International Journal of Computer Networks & Communications (IJCNC)


International Journal of Network Security & Its Applications (IJNSA)

ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

November 2018, Volume 10. Number 6

A Multi-Layer Hybrid Text Steganography for Secret Communication Using Word Tagging and RGB Color Coding
[ pdf ]
Ali F. Al-Azzawi1, Philadelphia University, Jordan
Secure Third Party Auditor(TPA) for Ensuring Data Integrity in Fog Computing [pdf]
KashifMunir and Lawan A. Mohammed, University of Hafr Al Batin, KSA
IOT and Security-Privacy Concerns: A Systematic Mapping Study [pdf]
Moussa WITTI and Dimitri KONSTANTAS, Information Science Institute University of Geneva, Switzerland
Biometric Smartcard Authentication for Fog Computing [pdf]
Kashif Munir and Lawan A. Mohammed, University of Hafr Al Batin, KSA

September 2018, Volume 10. Number 5

Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions [ pdf ]
Nicholas J. Miller and Mehrdad Aliasgari, California State University Long Beach, USA
The Effect of Information Technology Using Enterprise Security Risk Management [pdf]
Michael O. Adekanye and Shawon S. M. Rahman, University of Hawaii-Hilo, USA
A Tiered Blockchain Framework for Vehicular Forensics [pdf]
Marcel C. Ugwu1, Izunna U. Okpala2, Collins I. Oham3 and Cosmas I. Nwakanma3, 1Seamfix Nigeria Limited, Nigeria,
2National Institute for Nigerian Languages, Nigeria and 3Federal University of Technology, Nigeria

July 2018, Volume 10. Number 4

Mining Patterns of Sequential Malicious APIs to Detect Malware [ pdf ]
Abdurrahman Pektas1, Elif Nurdan Pektas2 and Tankut Acarman1, 1Galatasaray University, Turkey and 2Siemens – Turkey, Turkey
A Method for Encrypting and Decrypting Wave Files [pdf]
Mohamad M. Al-laham, Mohamad a. Mai’iteh, Hasan Rashaideh and Ziad Al-Qadi, Al-Balqa Applied University, Jordan

May 2018, Volume 10. Number 3

The (In)Security of Topology Discovery in Openflow-Based Software Defined Network [ pdf ]
Talal Alharbi, Marius Portmann and Farzaneh Pakzad, The University of Queensland, Australia
Symmetric Key Management Scheme for Hierarchical Wireless Sensor Networks [pdf]
Mohammed A. Al-taha and Ra’ad A. Muhajjar, Basrah University, Iraq
Low Area FPGA Implementation of DROM-CSLA-QTL Architecture for Cryptographic Applications [pdf]
Shailaja A1 and Krishnamurthy G N1, 1VTU-RRC, India and 1BNM Institute of Technology, India
A Novel Approach of Image Steganography for Secret Communication Using Spacing Method [pdf]
Wa’el Ibrahim A. Almazaydeh1, H.S.Sheshadri1 and S.K.Padma2, 1P.E.S. College of Engineering, India and
2Sri Jayachamarajendra College of Engineering, India

March 2018, Volume 10. Number 2

Unconstrained Endpoint Security System : UEPTSS [ pdf ]
Fatema Bannat Wala and Chase Cotton, University of Delaware, USA
VANET Security and Privacy – An Overview [pdf]
Marvy B. Mansour1, Cherif Salama2, Hoda K. Mohamed3 and Sherif A. Hammad4, 1British University in Egypt, Egypt,
2,3Ain Shams University, Egypt and 4Avelabs, Germany

January 2018, Volume 10. Number 1

Click Spam Prevention Model for Online Advertisement [ pdf ]
Nicola Zingirian and Michele Benini, University of Padova, Italy
Protecting Privacy in VANETs Using Mix Zones with Virtual Pseudonym Change [pdf]
Belal Amro, Hebron University, Palestine

