Monday, August 31, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Trends in Network and Wireless Network Security in 2020:
https://www.academia.edu/41747570/Trends_in_Network_and_Wireless_Network_Security_in_2020

Submission Deadline: September 05, 2020

Contact us:
Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

Submission Link:
http://coneco2009.com/submissions/imagination/home.html



Thursday, August 27, 2020

International Journal of Network Security & Its Applications (IJNSA)


ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Top read research articles in the field of Network Security @ 2019:
https://www.cseij.org/top2019/TopreadresearcharticlesinthefieldofNetworkSecurity@2019.html

Contact us:
Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

Wednesday, August 26, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Most Downloaded Article for an Year:

https://www.academia.edu/38888363/SECURITY_and_PRIVACY_THREATS_ATTACKS_AND_COUNTERMEASURES_IN_INTERNET_OF_THINGS

Original Source URL: https://aircconline.com/ijnsa/V11N2/11219ijnsa05.pdf

Volume Link: http://airccse.org/journal/jnsa19_current.html


Tuesday, August 25, 2020

6th International Conference of Networks, Communications, Wireless and Mobile Computing (NCWC 2020)

Submit your Research Articles!

6th International Conference of Networks, Communications, Wireless and Mobile Computing (NCWC 2020)
October 24 – 25, 2020, Dubai, UAE
https://csen2020.org/ncwc/index.html

Important Dates

Submission Deadline : August 30, 2020
Authors Notification : September 30, 2020
Registration & Camera-Ready Paper Due : October 08, 2020

Contact Us
Here’s where you can reach us: ncwc@csen2020.org or ncwcconference@yahoo.com

Submission System
https://csen2020.org/submission/index.php



Monday, August 24, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

RESONANCE BASED MICROMECHANICAL CANTILEVER FOR GAS SENSING

Subhashini. S1 and Vimala Juliet. A2
1Research Scholar, Department of Electronics Engineering, Sathyabama University, Chennai, India
2Prof. & Head, Department of EIE, SRM University, Chennai, India

ABSTRACT
Our world is facing some drastic changes in the climatic conditions due to the heating effect caused by various greenhouse gases. The most harmful gas among them is Carbon dioxide and is increasing at an uncontrolled rate. This paper aims in finding out the quantity of the major polluting gas carbon dioxide. The gravimetric sensor works by adsorbing the CO2 molecules on ZnO sensing layer, which alters the overall mass of the sensor. The mechanical structure is a cantilever, having its own resonant frequency. To selectively adsorb CO2 molecules from the mixture of gaseous molecules, ZnO at a specific temperature is used. As the gas molecules are adsorbed the mass increases and hence there is a change in resonant frequency. This change in frequency gives the measure of the quantity of CO2 molecules present in that environment. The major expected advantage of this technique would be the repeatability of the sensor that is used. This Quantitative analysis of CO2 would be helpful for mankind by alerting them about the environment in which they work, by proper conditioning and networking.

Original Source URL: http://airccse.org/journal/nsa/0313nsa10.pdf

Volume Link: http://airccse.org/journal/jnsa13_current.html



International Journal of Network Security & Its Applications (IJNSA)



International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)
Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: August 29, 2020
·         Notification: September 29, 2020
·         Final Manuscript Due: October 07, 2020
·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: http://airccse.org/journal/ijnsa.html


 Here you can reach us in Social Medias:
 
·         Twitter: https://twitter.com/CapeIjnsa


Friday, August 21, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUTING: PANACEA FOR MULTI-CLOUD SECURITY SNAGS

Uchechukwu Emejeamara1, Udochukwu Nwoduh2 and Andrew Madu2
1IEEE Computer Society, Connecticut Section, USA
2Department of Computer Science, Federal Polytechnic Nekede, Nigeria.

ABSTRACT
Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.

Original Source URL: https://aircconline.com/ijnsa/V12N4/12420ijnsa03.pdf

Volume Link: http://airccse.org/journal/jnsa20_current.html


International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK

M Abdul Rahiman1, Nishanth Jain2, Arun K. Dubey3 and G Manoj Kumar4
1Director, AICTE, Ministry of HRD,Govt of India, New Delhi, INDIA
2Cosultant,e-Gov, AICTE, Ministry of HRD, New Delhi, INDIA
3Asst Professor, CSE, Bharati Vidyapeeth College of Engineering, New Delhi
4Associate Professor, CSE, LBS Inst of Tech for Women, Trivandrum, Kerala

ABSTRACT
Sensor network facilitates monitoring and controlling of physical environments. These wireless networks consist of dense collection of sensors capable of collection and dissemination of data. They have application in variety of fields such as military purposes, environment monitoring etc. Typical deployment of sensor network assumes central processing station or a gateway to which all other nodes route their data using dynamic source routing (DSR). This causes congestion at central station and thus reduces the efficiency of the network. In this work we will propose a better dynamic source routing technique using network coding to reduce total number of transmission in sensor networks resulting in better efficiency.

