Tuesday, June 30, 2020
Monday, June 29, 2020
International Journal of Network Security & Its Applications (IJNSA)
International
Journal of Network Security & Its Applications (IJNSA)
ISSN:
0974 - 9330 (Online); 0975 - 2307 (Print)
Scope & Topics
The International Journal of Network
Security & Its Applications (IJNSA) is a bi monthly open access
peer-reviewed journal that publishes articles which contribute new results in
all areas of the computer Network Security & its applications. The journal
focuses on all technical and practical aspects of security and its applications
for wired and wireless networks. The goal of this journal is to bring together
researchers and practitioners from academia and industry to focus on
understanding Modern security threats and countermeasures, and establishing new
collaborations in these areas.
Topics of Interest
include, but are not limited to, the following
- Network and Wireless Network
Security
- Mobile, Ad Hoc and Sensor Network
Security
- Peer-to-Peer Network Security
- Database and System Security
- Intrusion Detection and Prevention
- Internet Security &
Applications
- Security & Network Management
- E-mail security, Spam, Phishing,
E-mail fraud
- Virus, worms, Trojan Protection
- Security threats &
countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
- Ubiquitous Computing Security
- Web 2.0 security
- Cryptographic protocols
- Performance Evaluations of
Protocols & Security Application
Paper Submission
Authors
are invited to submit papers for this journal through Email: ijnsa@airccse.org or through Submission
System.
Submissions must be original and should not have been published previously or
be under consideration for publication while being evaluated for this Journal.
Important Dates
· Submission
Deadline: July 04, 2020
· Notification: August 04, 2020
· Final Manuscript Due: August 12, 2020
· Publication Date: Determined by the Editor-in-Chief
Contact Us
International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)
http://airccse.org/journal/ijnsa.html
Trends in Cryptographic Protocols in 2020:
https://www.academia.edu/42291067/Trends_in_Cryptographic_Protocols_in_2020
Submission Deadline: July 04, 2020
Contact us:
Here's where you can reach us: ijnsa@airccse.org or ijnsa@aircconline.com
Submission Link:
http://coneco2009.com/submissions/imagination/home.html
Friday, June 26, 2020
11th International Conference on Ad hoc, Sensor & Ubiquitous Computing (ASUC 2020)
Call for Online Participation
=====================
11th International Conference on Ad hoc, Sensor & Ubiquitous Computing (ASUC 2020)
July 11~12, 2020, Toronto, Canada
https://icaita2020.org/asuc/index.html
Contact Us
Here's where you can reach us: asucconf@yahoo.com or asuc@icaita2020.org
https://icaita2020.org/cp/asuc-cp.pdf
Thursday, June 25, 2020
International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)
http://airccse.org/journal/ijnsa.html
Most Viewed Article for an Year:
https://www.academia.edu/37160354/MINING_PATTERNS_OF_SEQUENTIAL_MALICIOUS_APIS_TO_DETECT_MALWARE
Original Source URL: https://aircconline.com/ijnsa/V10N4/10418ijnsa01.pdf
Volume Link: http://airccse.org/journal/jnsa18_current.html
http://airccse.org/journal/ijnsa.html
Most Viewed Article for an Year:
https://www.academia.edu/37160354/MINING_PATTERNS_OF_SEQUENTIAL_MALICIOUS_APIS_TO_DETECT_MALWARE
Original Source URL: https://aircconline.com/ijnsa/V10N4/10418ijnsa01.pdf
Volume Link: http://airccse.org/journal/jnsa18_current.html
International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)
http://airccse.org/journal/ijnsa.html
Submission Deadline: June 27, 2020
Contact us:
Here's where you can reach us: ijnsa@airccse.org or ijnsa@aircconline.com
Google Scholar Link:
https://scholar.google.co.in/citations?hl=en&user=lhj_6AYAAAAJ
Submission Link:
http://coneco2009.com/submissions/imagination/home.html
http://airccse.org/journal/ijnsa.html
Submission Deadline: June 27, 2020
Contact us:
Here's where you can reach us: ijnsa@airccse.org or ijnsa@aircconline.com
Google Scholar Link:
https://scholar.google.co.in/citations?hl=en&user=lhj_6AYAAAAJ
Submission Link:
http://coneco2009.com/submissions/imagination/home.html
Wednesday, June 24, 2020
Monday, June 22, 2020
International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)
http://airccse.org/journal/ijnsa.html
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
Charles DeVoe1 and Syed (Shawon) M. Rahman, Ph.D.2
1Capella University, Minneapolis, USA
2Computer Science Faculty, University of Hawaii-Hilo, Hilo, USA and Adjunct Faculty, Capella University, Minneapolis, USA
ABSTRACT
Most small to medium health care organizations do not have the capability to address cyber incidents within the organization. Those that do are poorly trained and ill equipped. These health care organizations are subject to various laws that address privacy concerns, proper handling of financial information, and Personally Identifiable Information. Currently an IT staff handles responses to these incidents in an Ad Hoc manner. A properly trained, staffed, and equipped Cyber Incident Response Team is needed to quickly respond to these incidents to minimize data loss, and provide forensic data for the purpose of notification, disciplinary action, legal action, and to remove the risk vector. This paper1 will use the proven Incident Command System model used in emergency services to show any sized agency can have an adequate CIRT.
