SlideShare a Scribd company logo
1 of 40
Download to read offline
International Journal of Network Security & Its Applications
(IJNSA)
ISSN : 0974 - 9330 (Online); 0975 – 2307 (Print)
http://airccse.org/journal/ijnsa.html
SCOPE OF THE JOURNAL
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open
access peer-reviewed journal that publishes articles which contribute new results in all areas of the
computer Network Security & its applications. The journal focuses on all technical and practical
aspects of security and its applications for wired and wireless networks. The goal of this journal is
to bring together researchers and practitioners from academia and industry to focus on
understanding Modern security threats and countermeasures, and establishing new collaborations in
these areas.
Topics of Interest
Network and Wireless Network Security
Mobile, Ad Hoc and Sensor Network Security
Peer-to-Peer Network Security
Database and System Security
Intrusion Detection and Prevention
Internet Security & Applications
Security & Network Management
E-mail security, Spam, Phishing, E-mail fraud
Virus, worms, Trojon Protection
Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
Ubiquitous Computing Security
Web 2.0 security
Cryptographic protocols
Performance Evaluations of Protocols & Security Application
http://airccse.org/journal/ijnsa.html
Members of the Editorial Board
Editor In Chief:
Jae-Kwang Lee, Hannam University, South Korea
Associate Editor
Dhinaharan Nagamalai, KTO Karatay University, Turkey
Editorial Board
A.K. Vatsa, Shobhit University, India
Abdul Kadir Ozcan, The American university, Cyprus
Alireza Nemaney Pour, Islamic Azad University of Abhar, Iran
Anas Abou El Kalam, UCA/ENSA of Marrakesh, Morocco
Annamma Abraham, B M S Institute of Technology, India
Asadollah Shahbahrami, University of Guilan, Iran
Ashok Kumar Das, International Institute of Information Technology, India
Belhamri Azeddine, Universite Mentori, Algerie
Boo-Hyung Lee, KongJu National University, South Korea
Carlos E. Otero, The University of Virginia's College at Wise, USA
Ching-Hsien Hsu, Chung Hua University, Taiwan
Denivaldo Lopes, Federal University of Maranhao, Brazil
Dhinaharan Nagamalai, Wireilla Net Solutions PTY LTD, Australia
Gurdev Singh, Adesh Institute of Engineering & Technology, India
Hani H. Qusa, University College of Applied Sciences, Palestine
Henrique Joao Lopes Domingos, New University of Lisbon, Portugal
Hossain Shahriar, Kennesaw State University, USA
Ihab A. Ali, Helwan University, Egypt
Isaac Agudo, University of Malaga, Spain
Ismael Etxeberria-Agiriano, University of the Basque Country, Spain
Jaydip Sen, Tata Consultancy Services, India
Jeong-Hyun Park, Electronics Telecommunication Research Institute, South Korea
Jose Enrique Armendariz-Inigo, Universidad Publica de Navarra, Spain
Jungwook Song, Konkuk University, South Korea
M Rajarajan, City University, United Kingdom
M. B. Ghaznavi-Ghoushchi, Shahed University, Iran
http://airccse.org/journal/ijnsa.html
Editorial Board
Madhan KS, Infosys Technologies Limited, India.
Madhavi Latha, Jawaharlal Nehru Technological University, India
Mahdi Aiash, Middlesex University, London - United Kingdom
Manabu Okamoto, Kanagawa Institute of Technology, Japan
Marc Rader, Capella University, USA
Marjan Gusev, Univ. Sts Cyril and Methodius, Macedoni
Mina Rahbari, Islamic Azad University, Iran
Mohammad A. Alia, Al Zaytoonah University of Jordan, Jordan
Mohammad Ali Jabreil Jamali, Islamic Azad University, Iran
Mohammad Momani, University of technology Sydney, Australia
Mritunjay Rai, Indian Institute of Information Technology and Management, India
Narendra Kr Pareek, Mohanlal Sukhadia University, India
Natarajan Meghanathan, Jackson State University, USA
R.Ramesh, Anna University, India
Raja Kumar M, Universiti Sains Malaysia, Malaysia
Ram Kumar Singh, Swami Vivekanand Subharti University, India
S. K. Ghosh, Indian Institute of Technology, India
Saad M. Darwish, Alexandria University, Egypt
Salman Abdul Moiz, Centre for Development of Advanced Computing, India
Sarah M. North, Kennesaw State University, USA
Santosh Biswas, Indian Institute of Technology Guwahati, India
Shekoofeh Ghiam, Sharif University of Technology, Iran
Sherif S. Rashad, Morehead State University, USA
Susantha Herath, St. Cloud State University, USA
Talal Mousa Alkharobi, King Fahd University of Petroleum & Minerals, Saudi Arabia
V. Lakshmi Narasimhan, East Carolina University, USA
William R Simpson, The Institute for Defense Analyses, USA
Xiaohong Yuan, North Carolina A&T State University, USA
Yasir Arfat Malkani, University of Sindh, Pakistan
Yeong Deok Kim, WooSong University , South Korea
Zakaria Saleh, Yarmouk University, Jordan
Roka Imareef, University of Sabha, Libya
Nameer Emam, Philadelphia University, Jordan
Asimi Ahmed, Ibn Zohr University, Morocco
Hasan Alsakran, King Saud University, Saudi Arabia
http://airccse.org/journal/ijnsa.html
Paper Submission & Manuscript preparation Guide
Authors are invited to submit papers for this journal through E-mail ijnsa@airccse.org.
Submissions must be original and should not have been published previously or be under
consideration for publication while being evaluated for this Journal. For paper format
download the template in this page
Manuscript Template
Review Process
Submissions are accepted for review with the understanding that the same work has been
neither submitted to, nor published in, another publication. Simultaneous submission to other
publications will result in immediate rejection of the paper. Papers are not within the journal
scope will be rejected immediately after the pre review process.
All manuscripts will be subject to a well established, fair, unbiased peer review and refereeing
procedure, and are considered on the basis of their significance, novelty and usefulness to the
Journals readership. The reviewing structure will always ensure the anonymity of the referees
& it will be reviewed by 3 experts in the field. The review output will be one of the following
decisions:
1. Accept
2. Accept with minor changes
3. Weak Accept with major changes
4. Reject
The review process may take approximately two to three months to be completed. The Editor
reserves the right to reject a paper if it does not meet the aims and scope of the journal and if
it is not revised as per instructions.
Copy right form
After submitting final manuscript, you can get copy right form from AIRCC secretary
Publication charges: 120 USD (Maximum 20 pages)
Publication Frequency - Bi Monthly
January, March, May, July, September, November
Special Issue Proposal
IJNSA invite proposals for special issues on topics that fall within the scope of this journal.
You can send your proposal directly to editor in chief & secretary, AIRCC by email
Contact Us
Here's where you can reach us : ijnsa@airccse.org
http://airccse.org/journal/ijnsa.html
Volume 1, Number 1, April 2009
S.No Paper Title Citation
1
Using Rough Set and Support Vector Machine for Network Intrusion Detection
Rung-Ching Chen, Kai-Fan Cheng and Chia-Fen Hsieh, Chaoyang University of
Technology,Taiwan, R.O.C
97
2
Tools and Techniques for Network Forensics
Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore Jackson State
University,USA
51
3
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its
Modified Version using Digital Images
Krishnamurthy G N, Dr. V Ramaswamy,Bapuji Institute of Engineering &
Technology, India
19
4
A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of
Simplified Data Encryption Standard Algorithm
Poonam Garg,Institute of Management Technology, India
73
5
A New Cluster - Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc
Networks
Debdutta Barman Roy,Rituparna Chaki,Nabendu Chaki,Calcutta Institute of
Engineering and Management, India, West Bengal University of Technology,India,
University of Calcutta,India
84
Volume 1, Number 2, July 2009
6
Iterative method for improvement of coding and decryption
Natasa Zivic, Institute for Data Communication Systems, University of
Siegen,Germany
04
7
Tools A new key establishment Scheme for wireless sensor networks
Eric Ke Wang, Lucas C.K.Hui and S.M.Yiu, Department of Computer Science, The
University of Hong Kong, Hong Kong
04
8
Dynamic IDP signature processing by fast elimination using DFA
Mohammed Misbahuddin, Sachin Narayanan and Bishwa Ranjan Ghosh,Computer
Networks & Internet Engineering
Division, Centre for Development of Advanced Computing, Bangalore, India
03
9
Effect of inter packet delay in performance analysis of coexistence heterogeneous wireless
packet networks
G.M.Tamilselvan and A.Shanmugam,Bannariamman Institute of
Technology,Tamilnadu, India
09
10
Clustered Hierarchy in Sensor Networks: Performance and Security
Mohammed Abuhelaleh, Khaled Elleithy and Thabet Mismar, School of Engineering,
University of Bridgeport USA
01
11
Quantum Three-Pass Protocol: Key Distribution using Quantum Superposition States
Yoshito Kanamori1
and Seong-Moo Yoo 2
, 1
University of Alaska Anchorage, Alaska,
USA, 2
The University of Alabama
in Huntsville, Alabama, USA
06
12
Intelligent Intrusion Detection System Framework Using Mobile Agents
N.Jaisankar, R.Saravanan and K. Durai Swamy, School of Computing Sciences, VIT
University, India
19
13
On Generation of Firewall Log Status Reporter (SRr) Using Perl
Sugam Sharma1
, Hari Cohly2
, and Tzusheng Pei2
, 1
Iowa State University,
USA, 2
Jackson State University, USA
09
14
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and
Integration
Alan Mink, Sheila Frankel and Ray Perlner, National Institute of Standards and
Technology (NIST), USA
27
Volume 1, Number 3, October 2009
15
Integrating Identity-Based Cryptography in IMS Service Authentication
Mohamed Abid1
, Songbo Song2
, Hassnaa Moustafa2
and Hossam Afifi1
, 1
Telecom &
Management SudParis ,Evry, France
07
16
Agent Based Trust Management Model Based on Weight Value Model for Online Auctions
E.Sathiyamoorthy, N.Ch.Sriman Narayana Iyenger & V.Ramachandran, VIT
University,INDIA.
09
17
Cryptanalysis of a more efficient and secure Dynamic ID-Based Remote User Authentication
Scheme
Mohammed Aijaz Ahmed1
, D. Rajya Lakshmi2
and Sayed Abdul Sattar3
, GITAM
University, India
17
18
PSIM: A Tool for Analysis of Device Pairing Methods
Yasir Arfat Malkani and Lachhman Das Dhomeja, University of Sussex, Brighton, UK
05
19
Data Security in Mobile Devices by GEO Locking
M Prabu Kumar and K Praneesh Kumar Yadav, VIT University, India
04
20
Performance Evaluation of a New Route Optimization Technique for Mobile IP
Moheb r. Girgis, Tarek m. Mahmoud,Youssef s. Takroni and hassan s. Hassan,Minia
University, Egypt
01
21
Security Properties in an Open Peer-to-Peer Network
Jean-Francois Lalande, David Rodriguez, Christian Toinard,Laboratoire
DInformatique Fondamentale DOrleans, Universite, DOrleans, Ensi de Bourges,
France
03
22
A Security Framework for SOA Applications in Mobile Environment
Zair Abdelouahab,Federal University of Maranhao, CCET/DEEE Av. Dos
portugueses, Campus do Bacanga, Sao Luis, Brazil
15
23
Securing AODV for MANETs using Message Digest with Secret Key
Kamaljit Lakhtaria,Bhaskar N. Patel, Satish G. Prajapati,N. N. Jani, Atmiya Institute
of Technology & Science, India
08
24
Application Specific Usage control Implementation Verification
Rajkumar P.V, S.K.Ghosh and Pallab Dasgupta Indian Institute of Technology-
Kharagpur, India
03
Volume 2, Number 1, January 2010
25
Dynamic Neural Networks in the Detection of Distributed Attacks in Mobile Ad-Hoc
Networks
James Cannady, Nova Southeastern University, USA
09
26
A Frame Work for Ontological Privacy Preserved Mining
Geetha Mary. A and Sriman Narayana Iyengar. N.Ch, VIT University, India.
08
27
Workload Characterization of Spam Email Filtering Systems
Yan Luo, University of Massachusetts Lowell, USA
07
28
Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video
Cover Media
Natarajan Meghanathan and Lopamudra Nayak, Jackson State University, USA
61
29
Weakness on Cryptographic Schemes Based on Regular LDPC Codes
Omessaad Hamdi1
, Manel abdelhedi2
, Ammar Bouallegue2
and Sami
Harari3
, 1
SYSTEL, SUPCOM, Tunisia, 2
SYSCOM, ENIT, Tunisia and 3
SIS, USTV,
France.
00
30
Advanced Security Management in Metro Ethernet Networks
Ammar Rayes, Cisco Systems, USA
0
31
Combining Private and Public Key Encryption Techniques for Providing Extreme Secure
Environment for an Academic Institution Application
1
Syed S. Rizvi, 2
Aasia Riasat and 3
Khaled M. Elleithy, 1,3
University of Bridgeport, USA
and 2
Institute of Business Management, Pakistan.
07
32
Pledge: A Policy-Based Security Protocol for Protecting Content Addressable Storage
Architectures
Wassim Itani, Ayman Kayssi and Ali Chehab,American University of Beirut, Lebanon
01
Volume 2, Number 2, April 2010
33
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
Rajesh P Singh, Anupam Saikia and B. K. Sarma, Indian Institute of Technology,
Guwahati, India
05
34
Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection
Dewan Md. Farid1
, Nouria Harbi1
, and Mohammad Zahidur Rahman2
, 1
University
Lumiere Lyon 2 - France and 2
Jahangirnagar University, Bangladesh
96
35
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Eslam Gamal Ahmed, Eman Shaaban and Mohamed Hashem, Ain Shams University,
EGYPT
24
36
Fuzzy Aided Application Layer Semantic Intrusion Detection System – FASIDS
S.Sangeetha1
& V.Vaidehi2
, 1
Angel College of Engineering, India and 2
Madras Institute
of Technology, India
07
37
Events Classification in Log Audit
Sabah Al-Fedaghi and Fahad Mahdi, Kuwait University, Kuwait
07
38
Analysis of the Security of BB84 by Model Checking
Mohamed Elboukhari1
, Mostafa Azizi2
and Abdelmalek Azizi13
, 1
FSO, University
Mohamed Ist, Morocco, 2
ESTO, University Mohamed Ist,Morocco and 3
Academy
Hassan II of Sciences & Technology, Morocco
14
39
Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor
Mohsen Machhout1
, Zied Guitouni1
, Kholdoun Torki2
, Lazhar Khriji3
and Rached
Tourki1
, 1
Faculty of Sciences of Monastir,
Tunisia, 2
TIMA - CMP Laboratory, France and 3
Sultane Qaboos University, Oman
15
40
Impersonation Attack on EKE Protocol
Shirisha Tallapally , Vaagdevi College of Engineering, India
03
41
A Light-Weight Mutual Authentication and Key-Exchange Protocol Based on Elliptical
Curve Cryptogaphy for Energy -Constrained Devices
Kin Choong Yow and Amol Dabholkar, Nanyang Technological University,Singapore
04
42
Trust Based Content Distribution for Peer-To-Peer Overlay Networks
S.Ayyasamy1
and S.N. Sivanandam2
, 1
Tamilnadu College of Engineering, India
and 2
PSG College of Technology, India
06
43
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in MANET
T.V.P.Sundararajan and A.Shanmugam,Bannari Amman Institute of Technology,
Sathyamangalam,India
26
44
Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2)
Ulrich Herberg and Thomas Clausen,Ecole Polytechnique, France
24
Volume 2, Number 3, July 2010
45
A Novel Web-based Approach for Balancing Usability and Security Requirements of Text
Passwords
Dhananjay Kulkarni, Boston University, USA.
02
46
Cross-Layer Resource Allocation Scheme Under Heterogeneous Constranits For Next
Generation High Rate WPAN
Ayman Khalil, Matthieu Crussiere and Jean-Francois Helard, Institute of Electronics
and Telecommunications of Rennes
(IETR), France.
12
47
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Chang N. Zhang, Qian Yu and Xiao Wei Liu, University of Regina, Canada.
0
48
Design And Implementation Of a Trust-Aware Routing Protocol For Large WSNs
Theodore Zahariadis1
, Helen Leligou1
, Panagiotis Karkazis4
,Panagiotis Trakadas2
,
Ioannis Papaefstathiou4
,Charalambos Vangelatos3
and Lionel Besson4
, 1
Technological
Educational Institute of Chalkis, Greece, 2
Hellenic Authority for
Communications Security and Privacy (ADAE), Greece, 3
Hellenic Aerospace Industry
S.A., Greece, Thales Communications, France and 4
Technical University of Crete,
Greece.
46
49
Investigating & Improving The Reliability And Repeatability Of Keystorke Dynamics
Timers
Pavaday Narainsamy,Soyjaudah Sunjiv and Nugessur Shrikaant, University of
Mauritius.
05
50
Improving TLS Security By Quantum Cryptography
Mohamed Elboukhari1
, Mostafa Azizi2
and Abdelmalek Azizi3
, 1
FSO, University
Mohamed Ist, Morocco, 2
ESTO, University Mohamed Ist,Morocco and 3
Academy
Hassan II of Sciences & Technology, Morocco.
05
51
Hierarchical Design Based Intrusion Detection System For Wireless Ad Hoc Sensor Network
Mohammad Saiful Islam Mamun1
and A.F.M. Sultanul Kabir2
, 1
Stamford University,
Bangladesh and 2
American International University, Bangladesh.
43
52
Byzantine Behaviour (B2) - Mitigating Midway Multicast Misbehaviour (M4) In Adhoc
Network
S. Albert Raebra1
and S. Vijayalakshmi2
, 1
St.Josephs College, Bharathidasan
University, India and 2
Pondicherry University, India
01
53
An Efficient IP Traceback Through Packet Marking Algorithm
Y.Bhavani and P.Niranjan Reddy, Kakatiya Institute of Technology and Science,India.
08
54
Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security
Applications in Constrained Network Environment
K R Chandrasekhara Pillai1
and M P Sebastian2
,1
N S S College of Engineering,India
and ²Indian Institute of Management, India
08
55
Wireless Security Measurement Using Data Value Index
Reza Amirpoor, ¹Ajay Kumar ² and Satish R. Deavne ³,¹Bharati Vidyapeeth
University,India, ²JSPMs JAYAWANT Institute of Computer Applications,India
and ³DR.D. Y. Patil Ramrao Adik Institute of Technology, India.
0
56
An Efficient M-ARY QIM Data Hiding Algorithm For The Application To Image Error
Concealment
Amit Phadikar¹ and Santi P. Maity ², ¹MCKV Institute of Engineering,India
and ²Bengal Engineering and Science University, India
0
57
Pattern Analysis and Signature Extraction For Intrusion Attacks On Web Services
Urjita Thakar¹, Nirmal Dagdee² and Sudarshan Varma³, ¹Shri G.S. Institute of
Technology and Science,India, ²S.D. Bansal College of Technology,India and ³Ideavate
Solutions, USA.
15
Volume 2, Number 4, October 2010
58
A Multi-Criteria Evaluation of Information Security Controls Using Boolean Features
Angel R. Otero¹, Carlos E. Otero² and Abrar Qureshi², ¹Nova Southeastern University,
USA and ²University of Virginia's
College at Wise, USA
20
59
Securing Data Transfer in the Cloud Through Introducing Identification Packet and UDT-
Authentication Option FIeld:A Characterization
Danilo Valeros Bernardo and Doan B Hoang, The University of Technology- Sydney,
Australia
06
60
Efficient Digital Encryption Algorithm Based on Matrix Scrambling Technique
M. Kiran Kumar¹, S. Mukthyar Azam¹ and Shaik Rasool², ¹R.V.R & J.C College of
Engg, India and ²S.C.E.T, India
31
61
Verification of Quantum Cryptography Protocols by Model Checking
Mohamed Elboukhari¹, Mostafa Azizi² and Abdelmalek Azizi¹,¹
, ¹FSO, University
Mohamed Ist, Morocco, ²ESTO, University
Mohamed Ist, Morocco and ³Academy Hassan II of Sciences & Technology, Morocco
02
62
Evaluating Galois Counter Mode in Link Layer Security Architecture for Wireless Sensor
Networks
Vivaksha Jariwala¹ and D. C. Jinwala², ¹C. K. Pithawalla College of Engineering and
Technology, India and ²S. V. National Institute of Technology, India
03
63
Security in Wireless Sensor Networks: Key Management Module in SOOAWSN
Mohammed A. Abuhelaleh and Khaled M. Elleithy, University Of Bridgeport, USA
26
64
Effect of Hash Function on Performance of Low Power Wake up Receiver for Wireless
Sensor Network
Vikas Kumar¹ and Rajender Kumar², NIT- kurukshetra, India
00
65
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping
Nodes in a Mobile Ad Hoc Network
Jaydip Sen, Tata Consultancy Services Ltd - Kolkata, India
14
66
Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme with Session
Key Agreement for Multi-Server Environment
Rafael Martinez-Pelaez¹,²
, Francisco Rico-Novella¹, Cristina Satizabal2
and Jacek
Pomykala³, ¹Technical University of Catalonia, Spain, ²Universidad de la Sierra Sur,
Mexico and ³Warsaw University, Poland
05
67
A (2,N) Visual Cryptographic Technique for Banking Applications
Jayanta Kumar Pal¹, J. K. Mandal² and Kousik Dasgupta¹, ¹Kalyani Government
Engineering College, India and ²University of Kalyani, India
13
68
Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents
Mueen Uddin¹, Kamran Khowaja² and Azizah Abdul Rehman¹, ¹UTM, Malaysia
and 2
Isra University, Pakistan
24
69
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
Emmanouil A. Panaousis, George Drew, Grant P. Millar, Tipu A. Ramrekha and
Christos Politis, Kingston University - London, United Kingdom
07
70
Lightweight C&C based botnet detection using Aho-Corasick NFA
Udhayan J¹, Anitha R² and Hamsapriya T², ¹Karunya University, India and ²PSG
College of Technology, India
06
71
Emergency Response Communications and Associated Security Challenges
Muhammad Ibrahim Channa and Kazi M. Ahmed, Asian Institute of Technology,
Thailand
10
72
A Formal Verification Framework for Security Policy Management in Mobile IP Based
WLAN
Soumya Maity, P Bera, S K Ghosh and Pallab Dasgupta, Indian Institute of Technology
- Kharagpur, India
02
73
Effective Voice Calls Admission for Authorized User in Inter VOIP Network
Subashri T and Vaidehi V, Anna University - Chennai, India 0
74
ADRISYA: A Flow Based Anomaly Detection System for Slow and Fast Scan
Muraleedharan N and Arun Parmar, Centre for Development of Advanced Computing
(C-DAC), India
04
75
Improving the Reliability of Detection of LSB Replacement Steganography
Shreelekshmi R¹, Wilscy M² and C E Veni Madhavan³, ¹College of Engineering -
Trivandrum, India, ²University of Kerala, India and ³Indian Institute of Science, India
0
76
Zero Data Remnance Proof in Cloud Storage
Mithun Paul and Ashutosh Saxena, Infosys Technologies Ltd - Hyderabad, India
3
77
Bayesian Based Comment Spam Defending Tool
Dhinaharan Nagamalai¹, Beatrice Cynthia Dhinakaran² and Jae Kwang Lee², ¹Wireilla
Net Solutions, Australia and ²Hannam University, South Korea
2
Volume 3, Number 1, January 2011
78
Virtual Machines And Networks - Installation, Performance, Study, Advantages And
Virtualization Options
Ishtiaq Ali and Natarajan Meghanathan, Jackson State University, USA
19
79
Comparison Process Long Execution Between PQ Algorthm And New Fuzzy Logic
Algorithm For VOIP
Suardinata, Kamalrulnizam bin Abu Bakar and Nimitr Suanmali, University
Teknologi Malaysia, Malaysia
01
80
An Ov erview Of The Security Concerns In Enterprise Cloud Computing
Anthony Bisong¹ and Syed (Shawon) M. Rahman², ¹Capella University,USA
and ²University of Hawaii-Hilo, USA
182
81
A Human-Centric Approach To Group-Based Context-Awareness
Nasser Ghadiri, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee and Mohammad
A. Nematbakhsh, University of Isfahan,
Iran
08
82
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas
Sector
Iwendi, C. O and Allen, A. R. , University of Aberdeen, Scotland, UK
14
83
Failure of A Mix Network
Kun Peng, Institute for Infocomm Research, Singapore
03
84
Analysis of Web Logs And Web User In Web Mining
L.K. Joshila Grace¹, V.Maheswari¹ and Dhinaharan Nagamalai², ¹Sathyabama
University, India and ²Wireilla Net Solutions PTY Ltd, Australia
96
Volume 3, Number 2, March 2011
85
A Light Weight Protocol To Provide Location Privacy In Wireless Body Area Networks
Mohammed Mana¹, Mohammed Feham¹ and Boucif Amar Bensaber², ¹University of
Tlemcen, Algeria and²Universite du Quebec a Trois-Rivieres, Canada
11
86
Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication
Scheme Using Smart Cards
Ashok Kumar Das, International Institute of Information Technology - Hyderabad,
India
18
87
Digital Watermarking through Embedding of Encrypted and Arithmetically Compressed
Data into Image using Variable Length Key
Sabyasachi Samanta¹, Saurabh Dutta² and Goutam Sanyal³, ¹Haldia Institute of
Technology, India, ²Dr. B. C. Roy Engineering College - Durgapur, India and ³National
Institute of Technology - Durgapur, India
02
88
The Key Exchange Cryptosystem Used With Higher Order Diophantine Equations
Harry Yosh, HECO Ltd - Canberra, Australia
08
89
Design And Efficient Deployment Of Honeypot And Dynamic Rule Based Live Network
Intrusion Collaborative System
Renuka Prasad.B¹, Annamma Abraham², Abhas Abhinav³, Sunil.V.Gurlahosur⁴⁴⁴⁴ and
Srinivasa Y⁴⁴⁴⁴, ¹R.V.College of Engineering, India, ²BMSIT - Bengaluru,
India, ³DeepRootLinux Pvt Ltd, India, ⁴⁴⁴⁴SIT - Tumkur, India
01
90
Confidentiality & Authentication Mechanism for Biometric Information Transmitted over
Low Bandwidth & Unreliable channel
Raju Singh and A.K.Vatsa, Shobhit University, India.
06
91
Investigating the Combination of Text and Graphical Passwords for a more secure and usable
experience
C Singh, L Singh and E Marks, University of Guyana
09
92
Uncoercibility In E-Voting And E-Auctioning Mechanisms Using Deniable Encryption
Jaydeep Howlader, Vivek Nair, Saikat Basu and A. K. Mal, National Institute of
Technology - Durgapur, India
07
93
A Novel Data Encryption Technique By Genetic Crossover Of Robust Biometric Key And
Session Based Password
Tanmay Bhattacharya¹, Sirshendu Hore², Ayan Mukherjee³ and S. R. Bhadra
Chaudhuri⁴⁴⁴⁴, ¹JIS College Engineering, India, ²Hooghly Engineering & Technology
College, India, ³Institute of Science & Technology, India and ⁴⁴⁴⁴Bengal Engineering
& Science University, India
02
94
Replication Attack Mitigations for Static And Mobile WSN
V.Manjula and C.Chellappan, Anna University - Chennai, India
19
95
Stage Staffing Scheme for Copyright Protection In Multimedia
Sumit Kumar, Santosh Kumar and Sukumar Nandi, Indian Institute of Technology -
Guwahati, India
0
96
Substitution-diffusion based Image Cipher
Narendra K Pareek¹, Vinod Patidar² and Krishan K Sud², ¹M L Sukhadia University -
Udaipur, India and ²Sir Padampat Singhania University, India
14
97
A Robust Mechanism For Defending Distributed Denial Of Service Attacks On Web Servers
Jaydip Sen, Innovation Lab, Tata Consultancy Services Ltd.,- Kolkata, India
12
98
Image Encryption Based On Diffusion And Multiple Chaotic Maps
G.A.Sathishkumar¹, K.Bhoopathy bagan² and N.Sriraam³, ¹Sri Venkateswara College
of Engineering, India, ²Madras Institute of Technology, India and ³SSN College of
Engineering, India
35
99
A QoS Based MAC Protocol For Wireless Ad-hoc Network
Vandana khare¹, D.SrinivasRao² and Y.Madhavee Latha³, ¹CMEC - Hyd,
India, ²JNTUH - Hyd, India and ³MRECW - Hyd, India
0
Volume 3, Number 3, May 2011
100
System Dynamics Based Insider Threats Modeling
Sang-Chin Yang and Yi-Lu Wang, National Defense University, Republic of China
08
101
Countermeasure Tool - Carapace for Network Security
Anand Bisen, Shrinivas Karwa and B.B. Meshram, Veermata Jijabai Technological
Institute, India
01
102
On Design of PUF-Based Random Number Generators
Mehdi Ayat¹, Reza Ebrahimi Atani² and Sattar Mirzakuchaki¹, ¹Iran University of
Science and Technology, Iran and ²The University of Guilan, Iran
03
103
Credential Based Mediator Architecture for Access Control and Data Integration in Multiple
Data Sources Environment
Nirmal Dagdee and Ruchi Vijaywargiya, S.D. Bansal College Of Technology, India
05
104
Data Security Using Private Key Encryption System Based on Arithmetic Coding
Ajit Singh and Rimple Gilhotra, BPS Mahila Vishwavidyalaya, India
28
105
PKI in Government Identity Management Systems
Ali M. Al-Khouri, Emirates Identity Authority, United Arab Emirates
10
106
Maintaining Uniform Density and Minimizing the Chance of Error in a Large Scale WSN
Asis Kumar Tripathy, Shradhananda Beura, Muralidhar Behera and Gunanidhi
Pradhan, NM Institute of Engineering and Technology, India
00
107
Authentication Schemes for Session Passwords Using Color and Images
M Sreelatha¹, M Shashi², M Anirudh¹, Md Sultan Ahamer¹ and V Manoj
Kumar¹, ¹RVR & JC College of Engineering, India
and ²Andhra University College of Engineering, India
50
108
Transformation from Identity Stone Age to Digital Identity
Mohit Kohli, Rolta Technology Limited (RIL), India 02
109
Enterprise Delegation for Service Based Systems
Coimbatore Chandersekaran¹ and William R. Simpson², ¹The Secretary of the Air
Force, USA and ²The Institute for Defense Analyses, USA
0
110
An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its
Verification
Ferdous A Barbhuiya, Santosh Biswas and Sukumar Nandi, Indian Institute of
Technology - Guwahati, India
04
111
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
S.A.Arunmozhi and Y.Venkataramani, Saranathan College of Engineering, India
40
112
TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for
MANET
Ahmed M. Abd El-Haleem and Ihab A. Ali, Helwan University, Egypt 04
Volume 3, Number 4, July 2011
113
Novel Hybrid Intrusion Detection System For Clustered Wireless Sensor Network
Hichem Sedjelmaci and Mohamed Feham, Abou Bakr Belkaid University - Tlemcen,
Algeria
32
114
Wavelet Thresholding Approach For Image Denoising
Pankaj Hedaoo and Swati S Godbole, G. H. Raisoni College of Engineering, Nagpur,
India.
44
115
Architecture Of A Identity Based Firewall System
Nenad Stojanovski¹ and Marjan Gusev², ¹Makedonski Telekom AD, Orce Nikolov BB,
1000 Skopje, Macedonia and ²Ss. Cyril and Methodius University, Macedonia
07
116
Cryptovirology: Virus Approach
Shivale Saurabh Anandrao, Vishwakarma Institute Of Information Technology - Pune,
India
02
117
Security Apprehensions In Different Regions Of Cloud Captious Grounds
Gurdev Singh¹ Amit Sharma¹ and Manpreet Singh Lehal², ¹Eternal University, HP
India and ²Lyallpur Khalsa College, India
15
118
A Novel Header Matching Algorithm For Intrusion Detection Systems
Mohammad A. Alia¹, Adnan A. Hnaif¹, Hayam K. Al-Anie¹, Khulood Abu Maria¹,
Ahmed M. Manasrah² and M. Imran Sarwar³, ¹Al Zaytoonah University, Jordan, ²Al
Yarmouk University, Jordon and ³Universiti Sains Malaysia, Malaysia
01
119
A Novel Scheme For Deviation Detection In Asynchronous Distributed Pricing
S.S. Prasad, Rithika Baruah and Siddharth.A, National Institute of Technology,
Jamshedpur, India
0
120
E-Voting Protocol Based On Public-Key Cryptography
Hayam K. Al-Anie, Mohammad A. Alia and Adnan A. Hnaif, Al Zaytoonah University,
Jordan
12
121
Optimizing And Analysing The Effectiveness Of Security Hardening Measures Using
Various Optimization Techniques as Well as Network Management Models Giving Special
Emphasis To Attack Tree Model
Prabhat Kumar Vishwakarma, University of Gondar, Ethiopia
01
122
Governing Information Security In Conjunction With Cobit And Iso 27001
Tolga Mataracioglu¹ and Sevgi Ozkan², ¹TUBITAK National Research Institute of
Electronics and Cryptology (UEKAE), Turkey and ²Middle East Technical University,
Turkey
17
123
An Evaluation Of Fingerprint Security Using Noninvertible Biohash
N.Radha¹ and S.Karthikeyan², ¹Karpagam University, India and ²College of Applied
Sciences, Sultanate of Oman
15
124
RTOS Based Secure Shortest Path Routing Algorithm In Mobile Ad- Hoc Networks
R. Ramesh and S. Gayathri, Anna University, India
02
125
An Approach To Provide Security In Mobile Ad-Hoc Networks Using Counter Mode Of
Encryption On Mac Layer
Gulshan Kumar and Mritunjay Rai, Lovely Professional University, Jalandhar, India.
02
126
An Ancient Indian Board Game as a Tool for Authentication
Sreelatha Malempati¹ and Shashi Mogalla², ¹RVR & JC College of Engineering,
Guntur, A.P and ²Andhra University
College of Engineering, Visakhapatnam, A.P
03
127
Ensemble of Blowfish With Chaos Based S Box Design For Text And Image Encryption
Jeyamala Chandrasekaran¹ Subramanyan B¹ and Raman G.S², ¹Thiagarajar College of
Engineering, Madurai and ²KLN College of Information Technology, Madurai
09
Volume 3, Number 5, September 2011
128
Information Security Synthesis in Online Universities
Maria Schuett, Crisc and Syed (Shawon) M. Rahman, Capella University, USA
10
129
A Multiple Ballots Election Scheme Using Anonymous Distribution
Manabu Okamoto, Kanagawa Institute of Technology, Japan
01
130
Enhanced Secure Algorithm for Message Communication
Shaik Rasool, G. Sridhar, K. Hemanth Kumar and P. Ravi Kumar, S.C.E.T., India
01
131
Design & Implementation of Secure AODV in Multicast Routing to Detect DDOS Attack
Vikram Singh and Vatika, Chaudhary Devi Lal University, India
0
132
An ISP Based Notification and Detection System to Maximize Efficiency of Client
Honeypots in Protection of End Users
Masood Mansoori and Ray Hunt, University of Canterbury, New Zealand
0
133
Simulation of the Combined Method
Ilya Levin and Victor Yakovlev, State University of Telecommunication, Russia
00
134
Prevention of Wormhole Attack in Wireless Sensor Network
Dhara Buch¹ and Devesh Jinwala², ¹Government Engineering College Rajkot, India
and ²S.V. National Institute of Technology, India
19
135
DDNFS: A Distributed Digital Notary File System
Alexander Zanger, Bond University, Australia
00
136
Method for reducing of noise by improving Signal-to-Noise-Ratio in wireless LAN
R.Seshadri¹ and N. Penchalaiah², ¹S.V.University, India and ²ASCET, India
00
137
Handwritten Text Image Authentication Using Back Propagation
A S N Chakravarthy¹, Penmetsa V Krishna Raja² and P S Avadhani³, ¹Sri Aditya
Engineering College, India, ²JNTUK, India and ³Andhra University, India
04
138
A Hierarchical Intrusion Detection Architecture for Wireless Sensor Networks
Hossein Jadidoleslamy, The University of Guilan, Iran
18
139
BSK-WBSN: BioMetric Symmetric Keys tO Secure Wireless Body Sensors Networks
Mesmoudi Samira and Feham Mohammed, University of Tlemcen, Algeria
17
140
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent
Chintan Bhatt, Asha Koshti, Hemant Agrawal, Zakiya Malek and Bhushan Trivedi,
GLS Institute of Computer Technology, India
04
141
Botnet Command Detection using Virtual Honeynet
J.S.Bhatia, R.K.Sehgal and Sanjeev Kumar, CDAC Mohali, India
12
142
CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN
spoofing attack
L.Kavisankar and C.Chellappan, Anna University, India
06
143
Assured Full Communication by Merging BlocksRandomly in Wireless Sensor Networks
usingReed Solomon Code for Key Predistribution
Pinaki Sarkar¹ and Aritra Dhar², ¹Jadavpur University, India and ²Gurunanak
Institute of Technology, India
01
144
Trust Enhanced Data Security in Free Roaming Mobile agents using Symmetric Key
cryptography
G.Geetha¹ and C.Jayakumar², ¹Jerusalem college of Engineering, India and ²RMK
Engineering college, India
04
145
Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication
Mechanism
Preeti Sachan and Pabitra Mohan Khilar, National Institute of Technology Rourkela,
India
16
146
Adaptive Association Rule Mining Based Cross Layer Intrusion Detection System for
MANET
V. Anjana Devi¹ and R. S. Bhuvaneswaran², ¹St. Joseph's College of Engineering, India
and ²Anna University, India
03
147
Error Detection and Correction for Distributed Group Key Agreement Protocol
P.Vijayakumar, S.Bose and A.Kannan, Anna University - Chennai, India
0
Volume 3, Number 6, November 2011
148
Rational Secret Sharing Over an Asynchronous Broadcast Channel With Information
Theoretic Security
William K. Moses Jr. and C. Pandu Rangan, Indian Institute of Technology - Chennai,
India
02
149
An Overview of Penetration Testing
Aileen G. Bacudio¹, Xiaohong Yuan¹, Bei-Tseng Bill Chu² and Monique Jones¹, ¹North
Carolina A&T State University, USA and ²University of North Carolina at Charlotte,
USA
27
150
The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks
Novarun Deb, Manali Chakraborty and Nabendu Chaki, University of Calcutta,
India
0
151
Enhancing Infrastructure Security in Real Estate
Kyle Dees and Syed (Shawon) Rahman, Capella University, USA
09
152
Implementation of Cryptographic Algorithm for GSM and UMTS Systems.
Alpesh R. Sankaliya, V.Mishra and Abhilash Mandloi, Sardar Vallabhbhai National
Institute of Technology, India
07
153
Role of Multiple Encryption in Secure Electronic Transaction
Himanshu Gupta¹ and Vinod Kumar Sharma², ¹Amity University Campus, India
and ²Gurukula Kangri Vishwavidyalaya, India
19
154
Securing IEEE 802.11g WLAN Using Open VPN and its Impact Analysis
Praveen Likhar, Ravi Shankar Yadav and Keshava Rao M, Defence Research and
Development Organisation (DRDO) - Bangalore, India
12
155
Statistical Quality Control Approaches to Network Intrusion Detection
Rohitha Goonatilake¹, Rafic Bachnak¹ and Susantha Herath², ¹Texas A&M
International University, USA and ²St. Cloud State University, USA
02
156
Security Enhanced Key Predistribution Scheme Using Transversal Designs and Reed Muller
Codes for Wireless Sensor Networks
Pinaki Sarkar¹, Amrita Saha² and Samiran Bag³, ¹Jadavpur University, India, ²IIT
Bombay, India and ³Indian Statistical Institute, India
01
157
Scheme of Encryption for Block Ciphers and Multi Code Generation Based on Secret Key
P. Anuradha Kameswari, R. Chaya Kumari and L. Praveen Kumar, Andhra
University, India
00
158
User Authentication using Native Language Passwords
Sreelatha Malempati¹ and Shashi Mogalla², ¹R.V.R. & J.C. College of Engineering,
India and ²Andhra University College of Engineering, India
03
159
Prediction of Malicious Objects in Computer Network and Defense
Hemraj Sainia¹, T. C. Panda² and Minaketan Panda³, ¹Alwar Institute of Engineering
& Technology, India, ²Orissa Engineering College, India and ³SPANCO TELE, India
05
160
Blind Signature Scheme Based on Chebyshev Polynomials
Maheswara Rao Valluri, Salalah College of Technology, Oman
01
161
Efficient Detection of Sybil attack Based on Cryptography in Vanet
Mina Rahbari and Mohammad Ali Jabreil Jamali, Islamic Azad University, Iran
26
162
Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm
Debasis Das and Rajiv Misra, Indian Institute of Technology - Patna, India
20
163
Experimenting with the Novel Approaches in Text Steganography
Shraddha Dulera¹, Devesh Jinwala1 and Aroop Dasgupta², ¹S V National Institute of
Technology, India and ²Bhaskaracharya Institute for Space Applications and Geo-
Informatics, India
10
164
Techniques and Tools for Forensic Investigation of E-mail
M. Tariq Banday, University of Kashmir, India
13
165
Enhanced OneTime Pad Cipher with MoreArithmetic and Logical Operations with Flexible
Key Generation Algorithm
S.G.Srikantaswamy¹ and H.D.Phaneendra², ¹National Institute of Engineering -
Mysore, India and ² CSE NIE - Mysore, India
05
166
An Effective Prevention of Attacks using GI Time Frequency Algorithm under DDoS
K.Kuppusamy¹ and S.Malathi², ¹Alagappa University, India and ²Manonmaniam
Sundaranar University, India
07
167
Securing Mobile Agents in MANET against Attacks using Trust
Chandreyee Chowdhury and Sarmistha Neogy, Jadavpur University, India
03
Volume 4, Number 1, January 2012
168
Optimizing One Fair Document Exchange Protocol
Abdullah M. Alaraj, Qassim University, Saudi Arabia
03
169
IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots
K.Munivara Prasad¹, A.Rama Mohan Reddy² and V Jyothsna³, ¹Rayalaseema
University, India, ²SV University, India and ³Sree vidyanikethan Engg.College, India
10
170
Protected Data Objects Replication in Data Grid
G. Aruna Kranthi and D. Shashi Rekha, S.R. Engineering College - Warangal, India
Erratum : Due to a serious case of plagiarism this paper has been retracted.
0
171
Efficient & Secure Data Hiding Using Secret Reference Matrix
Laxman Tawade¹, Rajshree Mahajan² and Chandan Kulthe², ¹Pune University, India
and ²Aditya Engineering College, India
04
172
Risks and Remedies in E-Learning System
Nikhilesh Barik and Sunil Karforma, Burdwan University, India
28
173
Malware Detection Module using Machine Learning Algorithms to Assist in Centralized
Security in Enterprise Networks
Priyank Singhal and Nataasha Raul, Sardar Patel Institute of Technology - University
of Mumbai, India
19
174
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc
Network
G.Padmavathi, P.Subashini and D.Devi Aruna, Avinashiligam University for Women,
India
03
175
Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks
Sridhar Subramanian¹ and Baskaran Ramachandran², ¹Easwari Engineering College -
Chennai, India and ²Anna University - Chennai, India
18
176
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Security
Minal Moharir and A V Suresh, R V College of Engineering Bangalore, India
01
177
A Security Suite for Wireless Body Area Networks
Raghav V. Sampangi¹, Saurabh Dey², Shalini R. Urs³ and Srinivas Sampalli¹,
¹Dalhousie University, Canada, ²Analytics Quotient Bangalore, India and 3
University of
Mysore, India
21
178
A Defensive Mechanism Cross Layer Architecture for Manets to Identify and Correct
Misbehaviour in Routing
G.S. Mamatha, R.V. College of Engineering Bangalore, India
02
179
The Coordinate Ratios as a Tool to Analyze the Intrusion based on Buzek-Hillery Quantum
Copying Machine
Besma Othmani¹, Mohsen Machhout², Houcine Mejri¹,²
, Hafedh Belmabrouk¹ and Rached
Tourki¹, ¹Laboratoire d'Electronique et Micro Electronique Faculte des Sciences de Monastir,
Tunisia and ²Ecole Preparatoire aux Academies Melitaires, Tunisia
0
Volume 4, Number 2, March 2012
180
A Generic Framework for Device Pairing in Ubiquitous Computing Environments
Yasir Arfat Malkani, Dan Chalmers, Ian Wakeman and Lachhman Das Dhomeja,
University of Sussex, UK
01
181
LSR Protocol Based on Nodes Potentiality in Trust and Residual Energy for WSNs
Shaik Sahil Babu, Arnab Raha and M.K.Naskar, Jadavpur University, India
01
182
Cross Layer Intrusion Detection System for Wireless Sensor Network
Djallel Eddine Boubiche and Azeddine Bilami, LaSTIC Laboratory - UHL Batna,
Algeria
25
183
Minimizing the Time of Spam Mail Detection by Relocating Filtering System to the Sender
Mail Server
Alireza Nemaney Pour¹, Raheleh Kholghi² and Soheil Behnam Roudsari²,¹Islamic Azad
University of Abhar, Iran and ²Sharif University of Technology, Iran
03
184
A Bayesian Classification on Asset Vulnerability for Real Time Reduction of False Positives
in Ids
G.Jacob Victor¹, M Sreenivasa Rao² and V.CH. Venkaiah³, ¹SERP - RD Department,
India, ²JNTU - Hyderabad, India and ³CRRao AIMS & CS - Hyderabad, India
03
185
Cloud Computing Security in Business Information Systems
Sasko Ristov, Marjan Gusev and Magdalena Kostoska, Ss. Cyril and Methodius
University, Macedonia
28
186
Design and Analysis of a Novel Digital Image Encryption Scheme
Narendra K Pareek, M L Sukhadia University, India
27
187
An Implementation of Intrusion Detection System Using Genetic Algorithm
Mohammad Sazzadul Hoque, Md. Abdul Mukit and Md. Abu Naser Bikas, Shahjalal
University of Science and Technology, Bangladesh
183
188
Forensic Analysis of Windows Registry Against Intrusion
Haoyang Xie¹, Keyu Jiang¹, Xiaohong Yuan² and Hongbiao Zeng¹, ¹Fort Hays State
University, USA and ²North Carolina A&T State University, USA
08
189
LPM: A Distributed Architecture and Algorithms for Location Privacy in LBS
Muhamed Ilyas and R. Vijayakumar, Mahatma Gandhi University Kottayam, India
03
190
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Ashvini Vyavhare, Varsharani Bhosale, Mrunal Sawant and Fazila Girkar, College of
Engineering - Pune, India
02
191
Lattice Based Tools in Cryptanalysis for Public Key Cryptography
R.Santosh Kumar¹, C.Narasimham² and S.Pallam Setty³, ¹MVGR College of Engg.,
India, ²VR Siddhartha Engineering College, India and ³Andhra University, India
03
192
Identification of Image Spam by Using Low Level & Metadata Features
Anand Gupta, Chhavi Singhal and Somya Aggarwal, Netaji Subhas Institute of
Technology, India
02
193
Efficient Conditional Proxy Re-Encryption With Chosen Cipher Text Security
S. Sree Vivek¹, S. Sharmila Deva Selvi¹, V. Radhakishan¹, C. Pandu Rangan¹, ¹IIT
Madras, India and ²NIT Trichy, India
79
194
Passblot: A Highly Scalable Graphical one Time Password System
Sainath Gupta, Shashank Sahni, Pruthvi Sabbu, Siddhartha Varma and Suryakanth V
Gangashetty, IIIT - Hyderabad, India
05
Volume 4, Number 3, May 2012
195
Generating Representative Attack Test Cases for Evaluating and Testing Wireless Intrusion
Detection Systems
Khalid Nasr, Anas Abou El Kalam and Christian Fraboul, Universite de Toulouse
Toulouse, France
05
196
Survey and Taxonomy of Key Management Protocols for Wired and Wireless Networks
Adarsh Kumar, Alok Aggarwal and Charu, Jaypee Institute of Information and
Technology Noida, India
13
197
Security Threats Analysis in Bluetooth-Enabled Mobile Devices
Robayet Nasim, University of Science & Technology Chittagong, Bangladesh
03
198
Energy Constrained Reliable Routing Optimized Cluster Head Protocol for Multihop under
Water Acoustic Sensor Networks
Padmavathy.T.V, Gayathri.V, Indhumathi.V and Karthiga.G, R.M.K Collge of
Engineering Chennai, India
03
199
The New Age of Computer Virus and Their Detection
Nitesh Kumar Dixit¹, Lokesh mishra², Mahendra Singh Charan¹ and Bhabesh Kumar
Dey¹, ¹BIET Sikar, India and ²NCAC Sikar, India
05
200
Provable Secure Identity Based Signcryption Schemes without Random Oracles
Prashant Kushwah¹ and Sunder Lal², ¹Banasthali University, India and ²Veer Bahadur
Singh Purvanchal University, India
09
201
Lossless Reconstruction of Secret Image Using Threshold Secret Sharing and
Transformation
P. Devaki and G. Raghavendra Rao, NIE Mysore, India
05
202
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
P.Natesan and P.Balasubramanie, Kongu Engineering College, India
09
Volume 4, Number 4, July 2012
203
Resilient Voting Mechanisms for Mission Survivability in Cyberspace: Combining
Replication and Diversity
Charles A. Kamhoua¹, Patrick Hurley¹, Kevin A. Kwiat¹ and Joon S. Park², ¹Air Force
Research Laboratory - Information
Directorate, USA and ²Syracuse University, USA
02
204
Design and Evaluation of a New Fair Exchange Protocol Based on an Online TTP
Abdullah AlOtaibi and Hamza Aldabbas, De Montfort University, United Kingdom
0
205
Evaluation of Security Attacks on UMTS Authentication Mechanism
Mojtaba Ayoubi Mobarhan, Mostafa Ayoubi Mobarhan and Asadollah Shahbahrami,
University of Guilan, Iran
19
206
Non-Profit Organizations' Need to Address Security for Effective Government Contracting
Lee E. Rice¹ and Syed (Shawon) M. Rahman¹,²
, ¹Capella University,USA
and ²University of Hawaii-Hilo, USA
07
207
A Novel Energy Efficient and Administrator Based Secured Routing in MANET
Himadri Nath Saha¹, Debika Bhattacharyya¹ and P. K.Banerjee², ¹Institute of
Engineering and Management West Bengal, India and ²Jadavpur university, India
02
208
Dominant Features Identification for Covert Nodes in 9/11 Attack Using their Profile
S.Karthika, A.Kiruthiga And S.Bose, Anna University, India
02
209
How to Avoid the N-1 Attack Without Costly Implementations
David Tinoco Varela, Universidad Nacional Autonoma de Mexico, Mexico
0
210
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance
the Information Security
Manas Paul¹ and Jyotsna Kumar Mandal², ¹JIS College of Engineering, India
and ²Kalyani University, India
06
211
Comprehensive Comparison of VoIP SIP Protocol Problems and Cisco VoIP System
TALAL AL-KHAROBI and Mohmmed Abduallah Al-Mehdhar, King Fahd University
of Petroleum & Minerals(KFUPM), Saudi Arabia
0
212
A Comparative Study of the Traditional Model of IEEE 802.15.4 and Non-Overlapping
Binary Exponential Backoff IEEE 802.15.4
Archit Verma Pushpinder Singh Patheja and Akhilesh Waoo, BIST Bhopal, India
01
213
An Improved Watchdog Technique Based On Power-Aware Hierarchical Design For Ids In
Wireless Sensor Networks
A. Forootaninia¹ and M. B. Ghaznavi-Ghoushchi², ¹Tehran University, Iran
and ²Shahed University, Iran
10
214
Personal Safety Triggering System on Android Mobile Platform
Ashokkumar Ramalingam, Prabhu Dorairaj and Saranya Ramamoorthy, Blekinge
Institute of Technology, Sweden
12
215
A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks
Mahdi Aiash, Glenford Mapp and Aboubaker Lasebae, Middlesex University, UK 15
216
Implementation and Test of a Secure Mechanism's Modules in Routing Protocol of MANETs
with the Theory of Games
Karim KONATE and Abdourahime GAYE, University Cheikh Anta DIOP, Dakar 0
Volume 4, Number 5, September 2012
217
Simple Post Quantum Scheme for Higher Key Rate Multiparty Quantum Key Distribution
Abudhahir Buhari¹, Zuriati Ahmad Zukarnain¹, Shamala K. Subramaniam¹, Hisham
Zainuddin¹ and Suhairi Saharudin², ¹University Putra Malaysia, Malaysia
and ²Technology Park Malaysia, Malaysia
0
218
Comparison of High Speed Congestion Control Protocols
Jawhar Ben Abed¹, Laarif Sinda², Mohamed Ali Mani³ and Rachid Mbarek², ¹Polytech
Sousse, ²ISITCOM Hammam Sousse and ³ISTLS Sousse, Tunisia
04
219
Handoff Based Secure Checkpointing and Log Based Rollback Recovery for Mobile Hosts
Priyanka Dey and Suparna Biswas, West Bengal University, India
01
220
A Framework For Performance Evaluation Of ASIPs in Network-Based IDS
Majid Nezakatolhoseini¹ and Mohammad Amin Taherkhani², ¹Science and Research
Branch Islamic Azad University, Iran and ²Shahid Beheshti University, Iran
01
221
Design And Validation Of Specification Based Ids For Power Enhancement Related
Vulnerabilities In AODV
Chaitali Biswas Dutta and Utpal Biswas, University of Kalyani, India
0
222
Security V/S Qos for LTE Authentication and Key Agreement Protocol
Jacques Bou Abdo¹, Jacques Demerjian² and Hakima Chaouchi³, ¹Nokia Siemens
Networks, Lebanon, ²Antonine University, Lebanon and ³Telecom Sud Paris, France
09
223
Comparison of Certificate Policies Formerging Public Key Infrastructuresduring Merger and
Acquisition of Companies
Balachandra Muniyal¹, Prema K.V² and Mamatha Balachandra¹, ¹Manipal University,
India and ²Modi Institute of Technological Sciences, India
01
224
Healthcare IT: Is Your Information At Risk?
Kimmarie Donahue¹ and Syed (Shawon) M. Rahman², ¹San Antonio, USA and ²Capella
University, USA
05
225
A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications
H.Jayasree¹ and A.Damodaram², ¹ATRI, India and ²JNTUH - Kukatpally, India
05
226
A Survey on Web Spam Detection Methods: Taxonomy
Shekoofeh Ghiam¹ and Alireza Nemaney Pour², ¹Sharif University of Technology, Iran
and ²Islamic Azad University of Abhar, Iran
09
227
Sybil Attack on Lowest Id Clustering Algorithm in The Mobile Ad Hoc Network
Amol Vasudeva¹ and Manu Sood², ¹Jaypee University of Information Technology, India
and ²Himachal Pradesh University, India
18
228
A Simple and Reliable Touch Sensitive Security System
Adamu Murtala Zungeru¹, Jonathan Gana Kolo¹ and Ijarotimi Olumide², ¹University
of Nottingham, Malaysia and ²Rufus Giwa Polytechnic, Nigeria
11
229
Taxonomy Based Intrusion Attacks and Detection Management Scheme in Peer-Topeer
Network
Prashant Kumar Singh¹, A. K. Vatsa¹, Reetu Sharma² and Priyanka Tyagi³, ¹Shobhit
University, India, ²CERT, India and ³DVSIET, India
0
230
Secured Text Message Transmission in Pre -Channel Equalization Based MIMO- OFDM
System with Implementation of Concatenated ECB and CFB Cryptographic Algorithm
Laila Naznin,Shahrina Sultana, M. Golam Rashed and Shaikh Enayet Ullah, University
of Rajshahi, Bangladesh
0
231
Explore Ten Different Types of Software Engineering Principles
S.Thulasee Krishna¹, S.Sreekanth¹, B. Bhaskar¹ and N.Pavan Kumar², ¹Kuppam
Engineering College, India and ²Sitams, Chittoo(DT), India
03
Volume 4, Number 6, November 2012
232
RSAED: Robust and Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Merad Boudia Omar Rafik and Feham Mohamed, University of Tlemcen, Algeria
07
233
Secured RFID Mutual Authentication Scheme for Mifare Systems
Kuo-Tsang Huang and Jung-Hui Chiu, Chang Gung University, Taiwan
02
234
Malware Detection, Supportive Software Agents and Its Classification Schemes
Adebayo, Olawale Surajudeen¹, M.A. Mabayoje², Amit Mishra³ and Osho
Oluwafemi¹, ¹Federal University of Technology, Nigeria, ²University of Ilorin, Nigeria
and ³IBB University Lapai, Nigeria
11
235
Mining Techniques in Network Security to Enhance Intrusion Detection Systems
Maher Salem and Ulrich Buehler, University of Applied Sciences, Germany
06
236
A Quantum based Challenge-Response User Authentication Scheme over Noiseless Channel
Abudhahir Buhari¹, Zuriati Ahmad Zukarnain¹, Shamala K. Subramaniam¹ , Hisham
Zainuddin1
and Suhairi Saharudin², ¹University Putra Malaysia, Malaysia
and ²MIMOS - Technology Park Malaysia, Malaysia
02
237
Modelling and Verification of Extensible Authentication Protocol Using Spin Model
Checker
Manu S. Hegde, Jnanamurthy HK and Sanjay Singh, Manipal University, India
03
238
The Effect of the Number of Mobile Nodes on Varying Speeds of MANETS
John Tengviel¹, K. Diawuo² and K. A. Dotche², ¹Sunyani Polytechnic, Ghana
and ²KNUST Kumasi, Ghana
0
239
Wireless Public Key Infrastructure for Mobile Phones
Balachandra Muniyal, Krishna Prakash and Shashank Sharma, Manipal University,
India
04
240
Secure Key Management Protocol in WIMAX
Noudjoud Kahya¹, Nacira Ghoualmi¹ and Pascal Lafourcade², ¹Badji Mokhtar
University, Algeria and ²Joseph Fourier University, France
04
241
A Novel Multipoint Relay based Secure Routing in MANET
Himadri Nath Saha, Debika Bhattacharyya and P.K.Banerjee, IEM KolaKata, India
01
242
Network Threat Characterization in Multiple Intrusion Perspectives using Data Mining
Technique
Oluwafemi Oriola, Adesesan B. Adeyemo and Oluwaseyitanfunmi Osunade, University
of Ibadan, Nigeria
02
243
Removal of Certificates from Set Protocol Using Certificateless Public Key Cryptography
Arpita Sarkar and Sachin Tripathi, Indian School of Mines Dhanbad, India
01
244
Review on IPv6 Security Vulnerability Issues and Mitigation Methods
Supriyanto¹, Raja Kumar Murugesan² and Sureswaran Ramadass³, ¹Universitas Sultan
Ageng Tirtayasa, Indonesia, ²Taylor's University, Malaysia and ³National Advanced
IPv6 Centre (NAv6) Universiti Sains, Malaysia
07
Volume 5, Number 1, January 2013
255
Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case
Study
Natarajan Meghanathan, Jackson State University, USA
0
256
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
Kuo-Tsang Huang¹, Jung-Hui Chiu¹ and Sung-Shiou Shen², ¹Chang Gung University,
Taiwan and ²DE LIN Institute of Technology, Taiwan
08
257
An Integrated Solution for both Monitoring and Controlling for Automization Using
Wireless Sensor Networks: A Case Study
M Gnana Seelan and Ch AS Murty, Centre for Development of Advanced Computing -
Hyderabad, India
0
258
How to Find a Fixed Point in Shuffle Efficiently
Mikako Kageshima and Manabu Okamoto, Kanagawa Institute of Technology, Japan
0
259
Ontology-Driven Information Retrieval for Healthcare Information System : A Case Study
Aidarus M. Ibrahim, Hussein A. Hashi and Abdullalem A. Mohamed, University
Technology Malaysia (UTM), Malaysia
09
260
Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and
Support Vector Machines
A. M. Chandrashekhar¹ and K. Raghuveer², ¹Sri Jayachamarajendra College of
Engineering (SJCE), India and ²National Institute of Engineering (NIE) Mysore, India
12
261
Text Steganographic Approaches: A Comparison
Monika Agarwal, PDPM-IIITDM Jabalpur, India
40
Volume 5, Number 2, March 2013
262
Incident Response Plan for a Small to Medium Sized Hospital
Charles DeVoe and Syed (Shawon) M. Rahman, Capella University, USA
0
263
Privacy Preserving Data Mining by using Implicit Function Theorem
Pasupuleti Rajesh¹ and Gugulothu Narsimha², ¹VVIT College, India and ²JNTUH
University, India.
02
264
Tulungan: A Slandering-Resistant Reputation System for Collaborative Web Filtering
Systems
Alexis V. Pantola¹, Susan Pancho-Festin² and Florante Salvador¹, ¹De La Salle
University, Philippines and ²University of the Philippines, Philippines
0
265
Design Issues on Software Aspects and Simulation Tools for Wireless Sensor Networks
Leelavathi G¹, Shaila K², Venugopal K R³ and L M Patnaik⁴⁴⁴⁴, ¹Govt.S.K.S.J.
Technological Institute, India, ²Vivekananda Institute of Technology, India,
³University Visvesvaraya College of Engineering, India and ⁴⁴⁴⁴Indian Institute of
Science, India
03
267
Using Bias Optimiazation for Reversible Data Hiding using Image Interpolation
Andrew Rudder, Wayne Goodridge and Shareeda Mohammed, The University of the
West Indies, Trinidad and Tobago.
0
268
A 64 Bits Rotor Enhanced Block Cipher (Rebc3)
Ahmed ElShafee, Ahram Canadian University, Egypt.
0
269
A Robust Background Removal Algortihms Using Fuzzy C-Means Clustering
S.Lakshmi¹ and V.Sankaranarayanan², ¹Jeppiaar Engineering College, India
and ²Crescent Engineering College, India.
01
270
Efficacy of Attack Detection Capability of IDPS Based on its Deployment in Wired and
Wireless Environment
Shalvi Dave¹, Bhushan Trivedi² and Jimit Mahadevia³, ¹Indus University,
India, ²GLSICT,India and ³Elitecore Technologies Pvt. Ltd., India
02
271
Code Aware Dynamic Source Routing for Distributed Sensor Network
M Abdul Rahiman¹, Nishanth Jain¹, Arun K. Dubey² and G Manoj Kumar³, ¹AICTE,
Ministry of HRD,Govt of India, India, ²Bharati Vidyapeeth College of Engineering,
India and ³LBS Inst of Tech for Women, India.
01
272
Resonance Based Micromechanical Cantilever for Gas Sensing
Subhashini. S¹ and Vimala Juliet. A², ¹Sathyabama University, India and ²SRM
University, India
0
273
Traceback of DOS Over Autonomous Systems
Mohammed Alenezi and Martin J Reed, School of Computer Science and Electronic
Engineering, University of Essex, UK
04
274
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicular Ad-
hoc Network Environment
Vaishali D. Khairnar and Ketan Kotecha, Institute of Technology Nirma University,
India
25
275
A Novel Secure Cosine Similarity Computation Scheme with Malicious Adversaries
Dexin Yang¹, Chunjing Lin² and Bo Yang², ¹Guangzhou City Polytechnic, China
and ²Shaanxi Normal University, China
01
276
Improved Ids using Layered CRFS with Logon Restrictions and Mobile Alerts Based on
Deviant System Behaviour
Arpitha M1, Geetha V¹,Gowranga K H² and Bhakthavathsalam R², ¹Alpha College Of
Engineering, India and ²Indian Institute of Science, India
0
278
E-Commerce Systems Security for Small Businesses
Syed (Shawon) M. Rahman and Robert Lackey, Capella University, Minneapolis, USA.
04
Volume 5, Number 3, May 2013
279
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and Energy
Depletion Parameters
S.Prabhakara Rao¹, E.Nagabhooshanam² and S.Ramesh Babu¹, ¹Nigama Engineering
College, India and ²Sridevi Womens Engineering College, India
0
280
An Efficient Group Authentication for Group Communications
Lein Harn¹ and Changlu Lin², ¹University of Missouri, USA and ²Fujian Normal
University, P. R. China
06
281
Password Based Scheme and Group Testing for Defending DDOS Attacks
G Dayanandam¹, T V Rao², S Pavan Kumar Reddy¹ and Ravinuthala Sruthi¹, ¹QIS
Institute of Technology (QISIT), India and ²KL University (KLU), India
03
282
Security Algorithms for WIMAX
M Alzaabi¹, K D Ranjeeth¹, T Alukaidey¹ and K Salman², ¹University of Hertfordshire,
UK and ²Middle Tennessee State University, USA
02
283
Hybrid Architecture for Distributed Intrusion Detection System in Wireless Network
Seyedeh Yasaman Rashida, Islamic Azad University Shirgah, Iran
04
284
HTTPI Based Web Service Security over SOAP
Pankaj Choudhary, Rajendra Aaseri and Nirmal Roberts, ABV - Indian Institute of
Information Technology & Management, India
05
285
Implementation of a Security Protocol for Bluetooth and WI-FI
U. Pavan Kumar, Amity University, India
03
286
Bearings Prognostic Using Mixture of Gaussians Hidden Markov Model and Support Vector
Machine
Fatima Ezzahra Sloukia¹, Rajae Bouarfa¹, Hicham Medromi² and Mohammed
Wahbi¹, ¹SIR2C2S/LASI-EHTP, Morocco and ²Hassan II University, Morocco
11
287
Trust Value Algorithm: A Secure Approach against Packet Drop Attack in Wireless Ad-Hoc
Networks
Rajendra Aaseri, Pankaj Choudhary and Nirmal Roberts, ABV-Indian Institute of
Information Technology, India
02
Volume 5, Number 4, July 2013
288
Real Time Securing of All-Optical Networks Against Security Attacks at the Physical Level
Fahmida Rahman and Mohammed Arozullah, The Catholic University of America,
USA
0
289
Phishing Techniques and Mitigating the Associated Security Risks
Marc A. Rader and Syed (Shawon) M. Rahman, Capella University, USA
290
Wireless Networks Security in Jordan: A Field Study
Ahmad S. Mashhour¹ and Zakaria Saleh², ¹University of Bahrain, Bahrain
and ²Yarmouk University, Jordan
02
291
Early Detection of SQL Injection Attacks
Hossain Shahriar, Sarah North and Wei-Chuen Chen, Kennesaw State University, USA
06
292
A Framework for Security Components Anomalies Severity Evaluation and Classification
Kamel Karoui, Fakher Ben Ftima and Henda Ben Ghezala, University of Manouba,
Tunisia
0
293
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authentication
Pavan Kumar K, P. E. S. N. Krishna Prasad, M. V. Ramakrishna and B.D.C.N. Prasad,
Prasad V. Potluri Siddhartha Institute of Technology, India
03
294
Defence Schemes From Attacker's Own Reward Processes
L-F Pau, Copenhagen Business School, Denmark
01
295
Controlling IP Falsifying Using Realistic Simulation
Govindavaram Madhusri¹ and Chakunta Venkata Guru Rao², ¹Kakatiya University,
India and ²JNTU University, India
0
296
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Aliyu Mohammed, Haitham A. Jamil, Sulaiman Mohd Nor and Muhammad
NadzirMarsono, Universiti Teknologi Malaysia, Malaysia
1
297
Internal Security on an IDS Based on Agents
Rafael Paez, Mery Yolima Uribe and Miguel Torres, Pontificia Universidad Javeriana,
Colombia
02
298
A New Stemmer to Improve Information Retrieval
Wahiba Ben Abdessalem Karaa, University of Tunis. Tunisia
16
299
Performance Evaluation of Enhancedgreedy-Two-Phase Deployment Algorithm
Kartit Ali, University Mohammed V-Agdal, Morocco
0
300
Steganography and Random Grids
Pratarshi Saha¹, Sandeep Gurung¹ and Kunal Krishanu Ghose², ¹Sikkim Manipal
Institute of Technology, India and ²QualComm, USA
0
301
An Improved MULTI-SOM Algorithm
Imen Khanchouch, Khaddouja Boujenfa and Mohamed Limam, University of Tunis,
Tunisia and Dhofar University, Oman
02
302
Experimental Analysis of AODV and DSR with Varying Vehicle Mobility and Density in
Vanet Scenario
Arzoo Dahiya and R.K.Chauhan, Kurukshetra University, India
01
Volume 5, Number 5, September 2013
303
Knowledge-Based Authentication using Twitter Can We Use Lunch Menus As Passwords?
ManabuOkamoto, Kanagawa Institute of Technology, Japan
02
304
A Security Framework in Cloud Computing Infrastructure
Arijit Ukil¹, Debasish Jana² and Ajanta De Sarkar², ¹Tata Consultancy Services, India
and ²Birla Institute of Technology, India
13
305
Micro Rotor Enhanced Block Cipher Designed For Eight Bits Micro-Controllers (MREBC)
Ahmed ElShafee, Ahram Canadian University, Egypt
0
306
Image Authentication Through ZTransform with Low Energy And Bandwidth (IAZT
Madhumita Sengupta and J. K. Mandal, University of Kalyani, India
0
307
Fast Detection of Ddos Attacks Using Non-Adaptive Group Testing
Huynh Nguyen Chinh, Tan Hanh and Nguyen Dinh Thuc, HCMC,Vietnam
06
308
Effectiveness of Feature Detectionoperators on the Performance of Iris Biometric
Recognition System
Binsu C. Kovoor, Supriya M.H. and K. Poulose Jacob, Cochin University of Science
and Technology, India
07
309
Secure Collaborative Processing Architecture for MITB Attack Detection
Hani Qusa and Shadi Abudalfa, University College of Applied Science, Palestine
02
310
Security Challenges, Issues and Their Solutions For Vanet
Ram Shringar Raw, Manish Kumar and Nanhay Singh, Ambedkar Institute of
Advanced communication Technologies & Research, India
59
311
Defense Mechanisms for Computer-Based Information Systems
Majid Alshammari and Christian Bach, University of Bridgeport, USA
02
312
Optimized Hybrid Security Mechanism for Image Authentication and Secrecy using PSO
K.Kuppusamy and K.Thamodaran, Alagappa University, India
02
313
Credit Based Methodology to Detect and Discriminate DDOS Attack From Flash Crowd in
A Cloud Computing Environment
N.Jeyanthi, Hena Shabeeb and Mogankumar P.C, VIT University, India
05
314
Z-Shaped Dipole Antenna and its Fractal Iterations
Mustafa H. Abu Nasr, Al- Azhar University, Palestine
04
315
A Novel Approach for Secure Routing Through BGP Using Symmetric Key
Divan Raimagia, Shraddha Singh and Sameena Zafar, PIES College, India
01
316
Evaluating the Performance of the Secure Block Permutation Image Steganography
Algorithm
Adnan M. Shihab, Raghad K. Mohammed and Woud M. Abed, University of Baghdad,
Iraq
0
317
A Novel Technique to Detect Intrusion in Manet
J. K. Mandal¹ and Khondekar Lutful Hassan², ¹University of Kalyani, India
and ²University of Calcutta,India
03
Volume 5, Number 6, November 2013
318
Complete Network Security Protection for SME's within Limited Resources
Margie S. Todd¹ and Syed (Shawon) M. Rahman¹,²
, ¹Capella University, USA
and ²University of Hawaii-Hilo, USA
01
319
Multi-Level Parsing Based Approach Against Phishing Attacks With the Help of Knowledge
Bases
Gaurav Kumar Tak¹ and Gaurav Ojha², ¹Lovely Professional University, India
and ²Indian Institute of Information Technology and Management, India
02
320
A Need for Peer-To-Peer Strong Local Authentication Protocol (P2PSLAP) in Mobile
Banking
Bossi Masamila, Dublin Institute of Technology, Ireland
01
321
Securing Mobile Cloud Using Finger Print Authentication
IehabALRassan and HananAlShaher, King Saud University, Saudi Arabia
12
322
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection Engine
Anjan K¹, Srinath N K¹ and Jibi Abraham², ¹R V College of Engineering, India
and ²College of Engineering, India
01
323
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive Channel
Shortening in Multi-carrier Systems
Samir Abd Elghafar¹,²
, Salaheldin M. Diab¹, Bassiouny M. Sallam¹, Moawad I.
Dessouky¹, El-Sayed M. El-Rabaie¹ and Fathi E. Abd El-Samie¹, ¹Menoufia University,
Egypt and ²Jazan University, Saudi Arabia
0
324
Investigating the Effects of the Common Control Channel Challenge in Multichannel
Cognitive Networks With Hypothetical Spectrum Hole
Mthulisi Velempini¹ and Mqhele E. Dlodlo², ¹North-West University, South Africa
and ²University of Cape Town, South Africa
0
Volume 6, Number 1, January 2014
325
Optimised Malware Detection in Digital Forensics
SaeedAlmarri¹ and Paul Sant², ¹University of Bedfordshire, United Kingdom
and ²University Campus Milton Keynes, United Kingdom
05
326
A Novel Paradigm in Authentication System Using Swifi Encryption /Decryption Approach
Shadi R. Masadeh¹, Ahmad Azzazi², Bassam A. Y. Alqaralleh³ and Ali, Mousa.Al
Sbou³, ¹Isra University, Jordan, ²Applied Science University, Jordan and ³Al-Hussein
Bin Talal University, Jordan
01
327
Cloud Computing and Security Issues in the Cloud
Monjur Ahmed¹ and Mohammad Ashraf Hossain², ¹Daffodil Institute of IT,
Bangladesh and ²Freelance IT Consultant, Bangladesh
61
328
A Novel Approach: A Hybrid Semantic Matchmaker for Service Discovery in Service
Oriented Architecture
Soodeh Pakari, Esmaeel Kheirkhah and Mehrdad Jalali, Islamic Azad University,
Mashhad, Iran
02
329
SPARQL: Semantic Information Retrieval by Embedding Prepositions
Sneha Kumari, Rajiv Pandey, Amit Singh and Himanshu Pathak, Amity University,
India
01
330
A Fair Exchange & Customer Anonymity Protocol Using A Trusted Third Party for
Electronic Commerce Transactions and Payments
Fahad A Alqahtani, De Montfort University, United Kingdom
0
331
An IAC Approach for Detecting Profile Cloning in Online Social Networks
MortezaYousefi Kharaji¹ and FatemehSalehi Rizi², ¹Mazandaran University of Science
and Technology, Iran and ²Sheikhbahaee University of Isfahan, Iran
04
332
Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares
Pallavi Vijay Chavan¹, Mohammad Atique² and Latesh Malik¹, ¹GHRCE - Nagpur,
India and ²SGBAU -Amravati, India
09
Volume 6, Number 2, March 2014
333
The Impact of Management Information systems(MIS) Technologies on the quality of
Services provided at the University of TABUK
Hiyam S. Ensour and Tareg M. Alinizi, Petra of university, Jordan
03
334
Enhancing the Impregnability of Linux Servers
Rama Koteswara Rao G¹, Satya Prasad R², Pathanjali Sastri A² and P.E.S.N.
Prasad¹, ¹Prasad V. Potluri Siddhartha Institute of Technology, India and ²Acharya
Nagarjuna University, India
0
335
Implementing Packet Broadcasting Algorithm Of Mimo Based Mobile Ad-Hoc Networks To
Exploit Diversity
Swati Chowdhuri¹, Santanu Maiti¹, Sheli Sinha Chaudhuriand² and P.K.Baneerjee²,
¹Seacom Engineering College, India and ²Jadavpur University, India
02
336
A New Hybrid Algorithm for Business Intelligence Recommender System
P.Prabhu and N.Anbazhagan, Alagappa University, India 0
Volume 6, Number 3, May 2014
337
Privacy Protection for Role-Based Access Control in Service Oriented Architecture
Helen Cheung, Celia Li, Ye Yu and Cungang Yang, Ryerson University, Canada
01
338
Survey of Manet Misbehaviour Detection Approaches
Punya Peethambaran and Jayasudha J. S, SCT College of Engineering, India
08
339
Attack Graph-Based Risk Assessment and Optimisation Approach
Mohammed Alhomidi and Martin Reed, University of Essex, UK
05
340
Security Issues Associated with Big Data in Cloud Computing
Venkata Narasimha Inukollu¹ , Sailaja Arsi¹ and Srinivasa Rao Ravuri², ¹Texas Tech
University, USA and ²Cognizant Technology Solutions, India
50
341
A Survey of Trends in Massive DDOS Attacks and Cloud-Based Mitigations
FuiFui Wong and Cheng Xiang Tan, TongJi University, China
17
342
Role of Integrated Virtual E-Learning System for Distance Learning Students
Shweta Soni and M.D.Katkar, G.H.Raisoni Institute of Engineering and Technology
for Women, India
0
343
Self-Protection Mechanism For Wireless Sensor Networks
Hosam Soleman and Ali Payandeh, Maleke-Ashtar university Islamic Republic of Iran
04
344
Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes
Divya Ann Luke, Jayasudha. J.S, SCT College of Engineering, India
01
Volume 6, Number 4, July 2014
345
End to End Quality of Service Assurance for Multi-Service Provisioning in Mobile Ad Hoc
Networks.
Prabesh Dongol and Dhadesugoor R. Vaman, Prairie View A&M University, USA
01
346
Analysis of RSA Algorithm using GPU Programming
Sonam Mahajan and Maninder Singh, Thapar University, India
10
347
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Ajah Ifeyinwa Angela, Ebonyi State University Abakaliki, Nigeria
01
348
Analysis and Comparison of Symmetric Key Cryptographic Algorithms Based on Various
File Features
Ranjeet Masram, Vivek Shahare, Jibi Abraham, Rajni Moona, College of Engineering
Pune, India
23
349
State of Mobile Banking in Tanzania and Security Issues
Bossi Masamila, Dublin Institute of Technology, Ireland
09
350
A Novel (K,N) Secret Sharing Scheme from Quadratic Residues for Grayscale Images
El-Tigani B. Abdelsatir, Sahar Salahaldeen, Hyam Omar and Afra Hashim, University
of Khartoum, Sudan
03
Volume 6, Number 5, September 2014
351
A Secure Electronic Payment Protocol for Wireless Mesh Networks
Helen Cheung and Cungang Yang, Ryerson University, Canada
01
352
Cloud Based Access Control Model for Selective Encryption of Documents with Traitor
Detection
Punya Peethambaran and. Jayasudha J. S, Sct College of Engineering, India
02
353
Reducing the Cognitive Load on Analysts through Hamming Distance Based Alert
Aggregation
Peter Mell¹ and Richard Harang², ¹National Institute of Standards and Technology,
USA and ²U.S. Army Research Laboratory, USA
0
354
A Secure Cluster Based Communication in Wireless Network using Cryptographic Reports
Hamsha and Nagaraj, RVCE Bangalore, India
0
355
A Framework for Analysis and Comparison of Dynamic Malware Analysis Tools
Waqas Aman, Gjovik University College, Norway
01
356
Packet Drop Attack Detection Techniques in Wireless Ad Hoc Networks: A Review
Kennedy Edemacu, Martin Euku and Richard Ssekibuule, Makerere
UniversityKampala, Uganda
06
Volume 6, Number 6, November 2014
357
A Cryptographic Mutual Authentication Scheme for Web Applications
Yassine Sadqi, Ahmed Asimi and Younes Asimi, Ibn Zohr University, Morocco
04
358
Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data Using Secure
Division
Sumana M¹ and Hareesha K S², ¹M S Ramaiah Institute of Technology, India
and ²Manipal Institute of Technology, India
02
359
Collaborative Defence for Distributed Attacks (Case Study of Palestinian Information
Systems)
Hani Qusa, University College of Applied Science, Palestine
0
360
Hybrid Cryptographic Technique Using RSA Algorithm and Scheduling Concepts
Meenakshi Shankar and Akshaya.P, Sri Venkateswara College of Engineering, India
0
361
Key Management Techniques in Wireless Sensor Networks
Khawla Naji Shnaikat¹ and Ayman Ahmed Qudah², ¹University of Jordan, Jordan
and ²University of Dammam, KSA
03
Volume 7, Number 1, January 2015
362
Multi-Facet Trust Model for Online Social Network Environment
Liu Ban Chieng¹, Manmeet Mahinderjit Singh¹, Zarul Fitri Zaaba¹ and Rohail
Hassan², ¹University Sains Malaysia, Malaysia and ²Universiti Teknologi Petronas,
Malaysia
02
363
Accessing Secured Data in Cloud Computing Environment
Hasan Omar Al-Sakran, King Saud University, Saudi Arabia
06
364
Service Oriented Configuration Management of Software Architecture
Razie Alidoosti, Shahrouz Moaven and Jafar Habibi, Sharif University of Technology,
Iran
0
365
Runtime Potential Updater File(S) Identification: Does Your Software Updates
Automatically With Application Whitelisting?
Janardhan Reddy, Amit Kumar Jha and Sandeep Romana, Centre for Development of
Advanced Computing, India
0
366
Strong Zero-Knowledge Authentication Based on the Session Keys (SASK)
Younes ASIMI, Abdellah AMGHAR, Ahmed ASIMI and Yassine SADQI, Laboratoire
des Systemes informatiques et Vision (LabSiV), Morocco
04
367
A New Secret Handshakes Scheme with Dynamic Matching Based on ZSS
Preeti Kulshrestha and Arun Kumar Pal, G.B. Pant University of Agriculture and
Technology, India
05
368
A New DNA Based Approach of Generating Key-Dependent Shift Rows Transformation
Auday H. Al-Wattar, Ramlan Mahmod, Zuriati Ahmad Zukarnain and Nur Izura
Udzir, Universiti Putra Malaysia, Malaysia
01
Volume 7, Number 2, March 2015
369
Exploiting Rhetorical Relations to Multiple Documents Text Summarization
N.Adilah Hanin Zahri¹, Fumiyo Fukumoto², Matsyoshi Suguru² and Ong Bi
Lynn¹, ¹University of Malaysia Perlis, Malaysia and ²University of Yamanashi, Japan
0
370
An Interactive Visualization Tool for Animating Behavior of Cryptographic Protocols
Mabroka Maeref¹, Fatma Algali¹, Ahmed Patel² and Zarina Shukur², ¹Sebha University
Libya and ²The National University of Malaysia, Malaysia
01
371
A New Image Steganography Algorithm Based on MLSB Method with Random Pixels
Selection
Odai M.Al-Shatanawi and Nameer N.El.Emam, Philadelphia University, Jordan
03
372
Certificate Less Key Management Scheme in Manet Using Threshold Cryptography
Shaheena Khatoonand Balwant Singh Thakur, Pt.Ravishankar Shukla University,
India
01
373
Comprehensive Survey of Possible Security Issues on 4G Networks
Sumant Ku Mohapatra, Biswa Ranjan Swain and Pravanjan Das, Trident Academy of
Technology, India
06
Volume 7, Number 3, May 2015
374
Security Challenges as a Factor Affecting the Security of Manet: Attacks and Security
Solutions
Nabeel Zanoon¹, Nashat Albdour², Hatem S. A. Hamatta¹ and Rasha Moh'd Al-
Tarawneh¹, ¹Al-Balqa Applied University, Jordan and ²Tafila Technical University,
Jordan
04
375
An ANN Approach for Network Intrusion Detection using Entropy based Feature Selection
AshalataPanigrahi and ManasRanjanPatra, Berhampur University, India
02
376
A Performance Evaluation Of Common Encryption Techniques With Secure Watermark
System (SWS)
Ashraf Odeh¹, Shadi R.Masadeh¹ and Ahmad Azzazi², ¹Isra University, Jordan
and ²Applied Science University, Jordan
01
377
Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channel In Secured
Communication
Anjan K1, Srinath N K¹ and Jibi Abraham², ¹R V College of Engineering, India
and ²College of Engineering Pune, India
0
Volume 7, Number 4, July 2015
378
Deterring Hacking Strategies via Targeting Scanning Properties
Saad Alsunbul¹,²
, Phu Dung Le¹, Jefferson Tan¹, ¹Monash University, Australia
and ²King Abdullaziz for Science and Technology, Saudi Arabia
0
379
Providing End-To-End Secure Communications in GSM Networks
Heshem A.El Zouka, Arab Academy for Science & Technology and Maritime
Transport, Egypt
38
Volume 7, Number 5, September 2015
380
ANDROINSPECTOR: A System for Comprehensive Analysis of Android Applications
Babu Rajesh V, Phaninder Reddy, Himanshu P and Mahesh U Patil, Centre for
Development of Advanced Computing, India
0
381
Improved Steganographic Security by Applying an Irregular Image Segmentation and
Hybrid Adaptive Neural Networks with Modified Ant Colony Optimization
Nameer N. El. Emam¹ and Kefaya S. Qaddoum², ¹Philadelphia University, Jordan
and ²Warwick University, UK
0
382
An Intellect Learning on E-Mail Security and Fraud, Spam and Phishing
P.S.Jagadeesh Kumar, S.Meenakshi Sundaram and Ranjeet Kumar, Don Bosco
Institute of Technology, India
0
Volume 7, Number 6, November 2015
383
A Novel Evaluation Approach to Finding Lightweight Machine Learning Algorithms for
Intrusion Detection in Computer Network
Yuchen Wang¹, Shuxiang Xu² and Qiongfang Huang¹, ¹Zhejiang University of
Technology, China and ²University of Tasmania, Australia
0
384
A Machine Learning Approach to Anomaly-Based Detection on Android Platforms
Joshua Abah, Waziri O.V, Abdullahi M.B, Arthur U.M and Adewale O.S, Federal
University of Technology Minna, Nigeria
04
385
A System for Validating and Comparing Host-Based Ddos Detection Mechanisms
Nguyen Hong Son, Post and Telecommunication Institute of Technology, Vietnam 0
Volume 8, Number 1, January 2016
386
Limiting Self-Propagating Malware Based On Connection Failure Behavior Through Hyper-
Compact Estimators
You Zhou¹, Yian Zhou¹, Shigang Chen¹ and O. Patrick Kreidl², ¹University of Florida,
USA and ²University of North Florida, USA
0
387
Employee Trust Based Industrial Device Deployment and Initial Key Establishment
Apala Ray¹,²
and Johan Akerberg²,³
and Mats Bjorkman³ and Mikael Gidlund⁴⁴⁴⁴, ¹ABB
Corporate Research- Bangalore, India, ²Malardalen University, Sweden, ³ABB
Corporate Research-Vasteras, Sweden and ⁴⁴⁴⁴Mid Sweden University, Sundsvall,
Sweden
03
388
A Security Strategy against STEAL-AND-PASS Credential Attacks
Juan Ceballos, Security Consulting & Engineering, T-Systems International, Germany
0
389
Big Data Security and Privacy Issues in the CLOUD
Ali Gholami and Erwin Laure, KTH- Royal Institute of Technology, Sweden
01
Volume 8, Number 2, March 2016
390
Trends Toward Real-Time Network Data Steganography
James Collins, Sos Agaian, The University of Texas at San Antonio, USA
01
391
Intrusion Detection System Using Discrete Fourier Transform with Window Function
Yusuke Tsuge and HidemaTanaka, National Defense Academy of Japan, Japan
0
392
A Novel Charging and Accounting Scheme in Mobile Ad-Hoc Networks
Inna Kofman¹ and Nurul Huda², ¹University of Duesseldorf, Germany and ²Ryerson
University, Canada
0
393
A Security Evaluation Framework for U.K. E-Government Services Agile Software
Development
Steve Harrison¹,Antonis Tzounis², Leandros Maglaras¹, Francois Siewe¹, Richard
Smith¹ and Helge Janicke¹, ¹De Montfort University, United Kingdom and ²University
of Thessaly, Greece
01
394
Cascade Block Cipher Using Braiding/Entanglement of Spin Matrices and Bit Rotation
D.Sravana Kumar¹, P.Sirisha² and CH. Suneetha³, ¹Dr. V.S. Krishna Government
Degree College, India, ²Indian Maritime University, India and ³GITAM University,
India
0
395
The Internet of Things : New Interoperability, Management and Security Challenges
Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung, Western Sydney University,
Australia
06
396
Design and Implementation of the Advanced Cloud Privacy Threat Modeling
Ali Gholami¹, Anna-Sara Lind², Jane Reichel², Jan-Eric Litton³, Ake Edlund¹, Erwin
Laure¹, ¹KTH Royal Institute of Technology, Sweden, ²Uppsala University, Sweden
and ³Karolinska Institutet, Sweden
04
Volume 8, Number 3, May 2016
397
Using a Deep Understanding of Network Activities for Security Event Management
Mona Lange¹, Felix Kuhr² and Ralf Moller¹, ¹Universitat zu Lubeck, Germany
and ²Technical Universitat Hamburg-Harburg, Germany
0
398
Wearable Technology Devices Security and Privacy Vulnerability Analysis
Ke Wan Ching and Manmeet Mahinderjit Singh, University Sains Malaysia Penang,
Malaysia
0
399
Y-Hamiltonian Layers Broadcast Algorithm
Amnah El-Obaid and Nagham_Al-Madi, Zaytoonah University of Jordan, Jordan
01
400
Authentication Using Trust to Detect Misbehaving Nodes in Mobile Ad hoc Networks Using
Q-Learning
S.Sivagurunathan¹, K.Prathapchandran¹ and A.Thirumavalavan², ¹Gandhigram Rural
Institute-Deemed University, India and ²Arignar Anna Government Arts College, India
0
Volume 8, Number 4, July 2016
401
Proactive Detection of DDOS Attacks in Publish-Subscribe Networks
Bander Alzahrani¹, Vassilios Vassilakis², Mohammed Alreshoodi³, Fawaz Alarfaj⁴⁴⁴⁴ and
Ahmed Alhindi⁴⁴⁴⁴, ¹King Abdulaziz University, Saudi Arabia, ²University of Brighton,
United Kingdom, ³Qassim University, Saudi Arabia, ⁴⁴⁴⁴Al Imam Mohammad Ibn Saud
Islamic University (IMSIU), Saudi Arabia and ⁴⁴⁴⁴Umm Al-Qura University, Saudi
Arabia
01
402
Email Spam Classification Using Hybrid Approach of RBF Neural Network and Particle
Swarm Optimization
Mohammed Awad and Monir Foqaha, Arab American University, Palestine
0
403
Performance Analysis of the Neighbor Weight Trust Determination Algorithm in MANETs
Ali Abu Romman¹ and Hussein Al-Bahadili², ¹Princess Sumaya University for
Technology, Jordan and ²University of Petra, Jordan
0
404
A Benchmark for Designing Usable and Secure Text-Based Captchas
Suliman A. Alsuhibany, Qassim University, Saudi Arabia
03
405
An Intelligent Classification Model for Phishing Email Detection
Adwan Yasin and Abdelmunem Abuhasan, Arab American University, Palestine 0
Volume 8, Number 5, September 2016
406
A Hybrid Approach Combining Rule-Based and Anomaly-Based Detection Against DDoS
Attacks
Chin-Ling Chen¹ and Hsin-Chiao Chen², ¹National Pingtung University, Taiwan
and ²National Pingtung Institute of Commerce, Taiwan
0
407
Enhance RFID Security Against Brute Force Attack Based on Password Strength and
Markov Model
Adwan Yasin and Fadi AbuAlrub, Arab American University, Palestine
0
408
Color Image Encryption Based on Multiple Chaotic Systems
Adwan Yasin and Fadi AbuAlrub, Arab American University, Palestine
Yuting Xi, Xing Zhang and Ruisong Ye, Shantou University, P. R. China
0
Volume 8, Number 6, November 2016
409
Steganalysis Algorithm for PNG Images Based on Fuzzy Logic Technique
Jawaher alqahtani¹, Daniyal Alghazzawi¹ and Li Cheng², ¹King Abdulaziz University,
Saudi Arabia and ²Chinese Academy of Sciences, China
0
410
A Mechanism for Early Detecting DDOS Attacks Based on M/G/R PS Queue
Nguyen Hong Son, Post and Telecommunication Institute of Technology, Vietnam
0
411
A Bastion Mobile ID-Based Authentication Technique (BMBAT)
Abdelmunem Abuhasan and Adwan Yasin, Arab American University, Palestine
0
Volume 9, Number 1, January 2017
412
A Study on LEA and Seed Algorithms for Data Protection of Smartphone Based Disaster
Notification System
Jae Pil Lee, Jae Gwang Lee, Jun hyeon Lee, Ki-su Yoon and Jae Kwang Lee, Han Nam
University, Korea
0
413
Application-Layer DDOS Detection Based on a One-Class Support Vector Machine
Chuyu She¹, ², ³
, Wushao Wen¹,
, Zaihua Lin¹ and Kesong Zheng¹, ¹Sun Yat-Sen
University, China, ²SYSU-CMU Shunde International Joint Research Institute, China
and ³Guangdong University of Finance & Economics, China
0
414
A Survey on Security in Wireless Sensor Networks
Waleed Al Shehri, King Abdul-Aziz University, Saudi Arabia
06
Volume 9, Number 2, March 2017
415
Metric for Evaluating Availability of an Information System : A Quantitative Approach
Based on Component Dependency
Suhail Qadir Mir1
and S.M.K. Quadri2
, 1
University of Kashmir, India and 2
Jamia
Millia Islamia, India
0
416
A Secure E-Medical Exemption System (E-MES): Jordan Case
Heba N. Kamel, Mohammad A. Alia, Bara'aha. Al Saeq and Eman Abu Maria, Al
Zaytoonah University of Jordan, Jordan
0
Volume 9, Number 3, May 2017
417
A Conceptual Secure Blockchain Based Electronic Voting System
Ahmed Ben Ayed, Colorado Technical University, USA
0
418
Enhancing Cyber Security of Online Accounts via A Novel Protocol and New Techniques
Mehrdad Nourai and Haim Levkowitz, University of Massachusetts Lowell, USA 0
Projected citation counts in 2020 for International Journal of Network
Security & Its Applications (IJNSA)
Calendar
Year
(A): # Papers
published per
year
(B): Total
# citations
(as of Oct.
2016)
(C): Median
# of citations
per paper
(D):
Average #
citations
per paper
per year
(E):
Projected
total #
citations
in 2020
2009 24 478 9 2.5 717
2010 53 647 7 1.7 1012
2011 90 1063 5.5 2 1770
2012 77 724 3 1.9 1305
2013 80 305 2 1 608
2014 37 545 2 5 1274
2015 24 74 1 1.5 222
2016 26 21 0 0.8 105

More Related Content

What's hot

IICET 2015 - i-manager's International Conference on Engineering and Technolo...
IICET 2015 - i-manager's International Conference on Engineering and Technolo...IICET 2015 - i-manager's International Conference on Engineering and Technolo...
IICET 2015 - i-manager's International Conference on Engineering and Technolo...imanconference
 
Engineering by Shabbir Sahb
Engineering by Shabbir SahbEngineering by Shabbir Sahb
Engineering by Shabbir SahbSmaz Ali Zaidi
 
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT IAEME Publication
 
Top 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciTop 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciIJCI JOURNAL
 
Voicenotes - Android Based Smart Classroom
Voicenotes - Android Based Smart ClassroomVoicenotes - Android Based Smart Classroom
Voicenotes - Android Based Smart ClassroomIRJET Journal
 
ELECTRONIC MANAGEMENT SYSTEM BASED ON RFID AND USSD
ELECTRONIC MANAGEMENT SYSTEM BASED ON RFID AND USSDELECTRONIC MANAGEMENT SYSTEM BASED ON RFID AND USSD
ELECTRONIC MANAGEMENT SYSTEM BASED ON RFID AND USSDMartin Wachiye Wafula
 
Result Alert System through SMS and E-mail
Result Alert System through SMS and E-mailResult Alert System through SMS and E-mail
Result Alert System through SMS and E-mailiosrjce
 
Student college alert system to parents by their entry at the college premise...
Student college alert system to parents by their entry at the college premise...Student college alert system to parents by their entry at the college premise...
Student college alert system to parents by their entry at the college premise...Khadarbaba Shaik
 
A more secure and reliable protocol for wireless patient monitoring system
A more secure and reliable protocol for wireless patient monitoring systemA more secure and reliable protocol for wireless patient monitoring system
A more secure and reliable protocol for wireless patient monitoring systemeSAT Publishing House
 
Offline Sms Internet
Offline Sms InternetOffline Sms Internet
Offline Sms InternetIRJET Journal
 
Interactive Voice Response System for College automation
Interactive Voice Response System for College automationInteractive Voice Response System for College automation
Interactive Voice Response System for College automationIRJET Journal
 
Risk Management of Secure Cloud in Higher Educational Institution
Risk Management of Secure Cloud in Higher Educational InstitutionRisk Management of Secure Cloud in Higher Educational Institution
Risk Management of Secure Cloud in Higher Educational Institutionijtsrd
 

What's hot (15)

Muhanned CV
Muhanned CVMuhanned CV
Muhanned CV
 
IICET 2015 - i-manager's International Conference on Engineering and Technolo...
IICET 2015 - i-manager's International Conference on Engineering and Technolo...IICET 2015 - i-manager's International Conference on Engineering and Technolo...
IICET 2015 - i-manager's International Conference on Engineering and Technolo...
 
Engineering by Shabbir Sahb
Engineering by Shabbir SahbEngineering by Shabbir Sahb
Engineering by Shabbir Sahb
 
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
 
Top 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciTop 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijci
 
Voicenotes - Android Based Smart Classroom
Voicenotes - Android Based Smart ClassroomVoicenotes - Android Based Smart Classroom
Voicenotes - Android Based Smart Classroom
 
ELECTRONIC MANAGEMENT SYSTEM BASED ON RFID AND USSD
ELECTRONIC MANAGEMENT SYSTEM BASED ON RFID AND USSDELECTRONIC MANAGEMENT SYSTEM BASED ON RFID AND USSD
ELECTRONIC MANAGEMENT SYSTEM BASED ON RFID AND USSD
 
Result Alert System through SMS and E-mail
Result Alert System through SMS and E-mailResult Alert System through SMS and E-mail
Result Alert System through SMS and E-mail
 
Student college alert system to parents by their entry at the college premise...
Student college alert system to parents by their entry at the college premise...Student college alert system to parents by their entry at the college premise...
Student college alert system to parents by their entry at the college premise...
 
A more secure and reliable protocol for wireless patient monitoring system
A more secure and reliable protocol for wireless patient monitoring systemA more secure and reliable protocol for wireless patient monitoring system
A more secure and reliable protocol for wireless patient monitoring system
 
Offline Sms Internet
Offline Sms InternetOffline Sms Internet
Offline Sms Internet
 
Icetat2021 brochure
Icetat2021   brochureIcetat2021   brochure
Icetat2021 brochure
 
M.Tech. Cyber Security & Incident Response
M.Tech. Cyber Security & Incident ResponseM.Tech. Cyber Security & Incident Response
M.Tech. Cyber Security & Incident Response
 
Interactive Voice Response System for College automation
Interactive Voice Response System for College automationInteractive Voice Response System for College automation
Interactive Voice Response System for College automation
 
Risk Management of Secure Cloud in Higher Educational Institution
Risk Management of Secure Cloud in Higher Educational InstitutionRisk Management of Secure Cloud in Higher Educational Institution
Risk Management of Secure Cloud in Higher Educational Institution
 

Similar to IJNSA Citation Details (2009 - 2016)

International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...IJNSA Journal
 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
 
The International Journal of Database Management Systems (IJDMS)-WJCI, H inde...
The International Journal of Database Management Systems (IJDMS)-WJCI, H inde...The International Journal of Database Management Systems (IJDMS)-WJCI, H inde...
The International Journal of Database Management Systems (IJDMS)-WJCI, H inde...ijdms
 
International Journal of Computer Networks & Communications (IJCNC) - Scopus...
 International Journal of Computer Networks & Communications (IJCNC) - Scopus... International Journal of Computer Networks & Communications (IJCNC) - Scopus...
International Journal of Computer Networks & Communications (IJCNC) - Scopus...IJCNCJournal
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)ijdpsjournal
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
International Journal of Software Engineering & Applications (IJSEA) - ERA, H...
International Journal of Software Engineering & Applications (IJSEA) - ERA, H...International Journal of Software Engineering & Applications (IJSEA) - ERA, H...
International Journal of Software Engineering & Applications (IJSEA) - ERA, H...ijseajournal
 
IJCSIT Citation (2009 to 2016)
IJCSIT Citation (2009 to 2016)IJCSIT Citation (2009 to 2016)
IJCSIT Citation (2009 to 2016)ijcsit
 
IJCSIT Citation (2009 to 2016)
IJCSIT Citation (2009 to 2016)IJCSIT Citation (2009 to 2016)
IJCSIT Citation (2009 to 2016)ijcsit
 
LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)
LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)
LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)ijp2p
 
The International Journal of Information Technology, Modeling and Computing (...
The International Journal of Information Technology, Modeling and Computing (...The International Journal of Information Technology, Modeling and Computing (...
The International Journal of Information Technology, Modeling and Computing (...Zac Darcy
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) acijjournal
 
International Journal on Soft Computing ( IJSC ), H index - Profile
International Journal on Soft Computing ( IJSC ), H index - ProfileInternational Journal on Soft Computing ( IJSC ), H index - Profile
International Journal on Soft Computing ( IJSC ), H index - Profileijsc
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)ijwscjournal
 
International journal on telecom 2011
International journal on telecom 2011International journal on telecom 2011
International journal on telecom 2011ihsanlrimra
 
Advances in Materials Science and Engineering: An International Journal (MSEJ)
Advances in Materials Science and Engineering: An International Journal (MSEJ)Advances in Materials Science and Engineering: An International Journal (MSEJ)
Advances in Materials Science and Engineering: An International Journal (MSEJ)msejjournal
 
International Conference on Latest Trends in Engineering Science and Management
International Conference on Latest Trends in Engineering Science and ManagementInternational Conference on Latest Trends in Engineering Science and Management
International Conference on Latest Trends in Engineering Science and ManagementConference Info
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 

Similar to IJNSA Citation Details (2009 - 2016) (20)

International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)
 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)
 
The International Journal of Database Management Systems (IJDMS)-WJCI, H inde...
The International Journal of Database Management Systems (IJDMS)-WJCI, H inde...The International Journal of Database Management Systems (IJDMS)-WJCI, H inde...
The International Journal of Database Management Systems (IJDMS)-WJCI, H inde...
 
International Journal of Computer Networks & Communications (IJCNC) - Scopus...
 International Journal of Computer Networks & Communications (IJCNC) - Scopus... International Journal of Computer Networks & Communications (IJCNC) - Scopus...
International Journal of Computer Networks & Communications (IJCNC) - Scopus...
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
International Journal of Software Engineering & Applications (IJSEA) - ERA, H...
International Journal of Software Engineering & Applications (IJSEA) - ERA, H...International Journal of Software Engineering & Applications (IJSEA) - ERA, H...
International Journal of Software Engineering & Applications (IJSEA) - ERA, H...
 