Original Source URL: http://airccse.org/journal/nsa/0313nsa09.pdf

Volume Link: http://airccse.org/journal/jnsa13_current.html


Thursday, August 20, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION CAPABILITY OF INTRUSION PROTECTION SYSTEMS

Hajar Elkassabi, Mohammed Ashour and Fayez Zaki
Department of Electronics & Communication Faculty of Engineering, Mansoura University, Mansoura, Egypt

ABSTRACT
Over the past few years, intrusion protection systems have drawn a mature research area in the field of computer networks. The problem of excessive features has a significant impact on intrusion detection performance. The use of machine learning algorithms in many previous researches has been used to identify network traffic, harmful or normal. Therefore, to obtain the accuracy, we must reduce the dimensionality of the data used. A new model design based on a combination of feature selection and machine learning algorithms is proposed in this paper. This model depends on selected genes from every feature to increase the accuracy of intrusion detection systems. We selected from features content only ones which impact in attack detection. The performance has been evaluated based on a comparison of several known algorithms. The NSL-KDD dataset is used for examining classification. The proposed model outperformed the other learning approaches with accuracy 98.8 %.

Original Source URL: https://aircconline.com/ijnsa/V12N4/12420ijnsa02.pdf

Volume Link: http://airccse.org/journal/jnsa20_current.html



Tuesday, August 18, 2020

10th International Conference on Peer-to-Peer Networks and Trust Management (P2PTM 2020)


10th International Conference on Peer-to-Peer Networks and Trust Management (P2PTM 2020)

November 28 ~ 29, 2020, London, United Kingdom

https://cndc2020.org/p2ptm/index.html

CALL FOR PAPERS

Submission Deadline : August 22, 2020

Contact Us : p2ptm@cndc2020.org

Monday, August 17, 2020

International Journal of Network Security & Its Applications (IJNSA)



International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)
Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: August 23, 2020
·         Notification: September 23, 2020
·         Final Manuscript Due: October 01, 2020
·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: http://airccse.org/journal/ijnsa.html


 Here you can reach us in Social Medias:
 
·         Twitter: https://twitter.com/CapeIjnsa


International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Most Viewed Current Issue Article in Academia:

https://www.academia.edu/43792313/ENHANCED_AUTHENTICATION_FOR_WEB_BASED_SECURITY_USING_KEYSTROKE_DYNAMICS

Original Source URL: https://aircconline.com/ijnsa/V12N4/12420ijnsa01.pdf

Volume Link: http://airccse.org/journal/jnsa20_current.html


Thursday, August 13, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WIRED AND WIRELESS ENVIRONMENT

Shalvi Dave1, Bhushan Trivedi2 and Jimit Mahadevia3
1Department of MCA, Indus University, Ahmedabad
2Director, MCA, GLSICT,Ahmedabad
3Elitecore Technologies Pvt. Ltd., Ahmedabad

ABSTRACT
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defence against a variety of attacks that can compromise the security and proper functioning of an enterprise information system. Along with the widespread evolution of new emerging services, the quantity and impact of attacks have continuously increased, attackers continuously find vulnerabilities at various levels, from the network itself to operating system and applications, exploit them to crack system and services. Network defence and network monitoring has become an essential component of computer security to predict and prevent attacks. Unlike traditional Intrusion Detection System (IDS), Intrusion Detection and Prevention System (IDPS) have additional features to secure computer networks.
In this paper, we present a detailed study of how deployment of an IDPS plays a key role in its performance and the ability to detect and prevent known as well as unknown attacks. We categorize IDPS based on deployment as Network-based, host-based, and Perimeter-based and Hybrid. A detailed comparison is shown in this paper and finally we justify our proposed solution, which deploys agents at host-level to give better performance in terms of reduced rate of false positives and accurate detection and prevention.

Original Source URL: http://airccse.org/journal/nsa/0313nsa08.pdf

Volume Link: http://airccse.org/journal/jnsa13_current.html


Wednesday, August 12, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS

Siti Rahayu Selamat1, Teh Teck Guan2 and Robiah Yusof1
1Center for Advanced Computing Technology (C-ACT), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Melaka, Malaysia
2Infineon Technologies Melaka, Batu Berendam, Melaka, Malaysia

ABSTRACT
Current password authentication system was proven not secure enough to protect the information from intruders. However, various research has been done and the results show the value of FRR still low and the value of FAR still high. Thus, one of the methods suggests, is enhancing the current system using keystroke dynamics. Keystroke dynamics is a type of biometric authentication that does not require any special hardware, easy to use as the same routine as normal password authentication. Therefore, this research proposed an authentication system using keystroke dynamics to prevent the system from intruders. A system is developed that consist of two parts which are enrolment and verification. Then, a prototype is developed for testing process that consists of 3 main modules, namely Enrolment, Client/Server Connection and, Verification and Retraining. Based on the testing, the system proved that the keystroke dynamic authentication system was able to implement in client/server environment and shows the value of EER is low that indicates it provide a better system authentication. In future, the system can be improved by enhancing the security, performance, and user interface.

Original Source URL: https://aircconline.com/ijnsa/V12N4/12420ijnsa01.pdf

Volume Link: http://airccse.org/journal/jnsa20_current.html


Tuesday, August 11, 2020

International Conference on Big Data, IOT and Blockchain (BIBC 2020)


CALL FOR PAPERS...!!!

International Conference on Big Data, IOT and Blockchain (BIBC 2020)
October 24 - 25, 2020, Dubai, UAE

https://csen2020.org/bibc/index.html

Submission Deadline : August 16, 2020

Submission Link : https://csen2020.org/submission/index.php

Here's where you can reach us : bibc@csen2020.org or bibcconference@yahoo.com

International Journal of Network Security & Its Applications (IJNSA)



International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)
Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: August 23, 2020
·         Notification: September 23, 2020
·         Final Manuscript Due: October 01, 2020
·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: http://airccse.org/journal/ijnsa.html


 Here you can reach us in Social Medias:
 
·         Twitter: https://twitter.com/CapeIjnsa


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #p...