Call for Papers

The International Transactions on Computer and Network Security (ITCNS) bearing ISSN 1234-1234 (online) is an annual International Journal double peer-reviewed and published in the month of March by ASDF Journals, London, the UK since 2012.

The International Transactions on Computer and Network Security (ITCNS) publishes carefully refereed research, review, and survey papers that offer a significant contribution to the computer science literature, and which are of interest to a wide audience. Coverage extends to all main-stream software engineering-related applications.

All articles published by International Transactions on Computer and Network Security (ITCNS) are made freely and permanently accessible online immediately upon publication, without subscription charges or registration barriers. Authors of articles published in International Transactions on Computer and Network Security (ITCNS) are the copyright holders of their articles and have granted to any third party, in advance and in perpetuity, the right to use, reproduce or disseminate the article.

  • Application security
  • Anomaly detection.
  • Computer access control.
  • Application security. Antivirus software.
  • Computer security software. Secure coding.
  • Secure by default. Secure by design. Misuse case.
  • Security-focused operating system.
  • Authentication. Multi-factor authentication.
  • Authorization.
  • Data-centric security.
  • Code obfuscation.
  • Encryption.
  • Information security
  • Phishing attacks.
  • Removable media.
  • Passwords and Authentication.
  • Physical security.
  • Mobile Device Security.
  • Working Remotely.
  • Public Wi-Fi.
  • Cloud Security.
  • Network Security
  • Access Rights Management.
  • End Point Security.
  • Firewalls.
  • Intrusion Prevention/Detection.
  • Network Access Control.
  • Security Monitoring.
  • Wireless Security.
  • Endpoint Security
  • Data loss prevention.
  • Insider threat protection.
  • Disk, endpoint, and email encryption.
  • Application whitelisting or control.
  • Network access control.
  • Data classification.
  • Endpoint detection and response.
  • Privileged user control.
  • Internet Security
  • Phishing attacks.
  • Removable media.
  • Passwords and Authentication.
  • Physical security.
  • Mobile Device Security.
  • Working Remotely.
  • Public Wi-Fi.
  • Cloud Security.
  • Access Rights Management.
  • End Point Security.
  • Firewalls.
  • Intrusion Prevention/Detection.
  • Network Access Control.
  • Security Monitoring.
  • Wireless Security.
  • Firewall topics
  • Block ports that viruses, worms, and Trojans use to communicate with other machines on the Internet.
  • Prevent unwanted sharing of your files and computer resources such as printers.
  • Prevent applications on your computer from connecting to the Internet if they don’t need to.
  • Intrusion Prevention/Detection
  • Internet of Things.
  • Cloud Service Provider.
  • Intrusion Detection Systems.
  • Intrusion Detection System.
  • Network Traffic.
  • Network Access Control
  • Data Center Networking.
  • Secure Network Access.
  • Secure Access Service Edge (SASE)
    Wireless.
  • Intent-Based Networking.
  • Optics and Transceivers.
  • Security Monitoring
  • Access Rights Management.
  • End Point Security.
  • Firewalls.
  • Intrusion Prevention/Detection.
  • Network Access Control.
  • Security Monitoring.
  • Wireless Security.
  • Denial of Service
  • Rogue Access
  • Passive Capturing

Do you want to submit Article?