Wednesday, May 1, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Google Scholar URL:

https://scholar.google.co.in/citations?hl=en&user=lhj_6AYAAAAJ

Submission Deadline: May 04, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Monday, April 29, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Performance Analysis of the Neighbor Weight Trust Determination Algorithm in MANETs

Ali Abu Romman1 and Hussein Al-Bahadili2, 1Princess Sumaya University for Technology, Jordan and 2University of Petra, Jordan

Abstract

Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring down the whole network. Therefore, it is important to have a reliable mechanism for detecting and isolating malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective trust determination algorithm. This paper presents the performance analysis of a recently developed trust determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and isolating any maliciously behaving node(s) in a timely manner.

Keywords

NWTD, trust determination, trust-based routing protocols, malicious node, MANET, MANSim

Original Source URL: https://aircconline.com/ijnsa/V8N4/8416ijnsa03.pdf

Volume URL: https://airccse.org/journal/jnsa16_current.html

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.org/journal/ijnsa.html

Citations, h-index, i10-index

Citations 10674   h-index 49   i10-index 203

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

 

  • Artificial intelligence, Machine Learning for Security
  • Blockchain Technology, Cryptocurrencies and Cyber Security
  • Cloud, Fog, Edge & Cognitive Security
  • Cryptographic Protocols
  • Cyber Physical System (CPS) Security (autonomous vehicles, industrial control systems)
  • Data Center Network Control, Security and Optimization
  • Database and System Security
  • E-mail security, Spam, Phishing, E-mail fraud
  • Hardware-Based Attacks
  • Internet of Things (IoT) Security
  • Internet Security & Applications (Social networking, crowd sourcing and Web based applications, services security)
  • Intrusion Detection and Prevention
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Performance Evaluations of Protocols & Security Application
  • Security & Network Management
  • Security for emerging networks (SDN, Home Networks, Body-area Networks, VANETs)
  • Security of Virtual Machines
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Security, Trust and Privacy Challenges
  • Smart City, Grid, Electronic Voting Security
  • Network and Wireless Network Security
  • Ubiquitous Computing Security
  • Virus, worms, Trojan Protection
  • Web 2.0 Security

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: May 04, 2024

·         Acceptance Notification: May 25, 2024

·         Final Manuscript Due: May 29, 2024

·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: https://airccse.org/journal/ijnsa.html

Paper Submission Link: https://airccse.com/submissioncs/home.html


Friday, April 26, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Wikicfp URL: http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=179570

Submission Deadline: April 27, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html

Wednesday, April 24, 2024

5th International conference on Advanced Natural Language Processing (AdNLP 2024)

#nlp #datamining #machinelearning #bigdata #analysis #knowledgeprocessing #ubiquitouscomputing #business #modeling #artificialintelligence #internetofthings #informationextraction #informationretrieval #ontology #socialmedia #textmining #computerscience #naturallanguageprocessing #cloud #engineering #informationtechnology #ai #ml #tech #education #data #datascience #deeplearning #iot #web #analytics #computing #it #mining #programming #information #webdeveloper #computer #security #developer #cybersecurity #internet #innovation #datascientist #dataprotection #businessintelligence #robotics #bigdataanalytics #cloudstorage #database #devops #datasecurity #hadoop #cloudcomputing #blockchain #datavisualization #datacenter



Submit Your Research Articles...!!!

Welcome To AdNLP 2024

5th International conference on Advanced Natural Language Processing (AdNLP 2024)
May 25 ~ 26, 2024, Vancouver, Canada

Webpage URL:

Submission Deadline: April 27, 2024

Contact us:
Here's where you can reach us: adnlp@icaita2024.org (or) adnlpconference@gmail.com

Submission URL:

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

The Interest of Hybridizing Explainable AI with RNN to Resolve DDOS Attacks: A Comprehensive Practical Study

