International Journal of Computer Networks & Communications (IJCNC)


International Journal of Network Security & Its Applications (IJNSA)

ISSN 0974 – 9330 (Online); 0975 – 2307 (Print)

November 2022, Volume 14, Number 6

Turning the Disruptive Power of Blockchain in the Insurance Market into Innovative Opportunities Full Text
Wadnerson Boileau, University of South Florida (USF), USA
A Resource-Efficient Collaborative System for DDOS Attack Detection and Victim Identification Full Text
Fei Wang, Zhenxing Li and Xiaofeng Wang, National University of Defense Technology, China
A Framework for the Detection of Banking Trojans in Android Full Text
Subarna Adhikari, Sushil Nepal and Rabindra Bista, Kathmandu University, Nepal

September 2022, Volume 14, Number 5

Encryption Modes Identification of Block Ciphers based on Machine Learning Full Text
Ruiqi Xia1, Manman Li2 and Shaozhen Chen21Information Engineering University, China, 2State Key Laboratory of Mathematical Engineering and Advanced Computing, Kexue Avenue, China

A Comprehensive Survey of Phishing Attacks and Defences: Human Factors, Training and the Role of Emotions Full Text
Mousa Jari, Newcastle University, UK & King Saud University, Saudi Arabia
Survey of United States Related Domains: Secure Network Protocol Analysis Full Text
DeJean Dunbar, Patrick Hill, and Yu-Ju Lin, Charleston Southern University, USA

Future Ready Banking with Smart Contracts – CBDC and Impact on the Indian Economy Full Text
Bibhu Dash1, Meraj F. Ansari1, Pawankumar Sharma1 and Swati Swayam siddha21School of Computer and Information Sciences, USA, 2KIIT University, India
An Extended Security Measurement Framework for Open-Source Enterprise Resource Planning Software Security Full Text
Jane Wanjiru Njuki, Geoffrey Muchiri Muketha and John Gichuki Ndia, Murang’a University of Technology, Kenya

July 2022, Volume 14, Number 4

An Efficient Deep Learning Approach for Network Intrusion Detection System on Software Defined Network Full Text
Mhmood Radhi Hadi and Adnan Saher Mohammed, Karabuk University, Turkey
Reputation-Based Consensus for Blockchain Technology in Smart Grid Full Text
Tuan Nguyen Kim1, Ha Nguyen Hoang2 and Nguyen Tran Truong Thien11Duy Tan University, Vietnam, 2University of Sciences, Hue University, Vietnam
Distributed Denial of Service Attack Detection and Prevention Model for IoT based Computing Environment using Ensemble Machine Learning Approach Full Text
Angel R. Otero, Florida Institute of Technology, USA

May 2022, Volume 14, Number 3

An Evaluation of Security in Blockchain-based Sharing of Student Records in Higher Education Full Text
Timothy Arndt1, Angela Guercio2 and Younghun Chae21Cleveland State University, USA, 2Kent State University at Stark, USA
Detecting Malware in Portable Executable Files using Machine Learning Approach Full Text
Tuan Nguyen Kim1, Ha Nguyen Hoang2 and Nguyen Tran Truong Thien11Duy Tan University, Vietnam, 2University of Sciences, Hue University, Vietnam
Blockchain Security : Enhanced Control Evaluation Approach to Protect Organizations’ Accounting Information Full Text
Angel R. Otero, Florida Institute of Technology, USA
Cyber Security of Smart Watches : A Review of the Vulnerabilities with Recommendations Presented to Protect the Wearables Full Text
Aaron James Webb, Macquarie University, Australia

Context-Aware Security Mechanism for Mobile Cloud Computing Full Text
Cláudio Aroucha and Higo Felipe Pires, Federal University of Maranhão, Brazil

March 2022, Volume 14, Number 2

An Efficient Secure Cryptography Scheme for New ML-based RPL Routing Protocol in Mobile IoT Environment Full Text
Kishore Golla and S. PallamSetty, Andhra University, India
The Effectiveness of Applying Different Strategies on Recognition and Recall Textual Password Full Text
Hassan Wasfi and Richard Stone, Iowa State University, USA
Hybridized Model for Data Security Based on Security Hash Analysis (SHA 512) and Salting Techniques Full Text
Felix Aranuwa1, Ford Olubodun2 and David Akinwumi1, 1Adekunle Ajasin University, Nigeria, 2Auchi Polytechnic, Nigeria

January 2022, Volume 14, Number 1

A Robust Cybersecurity Topic Classification Tool Full Text
Elijah Pelofske1, Lorie M. Liebrock1 and Vincent Urias21New Mexico Institute of Mining and Technology, USA,2Sandia National Laboratories, New Mexico, USA
Enablers to Boost Blockchain Adoption in EU Full Text
Artemis Voulkidis1, Theodore Zahariadis1, 2, Andreas Papadakis3 and Charalambos Ipektsidis41Synelixis SA, Greece,2National and Kapodistrian University of Athens, Greece, 3School of Pedagogical and Technological Education(ASPETE), Greece, 4Intrasoft International SA, Luxembourg
Offline Signature Recognition via Convolutional Neural Network and Multiple Classifiers Full Text
Fadi Mohammad Alsuhimat and Fatma Susilawati Mohamad, Universiti Sultan Zainal Abidin, Malaysia
A Secure DNA Cryptosystem based on Steganography and Indexing Cipher Full Text
Tamer Barakat1, Nahed Mahmoud1, Ihab. A. Ali2 and Mohamed Hamdi11Fayoum University, Egypt, 2Helwan University, Egypt

