posted by user: aircc_cfp || 2834 views || tracked by 4 users: [display]

IJNSA 2026 : International Journal of Network Security & Its Applications - ERA Indexed, H Index - 52

FacebookTwitterLinkedInGoogle

Link: https://airccse.org/journal/ijnsa.html
 
When N/A
Where N/A
Submission Deadline Feb 21, 2026
Notification Due Mar 13, 2026
Final Version Due Mar 20, 2026
Categories    network security   security   cyber security   computer security
 

Call For Papers

International Journal of Network Security & Its Applications - ERA Indexed, H Index - 52


IJNSA is listed in ERA 2023 as per the Australian Research Council (ARC) Journal Ranking

World Journal Clout Index (WJCI) Impact Factor : 0.279 (2020); 0.139 (2019)


Citations, h-index, i10-index of IJNSA

Call for Papers

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest

  • Artificial intelligence, Machine Learning for Security
  • Blockchain Technology, Cryptocurrencies and Cyber Security
  • Cloud, Fog, Edge & Cognitive Security
  • Cryptographic Protocols
  • Cyber Physical System (CPS) Security (autonomous vehicles, industrial control systems)
  • Data Center Network Control, Security and Optimization
  • Database and System Security
  • E-mail security, Spam, Phishing, E-mail fraud
  • Hardware-Based Attacks
  • Internet of Things (IoT) Security
  • Internet Security & Applications (Social networking, crowd sourcing and Web based applications, services security)
  • Intrusion Detection and Prevention
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Performance Evaluations of Protocols & Security Application
  • Security & Network Management
  • Security for emerging networks (SDN, Home Networks, Body-area Networks, VANETs)
  • Security of Virtual Machines
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Security, Trust and Privacy Challenges
  • Smart City, Grid, Electronic Voting Security
  • Network and Wireless Network Security
  • Ubiquitous Computing Security
  • Virus, worms, Trojan Protection
  • Web 2.0 Security

Paper Submission

Authors are invited to submit papers for this journal through E-mail: ijnsa@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

Submission Deadline:February 21, 2026
Authors Notification: March 13, 2026
Final Manuscript Due: March 20, 2026
Publication Date:Determined by the Editor-in-Chief

Note

AIRCC's International Journal of Network Security & Its Applications (IJNSA) is dedicated to strengthen the field of Security & Its Applications and publishes only good quality papers. IJNSA is highly selective and maintains less than 20% acceptance rate. All accepted papers will be tested for plagiarism manually as well as by Docoloc . Papers published in IJNSA has received enormous citations and has been regarded as one of the best Journal in the Security research field.

Current Issue


January 2026, Volume 18, Number 1

Empirical Telemetry-based Metrics for Evaluating Honeypot Realism and Deception Effectiveness Full Text
Teresita Noelia Nunez Migliorisi, University of Delaware, USA

Optimized Naive Bayes for Phishing Website Detection using Hybrid TF - IDF and Character Level URL Features Full Text
Hieu Ngo Van, Tin Trinh Quang, Phuong Nguyen Thi Thanh, Huong Mai Quoc and Dung Nguyen Thi Thuy, Duy Tan University, Vietnam

Advanced Graph Neural Network Mechanisms for IoT Network Intrusion Detection: A Comprehensive Study of Prototype-Based, Contrastive, and Structure Learning Approaches Full Text
Mehmet Baris Yaman, Foundational Technology, Turkey

Machine Learning for Network Intrusion Detection in Usa Critical Infrastructure: Challenges and Opportunities Full Text
Joy Selasi Agbesi1, Abigail Nanayaa Otchill2, Raymond Horlalie Tay3 and Noah K. Bamfo4, 1Ohio University, USA, 2Foundation and Support, United States, 3College of Engineering Northeastern University, United States, 4Consulting Network Engineer, United States

OTN in the 5g Era: Transporting Massive Ip-Based Mobile Traffic Full Text
Joy Selasi Agbesi , Ohio University, USA

November 2025, Volume 17, Number 5/6

Hyperparameter Tuning-Based Optimized Performance Analysis of Machine Learning Algorithms for Network Intrusion Detection Full Text
Sudhanshu Sekhar Tripathy and Bichitrananda Behera, C.V. Raman Global University, India

An Explainable Graph Neural Network Framework for Anti–Money Laundering in Cryptocurrency Transactions using the Elliptic Dataset Full Text
Oluwatosin Lawal1, Awele Okolie2, Callistus Obunadike3, 1Texas A&M University, USA, 2Wentworth Institute of Technology, USA, 3Austin Peay State University, USA

Database and System Security Full Text
Nikitha Merilena Jonnada, University of the Cumberlands, USA

A Novel Trust-based DDOS Cyberattack Detection Model for Smart Business Environments Full Text
Oghenetejiri Okporokpo, Funminiyi Olajide, Nemitari Ajienka and Xiaoqi Ma, Nottingham Trent University, United Kingdom

