SlideShare a Scribd company logo
1 of 2
International Journal of Security and Communication Networks (IJSCS)
ISSN 0924 - 624N (Online) ; 0152 - 2160 (Print)
*** August Issue ***
http://skycs.org/jounals/ijscs/Home.html
Scope
International Journal of Security and Communication Networks(IJSCS) is a bi monthly open
access peer-reviewed journal that publishes articles which contribute new results in all areas of the
Security and Communication Networks. The goal of this journal is to bring together researchers and
practitioners from academia and industry to focus on understanding Modern developments in this
field, and establishing new collaborations in these areas. Authors are solicited to contribute to the
journal by submitting articles that illustrate research results, projects, surveying works and industrial
experiences that describe significant advances in the areas of Security and Communication Networks.
Topics of interest include, but are not limited to, the following
 network security
 computer security
 cyber security
 System and network security
 Threat modeling
 Security architecturesA
 Access control
 Malware and cyberweapons
 Intrusion detection and visualization
 Defense in depth
 Monitoring and real-time supervision
 Applied cryptography
 Perimeter security
 Safety-security interactions
 Cybersecurity engineering
 Secure communication protocols
 Formal models for ICS/CPS/ICN security
 Hardware security
 Resilient ICS/CPS/ICN
 Application security
 Secure firmware
 Wireless Power Transfer
 Wireless Message Communication Between Two Computers
 Wireless Electronic Notice Board Using GSM
 Wireless Over Temperature Alarm
 Fire Fighting Robotic Vehicle
PaperSubmission
Authors are invited to submit papers for this journal through Submission System. Submissions must
be original and should not have been published previously or be under consideration for publication
while being evaluated for this Journal.
Important Dates
 Submission Deadline :August 12, 2020
 Notification :August 25, 2020
 Final Manuscript Due :August 31, 2020
 Publication Date : Determined by the Editor-in-Chief
TO SUBMIT YOUR PAPER, PLEASE CLICK THE FOLLOWING LINK Submission System.
Contacts
Here's where you can reach us: ijcsijournal@yahoo.com

More Related Content

What's hot (20)

Ijscs
IjscsIjscs
Ijscs
 
Ijscs
IjscsIjscs
Ijscs
 
Ijscs
IjscsIjscs
Ijscs
 
Ijscs
IjscsIjscs
Ijscs
 
Ijscs
IjscsIjscs
Ijscs
 
Ijscs
IjscsIjscs
Ijscs
 
Ijscs
IjscsIjscs
Ijscs
 
Ijscs
IjscsIjscs
Ijscs
 
Ijscs
IjscsIjscs
Ijscs
 
Ijscs
IjscsIjscs
Ijscs
 
Ijscs
IjscsIjscs
Ijscs
 
Ijscs
IjscsIjscs
Ijscs
 
Ijscs
IjscsIjscs
Ijscs
 
Ijscs
IjscsIjscs
Ijscs
 
Ijscs
IjscsIjscs
Ijscs
 
Ijscs
IjscsIjscs
Ijscs
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Ijnsa
IjnsaIjnsa
Ijnsa
 
Ijnsa
IjnsaIjnsa
Ijnsa
 

Similar to International Journal of Security and Communication Networks (IJSCS)

International Journal of Security and Communication Networks (IJSCS)
International Journal of Security and Communication Networks (IJSCS)International Journal of Security and Communication Networks (IJSCS)
International Journal of Security and Communication Networks (IJSCS)ijfcst journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 

Similar to International Journal of Security and Communication Networks (IJSCS) (14)

International Journal of Security and Communication Networks (IJSCS)
International Journal of Security and Communication Networks (IJSCS)International Journal of Security and Communication Networks (IJSCS)
International Journal of Security and Communication Networks (IJSCS)
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 

More from ijfcst journal

International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)ijfcst journal
 
International Journal of Education (IJE)
International Journal of Education (IJE)International Journal of Education (IJE)
International Journal of Education (IJE)ijfcst journal
 
International Journal of Education (IJE)
International Journal of Education (IJE)International Journal of Education (IJE)
International Journal of Education (IJE)ijfcst journal
 
International Journal of Computer Networks &(IJCNC)
International Journal of Computer Networks &(IJCNC)International Journal of Computer Networks &(IJCNC)
International Journal of Computer Networks &(IJCNC)ijfcst journal
 
International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)ijfcst journal
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)ijfcst journal
 
International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)ijfcst journal
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)ijfcst journal
 
International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)ijfcst journal
 
