Aim and Scope

Aim - It aims to publish original, theoretical and practical advances in Network, Information, Cloud Software Security, Cryptography, Mobile Computing, Network Communication, Communication Engineering, Forensics Computing, Data mining and privacy, Computer vision, MANET, IoT, Biometrics and Pattern Recognition, Security of Sustainable Computing, Soft Computing, and all interdisciplinary streams of Computing and Engineering Sciences. It intends to disseminate original, scientific, theoretical or applied research in the field of Computer Sciences and allied fields. It provides a platform for publishing results and research with a strong empirical component.

Scope- The scope of the journal includes, but are not limited to the following:

Security in Software Engineering
Bioinformatics and Scientific Computing
Biomedical Engineering
Cloud Computing and Big Data
Compilers and Interpreters
Computational applied and theoretical sciences
Computational Intelligence
Computational Mathematics & Statistics
Computational Physical Sciences
Computer Architecture and Embedded Systems, VLSI
Computer Based Education
Computer Games
Computer Graphics and Multimedia
Computer Simulation, Modeling, Vision
Computer-aided Design/Manufacturing
Computing Ethics & Algorithms
Computing Practices & Applications
Data Mining & Database Systems
Digital Signal and Image Processing
Digital System and Logic Design
Distributed Sys and Parallel Processing
E-commerce and E-governance
Expert Systems
Forensic Sciences and Crime
Fuzzy Logic and Simulation
Geographical Information Systems
Green and Grid Computing
High Performance Computing
Human Computer Interaction
Image Processing
Information Retrieval
Information Systems
Information Technology
Mathematical Computing
Natural Language Processing
Reconfigurable Computing Systems
Robotics and Automation
Ubiquitous Computing
Virtual Computing and Global Development
Web and Internet Computing
Access Control and Intrusion Detection
Ad hoc Networks
Ad-hoc and sensor networks
Advance wireless technology
Agent Based Trust Management
Artificial Immune Systems
Authentication and Non-repudiation
Authentication and Non-repudiation
Authorization, Authentication and Identity Management
Autonomy-Oriented Computing
Biological & Evolutionary Computation
Biometric Security
Cloud Security and Privacy
Cloud, P2P, Clusters and Grid Computing : Security and Role of Trust
Coevolutionary Algorithms
Computational Intelligence in Security
Cryptographic protocols
Cryptography and Coding
Data & System Integrity
Data Integrity
Database and System Security
Decentralized Trust Management
E- Commerce
E-mail security, Spam, Phishing, E-mail fraud
Fuzzy Systems
Heterogeneous wireless networks
High speed networks
Identification and Authentication
Information Hiding
Insider Threats and Countermeasures
Intelligent Agents and Systems
Internet and Web applications
Internet Security & Applications
Intrusion Detection & Prevention
Intrusion Detection and Vulnerability Assessment
Key management
LAN/WLAN
MAC layer
MAN/WMAN
Measurement & Performance Analysis
Mobile & Broadband Wireless Internet
Mobile networks & Wireless LAN
Mobile, Ad Hoc and Sensor Network Security
Models for Authentication, Trust and Authorization
Multimedia Content Management
Network and Wireless Network Security
Network Architectures
Network Based applications
Network models
Network Operations & management
Network Protocols & Wireless Networks
Network Security
Network topology
Next Generation Internet
Next Generation Web Architectures
Optical Networking
Peer-to-Peer Network Security
Pervasive Computation Trust
Policy of Trust in E-leaning systems
Privacy and authentication
Privacy and authentication
QoS and Resource Management
Quantum cryptography
Regulation and Trust Mechanisms
Reinforcement & Unsupervised Learning
Routing Protocols
Routing, switching and addressing techniques
Secure Cloud Computing
Security & Network Management
Security and Privacy in Mobile Systems
Security and Privacy in Web Services
Security and Privacy Policies
Security and Risk Management
Security Area Control
Security Deployment
Security Engineering
Security Engineering Security for Grid Computing
Security for Grid Computing
Security in Distributed Systems
Advance wireless technology
Agent Based Trust Management
Artificial Immune Systems
Authentication and Non-repudiation
Authentication and Non-repudiation
Authorization, Authentication and Identity Management
Autonomy-Oriented Computing
Biological & Evolutionary Computation
Biometric Security
Cloud Security and Privacy
Cloud, P2P, Clusters and Grid Computing : Security and Role of Trust
Coevolutionary Algorithms
Computational Intelligence in Security
Cryptographic protocols
Cryptography and Coding
Data & System Integrity
Data Integrity
Database and System Security
Decentralized Trust Management
E- Commerce
E-mail security, Spam, Phishing, E-mail fraud
Fuzzy Systems
Heterogeneous wireless networks
High speed networks
Identification and Authentication
Information Hiding
Insider Threats and Countermeasures
Intelligent Agents and Systems
Internet and Web applications
Internet Security & Applications
Intrusion Detection & Prevention
Intrusion Detection and Vulnerability Assessment
Key management
LAN/WLAN
MAC layer
MAN/WMAN
Measurement & Performance Analysis
Mobile & Broadband Wireless Internet
Mobile networks & Wireless LAN
Mobile, Ad Hoc and Sensor Network Security
Models for Authentication, Trust and Authorization
Multimedia Content Management
Network and Wireless Network Security
Network Architectures
Network Based applications
Network models
Network Operations & management
Network Protocols & Wireless Networks
Network Security
Network topology
Next Generation Internet
Next Generation Web Architectures
Optical Networking
Peer-to-Peer Network Security
Pervasive Computation Trust
Policy of Trust in E-leaning systems
Privacy and authentication
Privacy and authentication
QoS and Resource Management
Quantum cryptography
Regulation and Trust Mechanisms
Reinforcement & Unsupervised Learning
Routing Protocols
Routing, switching and addressing techniques
Secure Cloud Computing
Security & Network Management
Security and Privacy in Mobile Systems
Security and Privacy in Web Services
Security and Privacy Policies
Security and Risk Management
Security Area Control
Security Deployment
Security Engineering
Security Engineering Security for Grid Computing
Security for Grid Computing
Security in Distributed Systems
Security in Distributed Systems
Security Information Systems Architecture
Security Management
Security middleware
Security, Privacy and Trust
Self-Organizing Networks and Networked Systems
Service and Systems Design and QoS Network Security
Social Networks & Web 2.0 Trust Management
Software Security
TCP Protocols
Trust and Reputation Management
Trust in Service-Oriented Architecture-
Trust Management
Trust Management for virtual organizations
Trust models and metrics
Trust, Security, Privacy, Policy management
Trust/risk based security frameworks
Ubiquitous Computing
Ubiquitous Computing Security
Ubiquitous networks
Untraceability
Virus, worms, Trojon Protection
WAN?W-WAN
Web 2.0 security
WI-FI Technologies
Wireless 2G, 3G, 4G, 5G Computing
Wireless communications
Wireless Multimedia systems
Wireless Network Security
Wireless Sensor network
Wireless topologies
 
Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation