International Journal of Security and Networks

Call for papers
Editor in Chief: Prof. Yang Xiao
ISSN online: 1747-8413
ISSN print: 1747-8405
4 issues per year
Subscription price

 

IJSN proposes and fosters discussion on and dissemination of network security related issues.

 



 Topics covered include

  • Cellular networks, wireless LANs, PANs, MANs, sensor/ad hoc networks
  • Mobile IP, IP and satellite networks, wireless internet/communications
  • Wired/wireless integrated networks
  • Internet/WWW, high-speed/P2P networks, VoIP, e-mail
  • Optical systems/networks, integrated/content-delivery networks
  • Domain name service, communications, distributed systems
  • Attacks, security mechanisms/services, authentication/authorisation, access control
  • Multicast security, data confidentiality/integrity, on-repudiation
  • Firewalls, privacy protection, security specification, encryption/decryption
  • Formal analyses, group communications, intrusion detection, anonymity
  • Key management, trust establishment, malicious parties' revocation, security policies
  • Fraudulent usage, prevention of traffic analysis, denial of service
  • PHY/MAC/routing protocols, dependability/reliability, secure location determination
  • Performance evaluation, performance/security tradeoff analysis
  • Network forensics, design/analysis of security protocols, security standards

 

More topics...

Security in Wireless Networks and Mobile Computing

  • Security in cellular networks (2G, 2.5G, 3G, B3G, 4G, etc.)
  • Security in wireless LANs (IEEE 802.11 WLAN, WiFi, and HiperLAN/2)
  • Security in wireless PANs (Bluetooth and IEEE 802.15)
  • Security in wireless MANs (IEEE 802.16 and WiMAX)
  • Security in sensor networks
  • Security in ad hoc networks
  • Security in mobile IP
  • Security in wireless internet
  • Security in satellite networks
  • Security in integrated wireless networks
  • Security in wired and wireless integrated networks
  • Security in wireless communications

Security in Wired Networks

  • Security in IP networks
  • Security in internet and WWW
  • Security in high-speed networks
  • Security in peer-to-peer networks
  • Security in optical systems and networks
  • Security in VoIP
  • Security in e-mail
  • Security in domain name service
  • Security in integrated networks
  • Security in communications
  • Security in content-delivery networks
  • Security in distributed systems

Security Issues in Networks include:

  • Attacks, security mechanisms, and security services
  • Authentication
  • Authorisation
  • Access control
  • Multicast security
  • Distributed access control
  • Data confidentiality
  • Data integrity
  • Non-repudiation
  • Firewall
  • Privacy protection
  • Security specification techniques
  • Encryption and decryption
  • Secure routing protocols
  • Formal analyses
  • Security group communications
  • Intrusion detection
  • Key management
  • Trust establishment
  • Revocation of malicious parties
  • Security policies
  • Fraudulent usage
  • Dependability and reliability
  • Anonymity
  • Prevention of traffic analysis
  • Secure PHY/MAC/routing protocols
  • Secure location determination
  • Denial of service
  • Network security performance evaluation
  • Tradeoff analysis between performance and security
  • Network forensics
  • Design or analysis of security protocols
  • Security standards

 

Hide

More on this journal...
Objectives

The objectives of IJSN are to establish an effective channel of communication between industry, government agencies, academic and research institutions and persons concerned with network security related problems. It also aims to promote and coordinate developments in the field of wireless/wired network security.


Readership

IJSN provides a vehicle to help professionals, academics, researchers, developers, working in the field of wireless/wired network security to disseminate information and to learn from each other's work.


Contents

IJSN publishes original papers, short papers, and review papers. Special Issues devoted to important topics in wireless/wired network security will also be published.


 

Hide

Browse issues

Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4

 

More volumes...

