posted by user: aircc_cfp || 1328 views || tracked by 2 users: [display]

IJNSA 2025 : International Journal of Network Security & Its Applications - ERA, WJCI Listed, H index - 51

FacebookTwitterLinkedInGoogle

Link: https://airccse.org/journal/ijnsa.html
 
When N/A
Where N/A
Submission Deadline Jun 15, 2025
Notification Due Jul 5, 2025
Final Version Due Jul 12, 2025
Categories    network security   security   cyber security   computer security
 

Call For Papers

International Journal of Network Security & Its Applications - ERA, WJCI Listed, H index - 51


IJNSA is listed in ERA 2023 as per the Australian Research Council (ARC) Journal Ranking

World Journal Clout Index (WJCI) Impact Factor : 0.279 (2020); 0.139 (2019)


Citations, h-index, i10-index of IJNSA

Citations 11632   h-index 51   i10-index 215

Call for Papers

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest

  • Artificial intelligence, Machine Learning for Security
  • Blockchain Technology, Cryptocurrencies and Cyber Security
  • Cloud, Fog, Edge & Cognitive Security
  • Cryptographic Protocols
  • Cyber Physical System (CPS) Security (autonomous vehicles, industrial control systems)
  • Data Center Network Control, Security and Optimization
  • Database and System Security
  • E-mail security, Spam, Phishing, E-mail fraud
  • Hardware-Based Attacks
  • Internet of Things (IoT) Security
  • Internet Security & Applications (Social networking, crowd sourcing and Web based applications, services security)
  • Intrusion Detection and Prevention
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Performance Evaluations of Protocols & Security Application
  • Security & Network Management
  • Security for emerging networks (SDN, Home Networks, Body-area Networks, VANETs)
  • Security of Virtual Machines
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Security, Trust and Privacy Challenges
  • Smart City, Grid, Electronic Voting Security
  • Network and Wireless Network Security
  • Ubiquitous Computing Security
  • Virus, worms, Trojan Protection
  • Web 2.0 Security

Paper Submission

Authors are invited to submit papers for this journal through E-mail: ijnsa@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

Submission Deadline:June 15, 2025
Authors Notification: July 05, 2025
Final Manuscript Due: July 12, 2025
Publication Date:Determined by the Editor-in-Chief

Note

AIRCC's International Journal of Network Security & Its Applications (IJNSA) is dedicated to strengthen the field of Security & Its Applications and publishes only good quality papers. IJNSA is highly selective and maintains less than 20% acceptance rate. All accepted papers will be tested for plagiarism manually as well as by Docoloc . Papers published in IJNSA has received enormous citations and has been regarded as one of the best Journal in the Security research field.

Current Issue


May 2025, Volume 17, Number 3

Detecting Malicious URLs: Trends, Challenges and the Role of Browser Extensions Full Text
Homam Eltaj and Maria Ajaj, Dar Al-Hekma University, Saudi Arabia

Access Detection System on Web Cameras and Microphones Full Text
Homam El-Taj, Amena Khoja, Basmah Alsharif, Dana Alsulami and Jumaina Abdulmajed, Dar Al-Hekma University, Saudi Arabia

Deep Learning Solutions for Source Code Vulnerability Detection Full Text
Nin Ho Le Viet, Long Phan, Hieu Ngo Van and Tin Trinh Quang, Duy Tan University, Vietnam

Scalability Analysis of IoT-DAG Distributed Ledgers using Preferential Attachment Topology: A Simulation Approach Full Text
Peter Kimemiah Mwangi, Stephen T. Njenga and Gabriel Ndung’u Kamau, Murang’a University of Technology, Murang’a, Kenya

Static Testing Tools Architecture in OpenMP for Exascale Systems Full Text
Samah Alajmani, Taif University, Saudi Arabia

A Lightweight Network Intrusion Detection System for SMEs Full Text
Homam El-Ta, Mawadah Fahhad, Reeman Abumlha, Shadan Showman and Zaina Saab, Dar Al-Hekma University, Saudi Arabia

March 2025, Volume 17, Number 2

Enhancing Malware Detection and Analysis using Deep Learning and Explainable AI (XAI) Full Text
Samah Alajmani1, Ebtihal Aljuaid1, Ben Soh2 and Raneem Y. Alyami1, 1Taif University, Saudi Arabia 2La Trobe University, Australia