November 2021, Volume 13, Number 6

Detection Method for Classifying Malicious Firmware Full Text
David Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA

Malicious Javascript Detection based on Clustering Techniques Full Text
Nguyen Hong Son1 and Ha Thanh Dung2, 1Faculty of Information Technology Posts and Telecommunications Institute of Technology, Vietnam, 2Saigon University, Vietnam

Understanding Traffic Patterns of Covid-19 IoC in Huge Academic Backbone Network SINET Full Text
Ruo Ando1, Youki Kadobayashi2, Hiroki Takakura1 and Hiroshi Itoh3, 1National Institute of Informatics, Japan,2Nara Institute of Science and Technology, Japan, 3National Institute of Information and Communications Technology, Japan

Improving Security and Fairness in Federated Learning Systems Full Text
Andrew R. Short1, Τheofanis G. Orfanoudakis2 and Helen C. Leligou1, 1University of West Attica, Greece,
2Hellenic Open University, Greece

Improve Security in Smart Cities Based on IoT, Solve Cyber Electronic Attacks with Technology by using Packet Tracer Full Text
Raed Al-hamarneh, University of Almaarefa, Kingdom of Saudi Arabia

System End-User Actions as a Threat to Information System Security Full Text
Paulus Kautwima, Titus Haiduwa, Kundai Sai, Valerianus Hashiyana and Nalina Suresh, University of Namibia, Namibia

Information and Communication Security Mechanisms For Microservices-based Systems Full Text
Lenin Leines-Vite, Juan Carlos Pérez-Arriaga and Xavier Limón, Universidad Veracruzana, Mexico

Comparative Review of Malware Analysis Methodologies Full Text
Ioannis G. Kiachidis and Dimitrios A. Baltatzis, International Hellenic University, Greece

Can Blockchain be a Solution to IoT Technical and Security Issues Full Text
Adanma Cecilia Eberendu1, Titus Ifeanyi Chinebu2, 1Madonna University, Nigeria, 2Federal College of Dental Technology and Therapy, Nigeria

September 2021, Volume 13, Number 5

Evaluation of a Blockchain-Enabled Resource Management Mechanism for NGNs Full Text
Michael Xevgenis, Dimitrios G. Kogias, Ioannis Christidis, Charalampos Patrikakis and Helen C. Leligou, University of West Attica, Greece
Secure Blockchain Decentralized Voting for Verified Users Full Text
Piotr Pospiech, Aleksander Marianski and Michal Kedziora, Wroclaw University of Science and Technology, Poland

July 2021, Volume 13, Number 4

Use of MARKOV Chain for Early Detecting DDoS Attacks Full Text
Chin-Ling Chen1 and Jian-Ming Chen21National Pingtung University, Taiwan, 2Genesis Technology, Inc., Taiwan
Constructing the 2-Element AGDS Protocol based on the Discrete Logarithm Problem Full Text
Tuan Nguyen Kim1, Duy Ho Ngoc2 and Nikolay A. Moldovyan31Duy Tan University, Vietnam, 2Ha Noi, Vietnam,
3St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia
Proof-of-Reputation: An Alternative Consensus Mechanism for Blockchain Systems Full Text
Oladotun Aluko1 and Anton Kolonin21Novosibirsk State University, Russia, 2Aigents Group, Russia
Critical Infrastructure Cybersecurity Challenges: IoT in Perspective Full Text
Akwetey Henry Matey1, Paul Danquah2, Godfred Yaw Koi-Akrofi1 and Isaac Asampana11University of
Professional Studies Accra, 2Heritage Christian University
Collective Signature Protocols for Signing Groups based on Problem of Finding Roots Modulo Large Prime Number Full Text
Tuan Nguyen Kim1, Duy Ho Ngoc2 and Nikolay A. Moldovyan31Duy Tan University, Vietnam, 2Ha Noi, Vietnam,
3St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia

May 2021, Volume 13, Number 3

Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks Full Text
David A. Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA
Effect Man-In the Middle on the Network Performance in Various Attack Strategies Full Text
Iyas Alodat, Jerash University, Jordan
Information-Centric Blockchain Technology for the Smart Grid Full Text
Lanqin Sang and Henry Hexmoor, Southern Illinois University, USA
A Survey on Federated Identity Management Systems Limitation and Solutions Full Text
Maha Aldosary and Norah Alqahtani, Imam Mohammad Ibn Saud Islamic University, KSA

March 2021, Volume 13, Number 2

Comparison of Malware Classification Methods using Convolutional Neural Network based on API Call Stream Full Text
Matthew Schofield, Gulsum Alicioglu, Bo Sun, Russell Binaco, Paul Turner, Cameron Thatcher, Alex Lam and
Anthony Breitzman, Rowan University, USA
Performance Evaluation of Machine Learning Techniques for DOS Detection in Wireless Sensor Network Full Text
Lama Alsulaiman and Saad Al-Ahmadi, King Saud University, Saudi Arabia
Applying the Health Belief Model to Cardiac Implanted Medical Device Patients Full Text
George W. Jackson1 and Shawon Rahman21Capella University, USA, 2University of HawaiiHilo, USA
A Literature Survey and Analysis on Social Engineering Defense Mechanisms and Infosec Policies Full Text
Dalal Alharthi and Amelia Regan, University of California Irvine, USA
Phishing Mitigation Techniques: A Literature Survey Full Text
Wosah Peace Nmachi and Thomas Win, School of Computing & Engineering University of Gloucestershire, United Kingdom

