Thursday, April 29, 2021

International Journal of Network Security & Its Applications (IJNSA)


International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Google Scholar Link:

https://scholar.google.co.in/citations?hl=en&user=lhj_6AYAAAAJ

Submission Deadline: May 01, 2021

Contact us:

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

Submission Link:

http://coneco2009.com/submissions/imagination/home.html


Wednesday, April 28, 2021

6th International Conference on Networks, Communications, Wireless and Mobile Computing (NCWMC 2021)

Call for Papers..!!!

6th International Conference on Networks, Communications, Wireless and Mobile Computing (NCWMC 2021)

May 29~30, 2021, Vancouver, Canada

Web Page URL : https://ccsit2021.org/ncwmc/index.html

Submission URL : https://ccsit2021.org/submission/index.php

Submission Deadline : May 01, 2021

Contact Us : ncwmc@ccsit2021.org


Tuesday, April 27, 2021

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Hybridization of DCT based Steganography and Random Grids

Pratarshi Saha1, Sandeep Gurung1 and Kunal Krishanu Ghose2, 1Sikkim Manipal Institute of Technology, India and 2QualComm, USA

ABSTRACT

With the increasing popularity of information technology in communication network, security has become an inseparable but vital issue for providing for confidentiality, data security, entity authentication and data origin authentication. Steganography is the scheme of hiding data into a cover media to provide confidentiality and secrecy without risking suspicion of an intruder. Visual cryptography is a new technique which provides information security using simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This technique allows visual information to be encrypted in such a way that their decryption can be performed by the Human Visual System (HVS), without any complex cryptographic algorithms. To provide a better secured system that ensures high data capacity and information security, a multilevel security system can be thought for which can be built by incorporating the principles of steganography and visual cryptography.

KEYWORDS

Data Security, DCT based Steganography, Random Grids, Visual Cryptography, Hybrid

Original Source URL: http://airccse.org/journal/nsa/5413nsa13.pdf

Volume Link: http://airccse.org/journal/jnsa13_current.html

Monday, April 26, 2021

International Journal of Network Security & Its Applications (IJNSA)

 


International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

 

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·        Submission Deadline: May 01, 2021

·        Notification: June 01, 2021

·        Final Manuscript Due: June 08, 2021

·        Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: http://airccse.org/journal/ijnsa.html

Paper Submission Link: http://coneco2009.com/submissions/imagination/home.html

Current Issue URL: http://airccse.org/journal/jnsa21_current.html

Here you can reach us in Social Medias:

·        Facebook: https://www.facebook.com/profile.php?id=100009698498932

·        Twitter: https://twitter.com/CapeIjnsa

·        Academia: https://independent.academia.edu/BrendonClarke

 

Thursday, April 22, 2021

International Journal of Network Security & Its Applications (IJNSA)


International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Submit Your Research Manuscripts "May Issue Journal"

Contact us:

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

Submission Link:

http://coneco2009.com/submissions/imagination/home.html


Wednesday, April 21, 2021

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Phishing Mitigation Techniques: A Literature Survey

Wosah Peace Nmachi and Thomas Win, School of Computing & Engineering University of Gloucestershire, United Kingdom

ABSTRACT

Email is a channel of communication which is considered to be a confidential medium of communication for exchange of information among individuals and organisations. The confidentiality consideration about e-mail is no longer the case as attackers send malicious emails to users to deceive them into disclosing their private personal information such as username, password, and bank card details, etc. In search of a solution to combat phishing cybercrime attacks, different approaches have been developed. However, the traditional exiting solutions have been limited in assisting email users to identify phishing emails from legitimate ones. This paper reveals the different email and website phishing solutions in phishing attack detection. It first provides a literature analysis of different existing phishing mitigation approaches. It then provides a discussion on the limitations of the techniques, before concluding with an explorationin to how phishing detection can be improved.

KEYWORDS

Cyber-security, Phishing Email Attack, Deep Learning, Stylometric Analysis, Cyber Human Behaviour

Original Source URL: https://aircconline.com/ijnsa/V13N2/13221ijnsa05.pdf

Volume Link: http://airccse.org/journal/jnsa21_current.html


Tuesday, April 20, 2021

10th International Conference on Parallel, Distributed Computing Technologies and Applications (PDCTA 2021)


10th International Conference on Parallel, Distributed Computing Technologies and Applications (PDCTA 2021)

May 29~30, 2021, Vancouver, Canada

https://ccsit2021.org/pdcta/index.html  

Important Dates

Submission Deadline: April 24, 2021

Contact Us

Here's where you can reach us: pdcta@ccsit2021.org (or) pdcta_conference@yahoo.com

Submission link: https://ccsit2021.org/submission/index.php


Monday, April 19, 2021

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

A Literature Survey and Analysis on Social Engineering Defense Mechanisms and Infosec Policies

Dalal Alharthi and Amelia Regan, University of California Irvine, USA

ABSTRACT

Social engineering attacks can be severe and hard to detect. Therefore, to prevent such attacks, organizations should be aware of social engineering defense mechanisms and security policies. To that end, the authors developed a taxonomy of social engineering defense mechanisms, designed a survey to measure employee awareness of these mechanisms, proposed a model of Social Engineering InfoSec Policies (SE-IPs), and designed a survey to measure the incorporation level of these SE-IPs. After analyzing the data from the first survey, the authors found that more than half of employees are not aware of social engineering attacks. The paper also analyzed a second set of survey data, which found that on average, organizations incorporated just over fifty percent of the identified formal SE-IPs. Such worrisome results show that organizations are vulnerable to social engineering attacks, and serious steps need to be taken to elevate awareness against these emerging security threats.

KEYWORDS

Cybersecurity, Social Engineering, Employee Awareness, Defense Mechanisms, Security Policies

Original Source URL: https://aircconline.com/ijnsa/V13N2/13221ijnsa04.pdf

Volume Link: http://airccse.org/journal/jnsa21_current.html

Sunday, April 18, 2021

International Journal of Network Security & Its Applications (IJNSA)

 


International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

 

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: April 24, 2021

·         Notification: May 24, 2021

·         Final Manuscript Due: May 31, 2021

·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: http://airccse.org/journal/ijnsa.html

Paper Submission Link: http://coneco2009.com/submissions/imagination/home.html

Current Issue URL: http://airccse.org/journal/jnsa21_current.html


Here you can reach us in Social Medias:

·         Facebook: https://www.facebook.com/profile.php?id=100009698498932

·         Twitter: https://twitter.com/CapeIjnsa

·         Academia: https://independent.academia.edu/BrendonClarke

 

Friday, April 16, 2021

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

April 2021: Top 10 Read Articles in Network Security and Its Applications

https://www.academia.edu/46913207/April_2021_Top_10_Read_Articles_in_Network_Security_and_Its_Applications

Submission Deadline: April 24, 2021

Contact us:

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

Submission Link:

http://coneco2009.com/submissions/imagination/home.html


International Journal of Network Security & Its Applications (IJNSA) - Current Issue: January 2021, Volume 13, Number 1


International Journal of Network Security & Its Applications (IJNSA)

ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Current Issue: January 2021, Volume 13, Number 1

Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms

William R. Simpson and Kevin E. Foltz, The Institute for Defense Analyses (IDA), USA

http://aircconline.com/abstract/ijnsa/v13n1/13121ijnsa01.html

http://aircconline.com/ijnsa/V13N1/13121ijnsa01.pdf

Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset

Geeta Kocher1 and Gulshan Kumar2, 1MRSPTU, India, 2SBSSTC, India

http://aircconline.com/abstract/ijnsa/v13n1/13121ijnsa02.html

http://aircconline.com/ijnsa/V13N1/13121ijnsa02.pdf

Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis

Anna Georgiadou, Spiros Mouzakitis and Dimitris Askounis, National Technical University of Athens, Greece

http://aircconline.com/abstract/ijnsa/v13n1/13121ijnsa03.html

http://aircconline.com/ijnsa/V13N1/13121ijnsa03.pdf

Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys

Cheman Shaik, VISH Consulting Services Inc, USA

http://aircconline.com/abstract/ijnsa/v13n1/13121ijnsa04.html

http://aircconline.com/ijnsa/V13N1/13121ijnsa04.pdf

Game Theory Application Resources Management and Distribution in Blockchain Network

Cong Hung Tran1, Dien Tam Le1, 2, Thanh Hieu Huynh3, 1Posts and Telecommunications Institute of Technology, Vietnam, 2Thu Duc Technology College, Vietnam, 3Saigon University, Vietnam

http://aircconline.com/abstract/ijnsa/v13n1/13121ijnsa05.html

http://aircconline.com/ijnsa/V13N1/13121ijnsa05.pdf

Volume Link: http://airccse.org/journal/jnsa21_current.html

Thursday, April 15, 2021

International Journal of Network Security & Its Applications (IJNSA)


International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Most Viewed Article for an Year:

https://www.academia.edu/45701590/COMPARISON_OF_MALWARE_CLASSIFICATION_METHODS_USING_CONVOLUTIONAL_NEURAL_NETWORK_BASED_ON_API_CALL_STREAM

