{"id":28,"date":"2020-10-04T10:49:26","date_gmt":"2020-10-04T10:49:26","guid":{"rendered":"https:\/\/asdfjournals.com\/journals\/itse\/?page_id=28"},"modified":"2021-12-17T07:24:08","modified_gmt":"2021-12-17T07:24:08","slug":"call-for-papers","status":"publish","type":"page","link":"https:\/\/asdfjournals.com\/journals\/itcns\/journal-information\/call-for-papers\/","title":{"rendered":"Call for Papers"},"content":{"rendered":"<section class=\"l-section wpb_row height_medium color_primary with_shape\"><div class=\"l-section-shape type_curve-inv pos_bottom\" style=\"height:15vmin;\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 8 64 8\" preserveAspectRatio=\"none\" width=\"100%\" height=\"100%\">\r\n\t<path fill=\"currentColor\" d=\"M64 15.9 Q32 0.4 0 15.9 L0 18 L64 18 Z\"\/>\r\n<\/svg><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: center;\">Call for Papers<\/h2>\n<\/div><\/div><div class=\"w-separator size_custom\" style=\"height:12vh\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p style=\"text-align: justify; color: black;\">The <strong>International Transactions on Computer and Network Security (ITCNS)<\/strong> bearing ISSN 1234-1234 (online) is an annual International Journal double peer-reviewed and published in the month of March by ASDF Journals, London, the UK since 2012.<\/p>\n<p style=\"text-align: justify; color: black;\">The<strong> International Transactions on Computer and Network Security (ITCNS)<\/strong>\u00a0publishes carefully refereed research, review, and survey papers that offer a significant contribution to the computer science literature, and which are of interest to a wide audience. Coverage extends to all main-stream software engineering-related applications.<\/p>\n<p style=\"text-align: justify; color: black;\">All articles published by <strong>International Transactions on Computer and Network Security (ITCNS)<\/strong> are made freely and permanently accessible online immediately upon publication, without subscription charges or registration barriers. Authors of articles published in <strong>International Transactions on Computer and Network Security (ITCNS)<\/strong>\u00a0are the copyright holders of their articles and have granted to any third party, in advance and in perpetuity, the right to use, reproduce or disseminate the article.<\/p>\n<ul>\n<li>Application security<\/li>\n<li>Anomaly detection.<\/li>\n<li>Computer access control.<\/li>\n<li>Application security. Antivirus software.<\/li>\n<li>Computer security software. Secure coding.<\/li>\n<li>Secure by default. Secure by design. Misuse case.<\/li>\n<li>Security-focused operating system.<\/li>\n<li>Authentication. Multi-factor authentication.<\/li>\n<li>Authorization.<\/li>\n<li>Data-centric security.<\/li>\n<li>Code obfuscation.<\/li>\n<li>Encryption.<\/li>\n<li>Information security<\/li>\n<li>Phishing attacks.<\/li>\n<li>Removable media.<\/li>\n<li>Passwords and Authentication.<\/li>\n<li>Physical security.<\/li>\n<li>Mobile Device Security.<\/li>\n<li>Working Remotely.<\/li>\n<li>Public Wi-Fi.<\/li>\n<li>Cloud Security.<\/li>\n<li>Network Security<\/li>\n<li>Access Rights Management.<\/li>\n<li>End Point Security.<\/li>\n<li>Firewalls.<\/li>\n<li>Intrusion Prevention\/Detection.<\/li>\n<li>Network Access Control.<\/li>\n<li>Security Monitoring.<\/li>\n<li>Wireless Security.<\/li>\n<li>Endpoint Security<\/li>\n<li>Data loss prevention.<\/li>\n<li>Insider threat protection.<\/li>\n<li>Disk, endpoint, and email encryption.<\/li>\n<li>Application whitelisting or control.<\/li>\n<li>Network access control.<\/li>\n<li>Data classification.<\/li>\n<li>Endpoint detection and response.<\/li>\n<li>Privileged user control.