ISSN 0974 – 9330 (Online); 0975 – 2307 (Print)
http://airccse.org/journal/ijnsa.html
November 2022, Volume 14, Number 6
Turning the Disruptive Power of Blockchain in the Insurance Market into Innovative Opportunities Full Text Wadnerson Boileau, University of South Florida (USF), USA |
A Resource-Efficient Collaborative System for DDOS Attack Detection and Victim Identification Full Text Fei Wang, Zhenxing Li and Xiaofeng Wang, National University of Defense Technology, China |
A Framework for the Detection of Banking Trojans in Android Full Text Subarna Adhikari, Sushil Nepal and Rabindra Bista, Kathmandu University, Nepal |
September 2022, Volume 14, Number 5
Encryption Modes Identification of Block Ciphers based on Machine Learning Full Text Ruiqi Xia1, Manman Li2 and Shaozhen Chen2, 1Information Engineering University, China, 2State Key Laboratory of Mathematical Engineering and Advanced Computing, Kexue Avenue, China A Comprehensive Survey of Phishing Attacks and Defences: Human Factors, Training and the Role of Emotions Full Text Mousa Jari, Newcastle University, UK & King Saud University, Saudi Arabia |
Survey of United States Related Domains: Secure Network Protocol Analysis Full Text DeJean Dunbar, Patrick Hill, and Yu-Ju Lin, Charleston Southern University, USA Future Ready Banking with Smart Contracts – CBDC and Impact on the Indian Economy Full Text Bibhu Dash1, Meraj F. Ansari1, Pawankumar Sharma1 and Swati Swayam siddha2, 1School of Computer and Information Sciences, USA, 2KIIT University, India |
An Extended Security Measurement Framework for Open-Source Enterprise Resource Planning Software Security Full Text Jane Wanjiru Njuki, Geoffrey Muchiri Muketha and John Gichuki Ndia, Murang’a University of Technology, Kenya |
July 2022, Volume 14, Number 4
An Efficient Deep Learning Approach for Network Intrusion Detection System on Software Defined Network Full Text Mhmood Radhi Hadi and Adnan Saher Mohammed, Karabuk University, Turkey |
Reputation-Based Consensus for Blockchain Technology in Smart Grid Full Text Tuan Nguyen Kim1, Ha Nguyen Hoang2 and Nguyen Tran Truong Thien1, 1Duy Tan University, Vietnam, 2University of Sciences, Hue University, Vietnam |
Distributed Denial of Service Attack Detection and Prevention Model for IoT based Computing Environment using Ensemble Machine Learning Approach Full Text Angel R. Otero, Florida Institute of Technology, USA |
An Evaluation of Security in Blockchain-based Sharing of Student Records in Higher Education Full Text Timothy Arndt1, Angela Guercio2 and Younghun Chae2, 1Cleveland State University, USA, 2Kent State University at Stark, USA |
Detecting Malware in Portable Executable Files using Machine Learning Approach Full Text Tuan Nguyen Kim1, Ha Nguyen Hoang2 and Nguyen Tran Truong Thien1, 1Duy Tan University, Vietnam, 2University of Sciences, Hue University, Vietnam |
Blockchain Security : Enhanced Control Evaluation Approach to Protect Organizations’ Accounting Information Full Text Angel R. Otero, Florida Institute of Technology, USA |
Cyber Security of Smart Watches : A Review of the Vulnerabilities with Recommendations Presented to Protect the Wearables Full Text Aaron James Webb, Macquarie University, Australia Context-Aware Security Mechanism for Mobile Cloud Computing Full Text Cláudio Aroucha and Higo Felipe Pires, Federal University of Maranhão, Brazil |
March 2022, Volume 14, Number 2
An Efficient Secure Cryptography Scheme for New ML-based RPL Routing Protocol in Mobile IoT Environment Full Text Kishore Golla and S. PallamSetty, Andhra University, India |
The Effectiveness of Applying Different Strategies on Recognition and Recall Textual Password Full Text Hassan Wasfi and Richard Stone, Iowa State University, USA |
Hybridized Model for Data Security Based on Security Hash Analysis (SHA 512) and Salting Techniques Full Text Felix Aranuwa1, Ford Olubodun2 and David Akinwumi1, 1Adekunle Ajasin University, Nigeria, 2Auchi Polytechnic, Nigeria |
January 2022, Volume 14, Number 1
A Robust Cybersecurity Topic Classification Tool Full Text Elijah Pelofske1, Lorie M. Liebrock1 and Vincent Urias2, 1New Mexico Institute of Mining and Technology, USA,2Sandia National Laboratories, New Mexico, USA |
Enablers to Boost Blockchain Adoption in EU Full Text Artemis Voulkidis1, Theodore Zahariadis1, 2, Andreas Papadakis3 and Charalambos Ipektsidis4, 1Synelixis SA, Greece,2National and Kapodistrian University of Athens, Greece, 3School of Pedagogical and Technological Education(ASPETE), Greece, 4Intrasoft International SA, Luxembourg |
Offline Signature Recognition via Convolutional Neural Network and Multiple Classifiers Full Text Fadi Mohammad Alsuhimat and Fatma Susilawati Mohamad, Universiti Sultan Zainal Abidin, Malaysia |
A Secure DNA Cryptosystem based on Steganography and Indexing Cipher Full Text Tamer Barakat1, Nahed Mahmoud1, Ihab. A. Ali2 and Mohamed Hamdi1, 1Fayoum University, Egypt, 2Helwan University, Egypt |
Detection Method for Classifying Malicious Firmware Full Text David Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA Malicious Javascript Detection based on Clustering Techniques Full Text Nguyen Hong Son1 and Ha Thanh Dung2, 1Faculty of Information Technology Posts and Telecommunications Institute of Technology, Vietnam, 2Saigon University, Vietnam Understanding Traffic Patterns of Covid-19 IoC in Huge Academic Backbone Network SINET Full Text Ruo Ando1, Youki Kadobayashi2, Hiroki Takakura1 and Hiroshi Itoh3, 1National Institute of Informatics, Japan,2Nara Institute of Science and Technology, Japan, 3National Institute of Information and Communications Technology, Japan Improving Security and Fairness in Federated Learning Systems Full Text Andrew R. Short1, Τheofanis G. Orfanoudakis2 and Helen C. Leligou1, 1University of West Attica, Greece, 2Hellenic Open University, Greece Improve Security in Smart Cities Based on IoT, Solve Cyber Electronic Attacks with Technology by using Packet Tracer Full Text Raed Al-hamarneh, University of Almaarefa, Kingdom of Saudi Arabia System End-User Actions as a Threat to Information System Security Full Text Paulus Kautwima, Titus Haiduwa, Kundai Sai, Valerianus Hashiyana and Nalina Suresh, University of Namibia, Namibia Information and Communication Security Mechanisms For Microservices-based Systems Full Text Lenin Leines-Vite, Juan Carlos Pérez-Arriaga and Xavier Limón, Universidad Veracruzana, Mexico Comparative Review of Malware Analysis Methodologies Full Text Ioannis G. Kiachidis and Dimitrios A. Baltatzis, International Hellenic University, Greece Can Blockchain be a Solution to IoT Technical and Security Issues Full Text Adanma Cecilia Eberendu1, Titus Ifeanyi Chinebu2, 1Madonna University, Nigeria, 2Federal College of Dental Technology and Therapy, Nigeria |
Evaluation of a Blockchain-Enabled Resource Management Mechanism for NGNs Full Text Michael Xevgenis, Dimitrios G. Kogias, Ioannis Christidis, Charalampos Patrikakis and Helen C. Leligou, University of West Attica, Greece |
Secure Blockchain Decentralized Voting for Verified Users Full Text Piotr Pospiech, Aleksander Marianski and Michal Kedziora, Wroclaw University of Science and Technology, Poland |
Use of MARKOV Chain for Early Detecting DDoS Attacks Full Text Chin-Ling Chen1 and Jian-Ming Chen2, 1National Pingtung University, Taiwan, 2Genesis Technology, Inc., Taiwan |
Constructing the 2-Element AGDS Protocol based on the Discrete Logarithm Problem Full Text Tuan Nguyen Kim1, Duy Ho Ngoc2 and Nikolay A. Moldovyan3, 1Duy Tan University, Vietnam, 2Ha Noi, Vietnam, 3St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia |
Proof-of-Reputation: An Alternative Consensus Mechanism for Blockchain Systems Full Text Oladotun Aluko1 and Anton Kolonin2, 1Novosibirsk State University, Russia, 2Aigents Group, Russia |
Critical Infrastructure Cybersecurity Challenges: IoT in Perspective Full Text Akwetey Henry Matey1, Paul Danquah2, Godfred Yaw Koi-Akrofi1 and Isaac Asampana1, 1University of Professional Studies Accra, 2Heritage Christian University |
Collective Signature Protocols for Signing Groups based on Problem of Finding Roots Modulo Large Prime Number Full Text Tuan Nguyen Kim1, Duy Ho Ngoc2 and Nikolay A. Moldovyan3, 1Duy Tan University, Vietnam, 2Ha Noi, Vietnam, 3St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia |
Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks Full Text David A. Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA |
Effect Man-In the Middle on the Network Performance in Various Attack Strategies Full Text Iyas Alodat, Jerash University, Jordan |
Information-Centric Blockchain Technology for the Smart Grid Full Text Lanqin Sang and Henry Hexmoor, Southern Illinois University, USA |