January 2021, Volume 13, Number 1

Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms Full Text
William R. Simpson and Kevin E. Foltz, The Institute for Defense Analyses (IDA), USA
Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset Full Text
Geeta Kocher1 and Gulshan Kumar21MRSPTU, India, 2SBSSTC, India
Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis Full Text
Anna Georgiadou, Spiros Mouzakitis and Dimitris Askounis, National Technical University of Athens, Greece
Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys Full Text
Cheman Shaik, VISH Consulting Services Inc, USA
Game Theory Application Resources Management and Distribution in Blockchain Network Full Text
Cong Hung Tran1, Dien Tam Le1, 2, Thanh Hieu Huynh31Posts and Telecommunications Institute of Technology, Vietnam,
2Thu Duc Technology College, Vietnam, 3Saigon University, Vietnam

November 2020, Volume 12, Number 6

Hybrid Chaotic Method for Medical Images Ciphering Full Text
Seham Muawadh Ali Ebrahim, Modern Academy for Engineering and Information Technology, Egypt
The Brazilian Law on Personal Data Protection Full Text
Jonatas S. de Souza1, 2, Jair M. Abe1, Luiz A. de Lima1, 2 and Nilson A. de Souza2, 31Paulista University, São Paulo, Brazil,
2National Association of Data Privacy Professionals, ANPPD, Brazil, 3São Paulo State Supplementary Pension Foundation,

September 2020, Volume 12, Number 5

Secured AODV to Protect WSN Against Malicious Intrusion Full Text
Saad Al-Ahmadi and Abdulrahman Alseqyani, King Saud University, Saudi Arabia

July 2020,Volume 12, Number 4

Enhanced Authentication for Web-Based Security using Keystroke DynamicsFull Text
Siti Rahayu Selamat1, Teh Teck Guan2 and Robiah Yusof11Universiti Teknikal Malaysia Melaka, Malaysia,
2Infineon Technologies Melaka, Malaysia
A Proposed Model for Dimensionality Reduction to Improve the Classification Capability of Intrusion Protection SystemsFull Text
Hajar Elkassabi, Mohammed Ashour and Fayez Zaki, Mansoura University, Egypt
Effective Method for Managing Automation and Monitoring in Multi-cloud Computing: Panacea for Multi-cloud Security SnagsFull Text
Uchechukwu Emejeamara1, Udochukwu Nwoduh2 and Andrew Madu21IEEE Computer Society, Connecticut Section, USA,
2Federal Polytechnic Nekede, Nigeria

May 2020,Volume 12, Number 3

Ontology-based Model for Security Assessment: Predicting Cyberattacks through Threat Activity AnalysisFull Text
Pavel Yermalovich and Mohamed Mejri, Université Laval, Canada
Advanced Multimedia Platform based on Big Data and Artificial Intelligence Improving CybersecurityFull Text
Alessandro Massaro1*, Gaetano Panarosa1, Nicola Savino1, Simone Buonopane2 and Angelo Galiano1,
1Dyrecta Lab, IT Research Laboratory, Italy, 2Spacertron srl, Italy
An Empirical Analysis of Email Forensics ToolsFull Text
Ahmad Ghafarian, Ash Mady and Kyung Park, University of North Georgia, USA
PDMLP: Phishing Detection using Multilayer PerceptronFull Text
Saad Al-Ahmadi and Tariq Lasloum, King Saud University, Saudi Arabia

March 2020,Volume 12, Number 2

Security Consideration in Peer-to-peer Networks with A Case Study Application[ pdf ]
Nick Rahimi, Southern Illinois University, USA
Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dynamic Billing System
in Smart Grid Using Permissioned Blockchain
[ pdf ]
Ozgur Oksuz, Adiyaman University, Turkey
A Survey on Malware Detection and Analysis Tools[ pdf ]
Sajedul Talukder1 and Zahidur Talukder21Edinboro University, USA and 2University of Texas at Arlington, USA
An Enhanced User Authentication Framework in Cloud Computing[ pdf ]
Hasan Al-Refai, Khaldoun Batiha, Ahmad M. Al-Refai, Philadelphia University, Jordan

January 2020,Volume 12. Number 1

A Survey on the Use of Data Clustering for Intrusion Detection System in Cybersecurity[ pdf ]
Binita Bohara1, Jay Bhuyan1, Fan Wu1 and Junhua Ding2, 1Tuskegee University, USA and 2University of North Texas, USA

Self-organization and Autonomous Network Survey[ pdf ]
Houneida SAKLY, Campus University of Mannouba, Tunisia

November 2019, Volume 11. Number 6

Quality Assessment of Access Security Controls over Financial Information[ pdf ]
Angel R. Otero, Christian Sonnenberg and LuAnn Bean, Florida Institute of Technology, USA

September 2019, Volume 11. Number 5

Machine Learning in Network Security Using KNIME Analytics [ pdf ]
Munther Abualkibash, Eastern Michigan University, USA

