ijwsn > Focus & ScopeJoin the board
International Journal of Wireless Security and Networks Cover

International Journal of Wireless Security and Networks

ISSN: 2584-0703

Publisher

Focus and Scope

About the Journal

International Journal of Wireless Security & Network is a peer-reviewed hybrid open-access journal launched in 2015 devoted to solving your network security problems in specific detail. Journal covers a niche segment of information technology dealing only with wireless network security. Wireless network attacks, securing wireless transmissions, and securing wireless access points are major portions that are covered under the journal.

Focus and Scope

  • Wireless threats: Wireless sensor network, security threat, security issues, security attacks, Wireless networks, Data security, Information security, Principal component analysis, Internet, Mobile computing, Secure storage, Computer networks, Communication system security, Information analysis, Internet security, wireless network media, mobile storage, cable network environment, primary components analysis.

  • Signal-hiding: Differential power analysis, DPA,dual-rail logic styles, hardware security, information-theoretic metrics, randomization,side-channel signal hiding, worst-case security evaluation, noise emulation, masking side-channel attacks, algorithmic countermeasures, amplitude randomization techniques, masking security proofs,side-channel information leakage,side-channel signal hiding, signal hiding countermeasures, security tradeoff.

  • Wireless vulnerabilities: Wireless security, group decision support, collaborative, knowledge management, vulnerability scan wireless networks, Information security, Knowledge management, Communication system security, Collaboration, Risk management, Data Security, Network servers, Authorization, and Computer security.

  • Securing wireless transmissions: Data transmission, wireless mesh networks, wireless data dissemination, emergency services broadcasting, military communication, reliable data dissemination, wireless network, security attacks, network dynamics, hand-held receivers coding, security key management, mobile devices Relays, Wireless communication, Communication system security, Receivers, Network coding, Authentication.

  • Network auditing: Neural networks, auditing, audit risk assessment, real-world cases, Intelligent networks, Artificial neural networks, Marketing and sales, Risk management, Training data, Chromium, Law, Legal factors, and Information systems.

  • Wireless public key infrastructure: Wireless networks, Public key, Public key cryptography, Communication system security, Elliptic curve cryptography, Computer networks, Communication system control, Communication system operations, and management, Computer network management, Business communication computer networks, public key cryptography, radiocommunication, security of data, telecommunication security.

  • Electromagnetic shielding: Matrix multiplication approach, multiple cylindrical shells, Gaussian elimination, Helmholtz equations, boundary equations, low-frequency electromagnetic shielding, low-frequency electromagnetic scattering transients, electromagnetic shielding, electromagnetic fields, conducting bodies, electromagnetic interference.