A Survey on Federated Identity Management Systems Limitation and Solutions Full Text Maha Aldosary and Norah Alqahtani, Imam Mohammad Ibn Saud Islamic University, KSA |
March 2021, Volume 13, Number 2
Comparison of Malware Classification Methods using Convolutional Neural Network based on API Call Stream Full Text Matthew Schofield, Gulsum Alicioglu, Bo Sun, Russell Binaco, Paul Turner, Cameron Thatcher, Alex Lam and Anthony Breitzman, Rowan University, USA |
Performance Evaluation of Machine Learning Techniques for DOS Detection in Wireless Sensor Network Full Text Lama Alsulaiman and Saad Al-Ahmadi, King Saud University, Saudi Arabia |
Applying the Health Belief Model to Cardiac Implanted Medical Device Patients Full Text George W. Jackson1 and Shawon Rahman2, 1Capella University, USA, 2University of HawaiiHilo, USA |
A Literature Survey and Analysis on Social Engineering Defense Mechanisms and Infosec Policies Full Text Dalal Alharthi and Amelia Regan, University of California Irvine, USA |
Phishing Mitigation Techniques: A Literature Survey Full Text Wosah Peace Nmachi and Thomas Win, School of Computing & Engineering University of Gloucestershire, United Kingdom |
November 2020, Volume 12, Number 6
Hybrid Chaotic Method for Medical Images Ciphering Full Text Seham Muawadh Ali Ebrahim, Modern Academy for Engineering and Information Technology, Egypt |
The Brazilian Law on Personal Data Protection Full Text Jonatas S. de Souza1, 2, Jair M. Abe1, Luiz A. de Lima1, 2 and Nilson A. de Souza2, 3, 1Paulista University, São Paulo, Brazil, 2National Association of Data Privacy Professionals, ANPPD, Brazil, 3São Paulo State Supplementary Pension Foundation, PREVCOM, Brazil |
Secured AODV to Protect WSN Against Malicious Intrusion Full Text Saad Al-Ahmadi and Abdulrahman Alseqyani, King Saud University, Saudi Arabia |
July 2020,Volume 12, Number 4
Enhanced Authentication for Web-Based Security using Keystroke DynamicsFull Text Siti Rahayu Selamat1, Teh Teck Guan2 and Robiah Yusof1, 1Universiti Teknikal Malaysia Melaka, Malaysia, 2Infineon Technologies Melaka, Malaysia |
A Proposed Model for Dimensionality Reduction to Improve the Classification Capability of Intrusion Protection SystemsFull Text Hajar Elkassabi, Mohammed Ashour and Fayez Zaki, Mansoura University, Egypt |
Effective Method for Managing Automation and Monitoring in Multi-cloud Computing: Panacea for Multi-cloud Security SnagsFull Text Uchechukwu Emejeamara1, Udochukwu Nwoduh2 and Andrew Madu2, 1IEEE Computer Society, Connecticut Section, USA, 2Federal Polytechnic Nekede, Nigeria |
May 2020,Volume 12, Number 3
Ontology-based Model for Security Assessment: Predicting Cyberattacks through Threat Activity AnalysisFull Text Pavel Yermalovich and Mohamed Mejri, Université Laval, Canada |
Advanced Multimedia Platform based on Big Data and Artificial Intelligence Improving CybersecurityFull Text Alessandro Massaro1*, Gaetano Panarosa1, Nicola Savino1, Simone Buonopane2 and Angelo Galiano1, 1Dyrecta Lab, IT Research Laboratory, Italy, 2Spacertron srl, Italy |
An Empirical Analysis of Email Forensics ToolsFull Text Ahmad Ghafarian, Ash Mady and Kyung Park, University of North Georgia, USA |
PDMLP: Phishing Detection using Multilayer PerceptronFull Text Saad Al-Ahmadi and Tariq Lasloum, King Saud University, Saudi Arabia |
Security Consideration in Peer-to-peer Networks with A Case Study Application[ pdf ] Nick Rahimi, Southern Illinois University, USA |
Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dynamic Billing System in Smart Grid Using Permissioned Blockchain[ pdf ] Ozgur Oksuz, Adiyaman University, Turkey |
A Survey on Malware Detection and Analysis Tools[ pdf ] Sajedul Talukder1 and Zahidur Talukder2, 1Edinboro University, USA and 2University of Texas at Arlington, USA |
An Enhanced User Authentication Framework in Cloud Computing[ pdf ] Hasan Al-Refai, Khaldoun Batiha, Ahmad M. Al-Refai, Philadelphia University, Jordan |
A Survey on the Use of Data Clustering for Intrusion Detection System in Cybersecurity[ pdf ]
Binita Bohara1, Jay Bhuyan1, Fan Wu1 and Junhua Ding2, 1Tuskegee University, USA and 2University of North Texas, USA
Self-organization and Autonomous Network Survey[ pdf ]
Houneida SAKLY, Campus University of Mannouba, Tunisia
Quality Assessment of Access Security Controls over Financial Information[ pdf ]