Original Source Link: http://airccse.org/journal/nsa/0313nsa01.pdf
Volume Link: http://airccse.org/journal/jnsa13_current.html
http://airccse.org/journal/ijnsa.html
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
Charles DeVoe1 and Syed (Shawon) M. Rahman, Ph.D.2
1Capella University, Minneapolis, USA
2Computer Science Faculty, University of Hawaii-Hilo, Hilo, USA and Adjunct Faculty, Capella University, Minneapolis, USA
ABSTRACT
Most small to medium health care organizations do not have the capability to address cyber incidents within the organization. Those that do are poorly trained and ill equipped. These health care organizations are subject to various laws that address privacy concerns, proper handling of financial information, and Personally Identifiable Information. Currently an IT staff handles responses to these incidents in an Ad Hoc manner. A properly trained, staffed, and equipped Cyber Incident Response Team is needed to quickly respond to these incidents to minimize data loss, and provide forensic data for the purpose of notification, disciplinary action, legal action, and to remove the risk vector. This paper1 will use the proven Incident Command System model used in emergency services to show any sized agency can have an adequate CIRT.
Original Source Link: http://airccse.org/journal/nsa/0313nsa01.pdf
Volume Link: http://airccse.org/journal/jnsa13_current.html
International Journal of Network Security & Its Applications (IJNSA)
International
Journal of Network Security & Its Applications (IJNSA)
ISSN:
0974 - 9330 (Online); 0975 - 2307 (Print)
Scope & Topics
The International Journal of Network
Security & Its Applications (IJNSA) is a bi monthly open access
peer-reviewed journal that publishes articles which contribute new results in
all areas of the computer Network Security & its applications. The journal
focuses on all technical and practical aspects of security and its applications
for wired and wireless networks. The goal of this journal is to bring together
researchers and practitioners from academia and industry to focus on
understanding Modern security threats and countermeasures, and establishing new
collaborations in these areas.
Topics of Interest
include, but are not limited to, the following
- Network and Wireless Network
Security
- Mobile, Ad Hoc and Sensor Network
Security
- Peer-to-Peer Network Security
- Database and System Security
- Intrusion Detection and Prevention
- Internet Security &
Applications
- Security & Network Management
- E-mail security, Spam, Phishing,
E-mail fraud
- Virus, worms, Trojan Protection
- Security threats &
countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
- Ubiquitous Computing Security
- Web 2.0 security
- Cryptographic protocols
- Performance Evaluations of
Protocols & Security Application
Paper Submission
Authors
are invited to submit papers for this journal through Email: ijnsa@airccse.org or through Submission
System.
Submissions must be original and should not have been published previously or
be under consideration for publication while being evaluated for this Journal.
Important Dates
· Submission
Deadline: June 27, 2020
· Notification: July 27, 2020
· Final Manuscript Due: August 04, 2020
· Publication Date: Determined by the Editor-in-Chief
Contact Us
Friday, June 19, 2020
6th International Conference of Networks, Communications, Wireless and Mobile Computing (NCWC 2020)
Welcome to NCWC 2020!