November 2017, Volume 9. Number 6

Effectiveness and Weakness of Quantified/Automated Anomaly Based IDs [ pdf ]
HidemaTanaka, National Defense Academy of Japan, Japan
Practical Approach for Securing Windows Environment : Attack Vectors and Countermeasures [pdf ]
Abdurrahman Pektaş1 and Ertuğrul Başaranoğlu2 , 1 Galatasaray University, Istanbul, Turkey and
2Ziraat Technology, Istanbul, Turkey
Predominance of Blowfish Over Triple Data Encryption Standard Symmetric Key Algorithm for Secure Integrated Circuits Using Verilog HDL [ pdf ]
V. Kumara Swamy1, and Prabhu Benakop2 1Sreenidhi Institute of Science and Technology, India , and 2 Indur Institute of Engineering and Technology, India
Feature Extraction and Feature Selection : Reducing Data Complexity with Apache Spark [pdf ]
Dimitrios Sisiaridis and Olivier Markowitch, Universite Libre de Bruxelles, Belgium
An Efficient Identity Based Authentication Protocol by Using Password [ pdf ]
Sanjeev Kumar Mandal and A R Deepti, Acharya Institute of Technology Bangalore, India

September 2017, Volume 9, Number 5

Architecture and Design of Micro Knowledge and Micro Medical Processing Units [ pdf ]
Shawon S. M. Rahman1 and Syed V. Ahamed2, 1University of Hawaii-Hilo, USA and 2City University of New York, USA
A Comparative Study of the Approach Provided for Preventing the Data Leakage [pdf ]
Kamaljeet Kaur1 Ishu Gupta2 and Ashutosh Kumar Singh2, 1Govt. Sr. Sec. School – Ambala, India and
2National Institute of Technology – Kurukshetra, India
Protocol Safety of VOIP Using the Cryptosystems Based on Elliptic Curve [ pdf ]
Layie Paul and Vivient Corneille Kamla, University of Ngaoundere, Cameroon

July 2017, Volume 9, Number 4

Performance Evaluation of J48 and Bayes Algorithms for Intrusion Detection System [ pdf ]
Uzair Bashir1 and Manzoor Chachoo2, 1Mewar University, India and 2University of Kashmir, India
Modelling Cyber Attacks [pdf]
Farida Chowdhury1 and Md Sadek Ferdous2, 1Shahjalal University of Science and Technology, Bangladesh and
2University of Southampton, UK
Node Authentication Using BLS Signature in Distributed PKI Based MANETS [ pdf ]
N Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, V. Ch. Venkaiah, and Y. V. Subba Rao, University of Hyderabad, India
Enhancing Efficiency of EAP-TTLS Protocol Through the Simultaneous Use of Encryption and Digital Signature Algorithms [ pdf ]
Seyed Milad Dejamfar and Sara Najafzadeh, Islamic Azad University, Iran
A Plain- Image Dependent Image Encryption Scheme using Half-Pixel-Level Interchange Permutation Operation [ pdf ]
Li Liu, Yucheng Chen and Ruisong Ye, Shantou University, China

May 2017, Volume 9, Number 3

A Conceptual Secure Blockchain- based Electronic Voting System [ pdf ]
Ahmed Ben Ayed , Colorado Technical University, USA
Enhancing Cyber Security of Online Accounts via a Novel Protocol and New Techniques [ pdf ]
Mehrdad Nourai and Haim Levkowitz , University of Massachusetts Lowell, USA

March 2017, Volume 9, Number 2

Metric for Evaluating Availability of an Information System : A Quantitative Approach Based on Component Dependency [ pdf ]
Suhail Qadir Mir1 and S.M.K. Quadri2, 1University of Kashmir, India and 2Jamia Millia Islamia, India
A Secure E-Medical Exemption System (E-MES): Jordan Case [ pdf ]
Heba N. Kamel, Mohammad A. Alia, Bara’aha. Al Saeq and Eman Abu Maria, Al Zaytoonah University of Jordan, Jordan

January 2017, Volume 9, Number 1

A Study on LEA and Seed Algorithms for Data Protection of Smartphone Based Disaster Notification System [ pdf ]
Jae Pil Lee, Jae Gwang Lee, Jun hyeon Lee, Ki-su Yoon and Jae Kwang Lee, Han Nam University, Korea
Application-Layer DDOS Detection Based on a One-Class Support Vector Machine [ pdf ]
Chuyu She1, 2, 3 , Wushao Wen1,2, Zaihua Lin1 and Kesong Zheng1, 1Sun Yat-Sen University, China, 2SYSU-CMU Shunde International Joint Research Institute, China and 3Guangdong University of Finance & Economics, China
A Survey on Security in Wireless Sensor Networks [ pdf ]
Waleed Al Shehri, King Abdul-Aziz University, Saudi Arabia

