Thursday, December 30, 2021

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Can Blockchain be a Solution to IoT Technical and Security Issues

Adanma Cecilia Eberendu1, Titus Ifeanyi Chinebu2, 1Madonna University, Nigeria, 2Federal College of Dental Technology and Therapy, Nigeria

ABSTRACT

The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.

KEYWORDS

Internet of things, blockchain, IoT security, technical and security issues, IoT devices

Abstract URL: http://aircconline.com/abstract/ijnsa/v13n6/13621ijnsa09.html

Original Source URL: https://aircconline.com/ijnsa/V13N6/13621ijnsa09.pdf

Volume URL: https://airccse.org/journal/jnsa21_current.html

Wednesday, December 29, 2021

3rd International Conference on Big Data and Blockchain (BDAB 2022)

3rd International Conference on Big Data and Blockchain (BDAB 2022)

January 22 ~ 23, 2022, Zurich, Switzerland

https://acsty2022.org/bdab/index

Scope & Topics

3rd International Conference on Big Data and Blockchain (BDAB 2022) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Big Data and Blockchain. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Big Data and Blockchain.

Topics of interest include, but are not limited to, the following

Big Data

·         Big Data Techniques, models and algorithms

·         Big Data Infrastructure and platform

·         Big Data Search and Mining

·         Big Data Security, Privacy and Trust

·         Big Data Applications, Bioinformatics, Multimedia etc

·         Big Data Tools and systems

·         Big Data Mining

·         Big Data Management

·         Cloud and grid computing for Big Data

·         Machine Learning and AI for Big Data

·         Big Data Analytics and Social Media

·         5G and Networks for Big Data

Blockchain

·         Block Chain issues and trends

·         Blockchain Attacks on Existing Systems

·         Blockchain Consensus Algorithms

·         Blockchain Foundations

·         Blockchain New Design

·         Blockchain Privacy

·         Blockchain Scalability

·         Blockchain based security for the IoT

·         Blockchain Authentication and authorization

·         Blockchain in digital forensic

Paper Submission

Authors are invited to submit papers through the conference Submission System by January 01, 2022 (Final Call). Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

Selected papers from BDAB 2022, after further revisions, will be published in the special issue of the following journals.

·         International Journal of Data Mining & Knowledge Management Process (IJDKP)

·         International Journal of Database Management Systems (IJDMS)

·         International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

·         Information Technology in Industry (ITII)New - ESCI Indexed

 
Important Dates

·         Submission Deadline: January 01, 2022 (Final Call) 

·         Authors Notification: January 10, 2022

·         Registration & Camera-Ready Paper Due: January 15, 2022

 

Contact Us

 

Here's where you can reach us: bdab@acsty2022.org (or) bdab_conf@yahoo.com

For more details, please visit: https://acsty2022.org/bdab/index

 

Paper Submission Link: https://acsty2022.org/submission/index.php

 

Tuesday, December 28, 2021

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Google Scholar Link:

https://scholar.google.co.in/citations?hl=en&user=lhj_6AYAAAAJ

Citations 7953   h-index 42   i10-index 168

Submission Deadline: January 01, 2022

Contact us:

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

Submission Link:

http://coneco2009.com/submissions/imagination/home.html


Monday, December 27, 2021

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Comparative Review of Malware Analysis Methodologies

Ioannis G. Kiachidis and Dimitrios A. Baltatzis, International Hellenic University, Greece

ABSTRACT

To fight against the evolution of malware and its development, the specific methodologies that are applied by the malware analysts are crucial. Yet, this is something often overlooked in the relevant bibliography or in the formal and informal training of the relevant professionals. There are only two generic and allencompassing structured methodologies for Malware Analysis (MA) – SAMA and MARE. The question is whether they are adequate and there is no need for another one or whether there is no such need at all. This paper will try to answer the above and it will contribute in the following ways: it will present, compare and dissect those two malware analysis methodologies, it will present their capacity for analysing modern malware by applying them on a random modern specimen and finally, it will conclude on whether there is a procedural optimization for malware analysis over the evolution of these two methodologies.

KEYWORDS

Malware Analysis, SAMA, MARE, Methodology, Review, Comparison

Abstract URL: http://aircconline.com/abstract/ijnsa/v13n6/13621ijnsa08.html

Original Source URL: https://aircconline.com/ijnsa/V13N6/13621ijnsa08.pdf

Volume URL: https://airccse.org/journal/jnsa21_current.html

Sunday, December 26, 2021

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Citations, h-index, i10-index

Citations 7942   h-index 42   i10-index 168

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

 

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: January 01, 2022

·         Notification: February 01, 2022

·         Final Manuscript Due: February 09, 2022

·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: http://airccse.org/journal/ijnsa.html

Paper Submission Link: http://coneco2009.com/submissions/imagination/home.html

Current Issue URL: http://airccse.org/journal/jnsa21_current.html

Here you can reach us in Social Medias:

·         Facebook: https://www.facebook.com/profile.php?id=100009698498932

·         Twitter: https://twitter.com/Journal_IJNSA

·         Academia: https://independent.academia.edu/BrendonClarke

 

Thursday, December 23, 2021

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Information and Communication Security Mechanisms For Microservices-based Systems

Lenin Leines-Vite, Juan Carlos Pérez-Arriaga and Xavier Limón, Universidad Veracruzana, Mexico

ABSTRACT

Security has become paramount in modern software services as more and more security breaches emerge, impacting final users and organizations alike. Trends like the Microservice Architecture bring new security challenges related to communication, system design, development, and operation. The literature presents a plethora of security-related solutions for microservices-based systems, but the spread of information difficult practitioners' adoption of novel security related solutions. In this study, we aim to present a catalogue and discussion of security solutions based on algorithms, protocols, standards, or implementations; supporting principles or characteristics of information security, considering the three possible states of data, according to the McCumber Cube. Our research follows a Systematic Literature Review, synthesizing the results with a meta-aggregation process. We identified a total of 30 primary studies, yielding 75 security solutions for the communication of microservices.

KEYWORDS

Microservices, Software architecture, Secure communication, Information security

Abstract URL: http://aircconline.com/abstract/ijnsa/v13n6/13621ijnsa07.html

Original Source URL: https://aircconline.com/ijnsa/V13N6/13621ijnsa07.pdf

Volume URL: https://airccse.org/journal/jnsa21_current.html

Wednesday, December 22, 2021

11th International Conference on Mobile & Wireless Networks (MoWiN 2022)


11th International Conference on Mobile & Wireless Networks (MoWiN 2022)

February 26 ~ 27, 2022, Vancouver, Canada

https://ccseit2022.org/mowin/index

Submission Deadline : December 25, 2021

Contact Us

Here's where you can reach us : mowin@ccseit2022.org or mowinconf@yahoo.com

Submission System: https://ccseit2022.org/submission/index.php

Tuesday, December 21, 2021

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

December 2021: Top 10 Read Articles in Network Security and Its Applications

https://www.academia.edu/65398775/December_2021_Top_10_Read_Articles_in_Network_Security_and_Its_Applications

Submission Deadline: December 25, 2021

Contact us:

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

Submission Link:

http://coneco2009.com/submissions/imagination/home.html


Monday, December 20, 2021

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

System End-User Actions as a Threat to Information System Security

Paulus Kautwima, Titus Haiduwa, Kundai Sai, Valerianus Hashiyana and Nalina Suresh, University of Namibia, Namibia

ABSTRACT

As universities migrate online due to the advent of Covid-19, there is a need for enhanced security in information systems in the institution of higher learning. Many opted to invest in technological approaches to mitigate cybersecurity threats; however, the most common types of cybersecurity breaches happen due to the human factor, well known as end-user error or actions. Thus, this study aimed to identify and explore possible end-user errors in academia and the resulting vulnerabilities and threats that could affect the integrity of the university's information system. The study further presented state-of-the-art humanoriented security threats countermeasures to compliment universities' cybersecurity plans. Countermeasures include well-tailored ICT policies, incident response procedures, and education to protect themselves from security events (disruption, distortion, and exploitation). Adopted is a mixedmethod research approach with a qualitative research design to guide the study. An open-ended questionnaire and semi-structured interviews were used as data collection tools. Findings showed that system end-user errors remain the biggest security threat to information systems security in institutions of higher learning. Indeed errors make information systems vulnerable to certain cybersecurity attacks and, when exploited, put legitimate users, institutional network, and its computers at risk of contracting viruses, worms, Trojan, and expose it to spam, phishing, e-mail fraud, and other modern security attacks such as DDoS, session hijacking, replay attack and many more. Understanding that technology has failed to fully protect systems, specific recommendations are provided for the institution of higher education to consider improving employee actions and minimizing security incidents in their eLearning platforms, post Covid-19.

KEYWORDS

Information Systems, Security Threats, End-user errors, Human Factors, DDoS, Virus, Worms, Trojan

Abstract URL: http://aircconline.com/abstract/ijnsa/v13n6/13621ijnsa06.html

Original Source URL: https://aircconline.com/ijnsa/V13N6/13621ijnsa06.pdf

Volume URL: https://airccse.org/journal/jnsa21_current.html

Sunday, December 19, 2021


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Citations, h-index, i10-index

Citations 7916   h-index 42   i10-index 168

IJNSA is indexed in World Journal Clout Index (WJCI)

https://wjci.cnki.net/UserIndex/JournalOverseaDetails?filename=ISSN0975-2307&Year=2020

WJCI Impact Factor - 0.279

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

 

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: December 25, 2021

·         Notification: January 25, 2022

·         Final Manuscript Due: February 02, 2022

·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: http://airccse.org/journal/ijnsa.html

Paper Submission Link: http://coneco2009.com/submissions/imagination/home.html

Current Issue URL: http://airccse.org/journal/jnsa21_current.html

Here you can reach us in Social Medias:

·         Facebook: https://www.facebook.com/profile.php?id=100009698498932

·         Twitter: https://twitter.com/Journal_IJNSA

·         Academia: https://independent.academia.edu/BrendonClarke

 

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...