Aims & Scope

AIMS

The International Transactions on Computer and Network Security (ITCNS) bearing ISSN 1234-1234 (online) is an annual International Journal double peer-reviewed and published in the month of March by ASDF Journals, London, the UK since 2012.

The aim of the journal is to:

  1. Disseminate original, scientific, theoretical or applied research in the field of Application security, Information security, Network Security, Endpoint Security, Internet Security, Access Rights Management, Firewalls, Intrusion Prevention/Detection, Network Access Control, Security Monitoring, Wireless Security and other Computer/Network Security oriented topics.
  2. Dispense a platform for publishing results and research with a strong empirical component.
  3. Aqueduct the significant gap between research and practice by promoting the publication of original, novel, industry-relevant research.
  4. Seek original and unpublished research article(s) based on theoretical and experimental works for the publication globally.
  5. Publish original, theoretical and practical advances in Application security, Information security, Network Security, Endpoint Security, Internet Security, Access Rights Management, Firewalls, Intrusion Prevention/Detection, Network Access Control, Security Monitoring, Wireless Security and other Computer/Network Security oriented topics.
  6. Impart a platform for publishing results and research with a strong empirical component, to create a bridge for significant gap between research and practice by promoting the publication of original, novel, industry-relevant research.
  7. Solicit original and unpublished research article(s), based on theoretical and experimental works.

SCOPE

The International Transactions on Computer and Network Security (ITCNS) is not limited to a specific aspect of Application security, Information security, Network Security, Endpoint Security, Internet Security, Access Rights Management, Firewalls, Intrusion Prevention/Detection, Network Access Control, Security Monitoring, Wireless Security and other Computer/Network Security oriented topics but is instead devoted to a wide range of subfields in that. While it encourages a broad spectrum of contribution in the Application security, Information security, Network Security, Endpoint Security, Internet Security, Access Rights Management, Firewalls, Intrusion Prevention/Detection, Network Access Control, Security Monitoring, Wireless Security and other Computer/Network Security oriented topics, its core interest lies in issues concerning Computer and Network Security. Articles of interdisciplinary nature are particularly welcome.

The primary goal of the new editors is to maintain high quality of publications. There will be a commitment to expediting the time taken for the publication of the article(s). The articles that are sent for reviews will have names of the authors deleted with a view towards enhancing the objectivity and fairness of the review process.

Articles that are devoted to the purely mathematical aspects without a discussion of the physical implications of the results or the consideration of specific examples are discouraged. Articles concerning Application security, Information security, Network Security, Endpoint Security, Internet Security, Access Rights Management, Firewalls, Intrusion Prevention/Detection, Network Access Control, Security Monitoring, Wireless Security and other Computer/Network Security oriented topics. should not be limited merely to a description and recording of observations but should contain theoretical and quantitative discussion of the results.

The Editors reserve the right to reject article(s) without sending them out for review. Articles for the Regular Issue of the journal can submit, round the year, electronically by using Article Submission SystemThe summited article (s) should cover following subfields of Computer and Network Security:

  1. Application security
    • Anomaly detection.
    • Computer access control.
    • Antivirus software.
    • Computer security software.
    • Security-focused operating system.
    • Authentication.
    • Multi-factor authentication.
    • Authorization.
    • Data-centric security.
    • Code obfuscation.
    • Encryption.
  2. Information security
    • Phishing attacks.
    • Removable media.
    • Passwords and Authentication.
    • Physical security.
    • Mobile Device Security.
    • Working Remotely.
    • Public Wi-Fi.
    • Cloud Security.
  3. Network Security
    • Access Rights Management.
    • End Point Security.
    • Firewalls.
    • Intrusion Prevention/Detection.
    • Network Access Control.
    • Security Monitoring.
    • Wireless Security.
  4. Endpoint Security
    • Data loss prevention.
    • Insider threat protection.
    • Disk, endpoint, and email encryption.
    • Application whitelisting or control.
    • Network access control.
    • Data classification.
    • Endpoint detection and response.
    • Privileged user control.
  5. Internet Security
    • Phishing attacks.
    • Removable media.
    • Passwords and Authentication.
    • Physical security.
    • Mobile Device Security.
    • Working Remotely.
    • Public Wi-Fi.
    • Cloud Security.
  6. Access Rights Management.
    • End Point Security.
    • Firewalls.
    • Intrusion Prevention/Detection.
    • Network Access Control.
    • Security Monitoring.
    • Wireless Security.
  7. Firewall topics
    • Block ports that viruses, worms, and Trojans use to communicate with other machines on the Internet.
    • Prevent unwanted sharing of your files and computer resources such as printers.
    • Prevent applications on your computer from connecting to the Internet if they don’t need to.
  8. Intrusion Prevention/Detection
    • Internet of Things.
    • Cloud Service Provider.
    • Intrusion Detection Systems.
    • Intrusion Detection System.
    • Network Traffic.
  9. Network Access Control
    • Data Center Networking.
    • Secure Network Access.
    • Secure Access Service Edge (SASE)
    • Wireless.
    • Intent-Based Networking.
    • Optics and Transceivers.
  10. Security Monitoring
    • Access Rights Management.
    • End Point Security.
    • Firewalls.
    • Intrusion Prevention/Detection.
    • Network Access Control.
    • Security Monitoring.
    • Wireless Security.
  11. Wireless Security
    • Denial of Service
    • Rogue Access
    • Passive Capturing

Do you want to submit Article?