November 2016, Volume 8, Number 6

Steganalysis Algorithm for PNG Images Based on Fuzzy Logic Technique [ pdf ]
Jawaher alqahtani1, Daniyal Alghazzawi1 and Li Cheng2, 1King Adbulaziz University, Saudi Arabia and 2Chinese Academy of Sciences, China
A Mechanism for Early Detecting DDOS Attacks Based on M/G/R PS Queue [ pdf ]
Nguyen Hong Son, Post and Telecommunication Institute of Technology, Vietnam
A Bastion Mobile ID-Based Authentication Technique (BMBAT) [ pdf ]
Abdelmunem Abuhasan and Adwan Yasin, Arab American University, Palestine

September 2016, Volume 8, Number 5

A Hybrid Approach Combining Rule-Based and Anomaly-Based Detection Against DDoS Attacks [ pdf ]
Chin-Ling Chen1 and Hsin-Chiao Chen2, 1National Pingtung University, Taiwan and 2National Pingtung Institute of Commerce, Taiwan
Enhance RFID Security Against Brute Force Attack Based on Password Strength and Markov Model [ pdf ]
Adwan Yasin and Fadi AbuAlrub, Arab American University, Palestine
Color Image Encryption Based on Multiple Chaotic Systems [ pdf ]
Yuting Xi, Xing Zhang and Ruisong Ye, Shantou University, P. R. China

July 2016, Volume 8, Number 4

Proactive Detection of DDOS Attacks in Publish-Subscribe Networks [ pdf ]
Bander Alzahrani1, Vassilios Vassilakis2, Mohammed Alreshoodi3, Fawaz Alarfaj4 and Ahmed Alhindi5, 1King Abdulaziz University, Saudi Arabia, 2University of Brighton, United Kingdom, 3Qassim University, Saudi Arabia, 4Al Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia and 5Umm Al-Qura University, Saudi Arabia
Email Spam Classification Using Hybrid Approach of RBF Neural Network and Particle Swarm Optimization [ pdf ]
Mohammed Awad and Monir Foqaha, Arab American University, Palestine
Performance Analysis of the Neighbor Weight Trust Determination Algorithm in MANETs [ pdf ]
Ali Abu Romman1 and Hussein Al-Bahadili2, 1Princess Sumaya University for Technology, Jordan and 2University of Petra, Jordan
A Benchmark for Designing Usable and Secure Text-Based Captchas [ pdf ]
Suliman A. Alsuhibany, Qassim University, Saudi Arabia
An Intelligent Classification Model for Phishing Email Detection [ pdf ]
Adwan Yasin and Abdelmunem Abuhasan, Arab American University, Palestine

May 2016, Volume 8, Number 3

Using a Deep Understanding of Network Activities for Security Event Management [ pdf ]
Mona Lange1, Felix Kuhr2 and Ralf Moller1, 1Universitat zu Lubeck, Germany and 2Technical Universitat Hamburg-Harburg,
Wearable Technology Devices Security and Privacy Vulnerability Analysis [ pdf ]
Ke Wan Ching and Manmeet Mahinderjit Singh, University Sains Malaysia Penang, Malaysia
Y-Hamiltonian Layers Broadcast Algorithm [ pdf ]
Amnah El-Obaid and Nagham_Al-Madi, Zaytoonah University of Jordan, Jordan
Authentication Using Trust to Detect Misbehaving Nodes in Mobile Ad hoc Networks Using Q-Learning [ pdf ]
S.Sivagurunathan1, K.Prathapchandran1 and A.Thirumavalavan2, 1Gandhigram Rural Institute-Deemed University, India and 2Arignar Anna Government Arts College, India

