SlideShare a Scribd company logo
International Journal of Information Security and Applications (IJISA)
ISSN 0974 - 624N (Online); 0175 - 2190 (Print)
*****FREE Publishing ****
http://skycs.org/jounals/ijisa/Home.html
Scope
International Journal of Information Security and Applications (IJISA) is a bi monthly open access
peer-reviewed journal that publishes articles which contribute new results in all areas of Information
Security and Applications. The journal focuses on all technical and practical aspects of Information
Security and Applications. The goal of this journal is to bring together researchers and practitioners
from academia and industry to focus on advanced Information Security concepts and establishing new
collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results,
projects, surveying works and industrial experiences that describe significant advances in Information
Security and Applications.
Topics of interest include, but are not limited to, the following
 Cryptographic protocols
 Cryptography and Coding
 Untraceability
 Privacy and authentication
 Key management
 Authentication
 Trust Management
 Quantum cryptography
 Computational Intelligence in Security
 Artificial Immune Systems
 Biological & Evolutionary Computation
 Intelligent Agents and Systems
 Reinforcement & Unsupervised Learning
 E- Commerce
 Access Control and Intrusion Detection
 Intrusion Detection and Vulnerability
Assessment
 Authentication and Non-repudiation
 Identification and Authentication
 Insider Threats and Countermeasures
 Intrusion Detection & Prevention
 Secure Cloud Computing
 Security Information Systems Architecture and
Design and Security Patterns
 Security Management
 Security Requirements (threats,
vulnerabilities, risk, formal methods, etc.)
 Sensor and Mobile Ad Hoc Network Security
 Autonomy-Oriented Computing
 Coevolutionary Algorithms
 Fuzzy Systems
 Biometric Security
 Trust models and metrics
 Regulation and Trust Mechanisms
 Data Integrity
 Models for Authentication, Trust and
Authorization
 Wireless Network Security
 Information Hiding
 Data & System Integrity
 Service and Systems Design and QoS Network
Security
 Software Security
 Security and Privacy in Mobile Systems
 Security and Privacy in Pervasive/Ubiquitous
Computing
 Security and Privacy in Web Sevices
 Security and Privacy Policies
 Security Area Control
 Security Deployment
 Security Engineering
Paper Submission
Authors are invited to submit papers for this journal through Submission System. Submissions must
be original and should not have been published previously or be under consideration for publication
while being evaluated for this Journal.
Important Dates
 Submission Deadline :August 04, 2019
 Notification :August 25, 2019
 Final Manuscript Due :August 31, 2019
 Publication Date : Determined by the Editor-in-Chief
TO SUBMIT YOUR PAPER, PLEASE CLICK THE FOLLOWING LINK Submission System.
Contacts
Here's where you can reach us: ijcsijournal@yahoo.com
Ijisa

More Related Content

RTF
Ijisa
ijfcst journal
 
RTF
Ijisa
ijfcst journal
 
RTF
Ijisa
ijfcst journal
 
RTF
International Journal of Information Security and Applications(IJISA)
MiajackB
 
RTF
International Journal of Information Security and Applications(IJISA)
MiajackB
 
RTF
International Journal of Information Security and Applications(IJISA)
MiajackB
 
DOCX
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
DOCX
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Information Security and Applications(IJISA)
MiajackB
 
International Journal of Information Security and Applications(IJISA)
MiajackB
 
International Journal of Information Security and Applications(IJISA)
MiajackB
 
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 

What's hot (15)

RTF
Ijisa
ijfcst journal
 
DOCX
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
DOCX
Ijisa
ijfcst journal
 
DOCX
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
DOCX
Ijisa
ijfcst journal
 
DOCX
International Journal of Network Security & Its Applications (IJNSA)
MiajackB
 
DOCX
Ijisa
ijfcst journal
 
DOCX
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
DOCX
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
DOCX
Ijisa
ijfcst journal
 
DOCX
Ijisa
ijfcst journal
 
DOCX
Ijisa
ijfcst journal
 
DOCX
International Journal of Network Security &Its Applications (IJNSA)
MiajackB
 
DOCX
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
DOCX
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
MiajackB
 
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security &Its Applications (IJNSA)
MiajackB
 
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
Ad

Similar to Ijisa (14)

RTF
International Journal of Information Security and Applications(IJISA)
MiajackB
 
DOCX
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
DOCX
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
DOCX
Ijisa
ijfcst journal
 
DOCX
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
DOCX
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
DOCX
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
DOCX
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
DOCX
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
DOCX
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
DOCX
International Journal of Network Security &Its Applications (IJNSA)
MiajackB
 
DOCX
International Journal of Wireless Networks Systems (IJWNS)
ijfcst journal
 
PDF
International Journal on Cryptography and Information Security (IJCIS)
ijcisjournal
 
DOCX
International Journal of Wireless Network (IJWNS)
jackson130
 
International Journal of Information Security and Applications(IJISA)
MiajackB
 
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
International Journal of Network Security &Its Applications (IJNSA)
MiajackB
 
International Journal of Wireless Networks Systems (IJWNS)
ijfcst journal
 
International Journal on Cryptography and Information Security (IJCIS)
ijcisjournal
 
International Journal of Wireless Network (IJWNS)
jackson130
 
Ad

More from ijfcst journal (20)

