If you encounter any problems with online submission, please email the manuscript to: support@ijsrnsc.org.
Aim and Scope
Aim - The aim of the journal is: to publish original, theoretical and practical advances in network communication, information security, communication technology, to disseminate original, scientific, theoretical or applied research in the field of network communication, information security, communication technology, to provide a platform for publishing results and research with a strong empirical component, to solicit original and unpublished research papers, based on theoretical or experimental works.
Scope- The scope of the journal includes, but are not limited to the following:
- Anonymity and Privacy, Security Management and Policies
- Artificial Intelligence, Machine Learning, and IoT for Security
- Authentication And Access Control, Intrusion Detection and Prevention
- Authentication in Social Networks, Biometric Security and Modeling
- Cloud, Fog, Edge and Cognitive Security
- Computer Crime Prevention and Detection, Digital and Cyber Forensics and Analysis
- Confidentiality Protection, Cryptography, Stenography, and Data Protection
- Cybersecurity, Cloud Security, Blockchain and cryptocurrency Security
- Data Mining in Security
- Database and Data Security
- E-Commerce Security; Image, Audio and Video Security
- Heterogeneous and Ubiquitous networks
- Information Ethics, Privacy Issues, and Information Security
- Information Warfare, Denial of Service Protection, and Spoofing Protection
- Malware And Botnet Detection, Virus/Worm Controls
- Network Architecture and Protocols, Internet and Security
- Network Security Communication
- Operating System Security
- Risk Management and Safety-Critical Systems
- Secure Communications Technology and Computer Systems
- Security Control Measures, Policy Models and Authentication
- Security For Grid and Distributed Computing
- Security Information Systems Architecture
- Social Media Abuse Detection, Intrusion Detection and Prevention
- Software And Hardware Security Architectures
- Wireless Ad-hoc and Sensor Networks