Wednesday, February 26, 2020

Call for papers - 13th International Conference on Network Security & Applications (CNSA 2020)


13th International Conference on Network Security &
Applications (CNSA 2020)

March 28 ~ 29, 2020, Sydney, Australia


Scope 

13th International Conference on Network Security & Applications (CNSA 2020) focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and counter measures and establishing new collaborations in these areas.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Security & its applications.

Topics of Interest

·       Network and Wireless Network Security
·       Peer-to-Peer Network Security
·       Database and System Security
·       Intrusion Detection and Prevention
·       Internet Security & Applications Security & Network Management
·       E-mail Security, Spam, Phishing, E-mail fraud
·       Virus, Worms, Trojan Protection
·       Security threats & Countermeasures (DDoS, MiM, Session Hijacking,Replay attack etc,)
·       Ubiquitous Computing Security
·       Web 2.0 security
·       Cryptographic Protocols
·       Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers through the Submission System by February 29, 2020.  Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS&IT) series (Confirmed).

Selected papers from CNSA 2020, after further revisions, will be published in the special issue of the following journals

·       Information Technology in Industry (ITII) New - ESCI (WOS) Indexed

Important Dates

         Submission Deadline: February 29, 2020
         Authors Notification: March 05, 2020
         Registration & Camera-Ready Paper Due: March 10, 2020

Here's where you can reach us: cnsaconference@yahoo.com or cnsa@ccseit2020.org



Tuesday, February 25, 2020

Call for papers - International Journal of Network Security & Its Applications (IJNSA)




International Journal of Network Security & Its Applications (IJNSA)

ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

 


Scope & Topics


The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of  security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following:

·         Network and Wireless Network Security
·         Mobile, Ad Hoc and Sensor Network Security
·         Peer-to-Peer Network Security
·         Database and System Security
·         Intrusion Detection and Prevention
·         Internet Security & Applications
·         Security & Network Management
·         E-mail security, Spam, Phishing, E-mail fraud
·         Virus, worms, Trojan Protection
·         Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
·         Ubiquitous Computing Security
·         Web 2.0 security
·         Cryptographic protocols
·         Performance Evaluations of Protocols & Security Application

Paper submission

Authors are invited to submit papers for this journal through e-mail ijnsa@airccse.org or  Submission System . Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

  •        Submission Deadline : February 29, 2020
  •      Notification                 : March 28, 2020
  •      Final Manuscript Due : April 07, 2020
  •       Publication Date         : Determined by the Editor-in-Chief

Contact Us
Here's where you can reach us : ijnsa@airccse.org or ijnsa@aircconline.com


Here you can reach us in social Medias

·         Twitter : https://twitter.com/CapeIjnsa
·         Academia : https://independent.academia.edu/BrendonClarke

Monday, February 24, 2020

6th International Conference on Advances in Computer Science and Information Technology (ACSTY-2020)


6th International Conference on Advances in Computer Science and Information Technology (ACSTY-2020)
April 25 ~ 26, 2020, Copenhagen, Denmark
Scope 
6th International Conference on Advances in Computer Science and Information Technology (ACSTY-2020) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information Technology. The conference looks for significant contributions to all major fields of the Computer Science, Engineering and Information Technology in theoretical and practical aspects.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.
Topics of interest include, but are not limited to, the following
  • Algorithms and Bioinformatics
  • Computer Architecture and Real Time Systems
  • Database and Data Mining
  • Dependable, Reliable and Autonomic Computing
  • Distributed and Parallel Systems and Algorithms
  • DSP/Image Processing/Pattern Recognition/Multimedia
  • Embedded System and Software
  • Game and Software Engineering
  • Geographical Information Systems/ Global Navigation Satellite Systems (GIS/GNSS)
  • Grid and Scalable Computing
  • Intelligent Information & Database Systems
  • IT policy and Business Management
  • Mobile and Ubiquitous Computing
  • Modeling and Simulation
  • Multimedia Systems and Services
  • Compiler Design
  • Computer Education
  • E-Learning, E-Business, Enterprise Information Systems and E-Government
  • Information Technology Management
  • Natural Language Processing
  • Networking and Communications
  • Operating Systems
  • Parallel and Distributed Systems
  • Performance Evaluation
  • Programming Languages
  • Recent Trends in Information Technology
  • Security and Information Assurance
  • Soft Computing (AI, Neural Networks, Fuzzy Systems, etc.)
  • Software Engineering
  • Theoretical Computer Science
  • Web and Internet Computing
Paper Submission
Authors are invited to submit papers through the conference Submission System by February 29, 2020. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).
Selected papers from ACSTY 2020, after further revisions, will be published in the special issue of the following journal.
Important Dates
  • Submission Deadline : February 29, 2020
  • Authors Notification : March 16, 2020
  • Registration & camera - Ready Paper Due : March 24, 2020
Contact Us
Here's where you can reach us: acsty@acsty2020.org (or) acstyconff@yahoo.com