Ahmad Mater Aljohani and Ibrahim Elgendi, University of Canberra, Australia

Abstract

In this paper, we suggest a new method to address attack detection problems in IoT networks, by using a specific emphasis on the user’s and network’s requirements regarding the application provider and giving a defence against intruders and malicious users. The paper focuses on resolving the problem of detection of attacks in IoT networks using Recurrent Neural Networks and an explainable artificial intelligence technique (XAI) named SHAP. XAI refers to a collection of methods and procedures for explaining how AI models make decisions. Although XAI is useful for understanding the motivations underlying AI models, the information utilized in these discoveries may be a risk. Machine learning models are vulnerable to attacks such as model inversion, model extraction, and membership inference. Such attacks could concentrate on the learning model or on the data used to train and build the model, depending on the involved circumstances and parties. Hence, when the owner of an AI model wishes to grant only black-box access and does not expose the model's parameters and architecture to third parties, solutions like XAI can notably enhance the susceptibility to model extraction attacks.

To guarantee the users regarding possible violations, the proposed RNN-SHAP method is based on a decentralized topology relying on a set of cooperative independent parties including the users of IoT network. Another advantage of the suggested approach is the capitalization on the trust relationships that are part of IoT networks in real life to build trusted mechanisms in the network. Compared to other methods using different metrics, the suggested RNN-SHAP shows its efficiency in resolving the DDoS problem.

Keywords

deep learning (DL), Recurrent neural networks (RNN), SHapley Additive explanation (SHAP), Attack detection, explainable artificial intelligence (XAI), Distributed Denial of Service (DDoS)

Abstract URL: http://aircconline.com/abstract/ijnsa/v16n2/16224ijnsa05.html

Original Source URL: https://aircconline.com/ijnsa/V16N2/16224ijnsa05.pdf

Volume URL: https://airccse.org/journal/jnsa24_current.html

Monday, April 22, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

April 2024 - Top 10 Read Articles in Network Security & Its Applications

https://www.academia.edu/117916413/April_2024_Top_10_Read_Articles_in_Network_Security_and_Its_Applications

Submission Deadline: April 27, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Submission Deadline: April 27, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Wednesday, April 17, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Enhancing Data Privacy in Wireless Sensor Networks: Investigating Techniques and Protocols to Protect Privacy of Data Transmitted Over Wireless Sensor Networks in Critical Applications of Healthcare and National Security

Akinsola Ahmed, Ejiofor Oluomachi, Akinde Abdullah, Njoku Tochukwu, Austin Peay State University, USA

Abstract

The article discusses the emergence of Wireless Sensor Networks (WSNs) as a groundbreaking technology in data processing and communication. It outlines how WSNs, composed of dispersed autonomous sensors, are utilized to monitor physical and environmental factors, transmitting data wirelessly for analysis. The article explores various applications of WSNs in healthcare, national security, emergency response, and infrastructure monitoring, highlighting their roles in enhancing patient care, public health surveillance, border security, disaster management, and military operations. Additionally, it examines the foundational concepts of data privacy in WSNs, focusing on encryption techniques, authentication mechanisms, anonymization techniques, and access control mechanisms. The article also addresses vulnerabilities, threats, and challenges related to data privacy in healthcare and national security contexts, emphasizing regulatory compliance, ethical considerations, and socio-economic factors. Furthermore, it introduces the Diffusion of Innovation Theory as a framework for understanding the adoption of privacy-enhancing technologies in WSNs. Finally, the article reviews empirical studies demonstrating the efficacy of security solutions in preserving data privacy in WSNs, offering insights into advancements in safeguarding sensitive information.

Keywords

Wireless sensor networks, data privacy, healthcare, national security, Diffusion of Innovation Theory, encryption techniques, authentication mechanisms, anonymization techniques, access control mechanisms, vulnerabilities, threats, challenges, and empirical studies

Abstract URL: http://aircconline.com/abstract/ijnsa/v16n2/16224ijnsa04.html

Original Source URL: https://aircconline.com/ijnsa/V16N2/16224ijnsa04.pdf

Volume URL: https://airccse.org/journal/jnsa24_current.html

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Google Scholar URL:

https://scholar.google.co.in/citations?hl=en&user=lhj_6AYAAAAJ

Submission Deadline: April 20, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Monday, April 15, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Towards a Low Carbon Proof-of-work Blockchain

Agron Gemajli, Shivam Patel, and Phillip G. Bradford, University of Connecticut, USA

Abstract

Proof of Work (PoW) blockchains burn a lot of energy. Proof-of-work algorithms are expensive by design and often only serve to compute blockchains. In some sense, carbon-based and non-carbon based regional electric power is fungible. So the total carbon and non-carbon electric power mix plays a role. Thus, generally PoW algorithms have large CO2 footprints solely for computing blockchains. A proof of technology is described towards replacing hashcash or other PoW methods with a lottery and proof-of-VM (PoVM) emulation. PoVM emulation is a form of PoW where an autonomous blockchain miner gets a lottery ticket in exchange for providing a VM (virtual Machine) for a specified period. These VMs get their jobs from a job queue. Managing and ensuring, by concensus, that autonomous PoVMs are properly configured and running as expected gives several gaps for a complete practical system. These gaps are discussed. Our system is similar to a number of other blockchain systems. We briefly survey these systems. This paper along with our proof of technology was done as a senior design project.

Keywords

Blockchain, low carbon blockchain

Abstract URL: http://aircconline.com/abstract/ijnsa/v16n2/16224ijnsa03.html

Original Source URL: https://aircconline.com/ijnsa/V16N2/16224ijnsa03.pdf

Volume URL: https://airccse.org/journal/jnsa24_current.html

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.org/journal/ijnsa.html

Citations, h-index, i10-index

Citations 10638   h-index 49   i10-index 202

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

 

  • Artificial intelligence, Machine Learning for Security
  • Blockchain Technology, Cryptocurrencies and Cyber Security
  • Cloud, Fog, Edge & Cognitive Security
  • Cryptographic Protocols
  • Cyber Physical System (CPS) Security (autonomous vehicles, industrial control systems)
  • Data Center Network Control, Security and Optimization
  • Database and System Security
  • E-mail security, Spam, Phishing, E-mail fraud
  • Hardware-Based Attacks
  • Internet of Things (IoT) Security
  • Internet Security & Applications (Social networking, crowd sourcing and Web based applications, services security)
  • Intrusion Detection and Prevention
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Performance Evaluations of Protocols & Security Application
  • Security & Network Management
  • Security for emerging networks (SDN, Home Networks, Body-area Networks, VANETs)
  • Security of Virtual Machines
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Security, Trust and Privacy Challenges
  • Smart City, Grid, Electronic Voting Security
  • Network and Wireless Network Security
  • Ubiquitous Computing Security
  • Virus, worms, Trojan Protection
  • Web 2.0 Security

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: April 20, 2024

·         Acceptance Notification: May 20, 2024

·         Final Manuscript Due: May 27, 2024

·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: https://airccse.org/journal/ijnsa.html

Paper Submission Link: https://airccse.com/submissioncs/home.html


Friday, April 12, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Empowering Manets with Advanced Multimodal Biometric Authentication and Encryption

Alaa M. Elbanaa1, Mahmoud Y. Shams2,*, Roayat I. Abdelfatah1, Mohamed E. Nasr1, 1Tanta University, Egypt, 2Kafrelsheikh University, Egypt

Abstract

In a mobile ad hoc network (MANET), nodes communicate wirelessly, facing unique challenges. Traditional MANETs suffer from issues like erroneous transmission and vulnerability to unauthorized nodes joining the network, posing security risks. Authentication within MANETs is a significant security concern, prompting ongoing research for enhancements. Our solution integrates multimodal biometric authentication with RSA and AES encryption, providing robust security for user authentication and data protection in MANETs. This approach effectively addresses risks such as unauthorized access and data tampering, crucial for secure communication in dynamic, resource-limited MANET environments. Our proposed system utilizes a combination of face and fingerprint biometrics for encryption, enhancing network security. Through testing, our system demonstrates a high authentication rate of 92.42% with minimal processing times: 0.042 ms for key generation, 0.019 ms for encryption, and 0.032 ms for decryption, based on a 1024-bit key size. These practical results showcase the resilience and efficiency of our secure system.

Keywords

MANET, Public Cryptography, Face, Fingerprint, Security Key, AES, RSA

Abstract URL: http://aircconline.com/abstract/ijnsa/v16n2/16224ijnsa02.html

Original Source URL: https://aircconline.com/ijnsa/V16N2/16224ijnsa02.pdf

Volume URL: https://airccse.org/journal/jnsa24_current.html

Wednesday, April 10, 2024

4th International Conference on NLP & Data Mining (NLDM 2024)

#nlp #datamining #artificialintelligence #machinelearning #bigdata #analysis #knowledgeprocessing #ubiquitouscomputing #business #modeling #internetofthings #informationextraction #informationretrieval #ontology #socialmedia #textmining #computerscience #naturallanguageprocessing #cloud #engineering #informationtechnology #ai #ml #tech #education #data #datascience #deeplearning #iot #web #analytics #computing #it #mining #programming #information #webdeveloper #computer #security #developer #cybersecurity #internet #innovation #datascientist #dataprotection #businessintelligence #robotics #bigdataanalytics #cloudstorage #database #devops #datasecurity #hadoop #cloudcomputing #blockchain #datavisualization #datacenter


Submit Your Research Articles...!!!

Welcome To NLDM 2024

4th International Conference on NLP & Data Mining (NLDM 2024)

August 17 ~ 18, 2024, Chennai, India

Webpage URL:

https://comit2024.org/nldm/index

Submission Deadline: April 13, 2024

Contact us:

Here's where you can reach us: nldm@comit2024.org (or) nldmconf@yahoo.com

Submission URL:

https://comit2024.org/submission/index.php


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

WikiCFP URL:

http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=179570

Submission Deadline: April 13, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Monday, April 8, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Unlocking Secrets: Bioinformatics' Impact on Forensic Bio-Examinations

Joe H Smith1 and M Singh2, 1University of South Africa, South Africa, 2University of the Free State, South Africa

Abstract

Bioinformatics (BI) is a diverse and interdisciplinary domain that studies biological data through computational techniques. Its rapid technological progress has led to a significant increase in biological data production, sparking a notable expansion in BI research and application. In recent years, the convergence between BI and forensic science has become increasingly evident, with the growing use of BI tools and techniques in forensic investigations. BI is not only extensively used in biomedical research to analyse biological data and forecast gene regulation but also in the development of drugs targeting disorders linked to epigenetic alterations. It merges principles from various fields like biology, computer science, and statistics to process extensive omics data, create databases, predict structures, and model metabolic processes. The impact of BI on biomedical research is substantial, aiding in data processing, prediction, and visualisation. Moreover, BI is increasingly important in analysing data generated through Sanger-based electrophoresis methods and massively parallel sequencing in forensic DNA analysis, demonstrating its practical application in the field. Therefore, BI plays a critical role in forensic identification, searching databases side by side, forensic DNA phenotyping and biographic ancestry, forensic genetic genealogy, and forensic epigenomics. An overview of different bioinformatic methodologies employed in forensic applications, exploring approaches for managing data and investigating trend analysis strategies within forensic contexts, is discussed. Additionally, it investigates data management strategies. The primary objective was to explore how BI facilitates forensic BI's use, integration, and impact. Utilising a systematic literature review and content analysis, the study examined peer-reviewed articles, conference proceedings, and reports from critical databases like Google Scholar and Scopus, focusing on publications from 2010 to 2024. Key findings highlight the significant advancements in genomic sequencing technologies and their application in personalised therapeutics. Forensic scientists can improve forensic exams' accuracy, reliability, and efficiency by using BI tools, metrics, and efficient data management procedures.

Keywords

Deoxyribonucleic acid (DNA) data, bio-examinations, bioinformatics, forensic examinations, massive parallel sequencing

Abstract URL: http://aircconline.com/abstract/ijnsa/v16n2/16224ijnsa01.html

Original Source URL: https://aircconline.com/ijnsa/V16N2/16224ijnsa01.pdf

Volume URL: https://airccse.org/journal/jnsa24_current.html

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Submission Deadline: April 13, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Friday, April 5, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Allconferencecfpalerts URL:

https://allconferencecfpalerts.com/cfp/view.php?eno=54486

Submission Deadline: April 07, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...