Wednesday, November 30, 2022

4th International Conference on Blockchain and Internet of Things (BIoT 2023)


4th International Conference on Blockchain and Internet of Things (BIoT 2023)

March 18 ~ 19, 2023, Vienna, Austria

https://www.ccsea2023.org/biot/index

Submission Deadline: December 03, 2022

Contact Us

Here's where you can reach us : biot@ccsea2023.org or biotconf@yahoo.com

Submission System: https://www.ccsea2023.org/submission/index.php

Tuesday, November 29, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

A Secure Cluster Based Communication in Wireless Network using Cryptographic Reports

Hamsha and Nagaraj, RVCE Bangalore, India

Abstract

Mobile Adhoc Networks are becoming very popular in current Wireless Technology, which is been associated to business, socially and in some critical applications like Military etc, The network which is formed by self configuring wireless links which are connected to each other. These applications are categorized by hostile environment that they serve while communicating between nodes. However in such Wireless Network will be more exposed to different types of security attacks. The challenge is to meet secure network communication. In this paper we focus on cluster based secure communication to improve the reliability between clusters. In this scheme the Cluster Members (CM) submits a report to the Cluster Head (CH) and temporarily stores Evidences as a security tokens. The reports contain digital signatures. The CH will verify the consistency of the CM report and updates to Accounting Centre (AC). AC will verify the uniformity of reports and clears the cryptographic operations. For attacker nodes, the security tokens are requested to classify and expel the attacker nodes which submit wrong reports.

Keywords

Selfishness, Security, Mobile Adhoc Network

Original Source URL: https://airccse.org/journal/nsa/6514nsa04.pdf

Volume URL: https://airccse.org/journal/jnsa14_current.html

Monday, November 28, 2022

International Journal of Network Security & Its Applications (IJNSA) - Current Issue: November 2022, Volume 14, Number 6


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Current Issue: November 2022, Volume 14, Number 6

Turning the Disruptive Power of Blockchain in the Insurance Market into Innovative Opportunities

Wadnerson Boileau, University of South Florida (USF), USA

Abstract URL: http://aircconline.com/abstract/ijnsa/v14n6/14622ijnsa01.html

Original Source URL: https://aircconline.com/ijnsa/V14N6/14622ijnsa01.pdf

A Resource-Efficient Collaborative System for DDOS Attack Detection and Victim Identification

Fei Wang, Zhenxing Li and Xiaofeng Wang, National University of Defense Technology, China

Abstract URL: http://aircconline.com/abstract/ijnsa/v14n6/14622ijnsa02.html

Original Source URL: https://aircconline.com/ijnsa/V14N6/14622ijnsa02.pdf

A Framework for the Detection of Banking Trojans in Android

Subarna Adhikari, Sushil Nepal and Rabindra Bista, Kathmandu University, Nepal

Abstract URL: http://aircconline.com/abstract/ijnsa/v14n6/14622ijnsa03.html

Original Source URL: https://aircconline.com/ijnsa/V14N6/14622ijnsa03.pdf

Volume URL: https://airccse.org/journal/jnsa22_current.html

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Sunday, November 27, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

IJNSA is indexed in World Journal Clout Index (WJCI)

https://wjci.cnki.net/UserIndex/JournalOverseaDetails?filename=ISSN0975-2307&Year=2020

WJCI Impact Factor - 0.279

Submission Deadline: December 10, 2022

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://coneco2009.com/submissions/imagination/home.html


Thursday, November 24, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Google Scholar URL:

https://scholar.google.co.in/citations?hl=en&user=lhj_6AYAAAAJ

Citations, h-index, i10-index

Citations 9157   h-index 44   i10-index 178

Submission Deadline: November 26, 2022

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://coneco2009.com/submissions/imagination/home.html

Wednesday, November 23, 2022

12th International Conference on Digital Image Processing and Pattern Recognition (DPPR 2022)


12th International Conference on Digital Image Processing and Pattern Recognition (DPPR 2022)

December 23 ~ 24, 2022, Sydney, Australia

Webpage URL: https://cndc2022.org/dppr/index

Paper Submission

Authors are invited to submit papers through the conference Submission System by November 26, 2022. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

Important Dates

• Submission Deadline: November 26, 2022 

• Authors Notification: December 16, 2022

• Registration & Camera-Ready Paper Due: December 19, 2022

Contact us:

Here's where you can reach us: dppr@cndc2022.org (or) dpprc@yahoo.com

Submission URL:

https://cndc2022.org/submission/index.php

Tuesday, November 22, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Reducing the Cognitive Load on Analysts through Hamming Distance Based Alert Aggregation

Peter Mell1 and Richard Harang2, 1National Institute of Standards and Technology, USA and 2U.S. Army Research Laboratory, USA

Abstract

Previous work introduced the idea of grouping alerts at a Hamming distance of 1 to achieve lossless alert aggregation; such aggregated meta-alerts were shown to increase alert interpretability. However, a mean of 84023 daily Snort alerts were reduced to a still formidable 14099 meta-alerts. In this work, we address this limitation by investigating several approaches that all contribute towards reducing the burden on the analyst and providing timely analysis. We explore minimizing the number of both alerts and data elements by aggregating at Hamming distances greater than 1. We show how increasing bin sizes can improve aggregation rates. And we provide a new aggregation algorithm that operates up to an order of magnitude faster at Hamming distance 1. Lastly, we demonstrate the broad applicability of this approach through empirical analysis of Windows security alerts, Snort alerts, netflow records, and DNS logs. The result is a reduction in the cognitive load on analysts by minimizing the overall number of alerts and the number of data elements that need to be reviewed in order for an analyst to evaluate the set of original alerts.

Keywords

Alert aggregation, Cognitive load, Hamming Distance, Hypergraphs, Security logs

Original Source URL: https://airccse.org/journal/nsa/6514nsa03.pdf

Volume URL: https://airccse.org/journal/jnsa14_current.html

Monday, November 21, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.org/journal/ijnsa.html

Citations, h-index, i10-index

Citations 9144   h-index 44   i10-index 178

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

 

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: November 26, 2022

·         Acceptance Notification: December 26, 2022

·         Final Manuscript Due: December 31, 2022

·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: https://airccse.org/journal/ijnsa.html


Thursday, November 17, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

November 2022: Top 10 Read Articles in Network Security and Its Applications

https://www.academia.edu/91035541/November_2022_Top_10_Read_Articles_in_Network_Security_and_Its_Applications

Google Scholar URL:

https://scholar.google.co.in/citations?hl=en&user=lhj_6AYAAAAJ

Citations, h-index, i10-index

Citations 9123   h-index 44   i10-index 177

Submission Deadline: November 19, 2022

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://coneco2009.com/submissions/imagination/home.html

Wednesday, November 16, 2022

12th International Conference on Peer-to-Peer Networks and Trust Management (P2PTM 2022)


12th International Conference on Peer-to-Peer Networks and Trust Management (P2PTM 2022)

https://cndc2022.org/p2ptm/index

December 23 ~ 24, 2022, Sydney, Australia

Submission Deadline: November 19, 2022

Contact Us

Here's where you can reach us : p2ptm@cndc2022.org or p2ptmconf@yahoo.com

Submission Link:

https://cndc2022.org/submission/index.php

Tuesday, November 15, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Cloud Based Access Control Model for Selective Encryption of Documents with Traitor Detection

Punya Peethambaran and. Jayasudha J. S, Sct College of Engineering, India

Abstract

Cloud computing refers to a type of networked computing whereby an application can be run on connected servers instead of local servers. Cloud can be used to store data, share resources and also to provide services. Technically, there is very little difference between public and private cloud architecture. However, the security and privacy of the data is a very big issue when sensitive data is being entrusted to third party cloud service providers. Thus encryption with a fine grained access control is inevitable to enforce security in clouds. Several techniques implementing attribute based encryption for fine grained access control have been proposed. Under such approaches, the key management overhead is a little bit high in terms of computational complexity. Also, secret sharing mechanisms have added complexity. Moreover, they lack mechanisms to handle existence of traitors. Our proposed approach addresses these requirements and reduces the overhead of the key management as well as secret sharing by using efficient algorithms and protocols. Also, a traitor tracing technique is introduced into the cloud computing two layer encryption environment.