Most trending articles 2020


Machine Learning in Network Security Using KNIME Analytics

Munther Abualkibash

School of Information Security and Applied Computing, College of Technology, Eastern Michigan University, Ypsilanti, MI, USA

Abstract
Machine learning has more and more effect on our every day’s life. This field keeps growing and expanding into new areas. Machine learning is based on the implementation of artificial intelligence that gives systems the capability to automatically learn and enhance from experiments without being explicitly programmed. Machine Learning algorithms apply mathematical equations to analyze datasets and predict values based on the dataset. In the field of cybersecurity, machine learning algorithms can be utilized to train and analyze the Intrusion Detection Systems (IDSs) on security-related datasets. In this paper, we tested different machine learning algorithms to analyze NSL-KDD dataset using KNIME analytics.

Keywords
Network Security, KNIME, NSL-KDD, and Machine Learning





Quality Assessment of Access Security Controls over Financial Information

Angel R. Otero, Christian Sonnenberg and LuAnn Bean

Nathan M. Bisk College of Business, Florida Institute of Technology, Melbourne, Florida, USA

Abstract

Information security necessitates the implementation of safeguards to guarantee an adequate defense against attacks, threats, and breaches from occurring. Nonetheless, even with “adequate” defensive efforts, the taste for accessing sensitive and confidential financial information is too tempting, and attacks continue to escalate. Organizations must plan ahead so that identified attacks, threats, and breaches are appropriately managed to a successful resolution. A proven method to address information security problems is achieved through the effective implementation of access security controls. This paper proposes a quantitative approach for organizations to evaluate access security controls over financial information using Analytic Hierarchy Process (AHP), and determines which controls best suit management’s goals and objectives. Through a case study, the approach is proven successful in providing a way for measuring the quality of access security controls over financial information based on multiple application-specific criteria.

Keywords

Information Security, Access Security Controls, Internal Controls, Analytic Hierarchy Process, Pairwise Comparisons. 




Methods Toward Enhancing RSA Algorithm : A Survey

Engr. Shaheen Saad Al-Kaabi and Dr. Samir Brahim Belhaouari
College of Science and Engineering, Hamad Bin Khalifa University (HBKU), Doha, Qatar
Abstract
Cryptography defines different methods and technologies used in ensuring communication between two parties over any communication medium is secure, especially in presence of a third part. This is achieved through the use of several methods, such as encryption, decryption, signing, generating of pseudo-random numbers, among many others. Cryptography uses a key, or some sort of a password to either encrypt or decrypt a message that needs to be kept secret. This is made possible using two classes of key-based encryption and decryption algorithms, namely symmetric and asymmetric algorithms. The best known and the most widely used public key system is RSA. This algorithm comprises of three phases, which are the key generation phase, encryption phase, and the decryption phase. Owing to the advancement in computing technology, RSA is prone to some security risks, which makes it less secure. The following paper preview different proposals on different methods used to enhance the RSA algorithm and increase its security. Some of these enhancements include combining the RSA algorithm with Diffie-Hellman or ElGamal algorithm, modification of RSA to include three or four prime numbers, offline storage of generated keys, a secured algorithm for RSA where the message can be encrypted using dual encryption keys, etc.
Keywords
Cryptography, RSA Algorithm, Encryption, Decryption, Cryptosystem, Security, Public Key, Private Key


Security& Privacy Threats, Attacks and Countermeasures in Internet of Things

Faheem Masoodi1 Shadab Alam2 and Shams Tabrez Siddiqui2

1Department of Computer Science, University of Kashmir, J&k, India 2Department of Computer Science, Jazan University, KSA

Abstract

The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years, the pace at which new devices are being integrated into the system will profoundly impact the world in a good way but also poses some severe queries about security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most significant concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where each layer provides a service. The security needs vary from layer to layer as each layer serves a different purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks have been discussed along with some existing and proposed countermeasures.

Keywords

Internet of Things, privacy, attacks, security, threats, protocols.




International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...