Wednesday, October 30, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Architecture and Design of Micro Knowledge and Micro Medical Processing Units

Shawon S. M. Rahman1 and Syed V. Ahamed2, 1University of Hawaii-Hilo, USA and 2City University of New York, USA

Abstract

In this article, we briefly present the evolution of conventional processor over the last four decades as a prelude to the evolution of knowledge processors. A system of specially designed chipsets from the traditional computer architectures facilitates the solution of most generic problems in sciences and in the society. The design of such chipsets permits the micro knowledge processor unit (µkpu) lodged in a generic knowledge machine to “understand” the context of the problem in reference to the global knowledge of such problems in the world wide web. Micro-processing within the more complex procedures such as knowledge and library functions is thus reduced to logical and then into consecutive hardware functions in the knowledge processors. Medical procedures are used for illustration of the potential of the µkpus. Such medical procedures, sub-procedures and micro-procedures can be performed upon medical super objects, objects, subordinate objects and micro-objects.procedures fragmented sufficiently for the µkpus, execute assembly level type of knowledge micro instructions. Conversely, the micro instructions reassembled vertically, in a hierarchy perform major procedures. Major medical procedures such as removing malignant tissues, curing a patient, performing surgeries, etc., bring about profound changes in patients. Minor procedures represent minor effects such as authorizing a prescription, recording the temperature or blood pressure, etc.

Keywords

Knowledge Processors, Micro Knowledge Processors, medical sensor network, CPU, knowledge instruction, Micro medical processors

Original Source URL: https://aircconline.com/ijnsa/V9N5/9517ijnsa01.pdf

Volume URL: https://airccse.org/journal/jnsa17_current.html

Tuesday, October 29, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy

Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Wikicfp URL: http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=179570

Submission Deadline: November 02, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Monday, October 28, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy

Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Submission Deadline: November 02, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Friday, October 25, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy

Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Google Scholar URL: https://scholar.google.co.in/citations?hl=en&user=lhj_6AYAAAAJ

Citations 11139   h-index 49   i10-index 210

Submission Deadline: October 26, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Thursday, October 24, 2024

5th International Conference on Data Science and Machine Learning (DSML 2024)

#datascience #machinelearning #artificialintelligence #datamining #bigdata #nlp #analysis #knowledgeprocessing #ubiquitouscomputing #business #modeling #internetofthings #informationextraction #informationretrieval #ontology #socialmedia #textmining #computerscience #naturallanguageprocessing #cloud #engineering #informationtechnology #ai #ml #tech #education #data #deeplearning #iot #web #analytics #computing #it #mining #programming #information #webdeveloper #computer #security #developer #cybersecurity #internet #innovation #datascientist #dataprotection #businessintelligence #robotics #bigdataanalytics #cloudstorage #database #devops #datasecurity #hadoop #cloudcomputing #blockchain #datavisualization #datacenter


Submit Your Research Articles...!!!

Welcome To DSML 2024

5th International Conference on Data Science and Machine Learning (DSML 2024)

December 21 ~ 22, 2024, Sydney, Australia

Webpage URL:

https://csen2024.org/dsml/index

Submission Deadline: October 26, 2024

Contact us:

Here's where you can reach us: dsml@csen2024.org (or) dsmlconfe@yahoo.com

Submission URL:

https://csen2024.org/submission/index


Wednesday, October 23, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

A Plain Image Dependent Image Encryption Scheme Using Half Pixel Level Interchange Permutation Operation

Li Liu, Yucheng Chen and Ruisong Ye, Shantou University, China

Abstract

In this paper, a chaos-based image encryption scheme with half-pixel-level interchange permutation strategy and plain-image dependence is proposed. The proposed image encryption scheme consists of a confusion process and a diffusion process. In the confusion process, a pixel-swapping operation between higher bit planes and lower bit planes is employed to replace the traditional confusion operation. The half pixel-level interchange permutation strategy between the higher 4-bit plane part and the lower 4-bit plane part not only improves the conventional permutation efficiency within the plain-image, but also changes all the pixel gray values. The system parameters of generalized Arnold map applied for the permutation operation relies on the plain-image content and consequently can resist chosen-plaintext and known plaintext attacks effectively. To enhance the security of the proposed image encryption, one multimodal skew tent map is utilized to generate pseudo-random gray value sequence for diffusion operation. Simulations have been carried out thoroughly with comparisons with some other existing image encryption schemes. The experimental results demonstrate that the proposed image encryption scheme is highly secure thanks to its large key space and efficient permutation-diffusion operations.

Keywords

Generalized Arnold map, Interchange permutation, Chaotic system, Multimodal skew tent map, Image encryption

Original Source URL: https://aircconline.com/ijnsa/V9N4/9417ijnsa05.pdf

Volume URL: https://airccse.org/journal/jnsa17_current.html


Monday, October 21, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy

Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Allconferencecfpalerts URL: https://allconferencecfpalerts.com/cfp/view.php?eno=60104

Submission Deadline: October 26, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Sunday, October 20, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy

Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Submission Deadline: October 26, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Friday, October 18, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy

Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Current Issue URL: https://airccse.org/journal/jnsa24_current.html

Submission Deadline: October 20, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Thursday, October 17, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Wikicfp URL: http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=179570

Submission Deadline: October 20, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Wednesday, October 16, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Enhance Efficiency of EAP-TTLS Protocol Through the Simultaneous Use of Encryption and Digital Signature Algorithms

Seyed Milad Dejamfar and Sara Najafzadeh, Islamic Azad University, Iran

Abstract

Security and its subcategory authentication are among the important subjects of cloud computing. In this system, user authentication mechanisms are carried out before providing access to resources. It is noteworthy that this input gate is actually the pathway of many attacks. Therefore, designing a secure user authentication mechanism significantly contributes to the overall security of the system. This process blocks attacks where the objective is to authenticate a user and when the user requests for cloud computing services. As a result, this article aimed to introduce a new security solution for cloud computing environments through employing the EAP-TTLS protocol, replacing the common Data Encryption Algorithm (DEA) with a new one, and adding a digital signature to the authentication process. After implementation of the proposed method in matlab, its performance was evaluated with RSA and ECDSA algorithms. The results of simulation showed the improvement of performance in terms of memory usage, authentication time, and verification delay. The proposed method [digital signature], along with username and password, is used to improve security in user authentication process.

Keywords

Cloud Computing, Security, Authentication, Encryption, EAP-TTLS

Original Source URL: https://aircconline.com/ijnsa/V9N4/9417ijnsa04.pdf

Volume URL: https://airccse.org/journal/jnsa17_current.html

Tuesday, October 15, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

October 2024 - Top 10 Read Articles in Network Security and Its Applications

https://www.academia.edu/124736693/October_2024_Top_10_Read_Articles_in_Network_Security_and_Its_Applications

Submission Deadline: October 20, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Monday, October 14, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Submission Deadline: October 20, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Friday, October 11, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Google Scholar URL: https://scholar.google.co.in/citations?hl=en&user=lhj_6AYAAAAJ

Submission Deadline: October 13, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Thursday, October 10, 2024

5th International Conference on NLP & Artificial Intelligence Techniques (NLAI 2024)

#nlp #artificialintelligence #machinelearning #datamining #bigdata #analysis #knowledgeprocessing #ubiquitouscomputing #business #modeling #internetofthings #informationextraction #informationretrieval #ontology #socialmedia #textmining #computerscience #naturallanguageprocessing #cloud #engineering #informationtechnology #ai #ml #tech #education #data #datascience #deeplearning #iot #web #analytics #computing #it #mining #programming #information #webdeveloper #computer #security #developer #cybersecurity #internet #innovation #datascientist #dataprotection #businessintelligence #robotics #bigdataanalytics #cloudstorage #database #devops #datasecurity #hadoop #cloudcomputing #blockchain #datavisualization #datacenter


Submit Your Research Articles...!!!

Welcome To NLAI 2024

5th International Conference on NLP & Artificial Intelligence Techniques (NLAI 2024)

November 16 ~ 17, 2024, Zurich, Switzerland

Webpage URL:

https://iccsea2024.org/nlai/index

Submission Deadline: October 12, 2024

Contact us:

Here's where you can reach us: nlai@iccsea2024.org (or) nlai_conference@yahoo.com

Submission URL:

https://iccsea2024.org/submission/index


Tuesday, October 8, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Comparative Analysis of Feature Selection Techniques for LSTM Based Network Intrusion Detection Models

Shahir Kottilingal, Wakeb Data, KSA

Abstract

Network intrusion systems are inevitable in protecting enterprise assets and improving cybersecurity. The research community is always on the lookout for new approaches to improve network intrusion detection. Network intrusion systems with deep learning models are the major advancement in this field. There are many varieties of network intrusion detection systems with deep learning models that are used nowadays. Even though researchers are investing heavily in their efforts on developing better network intrusion detection systems, rapid advancement in network intrusion attempts warrant further studies in this area. In this study, I am trying to explore the impact of the different most common feature selection methods on the performance of the LSTM-based network intrusion detection system. Benchmark network intrusion dataset UNSW-NB15 was explored for this study. This study explored 8 types of LSTM models in combination with different feature selection methods. The outcome of the study was very interesting as the LSTM model without applying any feature selection method, outperformed other combinations of models.

Keywords

Network Intrusion Detection, Deep Learning, LSTM, Feature Selection & UNSW-NB15

Abstract URL: http://aircconline.com/abstract/ijnsa/v16n5/16524ijnsa01.html

Original Source URL: https://aircconline.com/ijnsa/V16N5/16524ijnsa01.pdf

Volume URL: https://airccse.org/journal/jnsa24_current.html

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Submission Deadline: October 13, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Monday, October 7, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy

Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Submission Deadline: October 13, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Thursday, October 3, 2024

5th International Conference on Machine Learning Techniques and NLP (MLNLP 2024)

#machinelearning #nlp #datamining #artificialintelligence #bigdata #analysis #knowledgeprocessing #ubiquitouscomputing #business #modeling #internetofthings #informationextraction #informationretrieval #ontology #socialmedia #textmining #computerscience #naturallanguageprocessing #cloud #engineering #informationtechnology #ai #ml #tech #education #data #datascience #deeplearning #iot #web #analytics #computing #it #mining #programming #information #webdeveloper #computer #security #developer #cybersecurity #internet #innovation #datascientist #dataprotection #businessintelligence #robotics #bigdataanalytics #cloudstorage #database #devops #datasecurity #hadoop #cloudcomputing #blockchain #datavisualization #datacenter


Submit Your Research Articles...!!!

Welcome To MLNLP 2024

5th International Conference on Machine Learning Techniques and NLP (MLNLP 2024)

October 19 ~ 20, 2024, Sydney, Australia

Webpage URL:

https://csity2024.org/mlnlp/index

Submission Deadline: October 05, 2024 (Final Call)

Contact us:

Here's where you can reach us: mlnlp@csity2024.org (or) mlnlpconference@yahoo.com

Submission URL:

https://csity2024.org/submission/index.php


Wednesday, October 2, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Node Authentication Using BLS Signature in Distributed PKI Based MANETs

N Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, V. Ch. Venkaiah, and Y. V. Subba Rao, University of Hyderabad, India

Abstract

Authenticating a node in mobile ad-hoc networks is a challenging task due to their dynamic and resource constraint infrastructure. For this purpose, MANETS adopt two kinds of approaches Public key cryptography and identity based cryptography. In Public Key Infrastructure (PKI), Certificate Authority (CA) is responsible for key management. In order to adopt it to MANET, the job of the CA must be distributed. The master secret key is shared among the nodes of the MANET, to self-organize the network without a central authority.The key is shared based on Shamir secret sharing scheme with bi-variate polynomial to make the MANET fully selfmanaged by nodes.In this paper, we considered PKI based scenario and proposed a new scheme to authenticate a node using BLS signature which is light weight compared to the existing schemes thus making it suitable for MANET.

Keywords

Mobile ad-hoc network, bi-variate polynomial, secret sharing technique, threshold cryptography, BLS signature

Original Source URL: https://aircconline.com/ijnsa/V9N4/9417ijnsa03.pdf

Volume URL: https://airccse.org/journal/jnsa17_current.html

Tuesday, October 1, 2024

International Journal of Network Security & Its Applications (IJNSA) - Current Issue: September 2024, Volume 16, Number 5

#networksecurity #security #network #blockchain #technology #cybersecurity #artificialintelligence #machinelearning #database #systemsecurity #optimization #internetsecurity #mobile #adhoc #sensors #protocols #Management #intrusion #detection #prevention


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Current Issue: September 2024, Volume 16, Number 5

Comparative Analysis of Feature Selection Techniques for LSTM Based Network Intrusion Detection Models

Shahir Kottilingal, Wakeb Data, KSA

Abstract URL: http://aircconline.com/abstract/ijnsa/v16n5/16524ijnsa01.html

Original Source URL: https://aircconline.com/ijnsa/V16N5/16524ijnsa01.pdf

Volume URL: https://airccse.org/journal/jnsa24_current.html

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...