regulation and Trust Mechanisms  Data Integrity  Models for Authentication, Trust and Authorization  Wireless Network Security  Information Hiding  Data & System Integrity  E- Commerce  Access Control and Intrusion Detection  Intrusion Detection and Vulnerability Assessment  Authentication and Non-repudiation  Identification and Authentication  Insider Threats and Countermeasures  Intrusion Detection & Prevention  Secure Cloud Computing  Security Information Systems Architecture and Design and Security Patterns  Security Management  Security Requirements (threats,vulnerabilities, risk, formal methods, etc.)  Sensor and Mobile Ad Hoc Network Security  Service and Systems Design and QoS Network Security  Software Security  Security and Privacy in Mobile Systems  Security and Privacy in Pervasive/Ubiquitous Computing  Security and Privacy in Web Sevices  Security and Privacy Policies  Security Area Control  Security Deployment  Security Engineering  Distributed Systems
  • 2. PaperSubmission Authors are invited to submit papers for this journal through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. Important Dates  Submission Deadline :May 16, 2020  Notification :May 25, 2020  Final Manuscript Due :May 31, 2020  Publication Date : Determined by the Editor-in-Chief TO SUBMIT YOUR PAPER, PLEASE CLICK THE FOLLOWING LINK Submission System. Contacts Here's where you can reach us: ijcsijournal@yahoo.com