Delay Testing in Integrated Circuits: Methodologies for Path Delay Fault Detection and Hardware Security Full Text
Palanichamy Manikandan, Østfold University College, Norway

Analysing the Impact of Password Length and Complexity on the Effectiveness of Brute Force Attacks Full Text
Lama A. AlMalki1, Samah H. Alajmani1, Ben Soh2 and Raneem Y. Alyami1, 1Taif University, Saudi Arabia 2La Trobe University, Australia

January 2025, Volume 17, Number 1

A Trust-Based Multipath Congestion-Aware Routing Technique to Curb Wormhole Attacks for Mobile Nodes in WSNs Full Text
Fortine Mwihaki Mata, Geoffrey Muchiri Muketha and Gabriel Ndung’u Kamau, Murang’a University of Technology, Kenya

November 2024, Volume 16, Number 6

Deep Learning Approach for Detection of Phishing Attack to Strengthen Network Security Full Text
Hadeer Alsubaie, Rahaf Althomali and Samah Alajmani, Taif University, Saudi Arabia

Improving Intrusion Detection System using the Combination of Neural Network and Genetic Algorithm Full Text
Amin Dastanpour1, Amirabbas Farizani1 and Raja Azlina Raja Mahmood2 1Kerman institute of higher education, Iran, 2University Putra Malaysia, Malaysia

A Thorough Study of the Internet of Things: from Core Components to Security and Applications Full Text
Jean Pierre Ntayagabiri1, Youssef Bentaleb2, Jeremie Ndikumagenge3 and Hind EL Makhtoum4 1,3University of Burundi, Burundi, 2,4Ibn Tofaïl University, Morocco

Blockmedcare: Advancing Healthcare Through Blockchain Integration with AI and IOT Full Text
Oliver Simonoski and Dijana Capeska Bogatinoska, University of Information Science and Technology, Macedonia

Hybrid Deep Learning Approach for Enhanced Detection and Mitigation of DDOS Attack in SDN Networks Full Text
Ahlam Alsufyani, Bashayer Alotaibi and Samah Alajmani, Taif University, Saudi Arabia

Profitable uses of Artificial Intelligence and Machine Learning to Secure our Data Full Text
Nikitha Merilena Jonnada, University of the Cumberlands, USA

A Comprehensive Analysis of Network Scanning and Security Assessment Tool Full Text
Archita1 and Ruchi Tuli2, 1Netaji Subhash University of Technology, India 2Jubail Industrial College, Kingdom of Saudi Arabia

September 2024, Volume 16, Number 5

Comparative Analysis of Feature Selection Techniques for LSTM Based Network Intrusion Detection Models Full Text
Shahir Kottilingal, Wakeb Data, KSA

July 2024, Volume 16, Number 4

Enhanced Algorithm for Reduction of Blackhole’s Re-Judgment Delay for Realtime Traffic in Mobile Adhoc Network Full Text
Sarah Florence Massae and Joseph Chrisant Pengo, National Institute of Transport, Tanzania

Enhancing Digital Forensics Readiness in Big Data Wireless Medical Networks: A Secure Decentralised Framework Full Text
Cephas Mpungu, Carlisle George and Glenford Mapp, Middlesex University, UK

May 2024, Volume 16, Number 3

A Systematic Risk Assessment Approach for Securing the Smart Irrigation Systems Full Text
Anees Ara, Maya Emar, Renad Mahmoud, Noaf Alarifi, Leen Alghamdi and Shoug Alotaibi, Prince Sultan University, Saudi Arabia

The Mesa Security Model 2.0: A Dynamic Framework for Mitigating Stealth Data Exfiltration Full Text
Sanjeev Pratap Singh and Naveed Afzal, USA

Decentralized Energy Trading in Smart Grids: A Blockchain-Based Framework for Efficiency and Transparency Full Text
Iliass Hammouti, Adnane Addaim and Zouhair Guennoun, Mohammed V University, Morocco

Cyberguard: Fake Profile Detection using Machine Learning Full Text
M.Vijaya Lakshmi, Aishwarya Rao, Kalyani Boddulah, Ojaswi Cheekati and Varsha Vadla, G. Narayanamma Institute of Technology and Science (For Women), India