Angel R. Otero, Christian Sonnenberg and LuAnn Bean, Florida Institute of Technology, USA
Machine Learning in Network Security Using KNIME Analytics [ pdf ]
Munther Abualkibash, Eastern Michigan University, USA
EUNICERT: Ethereum Based Digital Certificate Verification System [ pdf ]
Trong Thua Huynh1, Dang-Khoa Pham2, 1Posts and Telecommunications Institute of Technology, Vietnam and 2FPT Telecom, Vietnam
Map Reduce Implementation for Malicious Websites Classification [ pdf ]
Md Maminur Islam1, Subash Poudyal1 and Kishor Datta Gupta2, 1University of Memphis, USA and 2Lamar University, USA
Authentication Mechanism Enhancement Utilising Secure Repository for Passwordless Handshake[ pdf ]
Ioannis A. Pikrammenos, Panagiotis Tolis and Panagiotis Perakis, University of Derby, Greece
A Chaotic Confusion-Diffusion Image Encryption Based on Henon Map [ pdf ]Ashraf Afifi, Taif University, Kingdom of Saudi Arabia
System Call Dependence Graph Based Behavior Decomposition of Android Applications[ pdf ]
Bin Zhao, JD.com Silicon Valley R&D Center, USA
A Novel Image Encryption Scheme with Huffman Encoding and Steganography Technique[ pdf ]
Manju Kumari1, Vipin Pawar2 and Pawan Kumar3, 1YMCA University of Science and Technology, India, 2Deenbandhu
Chotu Ram University of Science and Technology, India and 3University of Delhi, India
Exploring Challenges and Opportunities in Cybersecurity Risk and Threat Communications Related to the Medical Internet of Things (MIOT)[ pdf ]
George W. Jackson, Jr.1 and Shawon S. M. Rahman2, 1Capella University, USA and 2University of Hawaii-Hilo, USA
Generalized Legendre Polynomials for Support Vector Machines (SVMS) Classification[ pdf ]
Ashraf Afifi1 and E.A.Zanaty2, 1Taif University, Kingdom of Saudi Arabia and 2Sohag University, Egypt
Enhancing the WordPress System: from Role to Attribute-Based Access Control [ pdf ] Lifeng Cao, Jia Ying Ou and Amirhossein Chinaei, York University, Canada |
Classification Procedures for Intrusion Detection Based on KDD CUP 99 Data Set [pdf] Shaker El-Sappagh, Ahmed Saad Mohammed and Tarek Ahmed AlSheshtawy, Benha University, Egypt |
Xdoser, A Benchmarking Tool for System Load Measurement Using Denial of Service Features[pdf] AKM Bahalul Haque, Rabeya Sultana, Mohammad Sajid Fahad , MD Nasif Latif and Md. Amdadul Bari, North South University, Bangladesh |
Multi-Layer Classifier for Minimizing False Intrusion [pdf] Shaker El-Sappagh, Ahmed saad Mohammed and Tarek Ahmed AlSheshtawy, Benha University, Egypt |
Methods Toward Enhancing RSA Algorithm : A Survey [pdf] Shaheen Saad Al-Kaabi and Samir Brahim Belhaouari, Hamad Bin Khalifa University (HBKU), Qatar |
Survey on Secure Routing in Vanets [pdf] Afef Slama1 and Ilhem Lengliz2, 1University of Manouba, Tunisia and 2<,sup>Military Academy, Tunisia |
A Combination of Temporal Sequence Learning and Data Description for Anomaly – based NIDS [pdf] Nguyen Thanh Van1,2, Tran Ngoc Thinh1 and Le Thanh Sach1, 1Ho Chi Minh City University of Technology, VietNam and 2Ho Chi Minh City University of Technology and Education, VietNam |
Performance Analysis of Routing Protocols in MANET Under Malicious Attacks [ pdf ] Gorine1 and Rabia Saleh, 1Gloucestershire University, England |
Dual Security Using Image Steganography Based Matrix Partition [pdf] Huda H.Al.Ghuraify, Ali A.Al-Bakry, Ahmad T. Al-Jayashi, al-furat al-awsat university, Iraq |
A Review of Selected Proposals for Improving Identity Privacy in UMTS[pdf] Hiten Choudhury, Cotton University, India |
KVEFS: Encrypted File System Based on Distributed Key-Value Stores and FUSE [pdf] Giau Ho Kim, Son Hai Le, Trung Manh Nguyen, Vu Thi Ly, Thanh Nguyen Kim, Nguyen Van Cuong, Thanh Nguyen Trung, and Ta Minh Thanh, Le Quy Don Technical University, Vietnam |
Security & Privacy Threats, Attacks and Countermeasures in Internet of Things [pdf] Faheem Masoodi1, Shadab Alam2 and Shams Tabrez Siddiqui2, 1University of Kashmir, India and 2Jazan University, KSA |
Malware Detection Using Machine Learning Algorithms and Reverse Engineering of Android Java Code [ pdf ] Michal Kedziora, Paulina Gawin, Michal Szczepanik and Ireneusz Jozwiak, University of Science and Technology Wroclaw, Poland |
A Light Weight Solution for Detecting De-Authentication Attack [pdf] Rajinder Singh and Satish Kumar, PUSSGRC Hoshiarpur, Punjab, India |