Keywords

Cloud computing, attribute-based encryption, access control, group key management, fine grained access, cloud data security

Original Source URL: https://airccse.org/journal/nsa/6514nsa02.pdf

Volume URL: https://airccse.org/journal/jnsa14_current.html

Monday, November 14, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Scope:

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Current Issue URL:

https://airccse.org/journal/jnsa22_current.html

Submission Deadline: November 19, 2022

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://coneco2009.com/submissions/imagination/home.html

Sunday, November 13, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

IJNSA is indexed in World Journal Clout Index (WJCI)

https://wjci.cnki.net/UserIndex/JournalOverseaDetails?filename=ISSN0975-2307&Year=2020

WJCI Impact Factor - 0.279

Submission Deadline: November 19, 2022

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://coneco2009.com/submissions/imagination/home.html

Wednesday, November 9, 2022

6th International Conference on Networks and Security (NSEC 2022)

Submit Your Articles Now..!

6th International Conference on Networks and Security (NSEC 2022)

December 22 ~ 23, 2022, Sydney, Australia

https://inwes2022.org/nsec/index

Submission Deadline: November 12, 2022

Contact Us

Here's where you can reach us : nsec@inwes2022.org (or) nsecconfe@yahoo.com

Submission Link:

https://inwes2022.org/submission/index.php

Tuesday, November 8, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

A Secure Electronic Payment Protocol for Wireless Mesh Networks

Helen Cheung and Cungang Yang, Ryerson University, Canada

Abstract

Electronic payment systems for wireless mesh networks need to take into account the limited computational and communicational ability of mesh clients. Micropayment scheme is well suited for this scenario since it is specifically designed for efficient operations in payment transactions. In this article, we propose a one way hash chain structure based on which efficient and secure payment protocols that support both prepaid and credit-based paying schemes are introduced.

Keywords

multiparty micropayment, payment certificate, hash chain, wireless mesh networks, electronic payment

Original Source URL: https://airccse.org/journal/nsa/6514nsa01.pdf

Volume URL: https://airccse.org/journal/jnsa14_current.html

Monday, November 7, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

WikiCFP URL:

http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=169927

Submission Deadline: November 12, 2022

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://coneco2009.com/submissions/imagination/home.html

Sunday, November 6, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.org/journal/ijnsa.html

Citations, h-index, i10-index

Citations 9073   h-index 44   i10-index 177

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

 

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: November 12, 2022

·         Acceptance Notification: November 26, 2022

·         Final Manuscript Due: November 28, 2022

·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: https://airccse.org/journal/ijnsa.html

Thursday, November 3, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Google Scholar URL:

https://scholar.google.co.in/citations?hl=en&user=lhj_6AYAAAAJ

Citations, h-index, i10-index

Citations 9067   h-index 44   i10-index 177

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Submission Deadline: November 05, 2022

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://coneco2009.com/submissions/imagination/home.html

Wednesday, November 2, 2022

8th International Conference on Software Security (ICSS 2022)


8th International Conference on Software Security (ICSS 2022)

December 23 ~ 24, 2022, Sydney, Australia

Webpage URL:

https://cndc2022.org/icss/index

Submission Deadline: November 05, 2022

Contact us:

Here's where you can reach us: icss@cndc2022.org or icssconfe@yahoo.com

Submission URL:

https://cndc2022.org/submission/index.php

Tuesday, November 1, 2022

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

A Novel (K,N) Secret Sharing Scheme from Quadratic Residues for Grayscale Images

El-Tigani B. Abdelsatir, Sahar Salahaldeen, Hyam Omar and Afra Hashim, University of Khartoum, Sudan

Abstract

A new grayscale image encryption algorithm based on ,  threshold secret sharing is proposed. The scheme allows a secret image to be transformed into n shares, where any    shares can be used to reconstruct the secret image, while the knowledge of   1 or fewer shares leaves no sufficient information about the secret image and it becomes hard to decrypt the transmitted image. In the proposed scheme, the pixels of the secret image are first permuted and then encrypted by using quadratic residues. In the final stage, the encrypted image is shared into n shadow images using polynomials of Shamir scheme. The proposed scheme is provably secure and the experimental results shows that the scheme performs well while maintaining high levels of quality in the reconstructed image.

Keywords

Secret Sharing, Quadratic Residues, Secret Image Sharing, Image Encryption, Image Coding

Original Source URL: https://airccse.org/journal/nsa/6414nsa06.pdf

Volume URL: https://airccse.org/journal/jnsa14_current.html

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...