Wednesday, June 28, 2023

International Conference on Computer Science and Software Engineering (CSSE 2023)


Call for Research Papers!!!

Free – Extended Paper will be published as free of cost.

International Conference on Computer Science and Software Engineering (CSSE 2023)

August 12-13, 2023, Virtual Conference

https://csse2023.org/

Authors are invited to submit papers through the conference Submission System by July 01, 2023. Selected papers from csse 2023, after further revisions, will be published in the special issues of the following journals

Advanced Computing: An International Journal (ACIJ)

International Journal of Distributed and Parallel systems (IJDPS)

International Journal of Advanced Information Technology (IJAIT)

Computer Science & Engineering: An International Journal (CSEIJ)

Information Technology in Industry (ITII)

International Journal of Software Engineering & Applications (IJSEA)

Contact Us

Here's where you can reach us : csse@csse2023.org (or) csseconf@yahoo.com

Submission System

https://csse2023.org/submission/index.php

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

The Evolving Threat Landscape: An Overview of Attacks and Response Strategies Against Cybercrime in Saudi Arabia

Homam El-Taj, Dar Al-Hekma University, Kingdom of Saudi Arabia

Abstract

Saudi Arabia has been a victim of cyberattacks over the years, with an increasing number of attacks being reported since 2020. These cyberattacks significantly threaten the country's national security, economic stability, and personal privacy. In this article, we will explore the types of cyberattacks that have been observed in Saudi Arabia after 2020, the impact they have had on the country, and the measures taken by the Saudi government to counter these attacks. This article is aimed at providing a comprehensive understanding of the current state of cyberattacks in Saudi Arabia and the measures taken to address them.

Keywords

Saudi Arabia, cyberattacks, economic stability, personal privacy, cyberattack types, cyberattack impact

Abstract URL: http://aircconline.com/abstract/ijnsa/v15n3/15323ijnsa06.html

Original Source URL: https://aircconline.com/ijnsa/V15N3/15323ijnsa06.pdf

Volume URL: https://airccse.org/journal/jnsa23_current.html

Monday, June 26, 2023

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

IJNSA is indexed in World Journal Clout Index (WJCI)

WJCI Impact Factor - 0.349

Submission Deadline: July 01, 2023

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Sunday, June 25, 2023

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Google Scholar URL:

https://scholar.google.co.in/citations?hl=en&user=lhj_6AYAAAAJ

Citations, h-index, i10-index

Citations 9841   h-index 47   i10-index 187

Submission Deadline: July 01, 2023

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Thursday, June 22, 2023

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

An Extended K-Means Cluster Head Selection Algorithm for Efficient Energy Consumption in Wireless Sensor Networks

Peter Maina Mwangi, John Gichuki Ndia and Geoffrey Muchiri Muketha, Murang’a University of Technology, Kenya

Abstract

Effective use of sensor nodes’ batteries in wireless sensor networks is critical since the batteries are difficult to recharge or replace. This is closely connected to the networks’ lifespan since once the battery is used up, the node is no longer useful. The entire network will not function if 60 to 80% of the nodes in it have completely depleted their energy. In order to minimize energy usage and sustain the network for a long time, many cluster head selection algorithms have been developed. However, the existing cluster head selection algorithms such as K-Means, particle swarm selection optimization (PSO), Density-Based Spatial Clustering of Applications with Noise (DBSCAN) and Fuzzy C-Means (FCM) cluster head election algorithm have not fully reduced the issue of energy usage in WSN. The objective of this paper was to develop an extended K Mean Cluster Head selection(CHS) algorithm that uses remaining energy, distance between node and base station, distance between nodes and neighbour nodes, node density, node degree Maximum Cluster size, received signal strength indicator (RSSI) and Signal to Noise Ratio. The algorithm developed was used to enhance the lifespan of WSNs. The performance of the simulated variants of LEACH routing protocols is measured and evaluated using the quantitative research methodology. Utilizing residual node energy, packet delivery ratio, throughput, network longevity, average energy usage, and the number of live and dead node, the suggested approach is contrasted to previous approaches. From the study we observed that the proposed approach outperforms existing actual LEACH, Mod-LEACH and TSILEACH approaches.

Keywords

Cluster head, Cluster Head Selection Algorithms, energy efficiency, LEACH, Sensor node, Parameters, wireless sensor networks

Abstract URL: http://aircconline.com/abstract/ijnsa/v15n3/15323ijnsa05.html

Original Source URL: https://aircconline.com/ijnsa/V15N3/15323ijnsa05.pdf

Volume URL: https://airccse.org/journal/jnsa23_current.html

Wednesday, June 21, 2023

4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)


4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)

July 29 ~ 30, 2023, London, United Kingdom

Webpage URL: https://itcse2023.org/cbiot/index

Paper Submission

Authors are invited to submit papers through the conference Submission System by June 24, 2023. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

Important Dates

• Submission Deadline: June 24, 2023 

• Authors Notification: July 15, 2023

• Registration & Camera-Ready Paper Due: July 20, 2023

Contact us:

Here's where you can reach us: cbiot@itcse2023.org (or) cbiot.conf@yahoo.com

Submission URL:

https://itcse2023.org/submission/index.php


Tuesday, June 20, 2023

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

WikiCFP URL:

http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=171136

Submission Deadline: June 24, 2023

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Monday, June 19, 2023

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

The Relationship Between the Characteristics of Software Developers and Security Behavior Intention

Wisdom Umeugo, Independent Researcher, Canada

Abstract

Software security is integral to information security, requiring software developers to be aware of software security as implementers and information security as employees. Little is known about the impact of software developers’ characteristics on their information security behaviors. This study examined the relationship between software developer characteristics such as their application security awareness (AW), training, and self-efficacy (SE) and their information security behavior intention (SeBI). Data from a survey of 200 software developers in the United States were analyzed using correlational statistical methods. AW and SE positively correlated with SeBI, while application security training did not correlate. Developers’ AW and SeBI mean score was found to be poor. Information security managers should aim to improve software developers’ application security awareness and self-efficacy to help improve their information security behavior. Application security training infused with information security awareness and conducted by application security experts is recommended.

Keywords

Self-efficacy, Software security, Information security, Security behavior, Awareness, Application security

Abstract URL: http://aircconline.com/abstract/ijnsa/v15n3/15323ijnsa04.html

Original Source URL: https://aircconline.com/ijnsa/V15N3/15323ijnsa04.pdf

Volume URL: https://airccse.org/journal/jnsa23_current.html

Sunday, June 18, 2023

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.org/journal/ijnsa.html

Citations, h-index, i10-index

Citations 9827   h-index 47   i10-index 188

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

 

  • Artificial intelligence, Machine Learning for Security
  • Blockchain Technology, Cryptocurrencies and Cyber Security
  • Cloud, Fog, Edge & Cognitive Security
  • Cryptographic Protocols
  • Cyber Physical System (CPS) Security (autonomous vehicles, industrial control systems)
  • Data Center Network Control, Security and Optimization
  • Database and System Security
  • E-mail security, Spam, Phishing, E-mail fraud
  • Hardware-Based Attacks
  • Internet of Things (IoT) Security
  • Internet Security & Applications (Social networking, crowd sourcing and Web based applications, services security)
  • Intrusion Detection and Prevention
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Performance Evaluations of Protocols & Security Application
  • Security & Network Management
  • Security for emerging networks (SDN, Home Networks, Body-area Networks, VANETs)
  • Security of Virtual Machines
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Security, Trust and Privacy Challenges
  • Smart City, Grid, Electronic Voting Security
  • Network and Wireless Network Security
  • Ubiquitous Computing Security
  • Virus, worms, Trojan Protection
  • Web 2.0 Security

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: June 24, 2023

·         Acceptance Notification: July 24, 2023

·         Final Manuscript Due: July 31, 2023

·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: https://airccse.org/journal/ijnsa.html


Thursday, June 15, 2023

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

June 2023: Top 10 Read Articles in Network Security and Its Applications

https://www.academia.edu/103414669/June_2023_Top_10_Read_Articles_in_Network_Security_and_Its_Applications

Submission Deadline: June 17, 2023

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html

Wednesday, June 14, 2023

Tuesday, June 13, 2023

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

A Novel Alert Correlation Technique for Filtering Network Attacks

Jane Kinanu Kiruki1,2, Geoffrey Muchiri Muketha1 and Gabriel Kamau1, 1Murang’a University of Technology, Kenya, 2Chuka University, Kenya

Abstract

An alert correlation is a high-level alert evaluation technique for managing large volumes of irrelevant and redundant intrusion alerts raised by Intrusion Detection Systems (IDSs).Recent trends show that pure intrusion detection no longer can satisfy the security needs of organizations. One problem with existing alert correlation techniques is that they group related alerts together without putting their severity into consideration. This paper proposes a novel alert correlation technique that can filter unnecessary and low impact alerts from a large volume of intrusion. The proposed technique is based on a supervised feature selection method that usesclass type to define the correlation between alerts. Alerts of similar class type are identified using a class label. Class types are further classified based on their metric ranks of low, medium and high level. Findings show that the technique is able detect and report high level intrusions.

Keywords

Alert correlation, merging, classification, alert clustering, alert prioritization, pre-processing

Abstract URL: http://aircconline.com/abstract/ijnsa/v15n3/15323ijnsa03.html

Original Source URL: https://aircconline.com/ijnsa/V15N3/15323ijnsa03.pdf

Volume URL: https://airccse.org/journal/jnsa23_current.html

Monday, June 12, 2023

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Call for Papers

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Submission Deadline: June 17, 2023

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Sunday, June 11, 2023

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

IJNSA is indexed in World Journal Clout Index (WJCI)

WJCI Impact Factor - 0.349

Google Scholar URL:

https://scholar.google.co.in/citations?hl=en&user=lhj_6AYAAAAJ

Citations 9804   h-index 47   i10-index 188

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

• Submission Deadline: June 17, 2023

• Acceptance Notification: July 17, 2023

• Final Manuscript Due: July 24, 2023

• Publication Date: Determined by the Editor-in-Chief 

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Thursday, June 8, 2023

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Pseudo Random Key Generator using Fractal based Trellis Coded Genetic Algorithm for Image Encryption

Anusha .T and Venkatesan R, PSG College of Technology, India

Abstract

Cryptographic applications such as online banking, and securing medical and military data require the usage of random keys, which should remain unpredictable by adversaries. This paper focuses on the strengths and limitations of the techniques and algorithms that are used in the generation of random keys and a new method to generate random keys is proposed using fractals. Fractals are generated using the Sierpinski triangle and fed as input for Non-Deterministic Finite Automata (NDFA) to generate an Initial Vector (IV). Trellis Coded Genetic Algorithm (TCGA) code generator generates seed value using IV as input. Pseudo-Random Key Generator (PRKG) generates a Session Key matrix (SKM) using a seed value. Images are encrypted using SKM to generate cipher images. The randomness of the TCGA code is tested using entropy measure and efficiency based on NIST Tests. SKM with high entropy value is used for image encryption. The Number of Pixel Change Rate (NPCR) and Unified Average Changing Intensity (UACI) values are used for calculating the randomness of cipher images.

Keywords

Finite Automata, Pseudo Random Key Generator, Session Key Matrix, Trellis Coded Genetic Algorithm, Security

Abstract URL: http://aircconline.com/abstract/ijnsa/v15n3/15323ijnsa02.html

Original Source URL: https://aircconline.com/ijnsa/V15N3/15323ijnsa02.pdf

Volume URL: https://airccse.org/journal/jnsa23_current.html

Wednesday, June 7, 2023

5th International Conference on Internet of Things (CIoT 2023)


5th International Conference on Internet of Things (CIoT 2023)

June 17 ~ 18, 2023, Sydney, Australia

Webpage URL:

https://cseit2023.org/ciot/index

Submission Deadline: June 10, 2023 (Final Call)

Contact us:

Here's where you can reach us: ciot@cseit2023.org (or) ciotconference@yahoo.com

Submission URL:

https://cseit2023.org/submission/index.php


Tuesday, June 6, 2023

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Google Scholar URL:

https://scholar.google.co.in/citations?hl=en&user=lhj_6AYAAAAJ

Citations 9789   h-index 47   i10-index 188

Submission Deadline: June 10, 2023

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Monday, June 5, 2023

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Near Ultrasonic Attack and Defensive Countermeasures

Forrest McKee and David Noever, PeopleTec, USA

Abstract

The practical implications of issuing inaudible voice commands. The research mapped each attack vector to a tactic or technique from the MITRE ATT&CK matrix, covering enterprise, mobile, and Industrial Control System (ICS) frameworks. The experiment involved generating and surveying fifty near-ultrasonic audios to assess the attacks' effectiveness. Unprocessed commands achieved a 100% success rate, while processed commands achieved an 86% acknowledgment rate and a 58% overall executed (successful) rate. The research systematically stimulated previously unaddressed attack surfaces, aiming for comprehensive detection and attack design. Each ATT&CK identifier was paired with a tested defensive method, providing attack and defense tactics. The research findings revealed that the attack method employed Single Upper Sideband Amplitude Modulation (SUSBAM) to generate near-ultrasonic audio from audible sources. By eliminating the lower sideband, the design achieved a 6 kHz minimum from 16-22 kHz while remaining inaudible after transformation. The research also investigated the one-to-many attack surface, exploring scenarios where a single device triggers multiple actions or devices. Furthermore, the study demonstrated the reversibility or demodulation of the inaudible signal, suggesting potential alerting methods and the possibility of embedding secret messages like audio steganography. A critical methodological advance included tapping into the postprocessed audio signal when the server demodulates the signal for comparison to both the audible and inaudible input signals to improve the actionable success rates.

Keywords

Cybersecurity, voice activation, digital signal processing, Internet of Things, ultrasonic audio

Abstract URL: http://aircconline.com/abstract/ijnsa/v15n3/15323ijnsa01.html

Original Source URL: https://aircconline.com/ijnsa/V15N3/15323ijnsa01.pdf

Volume URL: https://airccse.org/journal/jnsa23_current.html

Sunday, June 4, 2023

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.org/journal/ijnsa.html

Citations, h-index, i10-index

Citations 9772   h-index 47   i10-index 187

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following


  • Artificial intelligence, Machine Learning for Security
  • Blockchain Technology, Cryptocurrencies and Cyber Security
  • Cloud, Fog, Edge & Cognitive Security
  • Cryptographic Protocols
  • Cyber Physical System (CPS) Security (autonomous vehicles, industrial control systems)
  • Data Center Network Control, Security and Optimization
  • Database and System Security
  • E-mail security, Spam, Phishing, E-mail fraud
  • Hardware-Based Attacks
  • Internet of Things (IoT) Security
  • Internet Security & Applications (Social networking, crowd sourcing and Web based applications, services security)
  • Intrusion Detection and Prevention
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Performance Evaluations of Protocols & Security Application
  • Security & Network Management
  • Security for emerging networks (SDN, Home Networks, Body-area Networks, VANETs)
  • Security of Virtual Machines
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Security, Trust and Privacy Challenges
  • Smart City, Grid, Electronic Voting Security
  • Network and Wireless Network Security
  • Ubiquitous Computing Security
  • Virus, worms, Trojan Protection
  • Web 2.0 Security

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: June 10, 2023

·         Acceptance Notification: July 10, 2023

·         Final Manuscript Due: July 17, 2023

·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: https://airccse.org/journal/ijnsa.html

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...