Author Register
International Journal of Network Security
User ID
(E-mail address)
Password
Retype Password
Salutation
-- Please Select a Title --
Dr
Miss
Mr
Mrs
Ms
Prof
First Name
Middle Name or Initial
Last Name
Are you available as a Reviewer?
Yes
No
Area of Expertise
-- Please Select --
Others
0-SI-Innovative Applications of Cyber Security for Network Security Surveillance
01-SI-Attack Resistance Intuitive Neural Networks for Mission Critical Applications
02-SI-Cybersecurity and Privacy in the Industrial Internet of Things (IIoT)
03-SI-Advanced Security System for Network in Fog and Edge Computing
05-SI-Applications of AI in solving complex problems in data security
08-SI-Role of Artificial Intelligence in Minimizing Data Threats
1-SI-
11-SI-Emerging Security Issues and Solutions for Location-Based Services Through Various Hardware Nodes
12-SI-Towards Trustworthy Mobile Information Management: Cross-Disciplinary Perspectives on Security and Privacy Challenges
13-SI-Pushing Toward the Integration Of Artificial Neural Networks With Genetic Algorithms For Solving Optimization And Control
14-SI-Federated Learning For Collaborative Fraud Detection In Large-Scale Networks
15-SI-Communication technologies for security implementations in all network layers
16-SI-Safety, security, and risk management in critical industrial sectors
17-SI-Deep Learning and Explainable Artificial Intelligence in Network Security
Access Control
AI Security
Biometric
Blockchain Technology
Communications Security
Computer Forensics
Computer Security
Cryptanalysis
Cyber Security
Data Security
Database Security
Digital Rights Management
Digital Signature
Electronic Commerce Security
Elliptic Curve Cryptography
Grid Computing Security
Information Hiding
Information Security
Information Security Management
Information Warfare and Cyber-attacks
Internet and Web Security
Intrusion Detection
Key Distribution, Agreement, and Management
Key Hierarchy
Multimedia Security
Network Protocol Security
Network Security
Public-Key Cryptography
Quantum Cryptography
RFID Security and Privacy
Secret-Key Cryptography
Secure Multicast Communications
Secure Software Engineering
Security in Ad Hoc Networks, MANET, & Sensor Networks
Security in Cloud Systems
Security in Mobile Computing
Security in P2P Systems
Security Models and Architectures
Social Networks Security
Steganography
Trusted Computing
User Authentication
Web Services Security
Wireless Security
Worm & Virus
Others
Others
0-SI-Innovative Applications of Cyber Security for Network Security Surveillance
01-SI-Attack Resistance Intuitive Neural Networks for Mission Critical Applications
02-SI-Cybersecurity and Privacy in the Industrial Internet of Things (IIoT)
03-SI-Advanced Security System for Network in Fog and Edge Computing
05-SI-Applications of AI in solving complex problems in data security
08-SI-Role of Artificial Intelligence in Minimizing Data Threats
1-SI-
11-SI-Emerging Security Issues and Solutions for Location-Based Services Through Various Hardware Nodes
12-SI-Towards Trustworthy Mobile Information Management: Cross-Disciplinary Perspectives on Security and Privacy Challenges
13-SI-Pushing Toward the Integration Of Artificial Neural Networks With Genetic Algorithms For Solving Optimization And Control
14-SI-Federated Learning For Collaborative Fraud Detection In Large-Scale Networks
15-SI-Communication technologies for security implementations in all network layers
16-SI-Safety, security, and risk management in critical industrial sectors
17-SI-Deep Learning and Explainable Artificial Intelligence in Network Security
Access Control
AI Security
Biometric
Blockchain Technology
Communications Security
Computer Forensics
Computer Security
Cryptanalysis
Cyber Security
Data Security
Database Security
Digital Rights Management
Digital Signature
Electronic Commerce Security
Elliptic Curve Cryptography
Grid Computing Security
Information Hiding
Information Security
Information Security Management
Information Warfare and Cyber-attacks
Internet and Web Security
Intrusion Detection
Key Distribution, Agreement, and Management
Key Hierarchy
Multimedia Security
Network Protocol Security
Network Security
Public-Key Cryptography
Quantum Cryptography
RFID Security and Privacy
Secret-Key Cryptography
Secure Multicast Communications
Secure Software Engineering
Security in Ad Hoc Networks, MANET, & Sensor Networks
Security in Cloud Systems
Security in Mobile Computing
Security in P2P Systems
Security Models and Architectures
Social Networks Security
Steganography
Trusted Computing
User Authentication
Web Services Security
Wireless Security
Worm & Virus
Others
Others
0-SI-Innovative Applications of Cyber Security for Network Security Surveillance
01-SI-Attack Resistance Intuitive Neural Networks for Mission Critical Applications
02-SI-Cybersecurity and Privacy in the Industrial Internet of Things (IIoT)
03-SI-Advanced Security System for Network in Fog and Edge Computing
05-SI-Applications of AI in solving complex problems in data security
08-SI-Role of Artificial Intelligence in Minimizing Data Threats
1-SI-
11-SI-Emerging Security Issues and Solutions for Location-Based Services Through Various Hardware Nodes
12-SI-Towards Trustworthy Mobile Information Management: Cross-Disciplinary Perspectives on Security and Privacy Challenges
13-SI-Pushing Toward the Integration Of Artificial Neural Networks With Genetic Algorithms For Solving Optimization And Control
14-SI-Federated Learning For Collaborative Fraud Detection In Large-Scale Networks
15-SI-Communication technologies for security implementations in all network layers
16-SI-Safety, security, and risk management in critical industrial sectors
17-SI-Deep Learning and Explainable Artificial Intelligence in Network Security
Access Control
AI Security
Biometric
Blockchain Technology
Communications Security
Computer Forensics
Computer Security
Cryptanalysis
Cyber Security
Data Security
Database Security
Digital Rights Management
Digital Signature
Electronic Commerce Security
Elliptic Curve Cryptography
Grid Computing Security
Information Hiding
Information Security
Information Security Management
Information Warfare and Cyber-attacks
Internet and Web Security
Intrusion Detection
Key Distribution, Agreement, and Management
Key Hierarchy
Multimedia Security
Network Protocol Security
Network Security
Public-Key Cryptography
Quantum Cryptography
RFID Security and Privacy
Secret-Key Cryptography
Secure Multicast Communications
Secure Software Engineering
Security in Ad Hoc Networks, MANET, & Sensor Networks
Security in Cloud Systems
Security in Mobile Computing
Security in P2P Systems
Security Models and Architectures
Social Networks Security
Steganography
Trusted Computing
User Authentication
Web Services Security
Wireless Security
Worm & Virus
Institution (Department)
Post Address
Phone
Fax
Web