Aim and Scope
Aim - It aims to publish original, theoretical and practical advances in Network, Information, Cloud Software Security, Cryptography, Mobile Computing, Network Communication, Communication Engineering, Forensics Computing, Data mining and privacy, Computer vision, MANET, IoT, Biometrics and Pattern Recognition, Security of Sustainable Computing, Soft Computing, and all interdisciplinary streams of Computing and Engineering Sciences. It intends to disseminate original, scientific, theoretical or applied research in the field of Computer Sciences and allied fields. It provides a platform for publishing results and research with a strong empirical component.
Scope- The scope of the journal includes, but are not limited to the following:
Security in Software Engineering Bioinformatics and Scientific Computing Biomedical Engineering Cloud Computing and Big Data Compilers and Interpreters Computational applied and theoretical sciences Computational Intelligence Computational Mathematics & Statistics Computational Physical Sciences Computer Architecture and Embedded Systems, VLSI Computer Based Education Computer Games Computer Graphics and Multimedia Computer Simulation, Modeling, Vision Computer-aided Design/Manufacturing Computing Ethics & Algorithms Computing Practices & Applications Data Mining & Database Systems Digital Signal and Image Processing Digital System and Logic Design Distributed Sys and Parallel Processing E-commerce and E-governance Expert Systems Forensic Sciences and Crime Fuzzy Logic and Simulation Geographical Information Systems Green and Grid Computing High Performance Computing Human Computer Interaction Image Processing Information Retrieval Information Systems Information Technology Mathematical Computing Natural Language Processing Reconfigurable Computing Systems Robotics and Automation Ubiquitous Computing Virtual Computing and Global Development Web and Internet Computing Access Control and Intrusion Detection Ad hoc Networks Ad-hoc and sensor networks Advance wireless technology Agent Based Trust Management Artificial Immune Systems Authentication and Non-repudiation Authentication and Non-repudiation Authorization, Authentication and Identity Management Autonomy-Oriented Computing Biological & Evolutionary Computation Biometric Security Cloud Security and Privacy Cloud, P2P, Clusters and Grid Computing : Security and Role of Trust Coevolutionary Algorithms Computational Intelligence in Security Cryptographic protocols Cryptography and Coding Data & System Integrity Data Integrity Database and System Security Decentralized Trust Management E- Commerce E-mail security, Spam, Phishing, E-mail fraud Fuzzy Systems Heterogeneous wireless networks High speed networks Identification and Authentication Information Hiding Insider Threats and Countermeasures Intelligent Agents and Systems Internet and Web applications Internet Security & Applications Intrusion Detection & Prevention Intrusion Detection and Vulnerability Assessment Key management LAN/WLAN MAC layer MAN/WMAN Measurement & Performance Analysis Mobile & Broadband Wireless Internet Mobile networks & Wireless LAN Mobile, Ad Hoc and Sensor Network Security Models for Authentication, Trust and Authorization Multimedia Content Management Network and Wireless Network Security Network Architectures Network Based applications Network models Network Operations & management Network Protocols & Wireless Networks Network Security Network topology Next Generation Internet Next Generation Web Architectures Optical Networking Peer-to-Peer Network Security Pervasive Computation Trust Policy of Trust in E-leaning systems Privacy and authentication Privacy and authentication QoS and Resource Management Quantum cryptography Regulation and Trust Mechanisms Reinforcement & Unsupervised Learning Routing Protocols Routing, switching and addressing techniques Secure Cloud Computing Security & Network Management Security and Privacy in Mobile Systems Security and Privacy in Web Services Security and Privacy Policies Security and Risk Management Security Area Control Security Deployment Security Engineering Security Engineering Security for Grid Computing Security for Grid Computing Security in Distributed Systems |
Advance wireless technology Agent Based Trust Management Artificial Immune Systems Authentication and Non-repudiation Authentication and Non-repudiation Authorization, Authentication and Identity Management Autonomy-Oriented Computing Biological & Evolutionary Computation Biometric Security Cloud Security and Privacy Cloud, P2P, Clusters and Grid Computing : Security and Role of Trust Coevolutionary Algorithms Computational Intelligence in Security Cryptographic protocols Cryptography and Coding Data & System Integrity Data Integrity Database and System Security Decentralized Trust Management E- Commerce E-mail security, Spam, Phishing, E-mail fraud Fuzzy Systems Heterogeneous wireless networks High speed networks Identification and Authentication Information Hiding Insider Threats and Countermeasures Intelligent Agents and Systems Internet and Web applications Internet Security & Applications Intrusion Detection & Prevention Intrusion Detection and Vulnerability Assessment Key management LAN/WLAN MAC layer MAN/WMAN Measurement & Performance Analysis Mobile & Broadband Wireless Internet Mobile networks & Wireless LAN Mobile, Ad Hoc and Sensor Network Security Models for Authentication, Trust and Authorization Multimedia Content Management Network and Wireless Network Security Network Architectures Network Based applications Network models Network Operations & management Network Protocols & Wireless Networks Network Security Network topology Next Generation Internet Next Generation Web Architectures Optical Networking Peer-to-Peer Network Security Pervasive Computation Trust Policy of Trust in E-leaning systems Privacy and authentication Privacy and authentication QoS and Resource Management Quantum cryptography Regulation and Trust Mechanisms Reinforcement & Unsupervised Learning Routing Protocols Routing, switching and addressing techniques Secure Cloud Computing Security & Network Management Security and Privacy in Mobile Systems Security and Privacy in Web Services Security and Privacy Policies Security and Risk Management Security Area Control Security Deployment Security Engineering Security Engineering Security for Grid Computing Security for Grid Computing Security in Distributed Systems Security in Distributed Systems Security Information Systems Architecture Security Management Security middleware Security, Privacy and Trust Self-Organizing Networks and Networked Systems Service and Systems Design and QoS Network Security Social Networks & Web 2.0 Trust Management Software Security TCP Protocols Trust and Reputation Management Trust in Service-Oriented Architecture- Trust Management Trust Management for virtual organizations Trust models and metrics Trust, Security, Privacy, Policy management Trust/risk based security frameworks Ubiquitous Computing Ubiquitous Computing Security Ubiquitous networks Untraceability Virus, worms, Trojon Protection WAN?W-WAN Web 2.0 security WI-FI Technologies Wireless 2G, 3G, 4G, 5G Computing Wireless communications Wireless Multimedia systems Wireless Network Security Wireless Sensor network Wireless topologies |
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.