July 2025, Volume 17, Number 4

Smart Meter Security Issues: A Review Paper Full Text
Osama Alshannaq1, Mohd Rizuan Baharon1, Shekh Faisal Abdul Latip1, Hairol Nizam Mohd Shah1 and Áine MacDermott2, 1Universiti Teknikal Malaysia Melaka, Malaysia, 2Liverpool John Moores University, United Kingdom

Using Combination of Fuzzy Set and Gravitational Algorithm for Improving Intrusion Detection Full Text
Amin Dastanpour1 and Raja Azlina Raja Mahmood2, 1Kerman Institute of Higher Education, Iran, 2University Putra Malaysia, Malaysia

A Systematic Review of Applications in Fraud Detection Full Text
Hashim Jameel Shareef Jarrar, Middle East University, Jordan

Trust Without Exposure: Verifiable Observability with Capability-Native Webassembly at the Edge Full Text
Bala Subramanyan, Verifoxx, UK

May 2025, Volume 17, Number 3

Detecting Malicious URLs: Trends, Challenges and the Role of Browser Extensions Full Text
Homam Eltaj and Maria Ajaj, Dar Al-Hekma University, Saudi Arabia

Access Detection System on Web Cameras and Microphones Full Text
Homam El-Taj, Amena Khoja, Basmah Alsharif, Dana Alsulami and Jumaina Abdulmajed, Dar Al-Hekma University, Saudi Arabia

Deep Learning Solutions for Source Code Vulnerability Detection Full Text
Nin Ho Le Viet, Long Phan, Hieu Ngo Van and Tin Trinh Quang, Duy Tan University, Vietnam

Scalability Analysis of IoT-DAG Distributed Ledgers using Preferential Attachment Topology: A Simulation Approach Full Text
Peter Kimemiah Mwangi, Stephen T. Njenga and Gabriel Ndung’u Kamau, Murang’a University of Technology, Murang’a, Kenya

Static Testing Tools Architecture in OpenMP for Exascale Systems Full Text
Samah Alajmani, Taif University, Saudi Arabia

A Lightweight Network Intrusion Detection System for SMEs Full Text
Homam El-Ta, Mawadah Fahhad, Reeman Abumlha, Shadan Showman and Zaina Saab, Dar Al-Hekma University, Saudi Arabia

March 2025, Volume 17, Number 2

Enhancing Malware Detection and Analysis using Deep Learning and Explainable AI (XAI) Full Text
Samah Alajmani1, Ebtihal Aljuaid1, Ben Soh2 and Raneem Y. Alyami1, 1Taif University, Saudi Arabia 2La Trobe University, Australia

Delay Testing in Integrated Circuits: Methodologies for Path Delay Fault Detection and Hardware Security Full Text
Palanichamy Manikandan, Østfold University College, Norway

Analysing the Impact of Password Length and Complexity on the Effectiveness of Brute Force Attacks Full Text
Lama A. AlMalki1, Samah H. Alajmani1, Ben Soh2 and Raneem Y. Alyami1, 1Taif University, Saudi Arabia 2La Trobe University, Australia

January 2025, Volume 17, Number 1

A Trust-Based Multipath Congestion-Aware Routing Technique to Curb Wormhole Attacks for Mobile Nodes in WSNs Full Text
Fortine Mwihaki Mata, Geoffrey Muchiri Muketha and Gabriel Ndung’u Kamau, Murang’a University of Technology, Kenya

November 2024, Volume 16, Number 6

Deep Learning Approach for Detection of Phishing Attack to Strengthen Network Security Full Text
Hadeer Alsubaie, Rahaf Althomali and Samah Alajmani, Taif University, Saudi Arabia

Improving Intrusion Detection System using the Combination of Neural Network and Genetic Algorithm Full Text
Amin Dastanpour1, Amirabbas Farizani1 and Raja Azlina Raja Mahmood2 1Kerman institute of higher education, Iran, 2University Putra Malaysia, Malaysia

A Thorough Study of the Internet of Things: from Core Components to Security and Applications Full Text
Jean Pierre Ntayagabiri1, Youssef Bentaleb2, Jeremie Ndikumagenge3 and Hind EL Makhtoum4 1,3University of Burundi, Burundi, 2,4Ibn Tofaïl University, Morocco

Blockmedcare: Advancing Healthcare Through Blockchain Integration with AI and IOT Full Text
Oliver Simonoski and Dijana Capeska Bogatinoska, University of Information Science and Technology, Macedonia

Hybrid Deep Learning Approach for Enhanced Detection and Mitigation of DDOS Attack in SDN Networks Full Text
Ahlam Alsufyani, Bashayer Alotaibi and Samah Alajmani, Taif University, Saudi Arabia

Profitable uses of Artificial Intelligence and Machine Learning to Secure our Data Full Text
Nikitha Merilena Jonnada, University of the Cumberlands, USA

A Comprehensive Analysis of Network Scanning and Security Assessment Tool Full Text
Archita1 and Ruchi Tuli2, 1Netaji Subhash University of Technology, India 2Jubail Industrial College, Kingdom of Saudi Arabia

September 2024, Volume 16, Number 5

Comparative Analysis of Feature Selection Techniques for LSTM Based Network Intrusion Detection Models Full Text
Shahir Kottilingal, Wakeb Data, KSA

July 2024, Volume 16, Number 4

Enhanced Algorithm for Reduction of Blackhole’s Re-Judgment Delay for Realtime Traffic in Mobile Adhoc Network Full Text
Sarah Florence Massae and Joseph Chrisant Pengo, National Institute of Transport, Tanzania

Enhancing Digital Forensics Readiness in Big Data Wireless Medical Networks: A Secure Decentralised Framework Full Text
Cephas Mpungu, Carlisle George and Glenford Mapp, Middlesex University, UK

May 2024, Volume 16, Number 3

A Systematic Risk Assessment Approach for Securing the Smart Irrigation Systems Full Text
Anees Ara, Maya Emar, Renad Mahmoud, Noaf Alarifi, Leen Alghamdi and Shoug Alotaibi, Prince Sultan University, Saudi Arabia

The Mesa Security Model 2.0: A Dynamic Framework for Mitigating Stealth Data Exfiltration Full Text
Sanjeev Pratap Singh and Naveed Afzal, USA

Decentralized Energy Trading in Smart Grids: A Blockchain-Based Framework for Efficiency and Transparency Full Text
Iliass Hammouti, Adnane Addaim and Zouhair Guennoun, Mohammed V University, Morocco

Cyberguard: Fake Profile Detection using Machine Learning Full Text
M.Vijaya Lakshmi, Aishwarya Rao, Kalyani Boddulah, Ojaswi Cheekati and Varsha Vadla, G. Narayanamma Institute of Technology and Science (For Women), India

March 2024, Volume 16, Number 2

Unlocking Secrets: Bioinformatics' Impact on Forensic Bio-Examinations Full Text
Joe H Smith1 and M Singh2, 1University of South Africa, South Africa, 2University of the Free State, South Africa

Empowering Manets with Advanced Multimodal Biometric Authentication and Encryption Full Text
Alaa M. Elbanaa1, Mahmoud Y. Shams2,*, Roayat I. Abdelfatah1, Mohamed E. Nasr1, 1Tanta University, Egypt, 2Kafrelsheikh University, Egypt

Towards a Low Carbon Proof-of-work Blockchain Full Text
Agron Gemajli, Shivam Patel, and Phillip G. Bradford, University of Connecticut, USA

Enhancing Data Privacy in Wireless Sensor Networks: Investigating Techniques and Protocols to Protect Privacy of Data Transmitted Over Wireless Sensor Networks in Critical Applications of Healthcare and National Security Full Text
Akinsola Ahmed, Ejiofor Oluomachi, Akinde Abdullah, Njoku Tochukwu, Austin Peay State University, USA

The Interest of Hybridizing Explainable AI with RNN to Resolve DDOS Attacks: A Comprehensive Practical Study Full Text
Ahmad Mater Aljohani and Ibrahim Elgendi, University of Canberra, Australia

January 2024, Volume 16, Number 1

Traffic Light Control Systems: Requirements Engineering Full Text
Ahmad Audat, Marah Yahia, Said Ghoul and Maram Bani Younes, Philadelphia University, Jordan

Optimizing Hyperparameters for Enhanced Email Classification and Forensic Analysis with Stacked Autoencoders Full Text
Merly Thomas1 and B. B. Meshram2, 1Fr. Conceicao Rodrigues College of Engineering, India, 2Veermata Jijabai Technological Institute Mumbai, India

Honorary Editor in Chief

Editor in Chief

Associate Editors

Editorial Board Members

... More

Related Resources

IJCNC 2026   International Journal of Computer Networks & Communications - Scopus, ERA Indexed, H Index - 39
JANT 2026   International Journal of Antennas
IJSEA 2026   International Journal of Software Engineering & Applications - ERA Indexed, H Index 36
ICITA 2026   ICITA 2026: 20th International Conference on Information Technology and Applications
IJGCA 2026   International Journal of Grid Computing & Applications
EI/Scopus-ICMLM 2026   2026 International Conference on Machine Learning and Large Models-EI/Scopus
CCNET 2026   13th International Conference on Computer Networks & Communications
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
NLDB 2026   31st Annual International Conference on Natural Language & Information Systems
AI-EE 2026   2026 International Conference on Artificial Intelligence and Electrical Engineering-EI/Scopus