March 2024, Volume 16, Number 2

Unlocking Secrets: Bioinformatics' Impact on Forensic Bio-Examinations Full Text
Joe H Smith1 and M Singh2, 1University of South Africa, South Africa, 2University of the Free State, South Africa

Empowering Manets with Advanced Multimodal Biometric Authentication and Encryption Full Text
Alaa M. Elbanaa1, Mahmoud Y. Shams2,*, Roayat I. Abdelfatah1, Mohamed E. Nasr1, 1Tanta University, Egypt, 2Kafrelsheikh University, Egypt

Towards a Low Carbon Proof-of-work Blockchain Full Text
Agron Gemajli, Shivam Patel, and Phillip G. Bradford, University of Connecticut, USA

Enhancing Data Privacy in Wireless Sensor Networks: Investigating Techniques and Protocols to Protect Privacy of Data Transmitted Over Wireless Sensor Networks in Critical Applications of Healthcare and National Security Full Text
Akinsola Ahmed, Ejiofor Oluomachi, Akinde Abdullah, Njoku Tochukwu, Austin Peay State University, USA

The Interest of Hybridizing Explainable AI with RNN to Resolve DDOS Attacks: A Comprehensive Practical Study Full Text
Ahmad Mater Aljohani and Ibrahim Elgendi, University of Canberra, Australia

January 2024, Volume 16, Number 1

Traffic Light Control Systems: Requirements Engineering Full Text
Ahmad Audat, Marah Yahia, Said Ghoul and Maram Bani Younes, Philadelphia University, Jordan

Optimizing Hyperparameters for Enhanced Email Classification and Forensic Analysis with Stacked Autoencoders Full Text
Merly Thomas1 and B. B. Meshram2, 1Fr. Conceicao Rodrigues College of Engineering, India, 2Veermata Jijabai Technological Institute Mumbai, India

November 2023, Volume 15, Number 6

Exploring Critical Vulnerabilities in SIEM Implementation and SOC Service Procurement: An In-Depth Analysis of High-Risk Scenarios Full Text
Ertuğrul AKBAŞ, Istanbul Esenyurt University, Turkey

A Framework for Securing Email Entrances and Mitigating Phishing Impersonation Attacks Full Text
Wosah Peace Nmachi, University of Gloucestershire, United Kingdom

A Systematic Review on Machine Learning Insider Threat Detection Models, Datasets and Evaluation Metrics Full Text
Everleen Nekesa Wanyonyi1,2, Silvance Abeka2 and Newton Masinde2, 1Murang’a University of Technology, Kenya, 2Jaramogi Oginga Odinga University of Science and Technology, Kenya

September 2023, Volume 15, Number 5

Invertible Neural Network for Inference Pipeline Anomaly Detection Full Text
Malgorzata Schwab and Ashis Biswas, University of Colorado at Denver, USA

SPDZ-Based Optimistic Fair Multi-Party Computation Detection Full Text
Chung-Li Wang, Alibaba Inc., USA

Exploring the Effectiveness of VPN Architecture in Enhancing Network Security for Mobile Networks: An Investigation Study Full Text
Khawla Azwee1, Mokhtar Alkhattali1 and Mostafa Dow2, 1High Institute of Science and Technology, Libya, 2College of Science and Technology, Libya

July 2023, Volume 15, Number 4

Building a Continuously Integrating System with High Safety Full Text
Tuan Nguyen Kim1, Ha Nguyen Hoang2 and Vy Huynh Trieu3, 1Duy Tan University, Viet Nam, 2Hue University, Vietnam, 3Phạm Van Dong University, Viet Nam

May 2023, Volume 15, Number 3

Near Ultrasonic Attack and Defensive Countermeasures Full Text
Forrest McKee and David Noever, PeopleTec, USA

Pseudo Random Key Generator using Fractal based Trellis Coded Genetic Algorithm for Image Encryption Full Text
Anusha .T and Venkatesan R, PSG College of Technology, India

A Novel Alert Correlation Technique for Filtering Network Attacks Full Text
Jane Kinanu Kiruki1,2, Geoffrey Muchiri Muketha1 and Gabriel Kamau1, 1Murang’a University of Technology, Kenya, 2Chuka University, Kenya