A Multi-Layer Arabic Text Steganographic Method Based on Letter Shaping [pdf] A.F. Al Azzawi, Philadelphia University, Jordan |
Performance Evaluation of Parallel International Data Encryption Algorithm on IMAN1 Super Computer [pdf] Ahmad Bany Doumi and Mohammad Qatawneh, University of Jordan, Amman-Jordan |
A Survey on Optimization Based Spectrum Sensing Techniques to Reduce ISI and PAPR In OFDM Based Cognitive Radio System [pdf] 1B.Maheswara Rao, 2S.Baskar, 1Research scholar and 2Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology |
A Multi-Layer Hybrid Text Steganography for Secret Communication Using Word Tagging and RGB Color Coding [ pdf ] Ali F. Al-Azzawi1, Philadelphia University, Jordan |
Secure Third Party Auditor(TPA) for Ensuring Data Integrity in Fog Computing [pdf] KashifMunir and Lawan A. Mohammed, University of Hafr Al Batin, KSA |
IOT and Security-Privacy Concerns: A Systematic Mapping Study [pdf] Moussa WITTI and Dimitri KONSTANTAS, Information Science Institute University of Geneva, Switzerland |
Biometric Smartcard Authentication for Fog Computing [pdf] Kashif Munir and Lawan A. Mohammed, University of Hafr Al Batin, KSA |
Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions [ pdf ] Nicholas J. Miller and Mehrdad Aliasgari, California State University Long Beach, USA |
The Effect of Information Technology Using Enterprise Security Risk Management [pdf] Michael O. Adekanye and Shawon S. M. Rahman, University of Hawaii-Hilo, USA |
A Tiered Blockchain Framework for Vehicular Forensics [pdf] Marcel C. Ugwu1, Izunna U. Okpala2, Collins I. Oham3 and Cosmas I. Nwakanma3, 1Seamfix Nigeria Limited, Nigeria, 2National Institute for Nigerian Languages, Nigeria and 3Federal University of Technology, Nigeria |
Mining Patterns of Sequential Malicious APIs to Detect Malware [ pdf ] Abdurrahman Pektas1, Elif Nurdan Pektas2 and Tankut Acarman1, 1Galatasaray University, Turkey and 2Siemens – Turkey, Turkey |
A Method for Encrypting and Decrypting Wave Files [pdf] Mohamad M. Al-laham, Mohamad a. Mai’iteh, Hasan Rashaideh and Ziad Al-Qadi, Al-Balqa Applied University, Jordan |
The (In)Security of Topology Discovery in Openflow-Based Software Defined Network [ pdf ] Talal Alharbi, Marius Portmann and Farzaneh Pakzad, The University of Queensland, Australia |
Symmetric Key Management Scheme for Hierarchical Wireless Sensor Networks [pdf] Mohammed A. Al-taha and Ra’ad A. Muhajjar, Basrah University, Iraq |
Low Area FPGA Implementation of DROM-CSLA-QTL Architecture for Cryptographic Applications [pdf] Shailaja A1 and Krishnamurthy G N1, 1VTU-RRC, India and 1BNM Institute of Technology, India |
A Novel Approach of Image Steganography for Secret Communication Using Spacing Method [pdf] Wa’el Ibrahim A. Almazaydeh1, H.S.Sheshadri1 and S.K.Padma2, 1P.E.S. College of Engineering, India and 2Sri Jayachamarajendra College of Engineering, India |
Unconstrained Endpoint Security System : UEPTSS [ pdf ] Fatema Bannat Wala and Chase Cotton, University of Delaware, USA |
VANET Security and Privacy – An Overview [pdf] Marvy B. Mansour1, Cherif Salama2, Hoda K. Mohamed3 and Sherif A. Hammad4, 1British University in Egypt, Egypt, 2,3Ain Shams University, Egypt and 4Avelabs, Germany |
Click Spam Prevention Model for Online Advertisement [ pdf ] Nicola Zingirian and Michele Benini, University of Padova, Italy |
Protecting Privacy in VANETs Using Mix Zones with Virtual Pseudonym Change [pdf] Belal Amro, Hebron University, Palestine |
Effectiveness and Weakness of Quantified/Automated Anomaly Based IDs [ pdf ] HidemaTanaka, National Defense Academy of Japan, Japan |
Practical Approach for Securing Windows Environment : Attack Vectors and Countermeasures [pdf ] Abdurrahman Pektaş1 and Ertuğrul Başaranoğlu2 , 1 Galatasaray University, Istanbul, Turkey and 2Ziraat Technology, Istanbul, Turkey |
Predominance of Blowfish Over Triple Data Encryption Standard Symmetric Key Algorithm for Secure Integrated Circuits Using Verilog HDL [ pdf ] V. Kumara Swamy1, and Prabhu Benakop2 1Sreenidhi Institute of Science and Technology, India , and 2 Indur Institute of Engineering and Technology, India |
Feature Extraction and Feature Selection : Reducing Data Complexity with Apache Spark [pdf ] Dimitrios Sisiaridis and Olivier Markowitch, Universite Libre de Bruxelles, Belgium |