Original Source URL: http://aircconline.com/ijnsa/V13N2/13221ijnsa01.pdf

Volume Link: http://airccse.org/journal/jnsa21_current.html

Wednesday, April 14, 2021

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Applying the Health Belief Model to Cardiac Implanted Medical Device Patients

George W. Jackson1 and Shawon Rahman2, 1Capella University, USA, 2University of HawaiiHilo, USA

ABSTRACT

Wireless Implanted Medical Devices (WIMD) are helping millions of users experience a better quality of life. Because of their many benefits, these devices are experiencing dramatic growth in usage, application, and complexity. However, this rapid growth has precipitated an equally rapid growth of cybersecurity risks and threats. While it is apparent from the literature WIMD cybersecurity is a shared responsibility among manufacturers, healthcare providers, and patients; what explained what role patients should play in WIMD cybersecurity and how patients should be empowered to assume this role. The health belief model (HBM) was applied as the theoretical framework for a multiple case study which examined the question: How are the cybersecurity risks and threats related to wireless implanted medical devices being communicated to patients who have or will have these devices implanted in their bodies? The subjects of this multiple case study were sixteen cardiac device specialists in the U.S., each possessing at least one year of experience working directly with cardiac implanted medical device (CIMD) patients, who actively used cardiac device home monitoring systems. The HBM provides a systematic framework suitable for the proposed research. Because of its six-decade history of validity and its extraordinary versatility, the health belief model, more efficiently than any other model considered, provides a context for understanding and interpreting the results of this study. Thus, the theoretical contribution of this research is to apply the HBM in a setting where it has never been applied before, WIMD patient cybersecurity awareness. This analysis (using a multiple case study) will demonstrate how the HBM can assist the health practitioners, regulators, manufacturers, security practitioners, and the research community in better understanding the factors, which support WIMD patient cybersecurity awareness and subsequent adherence to cybersecurity best practices.

KEYWORDS

Health Belief Model, Healthcare Cybersecurity, Cardiac Implanted Device, Wireless Implanted Medical Devices, WIMD, WIMD cybersecurity

Original Source URL: https://aircconline.com/ijnsa/V13N2/13221ijnsa03.pdf

Volume Link: http://airccse.org/journal/jnsa21_current.html

Tuesday, April 13, 2021

10th International Conference on Cryptography and Information Security (CRYPIS 2021)

Call for Papers...!!!

10th International Conference on Cryptography and Information Security (CRYPIS 2021)

June 26~27, 2021, Sydney, Australia

Due to the current COVID-19 pandemic, registered authors are now able to present their work through our online platforms New

Webpage Link: https://itcse2021.org/crypis/index.html

Submission Deadline -17.04.2021

Submission Link: https: https://itcse2021.org/submission/index.php

Contact Us: crypis@itcse2021.org

Monday, April 12, 2021

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Performance Evaluation of Machine Learning Techniques for DOS Detection in Wireless Sensor Network

Lama Alsulaiman and Saad Al-Ahmadi, King Saud University, Saudi Arabia

ABSTRACT

The nature of Wireless Sensor Networks (WSN) and the widespread of using WSN introduce many security threats and attacks. An effective Intrusion Detection System (IDS) should be used to detect attacks. Detecting such an attack is challenging, especially the detection of Denial of Service (DoS) attacks. Machine learning classification techniques have been used as an approach for DoS detection. This paper conducted an experiment using Waikato Environment for Knowledge Analysis (WEKA)to evaluate the efficiency of five machine learning algorithms for detecting flooding, grayhole, blackhole, and scheduling at DoS attacks in WSNs. The evaluation is based on a dataset, called WSN-DS. The results showed that the random forest classifier outperforms the other classifiers with an accuracy of 99.72%.

KEYWORDS

Wireless Sensor Networks, Machine Learning, Denial of Service

Original Source URL: https://aircconline.com/ijnsa/V13N2/13221ijnsa02.pdf

Volume Link: http://airccse.org/journal/jnsa21_current.html

Sunday, April 11, 2021

International Journal of Network Security & Its Applications (IJNSA)


International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

 

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: April 24, 2021

·         Notification: May 24, 2021

·         Final Manuscript Due: May 31, 2021

·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: http://airccse.org/journal/ijnsa.html

Paper Submission Link: http://coneco2009.com/submissions/imagination/home.html

Current Issue URL: http://airccse.org/journal/jnsa21_current.html


Here you can reach us in Social Medias:

·         Facebook: https://www.facebook.com/profile.php?id=100009698498932

·         Twitter: https://twitter.com/CapeIjnsa

·         Academia: https://independent.academia.edu/BrendonClarke

 

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...