March 2016, Volume 8, Number 2

Trends Toward Real-Time Network Data Steganography [ pdf ]
James Collins, Sos Agaian, The University of Texas at San Antonio, USA
Intrusion Detection System Using Discrete Fourier Transform with Window Function [ pdf ]
Yusuke Tsuge and HidemaTanaka, National Defense Academy of Japan, Japan
A Novel Charging and Accounting Scheme in Mobile Ad-Hoc Networks [ pdf ]
Inna Kofman1 and Nurul Huda2, 1University of Duesseldorf, Germany and 2Ryerson University, Canada
A Security Evaluation Framework for U.K. E-Government Services Agile Software Development [ pdf ]
Steve Harrison1,Antonis Tzounis2, Leandros Maglaras1, Francois Siewe1, Richard Smith1 and Helge Janicke1, 1De Montfort University, United Kingdom and 2University of Thessaly, Greece
Cascade Block Cipher Using Braiding/Entanglement of Spin Matrices and Bit Rotation [ pdf ]
D.Sravana Kumar1, P.Sirisha2 and CH. Suneetha3, 1Dr. V.S. Krishna Government Degree College, India, 2Indian Maritime University, India and 3GITAM University, India
The Internet of Things : New Interoperability, Management and Security Challenges [ pdf ]
Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung, Western Sydney University, Australia
Design and Implementation of the Advanced Cloud Privacy Threat Modeling [ pdf ]
Ali Gholami1, Anna-Sara Lind2, Jane Reichel2, Jan-Eric Litton3, Ake Edlund1, Erwin Laure1, 1KTH Royal Institute of Technology, Sweden,2Uppsala University, Sweden and 3Karolinska Institutet, Sweden

January 2016, Volume 8, Number 1

Limiting Self-Propagating Malware Based On Connection Failure Behavior Through Hyper-Compact Estimators [ pdf ]
You Zhou1, Yian Zhou1, Shigang Chen1 and O. Patrick Kreidl2, 1University of Florida, USA and 2University of North Florida, USA
Employee Trust Based Industrial Device Deployment and Initial Key Establishment [ pdf ]
Apala Ray1,2 and Johan Akerberg2,3and Mats Bjorkman3 and Mikael Gidlund4, 1ABB Corporate Research- Bangalore, India,2Malardalen University, Sweden, 3ABB Corporate Research-Vasteras, Sweden and 4Mid Sweden University, Sundsvall, Sweden
A Security Strategy against STEAL-AND-PASS Credential Attacks [ pdf ]
Juan Ceballos, Security Consulting & Engineering, T-Systems International, Germany
Big Data Security and Privacy Issues in the CLOUD [ pdf ]
Ali Gholami and Erwin Laure, KTH- Royal Institute of Technology, Sweden

November 2015, Volume 7, Number 6

A Novel Evaluation Approach to Finding Lightweight Machine Learning Algorithms for Intrusion Detection in Computer Network [Pdf]
Yuchen Wang1, Shuxiang Xu2 and Qiongfang Huang1, 1Zhejiang University of Technology, China and 2University of Tasmania, Australia
A Machine Learning Approach to Anomaly-Based Detection on Android Platforms [ Pdf ]
Joshua Abah, Waziri O.V, Abdullahi M.B, Arthur U.M and Adewale O.S, Federal University of Technology Minna, Nigeria
A System for Validating and Comparing Host-Based Ddos Detection Mechanisms [ Pdf ]
Nguyen Hong Son, Post and Telecommunication Institute of Technology, Viet Nam

September 2015, Volume 7, Number 5

ANDROINSPECTOR: A System for Comprehensive Analysis of Android Applications [ Pdf ]
Babu Rajesh V, Phaninder Reddy, Himanshu P and Mahesh U Patil, Centre for Development of Advanced Computing, India
Improved Steganographic Security by Applying an Irregular Image Segmentation and Hybrid Adaptive Neural Networks With Modified Ant Colony Optimization [ Pdf ]
Nameer N. El. Emam1 and Kefaya S. Qaddoum2, 1Philadelphia University, Jordan and 2Warwick University, UK
An Intellect Learning on E-Mail Security and Fraud, Spam and Phishing [ Pdf ]
P.S.Jagadeesh Kumar, S.Meenakshi Sundaram and Ranjeet Kumar, Don Bosco Institute of Technology, India