An Efficient Identity Based Authentication Protocol by Using Password [ pdf ] Sanjeev Kumar Mandal and A R Deepti, Acharya Institute of Technology Bangalore, India |
Architecture and Design of Micro Knowledge and Micro Medical Processing Units [ pdf ] Shawon S. M. Rahman1 and Syed V. Ahamed2, 1University of Hawaii-Hilo, USA and 2City University of New York, USA |
A Comparative Study of the Approach Provided for Preventing the Data Leakage [pdf ] Kamaljeet Kaur1 Ishu Gupta2 and Ashutosh Kumar Singh2, 1Govt. Sr. Sec. School – Ambala, India and 2National Institute of Technology – Kurukshetra, India |
Protocol Safety of VOIP Using the Cryptosystems Based on Elliptic Curve [ pdf ] Layie Paul and Vivient Corneille Kamla, University of Ngaoundere, Cameroon |
Performance Evaluation of J48 and Bayes Algorithms for Intrusion Detection System [ pdf ] Uzair Bashir1 and Manzoor Chachoo2, 1Mewar University, India and 2University of Kashmir, India |
Modelling Cyber Attacks [pdf] Farida Chowdhury1 and Md Sadek Ferdous2, 1Shahjalal University of Science and Technology, Bangladesh and 2University of Southampton, UK |
Node Authentication Using BLS Signature in Distributed PKI Based MANETS [ pdf ] N Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, V. Ch. Venkaiah, and Y. V. Subba Rao, University of Hyderabad, India |
Enhancing Efficiency of EAP-TTLS Protocol Through the Simultaneous Use of Encryption and Digital Signature Algorithms [ pdf ] Seyed Milad Dejamfar and Sara Najafzadeh, Islamic Azad University, Iran |
A Plain- Image Dependent Image Encryption Scheme using Half-Pixel-Level Interchange Permutation Operation [ pdf ] Li Liu, Yucheng Chen and Ruisong Ye, Shantou University, China |
A Conceptual Secure Blockchain- based Electronic Voting System [ pdf ] Ahmed Ben Ayed , Colorado Technical University, USA |
Enhancing Cyber Security of Online Accounts via a Novel Protocol and New Techniques [ pdf ] Mehrdad Nourai and Haim Levkowitz , University of Massachusetts Lowell, USA |
Metric for Evaluating Availability of an Information System : A Quantitative Approach Based on Component Dependency [ pdf ] Suhail Qadir Mir1 and S.M.K. Quadri2, 1University of Kashmir, India and 2Jamia Millia Islamia, India |
A Secure E-Medical Exemption System (E-MES): Jordan Case [ pdf ] Heba N. Kamel, Mohammad A. Alia, Bara’aha. Al Saeq and Eman Abu Maria, Al Zaytoonah University of Jordan, Jordan |
A Study on LEA and Seed Algorithms for Data Protection of Smartphone Based Disaster Notification System [ pdf ] Jae Pil Lee, Jae Gwang Lee, Jun hyeon Lee, Ki-su Yoon and Jae Kwang Lee, Han Nam University, Korea |
Application-Layer DDOS Detection Based on a One-Class Support Vector Machine [ pdf ] Chuyu She1, 2, 3 , Wushao Wen1,2, Zaihua Lin1 and Kesong Zheng1, 1Sun Yat-Sen University, China, 2SYSU-CMU Shunde International Joint Research Institute, China and 3Guangdong University of Finance & Economics, China |
A Survey on Security in Wireless Sensor Networks [ pdf ] Waleed Al Shehri, King Abdul-Aziz University, Saudi Arabia |
Steganalysis Algorithm for PNG Images Based on Fuzzy Logic Technique [ pdf ] Jawaher alqahtani1, Daniyal Alghazzawi1 and Li Cheng2, 1King Adbulaziz University, Saudi Arabia and 2Chinese Academy of Sciences, China |
A Mechanism for Early Detecting DDOS Attacks Based on M/G/R PS Queue [ pdf ] Nguyen Hong Son, Post and Telecommunication Institute of Technology, Vietnam |
A Bastion Mobile ID-Based Authentication Technique (BMBAT) [ pdf ] Abdelmunem Abuhasan and Adwan Yasin, Arab American University, Palestine |
A Hybrid Approach Combining Rule-Based and Anomaly-Based Detection Against DDoS Attacks [ pdf ] Chin-Ling Chen1 and Hsin-Chiao Chen2, 1National Pingtung University, Taiwan and 2National Pingtung Institute of Commerce, Taiwan |
Enhance RFID Security Against Brute Force Attack Based on Password Strength and Markov Model [ pdf ] Adwan Yasin and Fadi AbuAlrub, Arab American University, Palestine |
Color Image Encryption Based on Multiple Chaotic Systems [ pdf ] Yuting Xi, Xing Zhang and Ruisong Ye, Shantou University, P. R. China |
Proactive Detection of DDOS Attacks in Publish-Subscribe Networks [ pdf ] Bander Alzahrani1, Vassilios Vassilakis2, Mohammed Alreshoodi3, Fawaz Alarfaj4 and Ahmed Alhindi5, 1King Abdulaziz University, Saudi Arabia, 2University of Brighton, United Kingdom, 3Qassim University, Saudi Arabia, 4Al Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia and 5Umm Al-Qura University, Saudi Arabia |