6th International Conference of Networks, Communications, Wireless and Mobile Computing (NCWC 2020)
October 24 – 25, 2020, Dubai, UAE
https://csen2020.org/ncwc/index.html
Submission Deadline : June 27, 2020
Contact Us
Here’s where you can reach us: ncwc@csen2020.org or ncwcconference@yahoo.com
International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)
http://airccse.org/journal/ijnsa.html
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
Saad Al-Ahmadi1 and Tariq Lasloum2
1Department of Computer Science, College of Computer and Information Science, King Saud University, Riyadh, Saudi Arabia
2Department of Computer Engineering, College of Computer and Information Science, King Saud University, Riyadh, Saudi Arabia
ABSTRACT
A phishing website is a significant problem on the internet. It’s one of the Cyber-attack types where attackers try to obtain sensitive information such as username and password or credit card information. The recent growth in deploying a Detection phishing URL system on many websites has resulted in a massive amount of available data to predict phishing websites. In this paper, we purpose a new method to develop a phishing detection system called phishing detection based on a multilayer perceptron (PDMLP), which used on two types of datasets. The performance of these mechanisms evaluated in terms of Accuracy, Precision, Recall, and F-measure. Results showed that PDMLP provides better performance in comparison to KNN, SVM, C4.5 Decision Tree, RF, and RoF to classifiers.
Original Source URL: https://aircconline.com/ijnsa/V12N3/12320ijnsa04.pdf
Volume Link: http://airccse.org/journal/jnsa20_current.html
http://airccse.org/journal/ijnsa.html
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
Saad Al-Ahmadi1 and Tariq Lasloum2
1Department of Computer Science, College of Computer and Information Science, King Saud University, Riyadh, Saudi Arabia
2Department of Computer Engineering, College of Computer and Information Science, King Saud University, Riyadh, Saudi Arabia
ABSTRACT
A phishing website is a significant problem on the internet. It’s one of the Cyber-attack types where attackers try to obtain sensitive information such as username and password or credit card information. The recent growth in deploying a Detection phishing URL system on many websites has resulted in a massive amount of available data to predict phishing websites. In this paper, we purpose a new method to develop a phishing detection system called phishing detection based on a multilayer perceptron (PDMLP), which used on two types of datasets. The performance of these mechanisms evaluated in terms of Accuracy, Precision, Recall, and F-measure. Results showed that PDMLP provides better performance in comparison to KNN, SVM, C4.5 Decision Tree, RF, and RoF to classifiers.
Original Source URL: https://aircconline.com/ijnsa/V12N3/12320ijnsa04.pdf
Volume Link: http://airccse.org/journal/jnsa20_current.html
Thursday, June 18, 2020
International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)
http://airccse.org/journal/ijnsa.html
Most Downloaded Article for an Year:
https://www.academia.edu/37160354/MINING_PATTERNS_OF_SEQUENTIAL_MALICIOUS_APIS_TO_DETECT_MALWARE
Original Source URL: https://aircconline.com/ijnsa/V10N4/10418ijnsa01.pdf
Volume Link: http://airccse.org/journal/jnsa18_current.html
http://airccse.org/journal/ijnsa.html
Most Downloaded Article for an Year:
https://www.academia.edu/37160354/MINING_PATTERNS_OF_SEQUENTIAL_MALICIOUS_APIS_TO_DETECT_MALWARE
Original Source URL: https://aircconline.com/ijnsa/V10N4/10418ijnsa01.pdf
Volume Link: http://airccse.org/journal/jnsa18_current.html
Wednesday, June 17, 2020
International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)
http://airccse.org/journal/ijnsa.html
AN EMPIRICAL ANALYSIS OF EMAIL FORENSICS TOOLS
Ahmad Ghafarian, Ash Mady and Kyung Park
Department of Computer Science and Information Systems, Mike Cottrell College of Business, University of North Georgia, Dahlonega, GA, USA
ABSTRACT
Emails are the most common service on the Internet for communication and sending documents. Email is used not only from computers but also from many other electronic devices such as tablets; smartphones, etc. Emails can also be used for criminal activities. Email forensic refers to the study of email detail and content as evidence to identify the actual sender and recipient of a message, date/time of transmission, detailed record of email transaction, intent of the sender, etc. Email forensics involves investigation of metadata, keyword, searching, port scanning and generating report based on investigators need. Many tools are available for any investigation that involves email forensics. Investigators should be very careful of not violating user’s privacy. To this end, investigators should run keyword searches to reveal only the relevant emails. Therefore, knowledge of the features of the tool and the search features is necessary for the tool selection. In this research, we experimentally compare the performance of several email forensics tools. Our aim is to help the investigators with the tool selection task. We evaluate the tools in terms of their keyword search, report generation, and other features such as, email format, size of the file accepted, whether they work online or offline, format of the reports, etc. We use Enron email dataset for our experiment.
