Thursday, April 30, 2020

8th International Conference of Networks and Communications (NC 2020)


May 30~31, 2020, Vancouver, Canada

https://itcse2020.org/nc/index.html

Important Dates

• Submission Deadline : May 02, 2020
• Authors Notification : May 15, 2020
• Registration & Camera-Ready Paper Due : May 18, 2020

Contact Us

Here's where you can reach us: ncconf@itcse2020.org or nc.conf@yahoo.com

Wednesday, April 29, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Most Viewed Article in the last 30 Days:

https://www.academia.edu/28200717/AN_INTELLECT_LEARNING_ON_E-MAIL_SECURITY_AND_FRAUD_SPAM_AND_PHISHING

Original Source URL: http://airccse.org/journal/nsa/7515nsa03.pdf

Volume Link: http://airccse.org/journal/jnsa15_current.html


Tuesday, April 28, 2020

International Conference on Networks, Blockchain and Internet of Things (NBIoT 2020)


Welcome to NBIoT 2020

International Conference on Networks, Blockchain and Internet of Things (NBIoT 2020)

June 20~21, 2020, Dubai, UAE

https://csita2020.org/nbiot/index.html

Submission Deadline : May 03, 2020

Here's where you can reach us : nbiot@csita2020.org (or) confnbiot@yahoo.com

Monday, April 27, 2020

International Journal of Network Security & Its Applications (IJNSA)


ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Scope:
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Submission Deadline: May 02, 2020

Contact us:

Here's where you can reach us: ijnsa@airccse.org or ijnsa@aircconline.com

Submission Link:

http://coneco2009.com/submissions/imagination/home.html

Friday, April 24, 2020

6th International Conference on Networks and Communications (NCO 2020)


July 11~12, 2020, Toronto, Canada

https://icaita2020.org/nco/index.html

Important Dates

Submission Deadline : May 02, 2020

Contact Us

Here's where you can reach us: ncoconf@yahoo.com or nco@icaita2020.org

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Most Viewed Article in Academia:

https://www.academia.edu/37160354/MINING_PATTERNS_OF_SEQUENTIAL_MALICIOUS_APIS_TO_DETECT_MALWARE

Original Source URL: https://aircconline.com/ijnsa/V10N4/10418ijnsa01.pdf

Volume Link: http://airccse.org/journal/jnsa18_current.html


Thursday, April 23, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY

Moussa WITTI and Dimitri KONSTANTAS
Information Science Institute University of Geneva, Route de Drize 7, 1227 Carouge, Switzerland

Abstract:
The increase of smart devices has accelerated sensitive data exchange on the Internet using most of the time unsecured channels. Since a massive use of RFID (Radio-frequency Identification) tags in the transportation and construction industries from 1980 to 1990, with the expanded use of the Internet with 2G/3G or 4G since 2000, we are witnessing a new era of connected objects. A huge number of heterogeneous sensors may collect and dispatch sensitive data from an endpoint to worldwide network on the Internet. Privacy concerns in IOT remain important issues in the research. In this paper, we aim to evaluate current research state related to privacy and security in IOT by identifying existing approaches and publications trends. Therefore, we have conducted a systematic mapping study using automated searches from selected relevant academics databases. The result of this mapping highlights research type and contribution in different facets and research activities trends in the topic of “security and privacy” in IoT edge, cloud and fog environment.

Original Source URL: https://aircconline.com/ijnsa/V10N6/10618ijnsa03.pdf

Volume Link: http://airccse.org/journal/jnsa18_current.html


Wednesday, April 22, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

MALWARE DETECTION USING MACHINE LEARNING ALGORITHMS AND REVERSE ENGINEERING OF ANDROID JAVA CODE

Michal Kedziora, Paulina Gawin, Michal Szczepanik and Ireneusz Jozwiak

Faculty of Computer Science and Management Wroclaw, University of Science and Technology Wroclaw, Poland

Abstract:
This research paper is focused on the issue of mobile application malware detection by Reverse Engineering of Android java code and use of Machine Learning algorithms. The malicious software characteristics were identified based on a collected set of total number of 1958 applications (including 996 malware applications). During research a unique set of features was chosen, then three attribute selection algorithms and five classification algorithms (Random Forest, K Nearest Neighbors, SVM, Nave Bayes and Logistic Regression) were examined to choose algorithms that would provide the most effective rate of malware detection.

Original Source Link: https://aircconline.com/ijnsa/V11N1/11119ijnsa01.pdf

Volume Link: http://airccse.org/journal/jnsa19_current.html


Tuesday, April 21, 2020

8th International Conference of Security, Privacy and Trust Management (SPTM 2020)



June 13 ~ 14, 2020, Helsinki, Finland

https://csit2020.org/sptm/index.html

Scope:
8th International Conference of Security, Privacy and Trust Management (SPTM 2020) looks for significant contributions to Trust management for networks. Original papers are invited on Security, Privacy and Trust Management of wireless and wired networks. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.

Submission Deadline: April 25, 2020

Contact us:

Here's where you can reach us: sptm@csit2020.org (or) sptmconf@yahoo.com

Submission Link:

https://csit2020.org/submission/index.php

Monday, April 20, 2020

International Journal of Network Security & Its Applications (IJNSA)



ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Scope:
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Submission Deadline: April 25, 2020

Contact us:

Here's where you can reach us: ijnsa@airccse.org or ijnsa@aircconline.com

Submission Link:

http://coneco2009.com/submissions/imagination/home.html

Friday, April 17, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Submission Deadline: April 25, 2020

Contact us:

Here's where you can reach us: ijnsa@airccse.org or ijnsa@aircconline.com

Submission Link:

http://coneco2009.com/submissions/imagination/home.html


International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

April 2020 - Top Read Articles in Network Security & Its Applications

https://www.academia.edu/42762106/April_2020_-_Top_Read_Articles_in_Network_Security_and_Its_Applications

Submission Deadline: April 25, 2020

Contact us:

Here's where you can reach us: ijnsa@airccse.org or ijnsa@aircconline.com

Submission Link:

http://coneco2009.com/submissions/imagination/home.html


Thursday, April 16, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

AN ENHANCED USER AUTHENTICATION FRAMEWORK IN CLOUD COMPUTING

Hasan Al-Refai, Khaldoun Batiha, Ahmad M. Al-Refai
Department of Computer Science, Philadelphia University, Jordan

Abstract:
Recently, there are several studies have proposed user authentication frameworks to defend against different types of attacks such as phishing, replay attack, man in the middle attack and denial of service attack, etc. Most of these frameworks consist of three main phases, which are the registration phase, login phase, and authentication phase. Most of them have the changing password process as an additional activity.Many problemshave been noticed in the performance of these frameworks. For example, the registration phase is valunerable to internal attack such as SYN flood attack. In this work, we aim to propose a robust user authentication framework that overcomes the previous framework shortages. The proposed framework provides many security aspects such as remote authentication, mutual authentication, session key establishment,to mention a few. Besides, to ensure the security through all phases of this framework, we add a new phase called a Service Access Authentication Phase (SAAP).This phase is resposable of the internal verification.

Original Source URL: https://aircconline.com/ijnsa/V12N2/12220ijnsa04.pdf

Volume Link: http://airccse.org/journal/jnsa20_current.html


Wednesday, April 15, 2020

12th International Conference on Computer Networks & Communications (CoNeCo 2020)


June 27-28, 2020, Copenhagen, Denmark

https://acsit2020.org/coneco/index.html

Submission Deadline : April 18, 2020

Paper submission Link : https://acsit2020.org/submission/index.php

Contact Us: coneco@acsit2020.org
x

Tuesday, April 14, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS

Sajedul Talukder1 and Zahidur Talukder2

1Department of Mathematics and Computer Science, Edinboro University
2Department of Computer Science, University of Texas at Arlington

Abstract:
The huge amounts of data and information that need to be analyzed for possible malicious intent are one of the big and significant challenges that the Web faces today. Malicious software, also referred to as malware developed by attackers, is polymorphic and metamorphic in nature which can modify the code as it spreads. In addition, the diversity and volume of their variants severely undermine the effectiveness of traditional defenses that typically use signature-based techniques and are unable to detect malicious executables previously unknown. Malware family variants share typical patterns of behavior that indicate their origin and purpose. The behavioral trends observed either statically or dynamically can be manipulated by using machine learning techniques to identify and classify unknown malware into their established families. This survey paper gives an overview of the malware detection and analysis techniques and tools.

Original Source URL: https://aircconline.com/ijnsa/V12N2/12220ijnsa03.pdf

Volume Link: http://airccse.org/journal/jnsa20_current.html


Monday, April 13, 2020

International Journal of Network Security & Its Applications (IJNSA)


ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Trends in Cryptographic protocols in 2020

https://www.academia.edu/42291067/Trends_in_Cryptographic_Protocols_in_2020

Submission Deadline: April 25, 2020

Contact us:

Here's where you can reach us: ijnsa@airccse.org or ijnsa@aircconline.com

Submission Link:

http://coneco2009.com/submissions/imagination/home.html

Friday, April 10, 2020

International Journal of Network Security & Its Applications (IJNSA)



ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Most Viewed Article in Academia:

https://www.academia.edu/38888363/SECURITY_and_PRIVACY_THREATS_ATTACKS_AND_COUNTERMEASURES_IN_INTERNET_OF_THINGS

Original Source URL: http://aircconline.com/ijnsa/V11N2/11219ijnsa05.pdf

Volume Link: http://airccse.org/journal/jnsa19_current.html

Thursday, April 9, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dynamic Billing System in Smart Grid Using Permissioned Blockchain