Email Spam Classification Using Hybrid Approach of RBF Neural Network and Particle Swarm Optimization [ pdf ] Mohammed Awad and Monir Foqaha, Arab American University, Palestine |
Performance Analysis of the Neighbor Weight Trust Determination Algorithm in MANETs [ pdf ] Ali Abu Romman1 and Hussein Al-Bahadili2, 1Princess Sumaya University for Technology, Jordan and 2University of Petra, Jordan |
A Benchmark for Designing Usable and Secure Text-Based Captchas [ pdf ] Suliman A. Alsuhibany, Qassim University, Saudi Arabia |
An Intelligent Classification Model for Phishing Email Detection [ pdf ] Adwan Yasin and Abdelmunem Abuhasan, Arab American University, Palestine |
Using a Deep Understanding of Network Activities for Security Event Management [ pdf ] Mona Lange1, Felix Kuhr2 and Ralf Moller1, 1Universitat zu Lubeck, Germany and 2Technical Universitat Hamburg-Harburg, Germany |
Wearable Technology Devices Security and Privacy Vulnerability Analysis [ pdf ] Ke Wan Ching and Manmeet Mahinderjit Singh, University Sains Malaysia Penang, Malaysia |
Y-Hamiltonian Layers Broadcast Algorithm [ pdf ] Amnah El-Obaid and Nagham_Al-Madi, Zaytoonah University of Jordan, Jordan |
Authentication Using Trust to Detect Misbehaving Nodes in Mobile Ad hoc Networks Using Q-Learning [ pdf ] S.Sivagurunathan1, K.Prathapchandran1 and A.Thirumavalavan2, 1Gandhigram Rural Institute-Deemed University, India and 2Arignar Anna Government Arts College, India |
Trends Toward Real-Time Network Data Steganography [ pdf ] James Collins, Sos Agaian, The University of Texas at San Antonio, USA |
Intrusion Detection System Using Discrete Fourier Transform with Window Function [ pdf ] Yusuke Tsuge and HidemaTanaka, National Defense Academy of Japan, Japan |
A Novel Charging and Accounting Scheme in Mobile Ad-Hoc Networks [ pdf ] Inna Kofman1 and Nurul Huda2, 1University of Duesseldorf, Germany and 2Ryerson University, Canada |
A Security Evaluation Framework for U.K. E-Government Services Agile Software Development [ pdf ] Steve Harrison1,Antonis Tzounis2, Leandros Maglaras1, Francois Siewe1, Richard Smith1 and Helge Janicke1, 1De Montfort University, United Kingdom and 2University of Thessaly, Greece |
Cascade Block Cipher Using Braiding/Entanglement of Spin Matrices and Bit Rotation [ pdf ] D.Sravana Kumar1, P.Sirisha2 and CH. Suneetha3, 1Dr. V.S. Krishna Government Degree College, India, 2Indian Maritime University, India and 3GITAM University, India |
The Internet of Things : New Interoperability, Management and Security Challenges [ pdf ] Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung, Western Sydney University, Australia |
Design and Implementation of the Advanced Cloud Privacy Threat Modeling [ pdf ] Ali Gholami1, Anna-Sara Lind2, Jane Reichel2, Jan-Eric Litton3, Ake Edlund1, Erwin Laure1, 1KTH Royal Institute of Technology, Sweden,2Uppsala University, Sweden and 3Karolinska Institutet, Sweden |
Limiting Self-Propagating Malware Based On Connection Failure Behavior Through Hyper-Compact Estimators [ pdf ] You Zhou1, Yian Zhou1, Shigang Chen1 and O. Patrick Kreidl2, 1University of Florida, USA and 2University of North Florida, USA |
Employee Trust Based Industrial Device Deployment and Initial Key Establishment [ pdf ] Apala Ray1,2 and Johan Akerberg2,3and Mats Bjorkman3 and Mikael Gidlund4, 1ABB Corporate Research- Bangalore, India,2Malardalen University, Sweden, 3ABB Corporate Research-Vasteras, Sweden and 4Mid Sweden University, Sundsvall, Sweden |
A Security Strategy against STEAL-AND-PASS Credential Attacks [ pdf ] Juan Ceballos, Security Consulting & Engineering, T-Systems International, Germany |
Big Data Security and Privacy Issues in the CLOUD [ pdf ] Ali Gholami and Erwin Laure, KTH- Royal Institute of Technology, Sweden |
A Novel Evaluation Approach to Finding Lightweight Machine Learning Algorithms for Intrusion Detection in Computer Network [Pdf] Yuchen Wang1, Shuxiang Xu2 and Qiongfang Huang1, 1Zhejiang University of Technology, China and 2University of Tasmania, Australia |
A Machine Learning Approach to Anomaly-Based Detection on Android Platforms [ Pdf ] Joshua Abah, Waziri O.V, Abdullahi M.B, Arthur U.M and Adewale O.S, Federal University of Technology Minna, Nigeria |