The Relationship Between the Characteristics of Software Developers and Security Behavior Intention Full Text
Wisdom Umeugo, Independent Researcher, Canada

An Extended K-Means Cluster Head Selection Algorithm for Efficient Energy Consumption in Wireless Sensor Networks Full Text
Peter Maina Mwangi, John Gichuki Ndia and Geoffrey Muchiri Muketha, Murang’a University of Technology, Kenya

The Evolving Threat Landscape: An Overview of Attacks and Response Strategies Against Cybercrime in Saudi Arabia Full Text
Homam El-Taj, Dar Al-Hekma University, Kingdom of Saudi Arabia

Advancements in Crowd-Monitoring System: A Comprehensive Analysis of Systematic Approaches and Automation Algorithms: State-of-the-Art Full Text
Mohammed Ameen and Richard Stone, Iowa State University, USA

March 2023, Volume 15, Number 2

Mechanisms for Digital Transformation in the Education and Healthcare Sectors Utilizing Decentralized Self-Sovereign Identity Full Text
Gregory H. Jackson1 and Karaitiana Taiuru2, 1Adayge Inc., Utah, U.S.A, 2University of Auckland, New Zealand

Cybercrime Awareness on Social Media: A Comparison Study Full Text
Wisdom Umeugo, Independent researcher, Canada

A Countermeasure for Double Spending Attacks on Blockchain Technology in Smart Grid Full Text
Lanqin Sang and Henry Hexmoor, Southern Illinois University, USA

January 2023, Volume 15, Number 1

Analyzing Network Performance Parameters using Wireshark Full Text
Ruchi Tuli, Jubail Industrial College, Kingdom of Saudi Arabia

Metrics for Evaluating Alerts in Intrusion Detection Systems Full Text
Jane Kinanu Kiruki1,2, Geoffrey Muchiri Muketha1 and Gabriel Kamau1, 1Murang’a University of Technology, Kenya, 2Chuka University, Kenya

Optimizing Congestion Control by using Devices Authentication in Software-Defined Networks Full Text
Tamer Barakat, Hanan Eljawhri, Mohamed Merzban and Mahmoud Elbayoumi, Fayoum University, Egypt

November 2022, Volume 14, Number 6

Turning the Disruptive Power of Blockchain in the Insurance Market into Innovative Opportunities Full Text
Wadnerson Boileau, University of South Florida (USF), USA

A Resource-Efficient Collaborative System for DDOS Attack Detection and Victim Identification Full Text
Fei Wang, Zhenxing Li and Xiaofeng Wang, National University of Defense Technology, China

A Framework for the Detection of Banking Trojans in Android Full Text
Subarna Adhikari, Sushil Nepal and Rabindra Bista, Kathmandu University, Nepal

September 2022, Volume 14, Number 5

Encryption Modes Identification of Block Ciphers based on Machine Learning Full Text
Ruiqi Xia1, Manman Li2 and Shaozhen Chen2, 1Information Engineering University, China, 2State Key Laboratory of Mathematical Engineering and Advanced Computing, Kexue Avenue, China

A Comprehensive Survey of Phishing Attacks and Defences: Human Factors, Training and the Role of Emotions Full Text
Mousa Jari, Newcastle University, UK & King Saud University, Saudi Arabia

Survey of United States Related Domains: Secure Network Protocol Analysis Full Text
DeJean Dunbar, Patrick Hill, and Yu-Ju Lin, Charleston Southern University, USA

Future Ready Banking with Smart Contracts - CBDC and Impact on the Indian Economy Full Text
Bibhu Dash1, Meraj F. Ansari1, Pawankumar Sharma1 and Swati Swayam siddha2, 1School of Computer and Information Sciences, USA, 2KIIT University, India

An Extended Security Measurement Framework for Open-Source Enterprise Resource Planning Software Security Full Text
Jane Wanjiru Njuki, Geoffrey Muchiri Muketha and John Gichuki Ndia, Murang’a University of Technology, Kenya

July 2022, Volume 14, Number 4

An Efficient Deep Learning Approach for Network Intrusion Detection System on Software Defined Network Full Text
Mhmood Radhi Hadi and Adnan Saher Mohammed, Karabuk University, Turkey