EUNICERT: Ethereum Based Digital Certificate Verification System [ pdf ]
Trong Thua Huynh1, Dang-Khoa Pham21Posts and Telecommunications Institute of Technology, Vietnam and 2FPT Telecom, Vietnam

Map Reduce Implementation for Malicious Websites Classification [ pdf ]
Md Maminur Islam1, Subash Poudyal1 and Kishor Datta Gupta21University of Memphis, USA and 2Lamar University, USA

July 2019, Volume 11. Number 4

Authentication Mechanism Enhancement Utilising Secure Repository for Passwordless Handshake[ pdf ]
Ioannis A. Pikrammenos, Panagiotis Tolis and Panagiotis Perakis, University of Derby, Greece

A Chaotic Confusion-Diffusion Image Encryption Based on Henon Map [ pdf ]Ashraf Afifi, Taif University, Kingdom of Saudi Arabia

System Call Dependence Graph Based Behavior Decomposition of Android Applications[ pdf ]
Bin Zhao, Silicon Valley R&D Center, USA

A Novel Image Encryption Scheme with Huffman Encoding and Steganography Technique[ pdf ]
Manju Kumari1, Vipin Pawar2 and Pawan Kumar31YMCA University of Science and Technology, India, 2Deenbandhu
Chotu Ram University of Science and Technology, India and 3University of Delhi, India

Exploring Challenges and Opportunities in Cybersecurity Risk and Threat Communications Related to the Medical Internet of Things (MIOT)[ pdf ]
George W. Jackson, Jr.1 and Shawon S. M. Rahman21Capella University, USA and 2University of Hawaii-Hilo, USA

Generalized Legendre Polynomials for Support Vector Machines (SVMS) Classification[ pdf ]
Ashraf Afifi1 and E.A.Zanaty21Taif University, Kingdom of Saudi Arabia and 2Sohag University, Egypt

May 2019, Volume 11. Number 3

Enhancing the WordPress System: from Role to Attribute-Based Access Control
[ pdf ]
Lifeng Cao, Jia Ying Ou and Amirhossein Chinaei, York University, Canada
Classification Procedures for Intrusion Detection Based on KDD CUP 99 Data Set [pdf]
Shaker El-Sappagh, Ahmed Saad Mohammed and Tarek Ahmed AlSheshtawy, Benha University, Egypt
Xdoser, A Benchmarking Tool for System Load Measurement Using Denial of Service Features[pdf]
AKM Bahalul Haque, Rabeya Sultana, Mohammad Sajid Fahad , MD Nasif Latif and Md. Amdadul Bari,
North South University, Bangladesh
Multi-Layer Classifier for Minimizing False Intrusion [pdf]
Shaker El-Sappagh, Ahmed saad Mohammed and Tarek Ahmed AlSheshtawy, Benha University, Egypt
Methods Toward Enhancing RSA Algorithm : A Survey [pdf]
Shaheen Saad Al-Kaabi and Samir Brahim Belhaouari, Hamad Bin Khalifa University (HBKU), Qatar
Survey on Secure Routing in Vanets [pdf]
Afef Slama1 and Ilhem Lengliz2, 1University of Manouba, Tunisia and 2<,sup>Military Academy, Tunisia
A Combination of Temporal Sequence Learning and Data Description for Anomaly – based NIDS [pdf]
Nguyen Thanh Van1,2, Tran Ngoc Thinh1 and Le Thanh Sach1, 1Ho Chi Minh City University of Technology, VietNam and
2Ho Chi Minh City University of Technology and Education, VietNam

March 2019, Volume 11. Number 2

Performance Analysis of Routing Protocols in MANET Under Malicious Attacks
[ pdf ]
Gorine1 and Rabia Saleh, 1Gloucestershire University, England
Dual Security Using Image Steganography Based Matrix Partition [pdf]
Huda H.Al.Ghuraify, Ali A.Al-Bakry, Ahmad T. Al-Jayashi, al-furat al-awsat university, Iraq
A Review of Selected Proposals for Improving Identity Privacy in UMTS[pdf]
Hiten Choudhury, Cotton University, India
KVEFS: Encrypted File System Based on Distributed Key-Value Stores and FUSE [pdf]
Giau Ho Kim, Son Hai Le, Trung Manh Nguyen, Vu Thi Ly, Thanh Nguyen Kim, Nguyen Van Cuong, Thanh Nguyen Trung, and Ta Minh Thanh, Le Quy Don Technical University, Vietnam
Security & Privacy Threats, Attacks and Countermeasures in Internet of Things [pdf]
Faheem Masoodi1, Shadab Alam2 and Shams Tabrez Siddiqui2, 1University of Kashmir, India and 2Jazan University, KSA

January 2019, Volume 11. Number 1

Malware Detection Using Machine Learning Algorithms and Reverse Engineering of Android Java Code
[ pdf ]
Michal Kedziora, Paulina Gawin, Michal Szczepanik and Ireneusz Jozwiak, University of Science and Technology Wroclaw, Poland
A Light Weight Solution for Detecting De-Authentication Attack [pdf]
Rajinder Singh and Satish Kumar, PUSSGRC Hoshiarpur, Punjab, India
A Multi-Layer Arabic Text Steganographic Method Based on Letter Shaping [pdf]
A.F. Al Azzawi, Philadelphia University, Jordan
Performance Evaluation of Parallel International Data Encryption Algorithm on IMAN1 Super Computer [pdf]
Ahmad Bany Doumi and Mohammad Qatawneh, University of Jordan, Amman-Jordan
A Survey on Optimization Based Spectrum Sensing Techniques to Reduce ISI and PAPR In OFDM Based Cognitive Radio System [pdf]
1B.Maheswara Rao, 2S.Baskar, 1Research scholar and 2Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science
and Technology

