SlideShare a Scribd company logo
International Journal of Network Security & Its Applications (IJNSA) - ERA,
WJCI Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)
https://airccse.org/journal/ijnsa.html
Citations, h-index, i10-index
Citations 9853 h-index 47 i10-index 188
Scope & Topics
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly
open access peer-reviewed journal that publishes articles which contribute new results in all
areas of the computer Network Security & its applications. The journal focuses on all technical
and practical aspects of security and its applications for wired and wireless networks. The goal of
this journal is to bring together researchers and practitioners from academia and industry to focus
on understanding Modern security threats and countermeasures, and establishing new
collaborations in these areas.
Topics of Interest include, but are not limited to, the following
 Artificial intelligence, Machine Learning for Security
 Blockchain Technology, Cryptocurrencies and Cyber Security
 Cloud, Fog, Edge & Cognitive Security
 Cryptographic Protocols
 Cyber Physical System (CPS) Security (autonomous vehicles, industrial control systems)
 Data Center Network Control, Security and Optimization
 Database and System Security
 E-mail security, Spam, Phishing, E-mail fraud
 Hardware-Based Attacks
 Internet of Things (IoT) Security
 Internet Security & Applications (Social networking, crowd sourcing and Web based
applications, services security)
 Intrusion Detection and Prevention
 Mobile, Ad Hoc and Sensor Network Security
 Peer-to-Peer Network Security
 Performance Evaluations of Protocols & Security Application
 Security & Network Management
 Security for emerging networks (SDN, Home Networks, Body-area Networks, VANETs)
 Security of Virtual Machines
 Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
 Security, Trust and Privacy Challenges
 Smart City, Grid, Electronic Voting Security
 Network and Wireless Network Security
 Ubiquitous Computing Security
 Virus, worms, Trojan Protection
 Web 2.0 Security
Paper Submission
Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or
through Submission System. Submissions must be original and should not have been published
previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
 Submission Deadline: July 08, 2023
 Acceptance Notification: July 25, 2023
 Final Manuscript Due: July 28, 2023
 Publication Date: Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com
For other details, please visit: https://airccse.org/journal/ijnsa.html

More Related Content

Similar to Submit Your Research Articles - International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
IJNSA Journal
 
Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...
IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
IJNSA Journal
 
Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...
IJNSA Journal
 
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
IJNSA Journal
 
Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...
IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
IJNSA Journal
 
Online Paper Submission - International Journal of Network Security & Its App...
Online Paper Submission - International Journal of Network Security & Its App...Online Paper Submission - International Journal of Network Security & Its App...
Online Paper Submission - International Journal of Network Security & Its App...
IJNSA Journal
 
Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...
IJNSA Journal
 
Online Paper Submission - International Journal of Network Security & Its App...
Online Paper Submission - International Journal of Network Security & Its App...Online Paper Submission - International Journal of Network Security & Its App...
Online Paper Submission - International Journal of Network Security & Its App...
IJNSA Journal
 
Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...
IJNSA Journal
 
Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...
IJNSA Journal
 
Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...
IJNSA Journal
 
Research Paper Submission - International Journal of Network Security & Its A...
Research Paper Submission - International Journal of Network Security & Its A...Research Paper Submission - International Journal of Network Security & Its A...
Research Paper Submission - International Journal of Network Security & Its A...
IJNSA Journal
 
Research Articles Submission - International Journal of Network Security & It...
Research Articles Submission - International Journal of Network Security & It...Research Articles Submission - International Journal of Network Security & It...
Research Articles Submission - International Journal of Network Security & It...
IJNSA Journal
 
Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...
IJNSA Journal
 

Similar to Submit Your Research Articles - International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed (20)

Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...
 
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Online Paper Submission - International Journal of Network Security & Its App...
Online Paper Submission - International Journal of Network Security & Its App...Online Paper Submission - International Journal of Network Security & Its App...
Online Paper Submission - International Journal of Network Security & Its App...
 
Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...
 
Online Paper Submission - International Journal of Network Security & Its App...
Online Paper Submission - International Journal of Network Security & Its App...Online Paper Submission - International Journal of Network Security & Its App...
Online Paper Submission - International Journal of Network Security & Its App...
 
Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...
 
Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...
 
Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...
 
Research Paper Submission - International Journal of Network Security & Its A...
Research Paper Submission - International Journal of Network Security & Its A...Research Paper Submission - International Journal of Network Security & Its A...
Research Paper Submission - International Journal of Network Security & Its A...
 
Research Articles Submission - International Journal of Network Security & It...
Research Articles Submission - International Journal of Network Security & It...Research Articles Submission - International Journal of Network Security & It...
Research Articles Submission - International Journal of Network Security & It...
 
Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...Research Article Submission - International Journal of Network Security & Its...
Research Article Submission - International Journal of Network Security & Its...
 

Recently uploaded

[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 

Recently uploaded (20)

[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 

Submit Your Research Articles - International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

  • 1. International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print) https://airccse.org/journal/ijnsa.html Citations, h-index, i10-index Citations 9853 h-index 47 i10-index 188 Scope & Topics The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas. Topics of Interest include, but are not limited to, the following  Artificial intelligence, Machine Learning for Security  Blockchain Technology, Cryptocurrencies and Cyber Security  Cloud, Fog, Edge & Cognitive Security  Cryptographic Protocols  Cyber Physical System (CPS) Security (autonomous vehicles, industrial control systems)  Data Center Network Control, Security and Optimization  Database and System Security  E-mail security, Spam, Phishing, E-mail fraud  Hardware-Based Attacks  Internet of Things (IoT) Security  Internet Security & Applications (Social networking, crowd sourcing and Web based applications, services security)  Intrusion Detection and Prevention  Mobile, Ad Hoc and Sensor Network Security  Peer-to-Peer Network Security  Performance Evaluations of Protocols & Security Application  Security & Network Management  Security for emerging networks (SDN, Home Networks, Body-area Networks, VANETs)  Security of Virtual Machines  Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)  Security, Trust and Privacy Challenges  Smart City, Grid, Electronic Voting Security  Network and Wireless Network Security  Ubiquitous Computing Security  Virus, worms, Trojan Protection  Web 2.0 Security Paper Submission Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
  • 2. Important Dates  Submission Deadline: July 08, 2023  Acceptance Notification: July 25, 2023  Final Manuscript Due: July 28, 2023  Publication Date: Determined by the Editor-in-Chief Contact Us Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com For other details, please visit: https://airccse.org/journal/ijnsa.html