Wednesday, June 30, 2021

7th International Conference on Software Engineering (SOFT 2021)

Online Paper Submission Now!

7th International Conference on Software Engineering (SOFT 2021)

July 24 ~ 25, 2021, London, United Kingdom

https://icaita2021.org/soft/index

Submission URL: https://icaita2021.org/submission/index.php

Contact us: soft@icaita2021.org or softconference@yahoo.com

Tuesday, June 29, 2021

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Fast Detection of Ddos Attacks Using Non-Adaptive Group Testing

Huynh Nguyen Chinh, Tan Hanh and Nguyen Dinh Thuc, HCMC,Vietnam

ABSTRACT

Network security has become more important role today to personal users and organizations. Denial-ofService (DoS) and Distributed Denial-of-Service (DDoS) attacks are serious problem in network. The major challenges in design of an efficient algorithm in data stream are one-pass over the input, poly-log space, poly-log update time and poly-log reporting time. In this paper, we use strongly explicit construction d-disjunct matrices in Non-adaptive group testing (NAGT) to adapt these requirements and propose a solution for fast detecting DoS and DDoS attacks based on NAGT approach.

KEYWORDS

Denial-of-service attack, ditributed denial-of-service attack, Group testing, Non-Adaptive Group testing, ddisjunct matrix

Original Source URL: http://airccse.org/journal/nsa/5513nsa05.pdf

Volume Link: http://airccse.org/journal/jnsa13_current.html


Monday, June 28, 2021

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following


  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: July 03, 2021

·         Notification: August 03, 2021

·         Final Manuscript Due: August 11, 2021

·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: http://airccse.org/journal/ijnsa.html

Paper Submission Link: http://coneco2009.com/submissions/imagination/home.html

Current Issue URL: http://airccse.org/journal/jnsa21_current.html

Here you can reach us in Social Medias:

·         Facebook: https://www.facebook.com/profile.php?id=100009698498932

·         Twitter: https://twitter.com/CapeIjnsa

·         Academia: https://independent.academia.edu/BrendonClarke

 


Sunday, June 27, 2021

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

June 2021 - Top 10 Read Articles in Network Security and Its Applications

https://www.academia.edu/49359577/June_2021_Top_10_Read_Articles_in_Network_Security_and_Its_Applications

Submission Deadline: July 03, 2021

Contact us:

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

Submission Link:

http://coneco2009.com/submissions/imagination/home.html


Thursday, June 24, 2021

International Journal of Network Security & Its Applications (IJNSA)


International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Google Scholar Link:

https://scholar.google.co.in/citations?hl=en&user=lhj_6AYAAAAJ

Submission Deadline: June 26, 2021

Contact us:

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

Submission Link:

http://coneco2009.com/submissions/imagination/home.html


Wednesday, June 23, 2021

13th International Conference on Network and Communications Security (NCS 2021)


13th International Conference on Network and Communications Security (NCS 2021)

September 25 ~ 26, 2021, Toronto, Canada

https://cseit2021.org/ncs/index

Paper Submission

Authors are invited to submit papers through the conference Submission System by June 26, 2021.

Contact: ncs@cseit2021.org

Submission Link: https://cseit2021.org/submission/index.php

Tuesday, June 22, 2021

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Image Authentication Through ZTransform with Low Energy And Bandwidth (IAZT)

Madhumita Sengupta and J. K. Mandal, University of Kalyani, India

ABSTRACT

In this paper a Z-transform based image authentication technique termed as IAZT has been proposed to authenticate gray scale images. The technique uses energy efficient and low bandwidth based invisible data embedding with a minimal computational complexity. Near about half of the bandwidth is required compared to the traditional Z–transform while transmitting the multimedia contents such as images with authenticating message through network. This authenticating technique may be used for copyright protection or ownership verification. Experimental results are computed and compared with the existing authentication techniques like Li’s method [11], SCDFT [13], Region-Based method [14] and many more based on Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Image Fidelity (IF), Universal Quality Image (UQI) and Structural Similarity Index Measurement (SSIM) which shows better performance in IAZT.

KEYWORDS

Z-Transform, Frequency Domain, Watermarking, Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Image Fidelity (IF), Universal Quality Image (UQI), Structural Similarity Index Measurement (SSIM)

Original Source URL: http://airccse.org/journal/nsa/5513nsa04.pdf

Volume Link: http://airccse.org/journal/jnsa13_current.html

Monday, June 21, 2021

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

 

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: June 26, 2021

·         Notification: July 26, 2021

·         Final Manuscript Due: August 03, 2021

·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: http://airccse.org/journal/ijnsa.html

Paper Submission Link: http://coneco2009.com/submissions/imagination/home.html

Current Issue URL: http://airccse.org/journal/jnsa21_current.html

 
Here you can reach us in Social Medias:
 

·         Facebook: https://www.facebook.com/profile.php?id=100009698498932

·         Twitter: https://twitter.com/CapeIjnsa

·         Academia: https://independent.academia.edu/BrendonClarke

 


Thursday, June 17, 2021

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.net/journal/ijnsa.html

A Survey on Federated Identity Management Systems Limitation and Solutions

Maha Aldosary and Norah Alqahtani, Imam Mohammad Ibn Saud Islamic University, KSA

ABSTRACT

An efficient identity management system has become one of the fundamental requirements for ensuring safe, secure, and transparent use of identifiable information and attributes. Federated Identity Management (FIdM) allows users to distribute their identity information across security domains which increases the portability of their digital identities, and it is considered a promising approach to facilitate secure resource sharing among collaborating participants in heterogeneous IT environments. However, it also raises new architectural challenges and significant security and privacy issues that need to be mitigated. In this paper, we provide a comparison between FIdM architectures, presented the limitations and risks in FIdM system, and discuss the results and proposed solutions.

KEYWORDS

Federated Identity Management, Identity Management, Limitations, Identity Federation.

Original Source URL: https://aircconline.com/ijnsa/V13N3/13321ijnsa04.pdf

Volume Link: https://airccse.net/journal/jnsa21_current.html


Wednesday, June 16, 2021

7th International Conference on Networks & Communications (NWCOM 2021)

Submit Your Articles...!!!

7th International Conference on Networks & Communications (NWCOM 2021)

September 18 ~ 19, 2021, Copenhagen, Denmark

https://csity2021.org/nwcom/index

Contact Us

Here's where you can reach us : nwcom@csity2021.org or nwcomcon@yahoo.com

Submission System:

https://csity2021.org/submission/index.php


Tuesday, June 15, 2021

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Information-Centric Blockchain Technology for the Smart Grid

Lanqin Sang and Henry Hexmoor, Southern Illinois University, USA

ABSTRACT

This paper proposes an application of blockchain technology for securing the infrastructure of the modern power grid - an Information-Centric design for the blockchain network. In this design, all the transactions in the blockchain network are classified into different groups, and each group has a group number. A sender’s identity is encrypted by the control centre’s public key; energy data is encrypted by the subscriber’s public key, and by a receiver’s public key if this transaction is for a specific receiver; a valid signature is created via a group message and the group publisher’s private key. Our implementation of the design demonstrated the proposal is applicable, publisher’s identities are protected, data sources are hidden, data privacy is maintained, and data consistency is preserved.

KEYWORDS

Information-Centric, Blockchain, Smart Grid, Network Security, Distributed System.

Original Source URL: http://aircconline.com/ijnsa/V13N3/13321ijnsa03.pdf

Volume Link: http://airccse.org/journal/jnsa21_current.html

Monday, June 14, 2021

International Journal of Network Security & Its Applications (IJNSA)

 


International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

 

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: June 19, 2021

·         Notification: July 19, 2021

·         Final Manuscript Due: July 27, 2021

·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: http://airccse.org/journal/ijnsa.html

Paper Submission Link: http://coneco2009.com/submissions/imagination/home.html

Current Issue URL: http://airccse.org/journal/jnsa21_current.html


Here you can reach us in Social Medias:

·         Facebook: https://www.facebook.com/profile.php?id=100009698498932

·         Twitter: https://twitter.com/CapeIjnsa

·         Academia: https://independent.academia.edu/BrendonClarke

 

Wednesday, June 9, 2021

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Effect Man-In the Middle on the Network Performance in Various Attack Strategies

Iyas Alodat, Jerash University, Jordan

ABSTRACT

In this paper, we examined the effect on network performance of the various strategies an attacker could adopt to launch Man-In The Middle (MITM) attacks on the wireless network, such as fleet or random strategies. In particular, we're focusing on some of those goals for MITM attackers - message delay, message dropping. According to simulation data, these attacks have a significant effect on legitimate nodes in the network, causing vast amounts of infected packets, end-to-end delays, and significant packet loss.

KEYWORDS

Wireless Network, Mobile Network, security, Man-In-The-Middle Attack, smart cities, simulation, Intelligent Transportation System, Internet-of-Things

Original Source URL: https://aircconline.com/ijnsa/V13N3/13321ijnsa02.pdf

Volume Link: http://airccse.org/journal/jnsa21_current.html

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...