 IJSN is indexed in:

 

 IJSN is listed in:

 

Editor in Chief

  • Xiao, Yang, University of Alabama, USA
    (yangxiao@cs.ua.edu)

    Editorial Board Members

    • Azadmanesh, Azad, University of Nebraska at Omaha, USA
    • Cai, Zhipeng, Georgia State University, USA
    • Chen, Thomas M., Swansea University, UK
    • Cheng, Xiuzhen (Susan), The George Washington University, USA
    • Choo, Kim-Kwang Raymond, University of South Australia, Australia
    • Conti, Mauro, University of Padua, Italy
    • Crosby, Garth V., Southern Illinois University Carbondale (SIUC), USA
    • Dong, Yingfei, University of Hawaii, USA
    • Du, David Hung-Chang, University of Minnesota, USA
    • Du, Ding-zhu, University of Texas at Dallas, USA
    • Evans, Joseph B., The University of Kansas, USA
    • Huang, Chin-Tser, University of South Carolina, USA
    • Jaggard, Aaron D., U.S. Naval Research Laboratory, USA
    • Kesidis, George, The Pennsylvania State University, USA
    • Li, Kai, Princeton University, USA
    • Lin, Jason Yi-Bing, National Chiao Tung University, Taiwan
    • Liu, Yao, University of South Florida, USA
    • Lu, Kejie, University of Puerto Rico at Mayagüez, Puerto Rico
    • Lu, Rongxing, Nanyang Technological University, Singapore
    • Mateti, Prabhaker, Wright State University, USA
    • Misic, Jelena, Ryerson University, Canada
    • Mu, Yi, University of Wollongong, Australia
    • Pan, Yi, Georgia State University, USA
    • Petros, Nicopolitidis, Aristotle University of Thessaloniki, Greece
    • Ray, Indrajit, Colorado State University, USA
    • Shen, Xuemin, University of Waterloo, Canada
    • Sivalingam, Krishna M, Indian Institute of Technology Madras, India
    • Sun, Kun, College of William and Mary, USA
    • Suri, Neeraj, Technische University Darmstadt, Germany
    • Takabi, Hassan, University of North Texas, USA
    • Vaidya, Jaideep S., Rutgers, The State University of New Jersey, USA
    • Venkatasubramanian, Krishna Kumar, Worcester Polytechnic Institute, USA
    • Wang, Haining, University of Delaware, USA
    • Wu, Jie, Temple University, USA
    • Xie, Mengjun, University of Arkansas at Little Rock, USA
    • Yan, Guanhua, Binghamton University, State University of New York, USA
    • Yao, Danfeng (Daphne), Virginia Tech, USA
    • Yoo, Seong-Moo, University of Alabama in Huntsville, USA
    • Yu, Haifeng, National University of Singapore, Singapore
    • Yu, Ming, Florida State University, USA
    • Yu, Shucheng, University of Arkansas at Little Rock, USA
    • Yue, Chuan, University of Colorado Colorado Springs, USA
    • Zou, Xukai, Indiana University Purdue University Indianapolis, USA

     

    A few essentials for publishing in this journal

     

    • Submitted articles should not have been previously published or be currently under consideration for publication elsewhere.
    • Conference papers may only be submitted if the paper has been completely re-written (taken to mean more than 50%) and the author has cleared any necessary permissions with the copyright owner if it has been previously copyrighted.
    • All our articles are refereed through a double-blind process.
    • All authors must declare they have read and agreed to the content of the submitted article. A full statement of our Ethical Guidelines for Authors (PDF) is available.

     

    Submission process

     

    All articles for this journal must be submitted using our online submissions system.

    Read our Submitting articles page.

     

     

    Journal news

    • Hacked emails slice spam fast

       

      Spam spreads much faster and to more people when it is being propagated by hacked, or otherwise compromised, email accounts rather than legitimate accounts, according to research published in the International Journal of Security and Networks. The insight should help those modeling the dynamics of information diffusion as well as those hoping to track and [...]

      More details...

    • Geographical passwords worth their salt

       

      Now you can protect yourself online with your secret place. Its much easier to remember a place you have visited than a long, complicated password, which is why computer scientist Ziyad Al-Salloum of ZSS-Research in Ras Al Khaimah, UAE, is developing a system he calls geographical passwords. Writing in a freely available open access research [...]

      More details...

    •  

      17 - 18 March 2015
      Bogota, Colombia


    •  

      25 - 26 March 2015
      Istanbul, Turkey