Friday, May 29, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Most Viewed Article for an Year:

https://www.academia.edu/38383897/Architecture_for_Intrusion_Detection_System_with_Fault_Tolerance_Using_Mobile_Agent

Original Source URL: http://airccse.org/journal/nsa/0911nsa13.pdf

Volume Link: http://airccse.org/journal/jnsa11_current.html


Thursday, May 28, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Submission Deadline: May 30, 2020

Contact us:

Here's where you can reach us: ijnsa@airccse.org or ijnsa@aircconline.com

Submission Link:

http://coneco2009.com/submissions/imagination/home.html





Wednesday, May 27, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

ONTOLOGY-DRIVEN INFORMATION RETRIEVAL FOR HEALTHCARE INFORMATION SYSTEM : A CASE STUDY

Aidarus M. Ibrahim1 and Hussein A. Hashi2 Abdullalem A. Mohamed2
1Faculty of Computer Science and Information system, University Technology Malaysia (UTM), Malaysia
2Faculty of Computer Science and Information system, University Technology Malaysia (UTM), Malaysia
2Faculty of Computer Science and Information system, University Technology Malaysia (UTM), Malaysia

Abstract
In health research, one of the major tasks is to retrieve, and analyze heterogeneous databases containing one single patient’s information gathered from a large volume of data over a long period of time. The main objective of this paper is to represent our ontology-based information retrieval approach for clinical Information System. We have performed a Case Study in the real life hospital settings. The results obtained illustrate the feasibility of the proposed approach which significantly improved the information retrieval process on a large volume of data over a long period of time from August 2011 until January 2012.

Original Source URL: http://airccse.org/journal/nsa/0113nsa05.pdf

Volume Link: http://airccse.org/journal/jnsa13_current.html



Tuesday, May 26, 2020

International Conference on Networks, Blockchain and Internet of Things (NBIoT 2020)



International Conference on Networks, Blockchain and Internet of Things (NBIoT 2020)

June 20~21, 2020, Dubai, UAE

https://csita2020.org/nbiot/index.html

Important Dates

• Submission Deadline :May 31, 2020
• Authors Notification : June 05, 2020
• Registration & camera – Ready Paper Due :June 10, 2020

Contact Us

Here’s where you can reach us : nbiot@acsty2020.org(or) confnbiot@yahoo.com

Sunday, May 24, 2020

International Journal of Network Security & Its Applications (IJNSA)


International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Scope:
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Submission Deadline: May 30, 2020

Contact us:

Here's where you can reach us: ijnsa@airccse.org or ijnsa@aircconline.com

Submission Link:

http://coneco2009.com/submissions/imagination/home.html

Friday, May 22, 2020

International Conference on Big Data, Blockchain and Security (BDBS 2020)


International Conference on Big Data, Blockchain and Security (BDBS 2020)

August 22~23, 2020, Chennai, India

https://www.cseij.org/bdbs/index.html

Scope & Topics

International Conference on Big Data, Blockchain and Security (BDBS 2020) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Big Data and Block chain. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Big Data and Blockchain.

Important Dates

Submission Deadline : May 24, 2020

Submission Link
https://www.cseij.org/papersubmission/index.php

Contact Us
Here’s where you can reach us: bdbs@cseij.org or bdbsconf@yahoo.com

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Most Viewed Article for an Year:

https://www.academia.edu/28200717/AN_INTELLECT_LEARNING_ON_E-MAIL_SECURITY_AND_FRAUD_SPAM_AND_PHISHING

Original Source URL: http://airccse.org/journal/nsa/7515nsa03.pdf

Volume Link: http://airccse.org/journal/jnsa15_current.html



Thursday, May 21, 2020

6th International Conference On Networks, Mobile Communication (NMCO 2020)


6th International Conference On Networks, Mobile Communication (NMCO 2020)

https://csita2020.org/nmco/index.html

Submission Deadline : May 24, 2020

Contact us: Here's where you can reach us: nmco@csita2020.org

Submission link: https://csita2020.org/submission/index.php

Wednesday, May 20, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

HOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLY

Mikako Kageshima & ManabuOkamoto
Kanagawa Institute of Technology, Kanagawa, Japan

Abstract:
In electronic voting or whistle blowing, anonymity is necessary. Shuffling is a network security technique that makes the information sender anonymous. We use the concept of shuffling in internet-based lotteries, mental poker, E-commerce systems, and Mix-Net. However, if the shuffling is unjust, the anonymity, privacy, or fairness may be compromised. In this paper, we propose the method for confirming fair mixing by finding a fixed point in the mix system and we can keep the details on ‘how to shuffle’ secret. This method requires only two steps and is efficient.

