IJATCA solicits original research papers for the January – 2026 Edition.
Last date of manuscript submission is January 30, 2026.
In today’s world which is getting digitalized day by day and the data is increasing exponentially it becomes very important to check for the data security and privacy. As with the increasing data, the threat to that data is also increasing at the same rate. The data which is getting uploaded on the internet or any other network needs to be safe for the sake of the company’s private data or for the people who are using that network. In this paper the authors had discussed the various types of attacks, threats on the network from which the company or an individual needs to be careful to protect the company from any malicious activity. This paper also explores the various security measures to protect the data and offer proper security and privacy to it.
L.Devi, S.P.Shantharajah, “A Survey on Authentication and security maintenance in wireless sensor network”, Vol.4 Issue.5, pp 53-70, May-2015
M. Li, W. Lou, and K. Ren, \"Data security and privacy in wireless body area networks,\" in IEEE Wireless Communications, vol. 17, no. 1, pp. 51-58, February 2010
K. Zeng, K. Govindan, and P. Mohapatra, \"Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks],\" in IEEE Wireless Communications, vol. 17, no. 5, pp. 56-62, October 2010
SattarovaFeruza Y. and Prof. Tao-hoon Kim, “IT Security Review: Privacy, Protection, Access Control, Assurance and System Security,” International Journal of Multimedia and Ubiquitous Engineering Vol. 2, No. 2, pp. 17-32 April 2007
Arpna Dhingra, S Mittal, H Kaur, A Singh “A Review on Techniques of Spam Classification in Twitter,” International Journal of Advanced Trends in Computer Applications (IJATCA) Volume 1, Number 5, May 2015, pp. 57-59 ISSN: 2395-3519
Adrian Perrig, John Stankovic, David Wagner, “Security in wireless sensor networks,” Volume 47, Number 6, pp 53-57, 2004
Shailja Pandey, ” Modern Network Security: Issues And Challenges”, Vol. 3, Uttar Pradesh Technical University, 2011
Network security, virtual private network, network access control, firewall.
IJATCA is fuelled by a highly dispersed and geographically separated team of dynamic volunteers. IJATCA calls volunteers interested to contribute towards the scientific development in the field of Computer Science.