Original Source URL: https://aircconline.com/ijnsa/V12N3/12320ijnsa03.pdf
Volume Link: http://airccse.org/journal/jnsa20_current.html
http://airccse.org/journal/ijnsa.html
AN EMPIRICAL ANALYSIS OF EMAIL FORENSICS TOOLS
Ahmad Ghafarian, Ash Mady and Kyung Park
Department of Computer Science and Information Systems, Mike Cottrell College of Business, University of North Georgia, Dahlonega, GA, USA
ABSTRACT
Emails are the most common service on the Internet for communication and sending documents. Email is used not only from computers but also from many other electronic devices such as tablets; smartphones, etc. Emails can also be used for criminal activities. Email forensic refers to the study of email detail and content as evidence to identify the actual sender and recipient of a message, date/time of transmission, detailed record of email transaction, intent of the sender, etc. Email forensics involves investigation of metadata, keyword, searching, port scanning and generating report based on investigators need. Many tools are available for any investigation that involves email forensics. Investigators should be very careful of not violating user’s privacy. To this end, investigators should run keyword searches to reveal only the relevant emails. Therefore, knowledge of the features of the tool and the search features is necessary for the tool selection. In this research, we experimentally compare the performance of several email forensics tools. Our aim is to help the investigators with the tool selection task. We evaluate the tools in terms of their keyword search, report generation, and other features such as, email format, size of the file accepted, whether they work online or offline, format of the reports, etc. We use Enron email dataset for our experiment.
Original Source URL: https://aircconline.com/ijnsa/V12N3/12320ijnsa03.pdf
Volume Link: http://airccse.org/journal/jnsa20_current.html
Tuesday, June 16, 2020
6th International Conference on Networks and Communications (NCO 2020)
6th International Conference on Networks and Communications (NCO 2020)
July 11~12, 2020, Toronto, Canada
https://icaita2020.org/nco/index.html
Important Dates
Third Batch : (Submissions after June 06 , 2020)
• Submission Deadline : June 20, 2020 (Final Call)
• Authors Notification : July 01, 2020
• Registration & Camera-Ready Paper Due : July 06, 2020
Contact Us
Here's where you can reach us: ncoconf@yahoo.com or nco@icaita2020.org
Sunday, June 14, 2020
International Journal of Network Security & Its Applications (IJNSA)
International
Journal of Network Security & Its Applications (IJNSA)
ISSN:
0974 - 9330 (Online); 0975 - 2307 (Print)
Scope & Topics
The International Journal of Network
Security & Its Applications (IJNSA) is a bi monthly open access
peer-reviewed journal that publishes articles which contribute new results in
all areas of the computer Network Security & its applications. The journal
focuses on all technical and practical aspects of security and its applications
for wired and wireless networks. The goal of this journal is to bring together
researchers and practitioners from academia and industry to focus on
understanding Modern security threats and countermeasures, and establishing new
collaborations in these areas.
Topics of Interest
include, but are not limited to, the following
- Network and Wireless Network
Security
- Mobile, Ad Hoc and Sensor Network
Security
- Peer-to-Peer Network Security
- Database and System Security
- Intrusion Detection and Prevention
- Internet Security &
Applications
- Security & Network Management
- E-mail security, Spam, Phishing,
E-mail fraud
- Virus, worms, Trojan Protection
- Security threats &
countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
- Ubiquitous Computing Security
- Web 2.0 security
- Cryptographic protocols
- Performance Evaluations of
Protocols & Security Application
Paper Submission
Authors
are invited to submit papers for this journal through Email: ijnsa@airccse.org or through Submission
System.
Submissions must be original and should not have been published previously or
be under consideration for publication while being evaluated for this Journal.
Important Dates
· Submission
Deadline: June 20, 2020
· Notification: July 20, 2020
· Final Manuscript Due: July 28, 2020
· Publication Date: Determined by the Editor-in-Chief
Contact Us
Subscribe to:
Posts (Atom)
International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #p...
-
Jawaher alqahtani, Daniyal Alghazzawi 1and Li Cheng 2 1Department of Information Systems, King Adbulaziz University, Jeddah, Saudi Ar...
-
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS Inna Kofman1 and Nurul Huda2 1University of Duesseldorf, Department...
-
International Journal of Network Security & Its Applications (IJNSA) ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print) http://airccse.org/...