Original Source URL: http://airccse.org/journal/nsa/0113nsa04.pdf

Volume Link: http://airccse.org/journal/jnsa13_current.html



Tuesday, May 19, 2020

8th International Conference of Security, Privacy and Trust Management (SPTM 2020)


8th International Conference of Security, Privacy and Trust Management (SPTM 2020)

June 13 ~ 14, 2020, Helsinki, Finland

https://csit2020.org/sptm/index.html

Scope:
8th International Conference of Security, Privacy and Trust Management (SPTM 2020) looks for significant contributions to Trust management for networks. Original papers are invited on Security, Privacy and Trust Management of wireless and wired networks. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.

Submission Deadline: May 23, 2020

Contact us:
Here's where you can reach us: sptm@csit2020.org (or) sptmconf@yahoo.com

Submission Link:
https://csit2020.org/submission/index.php

Monday, May 18, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Scope:
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Submission Deadline: May 23, 2020

Contact us:
Here's where you can reach us: ijnsa@airccse.org or ijnsa@aircconline.com

Submission Link:
http://coneco2009.com/submissions/imagination/home.html


Friday, May 15, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Most Viewed Article for an Year:

https://www.academia.edu/38383897/Architecture_for_Intrusion_Detection_System_with_Fault_Tolerance_Using_Mobile_Agent

Original Source URL: http://airccse.org/journal/nsa/0911nsa13.pdf

Volume Link: http://airccse.org/journal/jnsa11_current.html

Thursday, May 14, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

AN INTEGRATED SOLUTION FOR BOTH MONITORING AND CONTROLLING FOR AUTOMIZATION USING WIRELESS SENSOR NETWORKS: A CASE STUDY

M Gnana Seelan & Ch A S Murty
Centre for Development of Advanced Computing, Hyderabad, India

Abstract:
Temperature monitoring plays a major role in controlling it according to its varied conditions. This process is common in all critical areas like data centre, server rooms, grid rooms and other data communication equipped rooms. This is mandatory for each organization/industry to impart such process, as most of the critical data would be in data centre along with their network infrastructure which having various electronic, electrical and mechanical devices are involved for data transmissions. These devices are very much depend on the environmental factors such as temperature, moisture, humidity etc., and also emit heat in the form of thermal energy when they are in functional. To overcome these heats, the server/data centre room(s) would be engaged with multiple (distributed) air-conditioning (ac) systems to provide cooling environment and maintain the temperature level of the room. The proposed paper is the study of automization of monitoring and controlling temperature as per desired requirements with wsn network

Original Source URL: http://airccse.org/journal/nsa/0113nsa03.pdf

Volume Link: http://airccse.org/journal/jnsa13_current.html


Wednesday, May 13, 2020

8th International Conference of Networks and Communications (NC 2020)


Call for Participation

We invite you to join us in Vancouver, Canada on May 30~31, 2020 for 8th International Conference of Networks and Communications (NC 2020)

The Conference is a forum for presenting new advances and research results in the fields of will provide an excellent international forum for sharing knowledge and results in Computer Networks & Communications.

Highlights of NC 2020 include:

• Invited talk from eminent Professors
• 9th International Conference on Advanced Computer Science and Information Technology (ICAIT 2020)
• 12th International Conference on Wireless and Mobile Network(WiMo 2020)
• International Conference on Artificial Intelligence and Machine Learning(CAIML 2020)
• 9th International Conference on Cryptography and Information Security(CRYPIS 2020)
• 9th International Conference on Digital Image Processing and Vision (ICDIPV 2020)
• 9th International Conference on Information Technology Convergence and Services (ITCSE 2020)
• International Conference on Cloud, Big Data and IoT (CBIoT 2020)
• International conference on Natural Language Computing Advances (NLCA 2020)