A System for Validating and Comparing Host-Based Ddos Detection Mechanisms [ Pdf ] Nguyen Hong Son, Post and Telecommunication Institute of Technology, Viet Nam |
ANDROINSPECTOR: A System for Comprehensive Analysis of Android Applications [ Pdf ] Babu Rajesh V, Phaninder Reddy, Himanshu P and Mahesh U Patil, Centre for Development of Advanced Computing cdac.in, India |
Improved Steganographic Security by Applying an Irregular Image Segmentation and Hybrid Adaptive Neural Networks With Modified Ant Colony Optimization [ Pdf ] Nameer N. El. Emam1 and Kefaya S. Qaddoum2, 1Philadelphia University, Jordan and 2Warwick University, UK |
An Intellect Learning on E-Mail Security and Fraud, Spam and Phishing [ Pdf ] P.S.Jagadeesh Kumar, S.Meenakshi Sundaram and Ranjeet Kumar, Don Bosco Institute of Technology, India |
Deterring Hacking Strategies via Targeting Scanning Properties [ Pdf ] Saad Alsunbul1,2, Phu Dung Le1, Jefferson Tan1, 1Monash University, Australia and 2King Abdullaziz for Science and Technology, Saudi Arabia |
Providing End-To-End Secure Communications in GSM Networks [ Pdf ] Heshem A.El Zouka, Arab Academy for Science & Technology and Maritime Transport, Egypt |
Security Challenges as a Factor Affecting the Security of Manet: Attacks and Security Solutions [ Pdf ] Nabeel Zanoon1, Nashat Albdour2, Hatem S. A. Hamatta1 and Rasha Moh’d Al-Tarawneh1, 1Al-Balqa Applied University, Jordan and2Tafila Technical University, Jordan |
An ANN Approach for Network Intrusion Detection using Entropy based Feature Selection [ Pdf ] AshalataPanigrahi and ManasRanjanPatra, Berhampur University, India |
A Performance Evaluation Of Common Encryption Techniques With Secure Watermark System (Sws) [ Pdf ] Ashraf Odeh1, Shadi R.Masadeh1 and Ahmad Azzazi2, 1Isra University, Jordan and 2Applied Science University, Jordan |
Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channel In Secured Communication [ Pdf ] Anjan K1, Srinath N K1 and Jibi Abraham2, 1R V College of Engineering, India and 2College of Engineering Pune, India |
Exploiting Rhetorical Relations to Multiple Documents Text Summarization [ Pdf ] N.Adilah Hanin Zahri1, Fumiyo Fukumoto2, Matsyoshi Suguru2 and Ong Bi Lynn1, 1University of Malaysia Perlis, Malaysia and2University of Yamanashi, Japan |
An Interactive Visualization Tool for Animating Behavior of Cryptographic Protocols [ Pdf ] Mabroka Maeref1, Fatma Algali1, Ahmed Patel2 and Zarina Shukur2, 1Sebha University Libya and 2The National University of Malaysia, Malaysia |
A New Image Steganography Algorithm Based on MLSB Method with Random Pixels Selection [ Pdf ] Odai M.Al-Shatanawi and Nameer N.El.Emam, Philadelphia University, Jordan |
Certificate Less Key Management Scheme in Manet Using Threshold Cryptography [ Pdf ] Shaheena Khatoonand Balwant Singh Thakur, Pt.Ravishankar Shukla University, India |
Comprehensive Survey of Possible Security Issues on 4G Networks [ Pdf ] Sumant Ku Mohapatra, Biswa Ranjan Swain and Pravanjan Das, Trident Academy of Technology, India |
Multi-Facet Trust Model for Online Social Network Environment [ Pdf ] Liu Ban Chieng1, Manmeet Mahinderjit Singh1, Zarul Fitri Zaaba1 and Rohail Hassan2, 1University Sains Malaysia, Malaysia and2Universiti Teknologi Petronas, Malaysia |
Accessing Secured Data in Cloud Computing Environment [ Pdf ] Hasan Omar Al-Sakran, King Saud University, Saudi Arabia |
Service Oriented Configuration Management of Software Architecture [ Pdf ] Razie Alidoosti, Shahrouz Moaven and Jafar Habibi, Sharif University of Technology, Iran |
Runtime Potential Updater File(S) Identification: Does Your Software Updates Automatically With Application Whitelisting? [ Pdf ] Janardhan Reddy, Amit Kumar Jha and Sandeep Romana, Centre for Development of Advanced Computing, India |
Strong Zero-Knowledge Authentication Based on the Session Keys (SASK) [ Pdf ] Younes ASIMI, Abdellah AMGHAR, Ahmed ASIMI and Yassine SADQI, Laboratoire des Systemes informatiques et Vision (LabSiV), Morocco |
A New Secret Handshakes Scheme with Dynamic Matching Based on ZSS [ Pdf ] Preeti Kulshrestha and Arun Kumar Pal, G.B. Pant University of Agriculture and Technology, India |
A New DNA Based Approach of Generating Key-Dependent Shift Rows Transformation [ Pdf ] Auday H. Al-Wattar, Ramlan Mahmod, Zuriati Ahmad Zukarnain and Nur Izura Udzir, Universiti Putra Malaysia, Malaysia |