July 2015, Volume 7, Number 4

Deterring Hacking Strategies via Targeting Scanning Properties [ Pdf ]
Saad Alsunbul1,2, Phu Dung Le1, Jefferson Tan1, 1Monash University, Australia and 2King Abdullaziz for Science and Technology, Saudi Arabia
Providing End-To-End Secure Communications in GSM Networks [ Pdf ]
Heshem A.El Zouka, Arab Academy for Science & Technology and Maritime Transport, Egypt

May 2015, Volume 7, Number 3

Security Challenges as a Factor Affecting the Security of Manet: Attacks and Security Solutions [ Pdf ]
Nabeel Zanoon1, Nashat Albdour2, Hatem S. A. Hamatta1 and Rasha Moh’d Al-Tarawneh1, 1Al-Balqa Applied University, Jordan and2Tafila Technical University, Jordan
An ANN Approach for Network Intrusion Detection using Entropy based Feature Selection [ Pdf ]
AshalataPanigrahi and ManasRanjanPatra, Berhampur University, India
A Performance Evaluation Of Common Encryption Techniques With Secure Watermark System (Sws) [ Pdf ]
Ashraf Odeh1, Shadi R.Masadeh1 and Ahmad Azzazi2, 1Isra University, Jordan and 2Applied Science University, Jordan
Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channel In Secured Communication [ Pdf ]
Anjan K1, Srinath N K1 and Jibi Abraham2, 1R V College of Engineering, India and 2College of Engineering Pune, India

March 2015, Volume 7, Number 2

Exploiting Rhetorical Relations to Multiple Documents Text Summarization [ Pdf ]
N.Adilah Hanin Zahri1, Fumiyo Fukumoto2, Matsyoshi Suguru2 and Ong Bi Lynn1, 1University of Malaysia Perlis, Malaysia and2University of Yamanashi, Japan
An Interactive Visualization Tool for Animating Behavior of Cryptographic Protocols [ Pdf ]
Mabroka Maeref1, Fatma Algali1, Ahmed Patel2 and Zarina Shukur2, 1Sebha University Libya and 2The National University of Malaysia, Malaysia
A New Image Steganography Algorithm Based on MLSB Method with Random Pixels Selection [ Pdf ]
Odai M.Al-Shatanawi and Nameer N.El.Emam, Philadelphia University, Jordan
Certificate Less Key Management Scheme in Manet Using Threshold Cryptography [ Pdf ]
Shaheena Khatoonand Balwant Singh Thakur, Pt.Ravishankar Shukla University, India
Comprehensive Survey of Possible Security Issues on 4G Networks [ Pdf ]
Sumant Ku Mohapatra, Biswa Ranjan Swain and Pravanjan Das, Trident Academy of Technology, India

January 2015, Volume 7, Number 1

Multi-Facet Trust Model for Online Social Network Environment [ Pdf ]
Liu Ban Chieng1, Manmeet Mahinderjit Singh1, Zarul Fitri Zaaba1 and Rohail Hassan2, 1University Sains Malaysia, Malaysia and2Universiti Teknologi Petronas, Malaysia
Accessing Secured Data in Cloud Computing Environment [ Pdf ]
Hasan Omar Al-Sakran, King Saud University, Saudi Arabia
Service Oriented Configuration Management of ‎Software ‎Architecture [ Pdf ]
Razie Alidoosti, Shahrouz Moaven and Jafar Habibi, Sharif University of Technology, Iran
Runtime Potential Updater File(S) Identification: Does Your Software Updates Automatically With Application Whitelisting? [ Pdf ]
Janardhan Reddy, Amit Kumar Jha and Sandeep Romana, Centre for Development of Advanced Computing, India
Strong Zero-Knowledge Authentication Based on the Session Keys (SASK) [ Pdf ]
Younes ASIMI, Abdellah AMGHAR, Ahmed ASIMI and Yassine SADQI, Laboratoire des Systemes informatiques et Vision (LabSiV), Morocco
A New Secret Handshakes Scheme with Dynamic Matching Based on ZSS [ Pdf ]
Preeti Kulshrestha and Arun Kumar Pal, G.B. Pant University of Agriculture and Technology, India
A New DNA Based Approach of Generating Key-Dependent Shift Rows Transformation [ Pdf ]
Auday H. Al-Wattar, Ramlan Mahmod, Zuriati Ahmad Zukarnain and Nur Izura Udzir, Universiti Putra Malaysia, Malaysia


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: