Thursday, April 28, 2022

3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)


3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)

July 23 ~ 24, 2022, Toronto, Canada

Webpage URL:

https://www.itcse2022.org/cbiot/index

Submission Deadline: April 30, 2022

Contact us:

Here's where you can reach us: cbiot@itcse2022.org (or) cbiot.conf@yahoo.com

Submission URL:

https://www.itcse2022.org/submission/index.php


Wednesday, April 27, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

April 2022 - Top 10 Read Articles in Network Security and Its Applications

https://www.academia.edu/77834325/April_2022_Top_10_Read_Articles_in_Network_Security_and_Its_Applications

Submission Deadline: April 30, 2022

Contact us:

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

Submission URL:

https://coneco2009.com/submissions/imagination/home.html


Tuesday, April 26, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

The Impact of Management Information systems(MIS) Technologies on the quality of Services provided at the University of TABUK

Hiyam S. Ensour and Tareg M. Alinizi, Petra of university, Jordan

Abstract

This study aimed to identify the impact of management information systems (MIS) techniques on the quality of services provided at the University of Tabuk from the perspective of staff. To achieve the goals of the study, two questionnaires were developed and distributed on a random sample of 426 employees at the University of Tabuk in the Kingdom of Saudi Arabia. The Statistical Package of Social Sciences (SPSS, V.16) was used to analyze the data of the questionnaire.

Keywords

MIS, computer, management, information technology, quality, and services

Original Source URL: https://airccse.org/journal/nsa/6214nsa01.pdf

Volume URL: https://airccse.org/journal/jnsa14_current.html

Sunday, April 24, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.org/journal/ijnsa.html

Citations, h-index, i10-index

Citations 8225   h-index 43   i10-index 171

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

 

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: April 30, 2022

·         Acceptance Notification: May 25, 2022

·         Final Manuscript Due: May 28, 2022

·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: https://airccse.org/journal/ijnsa.html

 


Thursday, April 21, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.org/journal/ijnsa.html

Current Issue URL:

https://airccse.org/journal/jnsa22_current.html

Invitation to submit your research in "May 2022, Volume 14, Number 3"

Contact us:

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

Submission Link:

https://coneco2009.com/submissions/imagination/home.html


Wednesday, April 20, 2022

4th International Conference on Internet of Things (CIoT 2022)


4th International Conference on Internet of Things (CIoT 2022)

June 25 ~ 26, 2022, Copenhagen, Denmark

https://www.cseit2022.org/ciot/index

Submission Deadline: April 23, 2022

Contact us:

Here's where you can reach us: ciot@cseit2022.org (or) ciotconference@yahoo.com

Submission Link:

https://www.cseit2022.org/submission/index.php


Tuesday, April 19, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.org/journal/ijnsa.html

Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares

Pallavi Vijay Chavan1, Mohammad Atique2 and Latesh Malik1, 1GHRCE - Nagpur, India and 2SGBAU - Amravati, India

Abstract

Novel idea of hierarchical visual cryptography is stated in this paper. The key concept of hierarchical visual cryptography is based upon visual cryptography. Visual cryptography encrypts secret information into two pieces called as shares. These two shares are stacked together by logical XOR operation to reveal the original secret. Hierarchical visual cryptography encrypts the secret in various levels. The encryption in turn is expansionless. The original secret size is retained in the shares at all levels. In this paper secret is encrypted at two different levels. Four shares are generated out of hierarchical visual cryptography. Any three shares are collectively taken to form the key share. All shares generated are meaningless giving no information by visual inspection. Performance analysis is also obtained based upon various categories of secrets. The greying effect is completely removed while revealing the secret Removal of greying effect do not change the meaning of secret.

Keywords

Visual cryptography, greying effect, shares, key share

Original Source URL: https://airccse.org/journal/nsa/6114nsa08.pdf

Volume URL: https://airccse.org/journal/jnsa14_current.html

Sunday, April 17, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.org/journal/ijnsa.html

https://wjci.cnki.net/UserIndex/JournalOverseaDetails?filename=ISSN0975-2307&Year=2020

WJCI Impact Factor - 0.279

Submission Deadline: April 23, 2022

Contact us:

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

Submission Link:

https://coneco2009.com/submissions/imagination/home.html


Thursday, April 14, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.org/journal/ijnsa.html

Hybridized Model for Data Security Based on Security Hash Analysis (SHA 512) and Salting Techniques

Felix Aranuwa1, Ford Olubodun2 and David Akinwumi1, 1Adekunle Ajasin University, Nigeria, 2Auchi Polytechnic, Nigeria

Abstract

High-profile security breaches and attacks on many organization’s database have been on the increase and the consequences of this, are the adverse effect on the organizations in terms of financial loss and reputation. Many of the security breaches has been ascribed to the vulnerability of the organization’s networks, security policy and operations. Additionally, the emerging technology solutions like Internet-ofThings (IoT), Artificial Intelligence, and Cloud Computing, has extremely exposed many of the organizations to different forms of cyber-threats and attacks. Researchers and system designers have made attempts to proffer solution to some of these challenges. However, the efficacy of the techniques remains a great concern due to insufficient control mechanisms. For instance, many of the techniques are majorly based on a single mode encryption techniques which are not too robust to withstand the threats and attacks on organization’s database. To proffer solution to these challenges, the current research designed and integrated a hybridized data security model based on Secured Hash Analysis (SHA 512) and Salting Techniques to enhance the adeptness of the existing techniques. The Hash Analysis algorithm was used to map the data considered to a bit string of a fixed length and salt was added to the password strings essentially to hide its real hash value. The idea of adding salt to the end of the password is basically to complicate the password cracking process. The hybridized model was implemented in Windows environment using python 3.7 IDE platform and tested on a dedicated Local Area Network (LAN) that was exposed to threats from both internal and external sources. The results from the test show that the model performed well in terms of efficiency and robustness to attacks. The performance of the new model recorded a high level of improvement over the existing techniques with a recital of 97.6%.

Keywords

LAN, Threats and Attacks, Security Breaches, Cryptography, Data Security, Hash Analysis, Salting Techniques

Abstract URL: http://aircconline.com/abstract/ijnsa/v14n2/14222ijnsa03.html

Original Source URL: https://aircconline.com/ijnsa/V14N2/14222ijnsa03.pdf

Volume URL: https://airccse.org/journal/jnsa22_current.html

Wednesday, April 13, 2022

11th International Conference on Cryptography and Information Security (CRYPIS 2022)


Call for Research Papers!

11th International Conference on Cryptography and Information Security (CRYPIS 2022)

July 23~24, 2022, Toronto, Canada

https://www.itcse2022.org/crypis/index

Submission Deadline : April 16, 2022

Contact Us

Here's where you can reach us : crypis@itcse2022.org or crypis.conf@yahoo.com

Submission System: https://www.itcse2022.org/submission/index.php

Monday, April 11, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.org/journal/ijnsa.html

The Effectiveness of Applying Different Strategies on Recognition and Recall Textual Password

Hassan Wasfi and Richard Stone, Iowa State University, USA

Abstract

Using English words as passwords have been a popular topic in the last few years. The following article discusses a study to compare self-selection of the system-generated words for recognition and selfgenerated words for recall for nouns and mixture words. The results revealed no significant difference between recognition and recall of password nouns. The average memorability rate of noun recognition was 75.72%, slightly higher than noun recall 74.23% in long-term memory. Also, there was no significant difference between recognition and recall mixture word passwords. The average memorability rate of mixture word recognition was 95.23%, and recall was 84.14% in long-term memory. The authors concluded that the recognition and recall of mixed word passwords had a higher memorability rate than nouns.

Keywords

Password, User behavior, Recognition, Recall, Nouns, Mixture Words, Passphrase

Abstract URL: http://aircconline.com/abstract/ijnsa/v14n2/14222ijnsa02.html

Original Source URL: https://aircconline.com/ijnsa/V14N2/14222ijnsa02.pdf

Volume URL: https://airccse.org/journal/ijnsa.html

Sunday, April 10, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.org/journal/ijnsa.html

Citations, h-index, i10-index

Citations 8177   h-index 43   i10-index 168

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

 

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: April 16, 2022

·         Acceptance Notification: May 15, 2022

·         Final Manuscript Due: May 23, 2022

·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: https://airccse.org/journal/ijnsa.html

 


Thursday, April 7, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.org/journal/ijnsa.html

Google Scholar Link:

https://scholar.google.co.in/citations?hl=en&user=lhj_6AYAAAAJ

Citations, h-index, i10-index

Citations 8171   h-index 43   i10-index 167

Submission Deadline: April 09, 2022

Contact us:

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

Submission Link:

https://coneco2009.com/submissions/imagination/home.html


Wednesday, April 6, 2022

3rd International Conference on Networks, Blockchain and Internet of Things (NBIoT 2022)


3rd International Conference on Networks, Blockchain and Internet of Things (NBIoT 2022)

June 18 ~ 19, 2022, Sydney, Australia

https://csita2022.org/nbiot/index

Submission Deadline: April 09, 2022

Contact us:

Here's where you can reach us: confnbiot@yahoo.com or nbiot@csita2022.org

Submission Link:

https://csita2022.org/submission/index.php

Tuesday, April 5, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.org/journal/ijnsa.html

An Efficient Secure Cryptography Scheme for New ML-based RPL Routing Protocol in Mobile IoT Environment

Kishore Golla and S. PallamSetty, Andhra University, India

Abstract

Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.

Keywords

ECC, security, Optimal path, Routing, Reinforcement learning

Abstract URL: http://aircconline.com/abstract/ijnsa/v14n2/14222ijnsa01.html

Original Source URL: https://aircconline.com/ijnsa/V14N2/14222ijnsa01.pdf

Volume URL: https://airccse.org/journal/jnsa22_current.html

Sunday, April 3, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.org/journal/ijnsa.html

Citations, h-index, i10-index

Citations 8164   h-index 43   i10-index 167

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

 

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: April 09, 2022

·         Acceptance Notification: May 09, 2022

·         Final Manuscript Due: May 17, 2022

·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: https://airccse.org/journal/ijnsa.html

 


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...