DOCX
International Journal of Humanities, Art and Social Studies (IJHAS)
ijfcst journal
 
DOCX
International Journal of Education (IJE)
ijfcst journal
 
DOCX
International Journal of Education (IJE)
ijfcst journal
 
DOCX
International Journal of Computer Networks &(IJCNC)
ijfcst journal
 
DOCX
International Journal of Signal & Image Processing (IJSP)
ijfcst journal
 
DOCX
International Journal of Managing Information Technology (IJMIT)
ijfcst journal
 
DOCX
International Journal of Software Engineering & Applications (IJSEA)
ijfcst journal
 
DOCX
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
ijfcst journal
 
DOCX
International Journal of Computer Networks &Communications(IJCNC)
ijfcst journal
 
DOCX
International Journal of Signal & Image Processing (IJSP)
ijfcst journal
 
DOCX
International Journal of Managing Information Technology (IJMIT)
ijfcst journal
 
DOCX
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
ijfcst journal
 
DOCX
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
ijfcst journal
 
DOCX
International Journal of Education (IJE)
ijfcst journal
 
DOCX
International Journal of Computer Networks & Communications(IJCNC)
ijfcst journal
 
DOCX
International Journal of Computer Networks &Communications(IJCNC)
ijfcst journal
 
DOCX
International Journal of Managing Information Technology (IJMIT)
ijfcst journal
 
DOCX
International Journal of Software Engineering &Applications (IJSEA)
ijfcst journal
 
DOCX
International Journal of Artificial Intelligence and Soft Computing (IJAISC) 
ijfcst journal
 
DOCX
International Journal of Humanities, Art and Social Studies (IJHAS)
ijfcst journal
 
International Journal of Humanities, Art and Social Studies (IJHAS)
ijfcst journal
 
International Journal of Education (IJE)
ijfcst journal
 
International Journal of Education (IJE)
ijfcst journal
 
International Journal of Computer Networks &(IJCNC)
ijfcst journal
 
International Journal of Signal & Image Processing (IJSP)
ijfcst journal
 
International Journal of Managing Information Technology (IJMIT)
ijfcst journal
 
International Journal of Software Engineering & Applications (IJSEA)
ijfcst journal
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
ijfcst journal
 
International Journal of Computer Networks &Communications(IJCNC)
ijfcst journal
 
International Journal of Signal & Image Processing (IJSP)
ijfcst journal
 
International Journal of Managing Information Technology (IJMIT)
ijfcst journal
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
ijfcst journal
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
ijfcst journal
 
International Journal of Education (IJE)
ijfcst journal
 
International Journal of Computer Networks & Communications(IJCNC)
ijfcst journal
 
International Journal of Computer Networks &Communications(IJCNC)
ijfcst journal
 
International Journal of Managing Information Technology (IJMIT)
ijfcst journal
 
International Journal of Software Engineering &Applications (IJSEA)
ijfcst journal
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC) 
ijfcst journal
 
International Journal of Humanities, Art and Social Studies (IJHAS)
ijfcst journal
 

Recently uploaded (20)

PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PDF
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PDF
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
PPTX
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
Basics and rules of probability with real-life uses
ravatkaran694
 
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 

Ijisa

  • 1. International Journal of Information Security and Applications (IJISA) ISSN 0974 - 624N (Online); 0175 - 2190 (Print) *****FREE Publishing **** http://skycs.org/jounals/ijisa/Home.html Scope International Journal of Information Security and Applications (IJISA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Security and Applications. The journal focuses on all technical and practical aspects of Information Security and Applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced Information Security concepts and establishing new collaborations in these areas. Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Information Security and Applications. Topics of interest include, but are not limited to, the following  Cryptographic protocols  Cryptography and Coding  Untraceability  Privacy and authentication  Key management  Authentication  Trust Management  Quantum cryptography  Computational Intelligence in Security  Artificial Immune Systems  Biological & Evolutionary Computation  Intelligent Agents and Systems  Reinforcement & Unsupervised Learning  E- Commerce  Access Control and Intrusion Detection  Intrusion Detection and Vulnerability Assessment  Authentication and Non-repudiation  Identification and Authentication  Insider Threats and Countermeasures  Intrusion Detection & Prevention  Secure Cloud Computing  Security Information Systems Architecture and Design and Security Patterns  Security Management  Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)  Sensor and Mobile Ad Hoc Network Security
  • 2.  Autonomy-Oriented Computing  Coevolutionary Algorithms  Fuzzy Systems  Biometric Security  Trust models and metrics  Regulation and Trust Mechanisms  Data Integrity  Models for Authentication, Trust and Authorization  Wireless Network Security  Information Hiding  Data & System Integrity  Service and Systems Design and QoS Network Security  Software Security  Security and Privacy in Mobile Systems  Security and Privacy in Pervasive/Ubiquitous Computing  Security and Privacy in Web Sevices  Security and Privacy Policies  Security Area Control  Security Deployment  Security Engineering Paper Submission Authors are invited to submit papers for this journal through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. Important Dates  Submission Deadline :August 04, 2019  Notification :August 25, 2019  Final Manuscript Due :August 31, 2019  Publication Date : Determined by the Editor-in-Chief TO SUBMIT YOUR PAPER, PLEASE CLICK THE FOLLOWING LINK Submission System. Contacts Here's where you can reach us: [email protected]