International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)ijfcst journal
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)ijfcst journal
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)ijfcst journal
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)ijfcst journal
 
International Journal of Education (IJE)
International Journal of Education (IJE)International Journal of Education (IJE)
International Journal of Education (IJE)ijfcst journal
 
International Journal of Computer Networks & Communications(IJCNC)
International Journal of Computer Networks & Communications(IJCNC)International Journal of Computer Networks & Communications(IJCNC)
International Journal of Computer Networks & Communications(IJCNC)ijfcst journal
 
International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)ijfcst journal
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)ijfcst journal
 
International Journal of Software Engineering &Applications (IJSEA)
International Journal of Software Engineering &Applications (IJSEA)International Journal of Software Engineering &Applications (IJSEA)
International Journal of Software Engineering &Applications (IJSEA)ijfcst journal
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC) 
International Journal of Artificial Intelligence and Soft Computing (IJAISC) International Journal of Artificial Intelligence and Soft Computing (IJAISC) 
International Journal of Artificial Intelligence and Soft Computing (IJAISC) ijfcst journal
 
International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)ijfcst journal
 

More from ijfcst journal (20)

International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)
 
International Journal of Education (IJE)
International Journal of Education (IJE)International Journal of Education (IJE)
International Journal of Education (IJE)
 
International Journal of Education (IJE)
International Journal of Education (IJE)International Journal of Education (IJE)
International Journal of Education (IJE)
 
International Journal of Computer Networks &(IJCNC)
International Journal of Computer Networks &(IJCNC)International Journal of Computer Networks &(IJCNC)
International Journal of Computer Networks &(IJCNC)
 
International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)
 
International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
 
International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)
 
International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)International Journal of Signal & Image Processing (IJSP)
International Journal of Signal & Image Processing (IJSP)
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
 
International Journal of Education (IJE)
International Journal of Education (IJE)International Journal of Education (IJE)
International Journal of Education (IJE)
 
International Journal of Computer Networks & Communications(IJCNC)
International Journal of Computer Networks & Communications(IJCNC)International Journal of Computer Networks & Communications(IJCNC)
International Journal of Computer Networks & Communications(IJCNC)
 
International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)International Journal of Computer Networks &Communications(IJCNC)
International Journal of Computer Networks &Communications(IJCNC)
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)
 
International Journal of Software Engineering &Applications (IJSEA)
International Journal of Software Engineering &Applications (IJSEA)International Journal of Software Engineering &Applications (IJSEA)
International Journal of Software Engineering &Applications (IJSEA)
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC) 
International Journal of Artificial Intelligence and Soft Computing (IJAISC) International Journal of Artificial Intelligence and Soft Computing (IJAISC) 
International Journal of Artificial Intelligence and Soft Computing (IJAISC) 
 
International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)International Journal of Humanities, Art and Social Studies (IJHAS)
International Journal of Humanities, Art and Social Studies (IJHAS)
 

Recently uploaded

How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 

Recently uploaded (20)

How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 

International Journal of Security and Communication Networks (IJSCS)

  • 1. International Journal of Security and Communication Networks (IJSCS) ISSN 0924 - 624N (Online) ; 0152 - 2160 (Print) *** August Issue *** http://skycs.org/jounals/ijscs/Home.html Scope International Journal of Security and Communication Networks(IJSCS) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Security and Communication Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern developments in this field, and establishing new collaborations in these areas. Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Security and Communication Networks. Topics of interest include, but are not limited to, the following  network security  computer security  cyber security  System and network security  Threat modeling  Security architecturesA  Access control  Malware and cyberweapons  Intrusion detection and visualization  Defense in depth  Monitoring and real-time supervision  Applied cryptography  Perimeter security  Safety-security interactions  Cybersecurity engineering  Secure communication protocols  Formal models for ICS/CPS/ICN security  Hardware security  Resilient ICS/CPS/ICN  Application security  Secure firmware  Wireless Power Transfer  Wireless Message Communication Between Two Computers  Wireless Electronic Notice Board Using GSM  Wireless Over Temperature Alarm  Fire Fighting Robotic Vehicle
  • 2. PaperSubmission Authors are invited to submit papers for this journal through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. Important Dates  Submission Deadline :August 12, 2020  Notification :August 25, 2020  Final Manuscript Due :August 31, 2020  Publication Date : Determined by the Editor-in-Chief TO SUBMIT YOUR PAPER, PLEASE CLICK THE FOLLOWING LINK Submission System. Contacts Here's where you can reach us: ijcsijournal@yahoo.com