November 2018, Volume 10. Number 6

A Multi-Layer Hybrid Text Steganography for Secret Communication Using Word Tagging and RGB Color Coding
[ pdf ]
Ali F. Al-Azzawi1, Philadelphia University, Jordan
Secure Third Party Auditor(TPA) for Ensuring Data Integrity in Fog Computing [pdf]
KashifMunir and Lawan A. Mohammed, University of Hafr Al Batin, KSA
IOT and Security-Privacy Concerns: A Systematic Mapping Study [pdf]
Moussa WITTI and Dimitri KONSTANTAS, Information Science Institute University of Geneva, Switzerland
Biometric Smartcard Authentication for Fog Computing [pdf]
Kashif Munir and Lawan A. Mohammed, University of Hafr Al Batin, KSA

September 2018, Volume 10. Number 5

Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions [ pdf ]
Nicholas J. Miller and Mehrdad Aliasgari, California State University Long Beach, USA
The Effect of Information Technology Using Enterprise Security Risk Management [pdf]
Michael O. Adekanye and Shawon S. M. Rahman, University of Hawaii-Hilo, USA
A Tiered Blockchain Framework for Vehicular Forensics [pdf]
Marcel C. Ugwu1, Izunna U. Okpala2, Collins I. Oham3 and Cosmas I. Nwakanma3, 1Seamfix Nigeria Limited, Nigeria,
2National Institute for Nigerian Languages, Nigeria and 3Federal University of Technology, Nigeria

July 2018, Volume 10. Number 4

Mining Patterns of Sequential Malicious APIs to Detect Malware [ pdf ]
Abdurrahman Pektas1, Elif Nurdan Pektas2 and Tankut Acarman1, 1Galatasaray University, Turkey and 2Siemens – Turkey, Turkey
A Method for Encrypting and Decrypting Wave Files [pdf]
Mohamad M. Al-laham, Mohamad a. Mai’iteh, Hasan Rashaideh and Ziad Al-Qadi, Al-Balqa Applied University, Jordan

May 2018, Volume 10. Number 3

The (In)Security of Topology Discovery in Openflow-Based Software Defined Network [ pdf ]
Talal Alharbi, Marius Portmann and Farzaneh Pakzad, The University of Queensland, Australia
Symmetric Key Management Scheme for Hierarchical Wireless Sensor Networks [pdf]
Mohammed A. Al-taha and Ra’ad A. Muhajjar, Basrah University, Iraq
Low Area FPGA Implementation of DROM-CSLA-QTL Architecture for Cryptographic Applications [pdf]
Shailaja A1 and Krishnamurthy G N1, 1VTU-RRC, India and 1BNM Institute of Technology, India
A Novel Approach of Image Steganography for Secret Communication Using Spacing Method [pdf]
Wa’el Ibrahim A. Almazaydeh1, H.S.Sheshadri1 and S.K.Padma2, 1P.E.S. College of Engineering, India and
2Sri Jayachamarajendra College of Engineering, India

March 2018, Volume 10. Number 2

Unconstrained Endpoint Security System : UEPTSS [ pdf ]
Fatema Bannat Wala and Chase Cotton, University of Delaware, USA
VANET Security and Privacy – An Overview [pdf]
Marvy B. Mansour1, Cherif Salama2, Hoda K. Mohamed3 and Sherif A. Hammad4, 1British University in Egypt, Egypt,
2,3Ain Shams University, Egypt and 4Avelabs, Germany

January 2018, Volume 10. Number 1

Click Spam Prevention Model for Online Advertisement [ pdf ]
Nicola Zingirian and Michele Benini, University of Padova, Italy
Protecting Privacy in VANETs Using Mix Zones with Virtual Pseudonym Change [pdf]
Belal Amro, Hebron University, Palestine

November 2017, Volume 9. Number 6

Effectiveness and Weakness of Quantified/Automated Anomaly Based IDs [ pdf ]
HidemaTanaka, National Defense Academy of Japan, Japan
Practical Approach for Securing Windows Environment : Attack Vectors and Countermeasures [pdf ]
Abdurrahman Pektaş1 and Ertuğrul Başaranoğlu2 , 1 Galatasaray University, Istanbul, Turkey and
2Ziraat Technology, Istanbul, Turkey
Predominance of Blowfish Over Triple Data Encryption Standard Symmetric Key Algorithm for Secure Integrated Circuits Using Verilog HDL [ pdf ]
V. Kumara Swamy1, and Prabhu Benakop2 1Sreenidhi Institute of Science and Technology, India , and 2 Indur Institute of Engineering and Technology, India
Feature Extraction and Feature Selection : Reducing Data Complexity with Apache Spark [pdf ]
Dimitrios Sisiaridis and Olivier Markowitch, Universite Libre de Bruxelles, Belgium
An Efficient Identity Based Authentication Protocol by Using Password [ pdf ]
Sanjeev Kumar Mandal and A R Deepti, Acharya Institute of Technology Bangalore, India

September 2017, Volume 9, Number 5

Architecture and Design of Micro Knowledge and Micro Medical Processing Units [ pdf ]
Shawon S. M. Rahman1 and Syed V. Ahamed2, 1University of Hawaii-Hilo, USA and 2City University of New York, USA
A Comparative Study of the Approach Provided for Preventing the Data Leakage [pdf ]
Kamaljeet Kaur1 Ishu Gupta2 and Ashutosh Kumar Singh2, 1Govt. Sr. Sec. School – Ambala, India and
2National Institute of Technology – Kurukshetra, India
Protocol Safety of VOIP Using the Cryptosystems Based on Elliptic Curve [ pdf ]
Layie Paul and Vivient Corneille Kamla, University of Ngaoundere, Cameroon

July 2017, Volume 9, Number 4

Performance Evaluation of J48 and Bayes Algorithms for Intrusion Detection System [ pdf ]
Uzair Bashir1 and Manzoor Chachoo2, 1Mewar University, India and 2University of Kashmir, India
Modelling Cyber Attacks [pdf]
Farida Chowdhury1 and Md Sadek Ferdous2, 1Shahjalal University of Science and Technology, Bangladesh and
2University of Southampton, UK
Node Authentication Using BLS Signature in Distributed PKI Based MANETS [ pdf ]
N Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, V. Ch. Venkaiah, and Y. V. Subba Rao, University of Hyderabad, India
Enhancing Efficiency of EAP-TTLS Protocol Through the Simultaneous Use of Encryption and Digital Signature Algorithms [ pdf ]
Seyed Milad Dejamfar and Sara Najafzadeh, Islamic Azad University, Iran
A Plain- Image Dependent Image Encryption Scheme using Half-Pixel-Level Interchange Permutation Operation [ pdf ]
Li Liu, Yucheng Chen and Ruisong Ye, Shantou University, China

May 2017, Volume 9, Number 3

A Conceptual Secure Blockchain- based Electronic Voting System [ pdf ]
Ahmed Ben Ayed , Colorado Technical University, USA
Enhancing Cyber Security of Online Accounts via a Novel Protocol and New Techniques [ pdf ]
Mehrdad Nourai and Haim Levkowitz , University of Massachusetts Lowell, USA

March 2017, Volume 9, Number 2

Metric for Evaluating Availability of an Information System : A Quantitative Approach Based on Component Dependency [ pdf ]
Suhail Qadir Mir1 and S.M.K. Quadri2, 1University of Kashmir, India and 2Jamia Millia Islamia, India
A Secure E-Medical Exemption System (E-MES): Jordan Case [ pdf ]
Heba N. Kamel, Mohammad A. Alia, Bara’aha. Al Saeq and Eman Abu Maria, Al Zaytoonah University of Jordan, Jordan

January 2017, Volume 9, Number 1

A Study on LEA and Seed Algorithms for Data Protection of Smartphone Based Disaster Notification System [ pdf ]
Jae Pil Lee, Jae Gwang Lee, Jun hyeon Lee, Ki-su Yoon and Jae Kwang Lee, Han Nam University, Korea
Application-Layer DDOS Detection Based on a One-Class Support Vector Machine [ pdf ]
Chuyu She1, 2, 3 , Wushao Wen1,2, Zaihua Lin1 and Kesong Zheng1, 1Sun Yat-Sen University, China, 2SYSU-CMU Shunde International Joint Research Institute, China and 3Guangdong University of Finance & Economics, China
A Survey on Security in Wireless Sensor Networks [ pdf ]
Waleed Al Shehri, King Abdul-Aziz University, Saudi Arabia

November 2016, Volume 8, Number 6

Steganalysis Algorithm for PNG Images Based on Fuzzy Logic Technique [ pdf ]
Jawaher alqahtani1, Daniyal Alghazzawi1 and Li Cheng2, 1King Adbulaziz University, Saudi Arabia and 2Chinese Academy of Sciences, China
A Mechanism for Early Detecting DDOS Attacks Based on M/G/R PS Queue [ pdf ]
Nguyen Hong Son, Post and Telecommunication Institute of Technology, Vietnam
A Bastion Mobile ID-Based Authentication Technique (BMBAT) [ pdf ]
Abdelmunem Abuhasan and Adwan Yasin, Arab American University, Palestine

September 2016, Volume 8, Number 5

A Hybrid Approach Combining Rule-Based and Anomaly-Based Detection Against DDoS Attacks [ pdf ]
Chin-Ling Chen1 and Hsin-Chiao Chen2, 1National Pingtung University, Taiwan and 2National Pingtung Institute of Commerce, Taiwan
Enhance RFID Security Against Brute Force Attack Based on Password Strength and Markov Model [ pdf ]
Adwan Yasin and Fadi AbuAlrub, Arab American University, Palestine
Color Image Encryption Based on Multiple Chaotic Systems [ pdf ]
Yuting Xi, Xing Zhang and Ruisong Ye, Shantou University, P. R. China