Ozgur Oksuz
Faculty of Engineering, Adiyaman University, Adiyaman, Turkey

Abstract:
This paper proposes an efficient data aggregation and dynamic billing system that it uses anonymous communication for exchanging information between smart meters and CC. Moreover, the given scheme consists of a permissioned blockchain. This blockchain contains the ledger that keeps users’ anonymized identities and electricity consumption for predefined time ranges. Using consumption data of users, a billing mechanism can bill the users accordingly. In the construction, since all the parties in the system have the ledger, every party has the aggregated usage of the electricity without using very heavy cryptographic operations such as homomorphic encryption, bilinear pairing, etc. Using the ledger in our model, the aggregation of the users’ electricity consumption can be computed by anyone in the system. Moreover, users can verify their bills and check any data using a signature scheme. This results in that the integrity of all data is going to be preserved. The proposed approach mainly uses hash functions to provide the same functionality (aggregation of the users’ data consumption, data integrity check, and dynamic pricing and billing) with preserving data privacy of the users.

Original Source URL: http://aircconline.com/ijnsa/V12N2/12220ijnsa02.pdf

Volume Link: http://airccse.org/journal/jnsa20_current.html


Wednesday, April 8, 2020

International Conference on Blockchain and Internet of Things (BIoT 2020)


July 25-26, 2020, London, United Kingdom

https://ccsea2020.org/biot/index.html

Submission Deadline : April 18, 2020

Submission Link:
https://ccsea2020.org/submission/index.ph

Contact us:
Here's where you can reach us : biotconf@yahoo.com or biot@ccsea2020.org

Tuesday, April 7, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION

Nick Rahimi
School of Information Systems & Applied Technology Southern Illinois University, Carbondale, IL

Abstract:
Peer-to-Peer (P2P) overlay networks wide adoption has also created vast dangers due to the millions of users who are not conversant with the potential security risks. Lack of centralized control creates great risks to the P2P systems. This is mainly due to the inability to implement proper authentication approaches for threat management. The best possible solutions, however, include encryption, utilization of administration, implementing cryptographic protocols, avoiding personal file sharing, and unauthorized downloads. Recently a new non-DHT based structured P2P system is very suitable for designing secured communication protocols. This approach is based on Linear Diophantine Equation (LDE) [1]. The P2P architectures based on this protocol offer simplified methods to integrate symmetric and asymmetric cryptographies’ solutions into the P2P architecture with no need of utilizing Transport Layer Security (TLS), and its predecessor, Secure Sockets Layer (SSL) protocols.

Original Source URL: http://aircconline.com/ijnsa/V12N2/12220ijnsa01.pdf

Volume Link: http://airccse.org/journal/jnsa20_current.html


Sunday, April 5, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Trends in Network and Wireless Network Security in 2020

https://www.academia.edu/41747570/Trends_in_Network_and_Wireless_Network_Security_in_2020

Submission Deadline: April 11, 2020

Contact us:

Here's where you can reach us: ijnsa@airccse.org or ijnsa@aircconline.com

Submission Link:

http://coneco2009.com/submissions/imagination/home.html


Friday, April 3, 2020

International Journal of Network Security & Its Applications (IJNSA)



ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Scope:
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Submission Deadline: April 11, 2020

Contact us:

Here's where you can reach us: ijnsa@airccse.org or ijnsa@aircconline.com

Submission Link:

http://coneco2009.com/submissions/imagination/home.html

Wednesday, April 1, 2020

International Journal of Network Security & Its Applications (IJNSA)



ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Top Downloaded Article in Academia:

https://www.academia.edu/38888363/SECURITY_and_PRIVACY_THREATS_ATTACKS_AND_COUNTERMEASURES_IN_INTERNET_OF_THINGS

Original Source URL: http://aircconline.com/ijnsa/V11N2/11219ijnsa05.pdf

Volume Link: http://airccse.org/journal/jnsa19_current.html

International Journal of Network Security & Its Applications (IJNSA)

ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Current Issue: March 2020, Volume 12, Number 2 - Table of Contents

1. Security Consideration in Peer-to-peer Networks with A Case Study Application
Nick Rahimi, Southern Illinois University, USA
Original Source URL: http://aircconline.com/ijnsa/V12N2/12220ijnsa01.pdf

2. Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dynamic Billing System in Smart Grid Using Permissioned Blockchain
Ozgur Oksuz, Adiyaman University, Turkey
Original Source URL: http://aircconline.com/ijnsa/V12N2/12220ijnsa02.pdf

3. A Survey on Malware Detection and Analysis Tools
Sajedul Talukder1 and Zahidur Talukder2, 1Edinboro University, USA and 2University of Texas at Arlington, USA
Original Source URL: http://aircconline.com/ijnsa/V12N2/12220ijnsa03.pdf

4. An Enhanced User Authentication Framework in Cloud Computing
Hasan Al-Refai, Khaldoun Batiha, Ahmad M. Al-Refai, Philadelphia University, Jordan
Original Source URL: http://aircconline.com/ijnsa/V12N2/12220ijnsa04.pdf

Volume Link: http://airccse.org/journal/jnsa20_current.html


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...