Registration Participants

Non-Author / Co-Author/ Simple Participants (no paper)

550 USD (With proceedings)

Here's where you can reach us: ncconf@itcse2020.org or nc.conf@yahoo.com

https://itcse2020.org/cp/nc-cp.pdf

Tuesday, May 12, 2020

International Journal of Network Security & Its Applications (IJNSA)


ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Scope:
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Submission Deadline: May 16, 2020

Contact us:

Here's where you can reach us: ijnsa@airccse.org or ijnsa@aircconline.com

Submission Link:

http://coneco2009.com/submissions/imagination/home.html

Monday, May 11, 2020

International Journal of Network Security & Its Applications (IJNSA)


ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Trends in Network and Wireless Network Security in 2020
https://www.academia.edu/41747570/Trends_in_Network_and_Wireless_Network_Security_in_2020

Submission Deadline: May 16, 2020

Contact us:
Here's where you can reach us: ijnsa@airccse.org or ijnsa@aircconline.com

Submission Link:
http://coneco2009.com/submissions/imagination/home.html

Friday, May 8, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Submission Deadline: May 09, 2020

Contact us:

Here's where you can reach us: ijnsa@airccse.org or ijnsa@aircconline.com

Submission Link:

http://coneco2009.com/submissions/imagination/home.html



Thursday, May 7, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Most Downloaded Article for an Year:

https://www.academia.edu/37160354/MINING_PATTERNS_OF_SEQUENTIAL_MALICIOUS_APIS_TO_DETECT_MALWARE

Original Source URL: https://aircconline.com/ijnsa/V10N4/10418ijnsa01.pdf

Volume Link: http://airccse.org/journal/jnsa18_current.html



Tuesday, May 5, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

CLICK SPAM PREVENTION MODEL FOR ONLINE ADVERTISEMENT

Nicola Zingirian and Michele Benini
Department of Information Engineering, University of Padova, Italy

Abstract:
This paper shows a vulnerability of the pay-per-click accounting of Google Ads and proposes a statistical tradeoff-based approach to manage this vulnerability. The result of this paper is a model to calculate the overhead cost per click necessary to protect the subscribers and a simple algorithm to implement this protection. Simulations validate the correctness of the model and the economical applicability.

Original Source URL: https://aircconline.com/ijnsa/V10N1/10118ijnsa01.pdf

Volume Link: http://airccse.org/journal/jnsa18_current.html

9th International Conference on Parallel, Distributed Computing and Applications (IPDCA 2020)


June 13 ~ 14, 2020, Helsinki, Finland

https://csit2020.org/ipdca/index.html

Submission Deadline: May 09, 2020

Contact us:

Here's where you can reach us: ipdca@csit2020.org (or) ipdcaconf@yahoo.com

Submission Link:

https://csit2020.org/submission/index.php

Monday, May 4, 2020

International Journal of Network Security & Its Applications (IJNSA)


ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Submission Deadline: May 09, 2020

Contact us:

Here's where you can reach us: ijnsa@airccse.org or ijnsa@aircconline.com

Submission Link:

http://coneco2009.com/submissions/imagination/home.html

Friday, May 1, 2020

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

RSAED: ROBUST AND SECURE AGGREGATION OF ENCRYPTED DATA IN WIRELESS SENSOR NETWORKS

Merad Boudia Omar Rafik & Feham Mohamed

STIC Laboratory, Department of Telecommunication, University of Tlemcen, Algeria

Abstract:
Recently, secure in-network aggregation in wireless sensor networks becomes a challenge issue, there is an extensive research on this area due to the large number of applications where the sensors are deployed and the security needs. In the last few years, aggregation of encrypted data has been proposed in order to maintain secrecy between the sensors and the sink, so the end-to-end data confidentiality is provided. However, the data integrity was not addressed. In this paper, we propose RSAED that allows integrity verification at intermediate nodes, ensures the base station to receive ciphertexts which come only from legitimate nodes and also improves the efficiency. Through implementation results, we evaluate our scheme using computation and communication overhead.

Original Source Link: http://airccse.org/journal/nsa/1112nsa01.pdf

Volume Link: http://airccse.org/journal/jnsa12_current.html



International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...