<\/li>\n<li>Internet Security<\/li>\n<li>Phishing attacks.<\/li>\n<li>Removable media.<\/li>\n<li>Passwords and Authentication.<\/li>\n<li>Physical security.<\/li>\n<li>Mobile Device Security.<\/li>\n<li>Working Remotely.<\/li>\n<li>Public Wi-Fi.<\/li>\n<li>Cloud Security.<\/li>\n<li>Access Rights Management.<\/li>\n<li>End Point Security.<\/li>\n<li>Firewalls.<\/li>\n<li>Intrusion Prevention\/Detection.<\/li>\n<li>Network Access Control.<\/li>\n<li>Security Monitoring.<\/li>\n<li>Wireless Security.<\/li>\n<li>Firewall topics<\/li>\n<li>Block ports that viruses, worms, and Trojans use to communicate with other machines on the Internet.<\/li>\n<li>Prevent unwanted sharing of your files and computer resources such as printers.<\/li>\n<li>Prevent applications on your computer from connecting to the Internet if they don&#8217;t need to.<\/li>\n<li>Intrusion Prevention\/Detection<\/li>\n<li>Internet of Things.<\/li>\n<li>Cloud Service Provider.<\/li>\n<li>Intrusion Detection Systems.<\/li>\n<li>Intrusion Detection System.<\/li>\n<li>Network Traffic.<\/li>\n<li>Network Access Control<\/li>\n<li>Data Center Networking.<\/li>\n<li>Secure Network Access.<\/li>\n<li>Secure Access Service Edge (SASE)<br \/>\nWireless.<\/li>\n<li>Intent-Based Networking.<\/li>\n<li>Optics and Transceivers.<\/li>\n<li>Security Monitoring<\/li>\n<li>Access Rights Management.<\/li>\n<li>End Point Security.<\/li>\n<li>Firewalls.<\/li>\n<li>Intrusion Prevention\/Detection.<\/li>\n<li>Network Access Control.<\/li>\n<li>Security Monitoring.<\/li>\n<li>Wireless Security.<\/li>\n<li>Denial of Service<\/li>\n<li>Rogue Access<\/li>\n<li>Passive Capturing<\/li>\n<\/ul>\n<\/div><\/div><div class=\"w-actionbox color_primary controls_right\"><div class=\"w-actionbox-text\"><h2 class=\"w-actionbox-title\">Do you want to submit Article?<\/h2><\/div><div class=\"w-actionbox-controls\"><a class=\"w-btn us-btn-style_1\" title=\"Submission\" target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/asdfjournals.com\/journals\/itcns\/submission\/\"><span class=\"w-btn-label\">Submit Now<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"Call for Papers The International Transactions on Computer and Network Security (ITCNS) bearing ISSN 1234-1234 (online) is an annual International Journal double peer-reviewed and published in the month of March by ASDF Journals, London, the UK since 2012. The International Transactions on Computer and Network Security (ITCNS)\u00a0publishes carefully refereed research, review, and survey papers that...","protected":false},"author":1,"featured_media":0,"parent":9,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-28","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/asdfjournals.com\/journals\/itcns\/wp-json\/wp\/v2\/pages\/28","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/asdfjournals.com\/journals\/itcns\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/asdfjournals.com\/journals\/itcns\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/asdfjournals.com\/journals\/itcns\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/asdfjournals.com\/journals\/itcns\/wp-json\/wp\/v2\/comments?post=28"}],"version-history":[{"count":25,"href":"https:\/\/asdfjournals.com\/journals\/itcns\/wp-json\/wp\/v2\/pages\/28\/revisions"}],"predecessor-version":[{"id":1701,"href":"https:\/\/asdfjournals.com\/journals\/itcns\/wp-json\/wp\/v2\/pages\/28\/revisions\/1701"}],"up":[{"embeddable":true,"href":"https:\/\/asdfjournals.com\/journals\/itcns\/wp-json\/wp\/v2\/pages\/9"}],"wp:attachment":[{"href":"https:\/\/asdfjournals.com\/journals\/itcns\/wp-json\/wp\/v2\/media?parent=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}