Editors Overview

jons maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.

Focus and Scope

About the Journal

Journal of Network Security [2395-6739(e)] is a peer-reviewed hybrid open-access journal launched in 2013 focused on the publication of all the Research/Review work carried out for the security of the network. 

Focus and Scope

  • Internet, Network, and Wireless Network Security& Applications: Computer security, Sensors, Internet of Things, Computer architecture, Privacy, Wireless sensor networks Internet of Things, security of data cyberentity security ,Internet of Things system architecture, general system security, network security, application security Wireless networks, Communication system security, Wireless LAN, Data security, Authentication, Bandwidth, Paper technology, Wireless communication, Computer security, Land mobile radio cellular systems Internet, Encryption, Business, Logic gates, Authentication, Computer crime computer network security, Internet, radiofrequency identification Internet of things, security risks, information technology industry, Demand response, Smart grid, 5G network, Internet of Things, Application potential, Continuing medical education (MeSH: education, medical, continuing), Distance learning (MeSH: education, distance), Telemedicine Teleconsultations (MeSH: remote consultation), social networking, network structure, Risk taking, Trust, Self-disclosure, Privacy, Bot-IoT dataset, Network flow, Network forensics, Forensics analytics, Problematic internet use, Compulsive, Behavioural addiction, Video gaming, Wireless Body Area Network (WBAN), Security, Threats, Attacks, Healthcare systems, Blockchain, Smart contracts, Cyber security, Distributed ledger technology, Cryptocurrency, Bitcoin, Cloud computing, Virtualization, Intrusions detection systems (IDSs), anomaly detection based, heuristic methods, Machine learning, Deep learning. 

  • Mobile, Sensor Network, Database, and System Security: Intrusion detection, Wireless sensor networks, Mobile ad hoc networks, Protection, Information systems, Intelligent networks,Sun, Base stations, Communication system security, Data securityad hoc networks, mobile communication, security of data, telecommunication security, wireless sensor networks intrusion detection, mobile ad hoc networks, wireless sensor networks, Wireless sensor network (WSN), Security, Deployment, Blanket coverage, Sensor nodes, Large-scale, Flocking control, Adaptive flocking control, Multiple target tracking, Multi-agent systems, Mobile sensor networks, Graph partitioning, Particle number concentration (PNC), Statistical modelling, Geoinformation, Pollution maps, Urban environment, Hybrid sensor network, Mobile sensor navigation, Energy-efficiency, Data gathering, Sink mobility, Network lifetime, Authentication, Passwords, Proactive password checking, Password cracking, smart grid, power system, security assessment, blackout, machine learning, mandatory access control, concurrency control, Database as a Service (DBaaS), Data mining, Artificial intelligence, Decision tree, Fuzzy sets, Inductive inference, Neural networks, Power systems, Transient stability assessment.

  • Virus, Worms, Trojan Protection, E-mail Security, Spam, Phishing, and E-mail Fraud: Unsolicited electronic mail, Filtering, Phishing, Postal services, ServersOn-Demand Spam Filter, E-mail Spam, Spamming, Ham, Junk E-mail, E-mail Vulnerability, on-demand spam filtering mechanism, botnets, e-mail addresses,learning techniques, e-mail classificatione-mail filters, information filtering, invasive software, learning (artificial intelligence), pattern classification, unsolicited e-mailProtection, Electronic mail, Banking, Credit cards, Internet, Information security, Web pages, Electronic commerce, Computer applications, Computer crimeSecurity, Phishing Attacks, User ProtectionBot, BotNet, IRC, Malwarecomputer crime, Internet, invasive software, software agents, Authorship analysis, Reverse engineering, Malicious code, Software forensics, Investigation, Malicious Code Filter (MCF), Activity–Quality, Architecture Analysis, Bayesian Network, Cyber Security, Reactor Protection System, Research Reactor, Government, Sectors, Cyber incidents, Taxonomy, CERT/CC, Reporting, Facet theory, Multidimensional scaling, Vulnerability, Distributed Control System (DCS), Supervisory Control and Data Acquisition (SCADA) system, Process Control System (PCS), Ubiquitous Sensor Network (USN), E-mail authentication and identification services, Information processing, Cognitive effort, Decision aids, Self-efficacy, Cybercrimes, E-mail forensics, E-mail social networks, Classification, Clustering, Statistical analysis, E-mail phishing, Support Vector Machines, Genetic programing, Regular expressions, Automatic generation, E-mail, Spam filtering.

  • Security Threats & Countermeasures (DDoS, MiM, Session Hijacking, Replay attack, etc,): Wireless Network, Access Point, Advance Encryption Standard, Mutual Authentication, Security Threats, VANET Security challenge, Attacks classification, V2V communication Security solutions, security attacks, DoS Attack, Malware Injection Attack, Side Channel Attack, Authentication Attack, Man in the Middle Attack, BlackEnergy, Malware, Cyber Attacks, Synchrophasors, Smart Grid, replay attack, embryonic computing technology, resource sharing, multitenancy, cloud security threats, cloud computing, cloud services, cloud technology, virtualization, authentication, authorization

  • Cryptographic Protocols: Cryptographic protocols, Cryptography, Mathematical model, Computer security, Application software, Radio access networks, Reactive power, Job design, Computer science taxonomy, Cryptographic protocols, Cryptography, Security, Laboratories, Authorization Cryptographic protocols, Cryptography, Authentication, Guidelines, Design engineering, Security, Logic, Error analysis, Computer Society, Privacy standards, network protocols, security, protocol verification, formal methodsCryptographic protocols, Cryptography, Graphics, Plasma welding, Application software, Specification languages, Formal specifications

  • Intrusion Detection and Prevention: Mobile communication, Ad hoc networks, Intrusion detection, Mobile ad hoc networks, Intrusion detection and prevention, mobile ad hoc networks, network layer attacks, securing ad hoc networks, Intrusion detection, Communication system security, Data security, Wireless networks, Testing, Protection, Access protocols, Access control, Laboratories, Systems engineering and theory, intrusion detection and rapid action, network intrusion detection, network prevention, local network, intranet, peer-to-peer infrastructure, information sharingAnomaly detection, DDoS attacks, deep learning, machine learning, Internet of Things, intrusion detection system.