July 2016, Volume 8, Number 4

Proactive Detection of DDOS Attacks in Publish-Subscribe Networks [ pdf ]
Bander Alzahrani1, Vassilios Vassilakis2, Mohammed Alreshoodi3, Fawaz Alarfaj4 and Ahmed Alhindi5, 1King Abdulaziz University, Saudi Arabia, 2University of Brighton, United Kingdom, 3Qassim University, Saudi Arabia, 4Al Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia and 5Umm Al-Qura University, Saudi Arabia
Email Spam Classification Using Hybrid Approach of RBF Neural Network and Particle Swarm Optimization [ pdf ]
Mohammed Awad and Monir Foqaha, Arab American University, Palestine
Performance Analysis of the Neighbor Weight Trust Determination Algorithm in MANETs [ pdf ]
Ali Abu Romman1 and Hussein Al-Bahadili2, 1Princess Sumaya University for Technology, Jordan and 2University of Petra, Jordan
A Benchmark for Designing Usable and Secure Text-Based Captchas [ pdf ]
Suliman A. Alsuhibany, Qassim University, Saudi Arabia
An Intelligent Classification Model for Phishing Email Detection [ pdf ]
Adwan Yasin and Abdelmunem Abuhasan, Arab American University, Palestine

May 2016, Volume 8, Number 3

Using a Deep Understanding of Network Activities for Security Event Management [ pdf ]
Mona Lange1, Felix Kuhr2 and Ralf Moller1, 1Universitat zu Lubeck, Germany and 2Technical Universitat Hamburg-Harburg,
Wearable Technology Devices Security and Privacy Vulnerability Analysis [ pdf ]
Ke Wan Ching and Manmeet Mahinderjit Singh, University Sains Malaysia Penang, Malaysia
Y-Hamiltonian Layers Broadcast Algorithm [ pdf ]
Amnah El-Obaid and Nagham_Al-Madi, Zaytoonah University of Jordan, Jordan
Authentication Using Trust to Detect Misbehaving Nodes in Mobile Ad hoc Networks Using Q-Learning [ pdf ]
S.Sivagurunathan1, K.Prathapchandran1 and A.Thirumavalavan2, 1Gandhigram Rural Institute-Deemed University, India and 2Arignar Anna Government Arts College, India

March 2016, Volume 8, Number 2

Trends Toward Real-Time Network Data Steganography [ pdf ]
James Collins, Sos Agaian, The University of Texas at San Antonio, USA
Intrusion Detection System Using Discrete Fourier Transform with Window Function [ pdf ]
Yusuke Tsuge and HidemaTanaka, National Defense Academy of Japan, Japan
A Novel Charging and Accounting Scheme in Mobile Ad-Hoc Networks [ pdf ]
Inna Kofman1 and Nurul Huda2, 1University of Duesseldorf, Germany and 2Ryerson University, Canada
A Security Evaluation Framework for U.K. E-Government Services Agile Software Development [ pdf ]
Steve Harrison1,Antonis Tzounis2, Leandros Maglaras1, Francois Siewe1, Richard Smith1 and Helge Janicke1, 1De Montfort University, United Kingdom and 2University of Thessaly, Greece
Cascade Block Cipher Using Braiding/Entanglement of Spin Matrices and Bit Rotation [ pdf ]
D.Sravana Kumar1, P.Sirisha2 and CH. Suneetha3, 1Dr. V.S. Krishna Government Degree College, India, 2Indian Maritime University, India and 3GITAM University, India
The Internet of Things : New Interoperability, Management and Security Challenges [ pdf ]
Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung, Western Sydney University, Australia
Design and Implementation of the Advanced Cloud Privacy Threat Modeling [ pdf ]
Ali Gholami1, Anna-Sara Lind2, Jane Reichel2, Jan-Eric Litton3, Ake Edlund1, Erwin Laure1, 1KTH Royal Institute of Technology, Sweden,2Uppsala University, Sweden and 3Karolinska Institutet, Sweden

January 2016, Volume 8, Number 1

Limiting Self-Propagating Malware Based On Connection Failure Behavior Through Hyper-Compact Estimators [ pdf ]
You Zhou1, Yian Zhou1, Shigang Chen1 and O. Patrick Kreidl2, 1University of Florida, USA and 2University of North Florida, USA
Employee Trust Based Industrial Device Deployment and Initial Key Establishment [ pdf ]
Apala Ray1,2 and Johan Akerberg2,3and Mats Bjorkman3 and Mikael Gidlund4, 1ABB Corporate Research- Bangalore, India,2Malardalen University, Sweden, 3ABB Corporate Research-Vasteras, Sweden and 4Mid Sweden University, Sundsvall, Sweden
A Security Strategy against STEAL-AND-PASS Credential Attacks [ pdf ]
Juan Ceballos, Security Consulting & Engineering, T-Systems International, Germany
Big Data Security and Privacy Issues in the CLOUD [ pdf ]
Ali Gholami and Erwin Laure, KTH- Royal Institute of Technology, Sweden

November 2015, Volume 7, Number 6

A Novel Evaluation Approach to Finding Lightweight Machine Learning Algorithms for Intrusion Detection in Computer Network [Pdf]
Yuchen Wang1, Shuxiang Xu2 and Qiongfang Huang1, 1Zhejiang University of Technology, China and 2University of Tasmania, Australia
A Machine Learning Approach to Anomaly-Based Detection on Android Platforms [ Pdf ]
Joshua Abah, Waziri O.V, Abdullahi M.B, Arthur U.M and Adewale O.S, Federal University of Technology Minna, Nigeria
A System for Validating and Comparing Host-Based Ddos Detection Mechanisms [ Pdf ]
Nguyen Hong Son, Post and Telecommunication Institute of Technology, Viet Nam