Reputation-Based Consensus for Blockchain Technology in Smart Grid Full Text
Lanqin Sang, Henry Hexmoor, Southern Illinois University, USA

Distributed Denial of Service Attack Detection and Prevention Model for IoT based Computing Environment using Ensemble Machine Learning Approach Full Text
Nicholas Oluwole Ogini1, Wilfred Adigwe2 and Noah Oghenefego Ogwara3, 1Delta State University, Nigeria, 2Delta State University of Science and Technology, Nigeria, 3Auckland University of Technology, New Zealand

May 2022, Volume 14, Number 3

An Evaluation of Security in Blockchain-based Sharing of Student Records in Higher Education Full Text
Timothy Arndt1, Angela Guercio2 and Younghun Chae2, 1Cleveland State University, USA, 2Kent State University at Stark, USA

Detecting Malware in Portable Executable Files using Machine Learning Approach Full Text
Tuan Nguyen Kim1, Ha Nguyen Hoang2 and Nguyen Tran Truong Thien1, 1Duy Tan University, Vietnam, 2University of Sciences, Hue University, Vietnam

Blockchain Security : Enhanced Control Evaluation Approach to Protect Organizations’ Accounting Information Full Text
Angel R. Otero, Florida Institute of Technology, USA

Cyber Security of Smart Watches : A Review of the Vulnerabilities with Recommendations Presented to Protect the Wearables Full Text
Aaron James Webb, Macquarie University, Australia

Context-Aware Security Mechanism for Mobile Cloud Computing Full Text
Cláudio Aroucha and Higo Felipe Pires, Federal University of Maranhão, Brazil

March 2022, Volume 14, Number 2

An Efficient Secure Cryptography Scheme for New ML-based RPL Routing Protocol in Mobile IoT Environment Full Text
Kishore Golla and S. PallamSetty, Andhra University, India

The Effectiveness of Applying Different Strategies on Recognition and Recall Textual Password Full Text
Hassan Wasfi and Richard Stone, Iowa State University, USA

Hybridized Model for Data Security Based on Security Hash Analysis (SHA 512) and Salting Techniques Full Text
Felix Aranuwa1, Ford Olubodun2 and David Akinwumi1, 1Adekunle Ajasin University, Nigeria, 2Auchi Polytechnic, Nigeria

January 2022, Volume 14, Number 1

A Robust Cybersecurity Topic Classification Tool Full Text
Elijah Pelofske1, Lorie M. Liebrock1 and Vincent Urias2, 1New Mexico Institute of Mining and Technology, USA, 2Sandia National Laboratories, New Mexico, USA

Enablers to Boost Blockchain Adoption in EU Full Text
Artemis Voulkidis1, Theodore Zahariadis1,2, Andreas Papadakis3 and Charalambos Ipektsidis4, 1Synelixis SA, Greece, 2National and Kapodistrian University of Athens, Greece, 3School of Pedagogical and Technological Education (ASPETE), Greece, 4Intrasoft International SA, Luxembourg

Offline Signature Recognition via Convolutional Neural Network and Multiple Classifiers Full Text
Fadi Mohammad Alsuhimat and Fatma Susilawati Mohamad, Universiti Sultan Zainal Abidin, Malaysia

A Secure DNA Cryptosystem based on Steganography and Indexing Cipher Full Text
Tamer Barakat1, Nahed Mahmoud1, Ihab. A. Ali2 and Mohamed Hamdi1, 1Fayoum University, Egypt, 2Helwan University, Egypt

Honorary Editor in Chief

Editor in Chief

Associate Editors

Editorial Board Members

... More

Related Resources

DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ITCCMA 2025   12th International Conference on Information Technology, Control, Chaos, Modeling and Applications
ICDMIS 2025   International Conference on Data Mining and Information Security
EI/Scopus-EKI 2025   2025 3rd International Conference on Educational Knowledge and Informatization-EI/Scopus
COMPLEX NETWORKS 2025   International Conference on Complex Networks and their Applications
MLNLP 2025   6th International Conference on Machine Learning Techniques and NLP
IJMA 2025   International Journal of Multimedia & Its Applications -- ERA, WJCI Indexed, H index - 22
ICIIT 2026   2026 11th International Conference on Intelligent Information Technology (ICIIT 2026)
IEEE TPS 2025   IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications