Wednesday, June 29, 2022

3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)

3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)

July 23 ~ 24, 2022, Toronto, Canada

https://www.itcse2022.org/cbiot/index

Scope & Topics

3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cloud, Big Data and IoT. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Cloud, Big Data and IoT.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Cloud, Big Data and IoT.

Topics of interest include, but are not limited to, the following

Cloud Computing

·         Cloud Application, Infrastructure and Platforms

·         Design Tool for Cloud Computing

·         Cloud Business

·         Service-Oriented Architecture in Cloud Computing

·         Cloud Based, Parallel Processing

·         Virtualization on Platforms in the Cloud

·         Location Based Services, Presence, Availability, and Locality

·         Mobile Clouds for New Millennium, Mobile Devices

·         Social Clouds (Social Networks in the Cloud)

·         Maintenance and Management of Cloud Computing Architecture

·         Cloud Applications in Vertical Industries

·         Cloud Storage and File Systems

·         Networks within Cloud systems, the Storage Area, and to the Outside Virtualization in the Context of Cloud Computing Platforms

·         System Integration, Virtual Compute Clusters

·         Consolidation NoSQL Data Stores

·         Performance, SLA Management and Enforcement

·         Resource Provisioning

·         Security Techniques for the Cloud

·         Energy Management and Programming Environments

·         Data storage and Management in Cloud Computing

·         Case Studies and Theories in Cloud Computing

·         The Open Cloud: Cloud Computing and Open Source

Big Data

·         Big Data Techniques, models and algorithms

·         Big Data Infrastructure and platform

·         Big Data Search and Mining

·         Big Data Security, Privacy and Trust

·         Big Data Applications, Bioinformatics, Multimedia etc

·         Big Data Tools and systems

·         Big Data Mining

·         Big Data Management

·         Cloud and grid computing for Big Data

·         Machine Learning and AI for Big Data

·         Big Data Analytics and Social Media

·         5G and Networks for Big Data

IoT

·         Internet of Things

·         Security and Privacy for IoT

·         IoT-enabled Innovation and Entrepreneurship

·         IoT Applications and Services

·         Experimental Results and Deployment Scenarios

·         Electronics and Signal processing for IoT

·         Connectivity and Networking

Paper Submission

Authors are invited to submit papers through the conference Submission System by July 02, 2022 (Final Call). Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

Selected papers from CBIoT 2022, after further revisions, will be published in the special issue of the following journals.

·         International Journal of Computer Networks & Communications (IJCNC) - Scopus Indexed & ERA Indexed

·         International Journal on Cloud Computing: Services and Architecture (IJCCSA)

·         International Journal of Wireless & Mobile Networks (IJWMN) - ERA Indexed

·         International Journal of Data Mining & Knowledge Management Process (IJDKP)

·         International Journal of Database Management Systems (IJDMS)

·         International Journal of Ambient Systems and Applications (IJASA)

·         International Journal on Web Service Computing (IJWSC)

·         International Journal of Grid Computing & Applications (IJGCA)

·         Information Technology in Industry (ITII)

 
Important Dates

·         Submission Deadline: July 02, 2022 (Final Call) 

·         Authors Notification: July 17, 2022

·         Registration & Camera-Ready Paper Due: July 19, 2022

 

Contact Us

 

Here's where you can reach us: cbiot@itcse2022.org (or) cbiot.conf@yahoo.com

For more details, please visit: https://www.itcse2022.org/cbiot/index

 

Paper Submission Link: https://www.itcse2022.org/submission/index.php


Tuesday, June 28, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Attack Graph-Based Risk Assessment and Optimisation Approach

Mohammed Alhomidi and Martin Reed, University of Essex, UK

Abstract

Attack graphs are models that offer significant capabilities to analyse security in network systems. An attack graph allows the representation of vulnerabilities, exploits and conditions for each attack in a single unifying model. This paper proposes a methodology to explore the graph using a genetic algorithm (GA). Each attack path is considered as an independent attack scenario from the source of attack to the target. Many such paths form the individuals in the evolutionary GA solution. The population-based strategy of a GA provides a natural way of exploring a large number of possible attack paths to find the paths that are most important. Thus unlike many other optimisation solutions a range of solutions can be presented to a user of the methodology.