September 2015, Volume 7, Number 5

ANDROINSPECTOR: A System for Comprehensive Analysis of Android Applications [ Pdf ]
Babu Rajesh V, Phaninder Reddy, Himanshu P and Mahesh U Patil, Centre for Development of Advanced Computing, India
Improved Steganographic Security by Applying an Irregular Image Segmentation and Hybrid Adaptive Neural Networks With Modified Ant Colony Optimization [ Pdf ]
Nameer N. El. Emam1 and Kefaya S. Qaddoum2, 1Philadelphia University, Jordan and 2Warwick University, UK
An Intellect Learning on E-Mail Security and Fraud, Spam and Phishing [ Pdf ]
P.S.Jagadeesh Kumar, S.Meenakshi Sundaram and Ranjeet Kumar, Don Bosco Institute of Technology, India

July 2015, Volume 7, Number 4

Deterring Hacking Strategies via Targeting Scanning Properties [ Pdf ]
Saad Alsunbul1,2, Phu Dung Le1, Jefferson Tan1, 1Monash University, Australia and 2King Abdullaziz for Science and Technology, Saudi Arabia
Providing End-To-End Secure Communications in GSM Networks [ Pdf ]
Heshem A.El Zouka, Arab Academy for Science & Technology and Maritime Transport, Egypt

May 2015, Volume 7, Number 3

Security Challenges as a Factor Affecting the Security of Manet: Attacks and Security Solutions [ Pdf ]
Nabeel Zanoon1, Nashat Albdour2, Hatem S. A. Hamatta1 and Rasha Moh’d Al-Tarawneh1, 1Al-Balqa Applied University, Jordan and2Tafila Technical University, Jordan
An ANN Approach for Network Intrusion Detection using Entropy based Feature Selection [ Pdf ]
AshalataPanigrahi and ManasRanjanPatra, Berhampur University, India
A Performance Evaluation Of Common Encryption Techniques With Secure Watermark System (Sws) [ Pdf ]
Ashraf Odeh1, Shadi R.Masadeh1 and Ahmad Azzazi2, 1Isra University, Jordan and 2Applied Science University, Jordan
Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channel In Secured Communication [ Pdf ]
Anjan K1, Srinath N K1 and Jibi Abraham2, 1R V College of Engineering, India and 2College of Engineering Pune, India

March 2015, Volume 7, Number 2

Exploiting Rhetorical Relations to Multiple Documents Text Summarization [ Pdf ]
N.Adilah Hanin Zahri1, Fumiyo Fukumoto2, Matsyoshi Suguru2 and Ong Bi Lynn1, 1University of Malaysia Perlis, Malaysia and2University of Yamanashi, Japan
An Interactive Visualization Tool for Animating Behavior of Cryptographic Protocols [ Pdf ]
Mabroka Maeref1, Fatma Algali1, Ahmed Patel2 and Zarina Shukur2, 1Sebha University Libya and 2The National University of Malaysia, Malaysia
A New Image Steganography Algorithm Based on MLSB Method with Random Pixels Selection [ Pdf ]
Odai M.Al-Shatanawi and Nameer N.El.Emam, Philadelphia University, Jordan
Certificate Less Key Management Scheme in Manet Using Threshold Cryptography [ Pdf ]
Shaheena Khatoonand Balwant Singh Thakur, Pt.Ravishankar Shukla University, India
Comprehensive Survey of Possible Security Issues on 4G Networks [ Pdf ]
Sumant Ku Mohapatra, Biswa Ranjan Swain and Pravanjan Das, Trident Academy of Technology, India

January 2015, Volume 7, Number 1

Multi-Facet Trust Model for Online Social Network Environment [ Pdf ]
Liu Ban Chieng1, Manmeet Mahinderjit Singh1, Zarul Fitri Zaaba1 and Rohail Hassan2, 1University Sains Malaysia, Malaysia and2Universiti Teknologi Petronas, Malaysia
Accessing Secured Data in Cloud Computing Environment [ Pdf ]
Hasan Omar Al-Sakran, King Saud University, Saudi Arabia
Service Oriented Configuration Management of ‎Software ‎Architecture [ Pdf ]
Razie Alidoosti, Shahrouz Moaven and Jafar Habibi, Sharif University of Technology, Iran
Runtime Potential Updater File(S) Identification: Does Your Software Updates Automatically With Application Whitelisting? [ Pdf ]
Janardhan Reddy, Amit Kumar Jha and Sandeep Romana, Centre for Development of Advanced Computing, India
Strong Zero-Knowledge Authentication Based on the Session Keys (SASK) [ Pdf ]
Younes ASIMI, Abdellah AMGHAR, Ahmed ASIMI and Yassine SADQI, Laboratoire des Systemes informatiques et Vision (LabSiV), Morocco
A New Secret Handshakes Scheme with Dynamic Matching Based on ZSS [ Pdf ]
Preeti Kulshrestha and Arun Kumar Pal, G.B. Pant University of Agriculture and Technology, India
A New DNA Based Approach of Generating Key-Dependent Shift Rows Transformation [ Pdf ]
Auday H. Al-Wattar, Ramlan Mahmod, Zuriati Ahmad Zukarnain and Nur Izura Udzir, Universiti Putra Malaysia, Malaysia

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: