IJNSA - Most Cited Articles
Upcoming SlideShare
Loading in...5
×
 

IJNSA - Most Cited Articles

on

  • 411 views

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)

Statistics

Views

Total Views
411
Views on SlideShare
411
Embed Views
0

Actions

Likes
0
Downloads
1
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

IJNSA - Most Cited Articles IJNSA - Most Cited Articles Document Transcript

  • International Journal of Network Security & Its Applications (IJNSA) ISSN 0974 - 9330 (Online); 0975 - 2307 (Print) http://airccse.org/journal/ijnsa.html Most Cited Articles - 2012 An Implementation of Intrusion Detection System Using Genetic Algorithm Mohammad Sazzadul Hoque, Md. Abdul Mukit and Md. Abu Naser Bikas, IJNSA Journal, Vol.4, No.2, March 2012, PP. 109-120 DOI : 10.5121/ijnsa.2012.4208 Provable Secure Identity Based Signcryption Schemes Without Random Oracles Prashant Kushwah and Sunder Lal, IJNSA Journal, Vol.4, No.3, May 2012, PP. 97-110 DOI : 10.5121/ijnsa.2012.4306 Non-Profit Organizations' Need to Address Security for Effective Government Contracting Lee E. Rice and Syed (Shawon) M. Rahman, IJNSA Journal, Vol.4, No.4, July 2012, PP. 53-71 DOI : 10.5121/ijnsa.2012.4404 Most Cited Articles - 2011 An Overview of the Security Concerns in Enterprise Cloud Computing Anthony Bisong and Syed (Shawon) M. Rahman, IJNSA Journal, Vol.3, No.1, January 2011, PP. 30-45 DOI : 10.5121/ijnsa.2011.3103 Analysis of Web Logs and Web User in Web Mining L.K. Joshila Grace,V.Maheswari and Dhinaharan Nagamalai, IJNSA Journal, Vol.3, No.1, January 2011, PP. 99-110 DOI : 10.5121/ijnsa.2011.3107 Authentication Schemes for Session Passwords using Color and Images M Sreelatha,M Shashi,M Anirudh,Md Sultan Ahamer and V Manoj Kumar , IJNSA Journal, Vol.3, No.3, May 2011, PP. 111-119 DOI : 10.5121/ijnsa.2011.3308 Data Security using Private Key Encryption System Based on Arithmetic Coding Ajit Singh and Rimple Gilhotra, IJNSA Journal, Vol.3, No.3, May 2011, PP. 58-67 DOI : 10.5121/ijnsa.2011.3305 Wavelet Thresholding Approach for Image Denoising Pankaj Hedaoo and Swati S Godbole, IJNSA Journal, Vol.3, No.4, July 2011, PP. 16-21 DOI : 10.5121/ijnsa.2011.3402 DDoS Attack and Defense Scheme in Wireless Ad hoc Networks S.A.Arunmozhi and Y.Venkataramani, IJNSA Journal, Vol.3, No.3, May 2011, PP. 182-187 DOI : 10.5121/ijnsa.2011.3312 Replication Attack Mitigations for Static and Mobile WSN V.Manjula and C.Chellappan, IJNSA Journal, Vol.3, No.2, March 2011, PP. 122-133 DOI : 10.5121/ijnsa.2011.3210 Prevention of Wormhole Attack in Wireless Sensor network Dhara Buch and Devesh Jinwala , IJNSA Journal, Vol.3, No.5, Sep 2011, PP. 85-98 DOI : 10.5121/ijnsa.2011.3507 Information Security Synthesis in Online Universities Maria Schuett,Crisc and Syed(Shawon)M.Rahman, IJNSA Journal, Vol.3, No.5, Sep 2011, PP. 1-20 DOI : 10.5121/ijnsa.2011.3501
  • Enhancing Infrastructure Security in Real Estate Kyle Dees,M.S and Syed(Shawon)Rahman, IJNSA Journal, Vol.3, No.6, November 2011, PP. 59-80 DOI : 10.5121/ijnsa.2011.3604 Cryptanalysis and Further Improvement of a Biometric-Based Remote User Authentication Scheme using Smart Cards Ashok Kumar Das, IJNSA Journal, Vol.3, No.2, March 2011, PP. 13-28 DOI : 10.5121/ijnsa.2011.3202 A Human-Centric Approach to Group-Based Context-Awareness Nasser Ghadiri,Ahmad Baraani-Dastjerdi,Nasser Ghasem-Aghaee and Mohammad A. Nematbakhsh, IJNSA Journal, Vol.3, No.1, January 201, PP. 47-66 DOI : 10.5121/ijnsa.2011.3104 SULMA: A Secure Ultra Light-Weight Mutual Authentication Protocol for Low Cost RFID Tags Mehrdad Kianersi,Mahmoud Gardeshi and Mohammad Arjmand, IJNSA Journal, Vol.2, No.2, April 2011, PP. 17-24 DOI:10.5121/iju.2011.2202 A Light Weight Protocol to Provide Location Privacy in Wireless Body Area Networks Mohammed Mana,Mohammed Feham and Boucif Amar Bensaber, IJNSA Journal, Vol.3, No.2, March 2011, PP. 1-11 DOI : 10.5121/ijnsa.2011.3201 Most Cited Articles - 2010 Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection Dewan Md. Farid,Nouria Harbi and Mohammad Zahidur Rahman, IJNSA Journal, Volume 2, Number 2, April 2010, PP. 12-25 DOI:10.5121/ijnsa.2010.2202 Hierarchical Design Based Intrusion Detection System for Wireless Ad Hoc Sensor Network Mohammad Saiful Islam Mamun and A.F.M. Sultanul Kabir, IJNSA Journal, Vol.2, No.3, July 2010, PP. 102-117 DOI : 10.5121/ijnsa.2010.2307 Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video Cover Media Natarajan Meghanathan and Lopamudra Nayak, IJNSA Journal, Vol.2, No.1, January 2010, PP. Design and Implementation of a Trust-Aware Routing Protocol for Large WSNS Theodore Zahariadis,Helen Leligou,Panagiotis Karkazis,Panagiotis Trakadas,Ioannis Papaefstathiou,Charalambos Vangelatos and Lionel Besson, IJNSA Journal, Vol.2, No.3, July 2010, PP. 52-68 DOI:10.5121/ijnsa.2010.2304 A Multi-Criteria Evaluation of Information Security Controls Using Boolean Features Angel R. Otero,Carlos E. Otero and Abrar Qureshi, IJNSA Journal, Vol.2, No.4, October 2010, PP. 1-11 DOI : 10.5121/ijnsa.2010.2401 Modeling yhe Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in Manet T.V.P.Sundararajan and A.Shanmugam Volume 2, Number 2, April 2010, PP. 147-160 DOI:10.5121/ijnsa.2010.2212 Cryptanalysis of a More Efficient and Secure Dynamic Id-Based Remote User Authentication Scheme Mueen Uddin,Kamran Khowaja and Azizah Abdul Rehman, IJNSA Journal, Vol.2, No.4, October 2010, PP. 129-141 DOI : 10.5121/ijnsa.2010.2411 Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2) Ulrich Herberg and Thomas Clausen, IJNSA Journal, Volume 2, Number 2, April 2010, PP. 162-181 DOI:10.5121/ijnsa.2010.2213
  • Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor Mohsen Machhout,Zied Guitouni,Kholdoun Torki,Lazhar Khriji and Rached Tourki, IJNSA Journal, Volume 2, Number 2, April 2010, PP. 100-112 DOI:10.5121/ijnsa.2010.2208 Dynamic Multi Layer Signature Based Intrusion Detection System Using Mobile Agents Mueen Uddin,Kamran Khowaja and Azizah Abdul Rehman, IJNSA Journal, Vol.2, No.4, October 2010, PP. 129-141 DOI : 10.5121/ijnsa.2010.2411 Analysis of the Security of BB84 by Model Checking Mohamed Elboukhari,Mostafa Azizi and Abdelmalek Azizi, IJNSA Journal, Volume 2, Number 2, April 2010, PP. 87-98 DOI:10.5121/ijnsa.2010.2207 A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network Jaydip Sen, IJNSA Journal, Vol.2, No.4, October 2010, PP. 92-104 DOI : 10.5121/ijnsa.2010.2408 Lightweight Mutual Authentication Protocol for Low Cost RFID Tags Eslam Gamal Ahmed,Eman Shaaban and Mohamed Hashem, IJNSA Journal, Volume 2, Number 2, April 2010, PP. 27-37 DOI:10.5121/ijnsa.2010.2203 Workload Characterization of Spam Email Filtering Systems Yan Luo, IJNSA Journal, Vol.2, No.1, January 2010, PP. 22-41 Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services Urjita Thakar,Nirmal Dagdee and Sudarshan Varma, IJNSA Journal, Vol.2, No.3, July 2010, PP. 190-205 DOI : 10.5121/ijnsa.2010.2313 An Efficient IP Traceback through Packet Marking Algorithm Y.Bhavani and P.Niranjan Reddy , IJNSA Journal, Vol.2, No.3, July 2010, PP. 132-142 DOI : 10.5121/ijnsa.2010.2309 A Testbed Implementation for Securing OLSR In Mobile Ad Hoc Networks Emmanouil A. Panaousis, George Drew, Grant P. Millar, Tipu A. Ramrekha and Christos Politis, IJNSA Journal, Vol.2, No.4, October 2010, PP. 140-161 DOI : 10.5121/ijnsa.2010.2412 Most Cited Articles - 2009 A New Cluster-Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc Networks Debdutta Barman Roy,Rituparna Chaki and Nabendu Chaki, IJNSA Journal, Vol.1,No.1,April2009, PP. 44-52 A Comparison Between Memetic algorithm and Genetic Algorithm for the Cryptanalysis of Simplified Data Encryption Standard Algorithm Poonam Garg, IJNSA Journal, Vol.1, No 1, April 2009, PP. 34-42 Using Rough Set and Support Vector Machine for Network Intrusion Detection Rung-Ching Chen,Kai-Fan Cheng and Chia-Fen Hsieh, IJNSA Journal, Vol 1, No 1, April 2009, PP. 1-13 Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration Alan Mink, Sheila Frankel and Ray Perlner, IJNSA Journal, Vol 1, No 2, July 2009, PP. 101-112 Tools and Techniques for Network Forensics Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore, IJNSA Journal, Vol .1, No.1,April 2009, PP. 14-25
  • Cryptanalysis of a More Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme Mohammed Aijaz Ahmed,D. Rajya Lakshmi and Sayed Abdul Sattar, IJNSA Journal, Vol.1, No.3, October 2009, PP. 32-37v Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images Krishnamurthy G N and Dr. V Ramaswamy , IJNSA Journal, Vol.1, No 1, April 2009, PP. 28- 33v Intelligent Detection System Framework Using Mobile Agents N.Jaisankar,R.Saravanan and K. Durai Swamy, IJNSA Journal, Vol 1, No 2, July 2009, PP. 72- 88 Integrating Identity-Based Cryptography in IMS Service Authentication Mohamed Abid,Songbo Song,Hassnaa Moustafa and Hossam Afifi , IJNSA Journal, Vol.1, No.3, October 2009, PP. 1-13 Agent Based Trust Management Model Based on Weight Value Model for Online Auctions E.Sathiyamoorthy, N.Ch.Sriman Narayana Iyenger and V.Ramachandran , IJNSA Journal, Vol.1, No.3, October 2009, PP. 15-31 AIRCC Publishing Corporation www.airccse.org