Keywords

Attack Graph, Risk Assessment, Genetic Algorithm

Original Source URL: https://airccse.org/journal/nsa/6314nsa03.pdf

Volume URL: https://airccse.org/journal/jnsa14_current.html

Monday, June 27, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.org/journal/ijnsa.html

Citations, h-index, i10-index

Citations 8692   h-index 43   i10-index 169

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

 

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: July 02, 2022

·         Acceptance Notification: July 22, 2022

·         Final Manuscript Due: July 27, 2022

·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: https://airccse.org/journal/ijnsa.html

Thursday, June 23, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Context-Aware Security Mechanism for Mobile Cloud Computing

Cláudio Aroucha and Higo Felipe Pires, Federal University of Maranhão, Brazil

Abstract

The use of mobile devices is common among people and something essential these days. These devices have limited resources which makes it critical to provide security without compromising user ergonomics, given the large number of cyberattacks that occur. This work proposes a context-aware security mechanism for Mobile Cloud Computing providing a security level of device data privacy from the analysis of the attributes of the network that is connected, available level of RAM, CPU, and battery at the time of communication. of data with the cloud. In addition, Transport Layer Security (TLS) technology is used to create a secure channel for sending data between the client and the server and implement the analysis of the mobile device context using Fuzzy logic. The impact of the proposed mechanism on mobile device performance was measured through stress tests. The proposed mechanism had a superior performance of 38% in the number of executions, 10% of memory, and 0.6% of CPU about the use of a single type of predefined symmetric algorithm for private network environment.

Keywords

Cloud Computing, Context-aware Computing, Network Security, Mobile Computing

Abstract URL: http://aircconline.com/abstract/ijnsa/v14n3/14322ijnsa05.html

Original Source URL: https://aircconline.com/ijnsa/V14N3/14322ijnsa05.pdf

Volume URL: https://airccse.org/journal/jnsa22_current.html

Wednesday, June 22, 2022

7th International Conference on Networks, Communications, Wireless and Mobile Computing (NCWMC 2022)


7th International Conference on Networks, Communications, Wireless and Mobile Computing (NCWMC 2022)

July 30-31, 2022, London, United Kingdom

https://ccsit2022.org/ncwmc/index

Submission Deadline : June 25, 2022

Contact Us:

ncwmc@ccsit2022.org

Tuesday, June 21, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

June 2022: Top 10 Read Articles in Network Security and Its Applications

https://www.academia.edu/82024239/June_2022_Top_10_Read_Articles_in_Network_Security_and_Its_Applications

Submission Deadline: June 25, 2022

Contact us:

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

Submission URL:

https://coneco2009.com/submissions/imagination/home.html

Monday, June 20, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Cyber Security of Smart Watches : A Review of the Vulnerabilities with Recommendations Presented to Protect the Wearables

Aaron James Webb, Macquarie University, Australia

Abstract

This paper will explore the security of smart watches that have seen significant growth over the past few years. As smart watches gain popularity in society, addressing privacy and security concerns to keep sensitive information safe from malicious exploitation must be important. In an industry with limited focus from academic researchers, governments, or leading security companies, I will examine whether smart watches should have mandatory security protection governed by security regulations and policies that protect data privacy and exposure from potential attacks.

Keywords

Security, wireless networks, biometrics, smartwatches

Abstract URL: http://aircconline.com/abstract/ijnsa/v14n3/14322ijnsa04.html

Original Source URL: https://aircconline.com/ijnsa/V14N3/14322ijnsa04.pdf

Volume URL: https://airccse.org/journal/jnsa22_current.html

Sunday, June 19, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.org/journal/ijnsa.html

Citations, h-index, i10-index

Citations 8661   h-index 43   i10-index 169

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

 

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: June 25, 2022

·         Acceptance Notification: July 23, 2022

·         Final Manuscript Due: July 28, 2022

·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: https://airccse.org/journal/ijnsa.html


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...