IJCSIT Citation (2009 to 2016)
IJCSIT Citation (2009 to 2016)IJCSIT Citation (2009 to 2016)
IJCSIT Citation (2009 to 2016)
 
IJCSIT Citation (2009 to 2016)
IJCSIT Citation (2009 to 2016)IJCSIT Citation (2009 to 2016)
IJCSIT Citation (2009 to 2016)
 
LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)
LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)
LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)
 
The International Journal of Information Technology, Modeling and Computing (...
The International Journal of Information Technology, Modeling and Computing (...The International Journal of Information Technology, Modeling and Computing (...
The International Journal of Information Technology, Modeling and Computing (...
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ)
 
International Journal on Soft Computing ( IJSC ), H index - Profile
International Journal on Soft Computing ( IJSC ), H index - ProfileInternational Journal on Soft Computing ( IJSC ), H index - Profile
International Journal on Soft Computing ( IJSC ), H index - Profile
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)
 
1111 (1).pdf
1111 (1).pdf1111 (1).pdf
1111 (1).pdf
 
International journal on telecom 2011
International journal on telecom 2011International journal on telecom 2011
International journal on telecom 2011
 
Advances in Materials Science and Engineering: An International Journal (MSEJ)
Advances in Materials Science and Engineering: An International Journal (MSEJ)Advances in Materials Science and Engineering: An International Journal (MSEJ)
Advances in Materials Science and Engineering: An International Journal (MSEJ)
 
International Conference on Latest Trends in Engineering Science and Management
International Conference on Latest Trends in Engineering Science and ManagementInternational Conference on Latest Trends in Engineering Science and Management
International Conference on Latest Trends in Engineering Science and Management
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 

Recently uploaded

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

IJNSA Citation Details (2009 - 2016)

  • 1. International Journal of Network Security & Its Applications (IJNSA) ISSN : 0974 - 9330 (Online); 0975 – 2307 (Print) http://airccse.org/journal/ijnsa.html
  • 2. SCOPE OF THE JOURNAL The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas. Topics of Interest Network and Wireless Network Security Mobile, Ad Hoc and Sensor Network Security Peer-to-Peer Network Security Database and System Security Intrusion Detection and Prevention Internet Security & Applications Security & Network Management E-mail security, Spam, Phishing, E-mail fraud Virus, worms, Trojon Protection Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,) Ubiquitous Computing Security Web 2.0 security Cryptographic protocols Performance Evaluations of Protocols & Security Application http://airccse.org/journal/ijnsa.html
  • 3. Members of the Editorial Board Editor In Chief: Jae-Kwang Lee, Hannam University, South Korea Associate Editor Dhinaharan Nagamalai, KTO Karatay University, Turkey Editorial Board A.K. Vatsa, Shobhit University, India Abdul Kadir Ozcan, The American university, Cyprus Alireza Nemaney Pour, Islamic Azad University of Abhar, Iran Anas Abou El Kalam, UCA/ENSA of Marrakesh, Morocco Annamma Abraham, B M S Institute of Technology, India Asadollah Shahbahrami, University of Guilan, Iran Ashok Kumar Das, International Institute of Information Technology, India Belhamri Azeddine, Universite Mentori, Algerie Boo-Hyung Lee, KongJu National University, South Korea Carlos E. Otero, The University of Virginia's College at Wise, USA Ching-Hsien Hsu, Chung Hua University, Taiwan Denivaldo Lopes, Federal University of Maranhao, Brazil Dhinaharan Nagamalai, Wireilla Net Solutions PTY LTD, Australia Gurdev Singh, Adesh Institute of Engineering & Technology, India Hani H. Qusa, University College of Applied Sciences, Palestine Henrique Joao Lopes Domingos, New University of Lisbon, Portugal Hossain Shahriar, Kennesaw State University, USA Ihab A. Ali, Helwan University, Egypt Isaac Agudo, University of Malaga, Spain Ismael Etxeberria-Agiriano, University of the Basque Country, Spain Jaydip Sen, Tata Consultancy Services, India Jeong-Hyun Park, Electronics Telecommunication Research Institute, South Korea Jose Enrique Armendariz-Inigo, Universidad Publica de Navarra, Spain Jungwook Song, Konkuk University, South Korea M Rajarajan, City University, United Kingdom M. B. Ghaznavi-Ghoushchi, Shahed University, Iran http://airccse.org/journal/ijnsa.html
  • 4. Editorial Board Madhan KS, Infosys Technologies Limited, India. Madhavi Latha, Jawaharlal Nehru Technological University, India Mahdi Aiash, Middlesex University, London - United Kingdom Manabu Okamoto, Kanagawa Institute of Technology, Japan Marc Rader, Capella University, USA Marjan Gusev, Univ. Sts Cyril and Methodius, Macedoni Mina Rahbari, Islamic Azad University, Iran Mohammad A. Alia, Al Zaytoonah University of Jordan, Jordan Mohammad Ali Jabreil Jamali, Islamic Azad University, Iran Mohammad Momani, University of technology Sydney, Australia Mritunjay Rai, Indian Institute of Information Technology and Management, India Narendra Kr Pareek, Mohanlal Sukhadia University, India Natarajan Meghanathan, Jackson State University, USA R.Ramesh, Anna University, India Raja Kumar M, Universiti Sains Malaysia, Malaysia Ram Kumar Singh, Swami Vivekanand Subharti University, India S. K. Ghosh, Indian Institute of Technology, India Saad M. Darwish, Alexandria University, Egypt Salman Abdul Moiz, Centre for Development of Advanced Computing, India Sarah M. North, Kennesaw State University, USA Santosh Biswas, Indian Institute of Technology Guwahati, India Shekoofeh Ghiam, Sharif University of Technology, Iran Sherif S. Rashad, Morehead State University, USA Susantha Herath, St. Cloud State University, USA Talal Mousa Alkharobi, King Fahd University of Petroleum & Minerals, Saudi Arabia V. Lakshmi Narasimhan, East Carolina University, USA William R Simpson, The Institute for Defense Analyses, USA Xiaohong Yuan, North Carolina A&T State University, USA Yasir Arfat Malkani, University of Sindh, Pakistan Yeong Deok Kim, WooSong University , South Korea Zakaria Saleh, Yarmouk University, Jordan Roka Imareef, University of Sabha, Libya Nameer Emam, Philadelphia University, Jordan Asimi Ahmed, Ibn Zohr University, Morocco Hasan Alsakran, King Saud University, Saudi Arabia http://airccse.org/journal/ijnsa.html
  • 5. Paper Submission & Manuscript preparation Guide Authors are invited to submit papers for this journal through E-mail ijnsa@airccse.org. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. For paper format download the template in this page Manuscript Template Review Process Submissions are accepted for review with the understanding that the same work has been neither submitted to, nor published in, another publication. Simultaneous submission to other publications will result in immediate rejection of the paper. Papers are not within the journal scope will be rejected immediately after the pre review process. All manuscripts will be subject to a well established, fair, unbiased peer review and refereeing procedure, and are considered on the basis of their significance, novelty and usefulness to the Journals readership. The reviewing structure will always ensure the anonymity of the referees & it will be reviewed by 3 experts in the field. The review output will be one of the following decisions: 1. Accept 2. Accept with minor changes 3. Weak Accept with major changes 4. Reject The review process may take approximately two to three months to be completed. The Editor reserves the right to reject a paper if it does not meet the aims and scope of the journal and if it is not revised as per instructions. Copy right form After submitting final manuscript, you can get copy right form from AIRCC secretary Publication charges: 120 USD (Maximum 20 pages) Publication Frequency - Bi Monthly January, March, May, July, September, November Special Issue Proposal IJNSA invite proposals for special issues on topics that fall within the scope of this journal. You can send your proposal directly to editor in chief & secretary, AIRCC by email Contact Us Here's where you can reach us : ijnsa@airccse.org http://airccse.org/journal/ijnsa.html
  • 6. Volume 1, Number 1, April 2009 S.No Paper Title Citation 1 Using Rough Set and Support Vector Machine for Network Intrusion Detection Rung-Ching Chen, Kai-Fan Cheng and Chia-Fen Hsieh, Chaoyang University of Technology,Taiwan, R.O.C 97 2 Tools and Techniques for Network Forensics Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore Jackson State University,USA 51 3 Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images Krishnamurthy G N, Dr. V Ramaswamy,Bapuji Institute of Engineering & Technology, India 19 4 A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard Algorithm Poonam Garg,Institute of Management Technology, India 73 5 A New Cluster - Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc Networks Debdutta Barman Roy,Rituparna Chaki,Nabendu Chaki,Calcutta Institute of Engineering and Management, India, West Bengal University of Technology,India, University of Calcutta,India 84 Volume 1, Number 2, July 2009 6 Iterative method for improvement of coding and decryption Natasa Zivic, Institute for Data Communication Systems, University of Siegen,Germany 04 7 Tools A new key establishment Scheme for wireless sensor networks Eric Ke Wang, Lucas C.K.Hui and S.M.Yiu, Department of Computer Science, The University of Hong Kong, Hong Kong 04 8 Dynamic IDP signature processing by fast elimination using DFA Mohammed Misbahuddin, Sachin Narayanan and Bishwa Ranjan Ghosh,Computer Networks & Internet Engineering Division, Centre for Development of Advanced Computing, Bangalore, India 03 9 Effect of inter packet delay in performance analysis of coexistence heterogeneous wireless packet networks G.M.Tamilselvan and A.Shanmugam,Bannariamman Institute of Technology,Tamilnadu, India 09 10 Clustered Hierarchy in Sensor Networks: Performance and Security Mohammed Abuhelaleh, Khaled Elleithy and Thabet Mismar, School of Engineering, University of Bridgeport USA 01
  • 7. 11 Quantum Three-Pass Protocol: Key Distribution using Quantum Superposition States Yoshito Kanamori1 and Seong-Moo Yoo 2 , 1 University of Alaska Anchorage, Alaska, USA, 2 The University of Alabama in Huntsville, Alabama, USA 06 12 Intelligent Intrusion Detection System Framework Using Mobile Agents N.Jaisankar, R.Saravanan and K. Durai Swamy, School of Computing Sciences, VIT University, India 19 13 On Generation of Firewall Log Status Reporter (SRr) Using Perl Sugam Sharma1 , Hari Cohly2 , and Tzusheng Pei2 , 1 Iowa State University, USA, 2 Jackson State University, USA 09 14 Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration Alan Mink, Sheila Frankel and Ray Perlner, National Institute of Standards and Technology (NIST), USA 27 Volume 1, Number 3, October 2009 15 Integrating Identity-Based Cryptography in IMS Service Authentication Mohamed Abid1 , Songbo Song2 , Hassnaa Moustafa2 and Hossam Afifi1 , 1 Telecom & Management SudParis ,Evry, France 07 16 Agent Based Trust Management Model Based on Weight Value Model for Online Auctions E.Sathiyamoorthy, N.Ch.Sriman Narayana Iyenger & V.Ramachandran, VIT University,INDIA. 09 17 Cryptanalysis of a more efficient and secure Dynamic ID-Based Remote User Authentication Scheme Mohammed Aijaz Ahmed1 , D. Rajya Lakshmi2 and Sayed Abdul Sattar3 , GITAM University, India 17 18 PSIM: A Tool for Analysis of Device Pairing Methods Yasir Arfat Malkani and Lachhman Das Dhomeja, University of Sussex, Brighton, UK 05 19 Data Security in Mobile Devices by GEO Locking M Prabu Kumar and K Praneesh Kumar Yadav, VIT University, India 04 20 Performance Evaluation of a New Route Optimization Technique for Mobile IP Moheb r. Girgis, Tarek m. Mahmoud,Youssef s. Takroni and hassan s. Hassan,Minia University, Egypt 01 21 Security Properties in an Open Peer-to-Peer Network Jean-Francois Lalande, David Rodriguez, Christian Toinard,Laboratoire DInformatique Fondamentale DOrleans, Universite, DOrleans, Ensi de Bourges, France 03 22 A Security Framework for SOA Applications in Mobile Environment Zair Abdelouahab,Federal University of Maranhao, CCET/DEEE Av. Dos portugueses, Campus do Bacanga, Sao Luis, Brazil 15
  • 8. 23 Securing AODV for MANETs using Message Digest with Secret Key Kamaljit Lakhtaria,Bhaskar N. Patel, Satish G. Prajapati,N. N. Jani, Atmiya Institute of Technology & Science, India 08 24 Application Specific Usage control Implementation Verification Rajkumar P.V, S.K.Ghosh and Pallab Dasgupta Indian Institute of Technology- Kharagpur, India 03 Volume 2, Number 1, January 2010 25 Dynamic Neural Networks in the Detection of Distributed Attacks in Mobile Ad-Hoc Networks James Cannady, Nova Southeastern University, USA 09 26 A Frame Work for Ontological Privacy Preserved Mining Geetha Mary. A and Sriman Narayana Iyengar. N.Ch, VIT University, India. 08 27 Workload Characterization of Spam Email Filtering Systems Yan Luo, University of Massachusetts Lowell, USA 07 28 Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video Cover Media Natarajan Meghanathan and Lopamudra Nayak, Jackson State University, USA 61 29 Weakness on Cryptographic Schemes Based on Regular LDPC Codes Omessaad Hamdi1 , Manel abdelhedi2 , Ammar Bouallegue2 and Sami Harari3 , 1 SYSTEL, SUPCOM, Tunisia, 2 SYSCOM, ENIT, Tunisia and 3 SIS, USTV, France. 00 30 Advanced Security Management in Metro Ethernet Networks Ammar Rayes, Cisco Systems, USA 0 31 Combining Private and Public Key Encryption Techniques for Providing Extreme Secure Environment for an Academic Institution Application 1 Syed S. Rizvi, 2 Aasia Riasat and 3 Khaled M. Elleithy, 1,3 University of Bridgeport, USA and 2 Institute of Business Management, Pakistan. 07 32 Pledge: A Policy-Based Security Protocol for Protecting Content Addressable Storage Architectures Wassim Itani, Ayman Kayssi and Ali Chehab,American University of Beirut, Lebanon 01 Volume 2, Number 2, April 2010 33 Little Dragon Two: An efficient Multivariate Public Key Cryptosystem Rajesh P Singh, Anupam Saikia and B. K. Sarma, Indian Institute of Technology, Guwahati, India 05 34 Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection Dewan Md. Farid1 , Nouria Harbi1 , and Mohammad Zahidur Rahman2 , 1 University Lumiere Lyon 2 - France and 2 Jahangirnagar University, Bangladesh 96
  • 9. 35 Lightweight Mutual Authentication Protocol for Low Cost RFID Tags Eslam Gamal Ahmed, Eman Shaaban and Mohamed Hashem, Ain Shams University, EGYPT 24 36 Fuzzy Aided Application Layer Semantic Intrusion Detection System – FASIDS S.Sangeetha1 & V.Vaidehi2 , 1 Angel College of Engineering, India and 2 Madras Institute of Technology, India 07 37 Events Classification in Log Audit Sabah Al-Fedaghi and Fahad Mahdi, Kuwait University, Kuwait 07 38 Analysis of the Security of BB84 by Model Checking Mohamed Elboukhari1 , Mostafa Azizi2 and Abdelmalek Azizi13 , 1 FSO, University Mohamed Ist, Morocco, 2 ESTO, University Mohamed Ist,Morocco and 3 Academy Hassan II of Sciences & Technology, Morocco 14 39 Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor Mohsen Machhout1 , Zied Guitouni1 , Kholdoun Torki2 , Lazhar Khriji3 and Rached Tourki1 , 1 Faculty of Sciences of Monastir, Tunisia, 2 TIMA - CMP Laboratory, France and 3 Sultane Qaboos University, Oman 15 40 Impersonation Attack on EKE Protocol Shirisha Tallapally , Vaagdevi College of Engineering, India 03 41 A Light-Weight Mutual Authentication and Key-Exchange Protocol Based on Elliptical Curve Cryptogaphy for Energy -Constrained Devices Kin Choong Yow and Amol Dabholkar, Nanyang Technological University,Singapore 04 42 Trust Based Content Distribution for Peer-To-Peer Overlay Networks S.Ayyasamy1 and S.N. Sivanandam2 , 1 Tamilnadu College of Engineering, India and 2 PSG College of Technology, India 06 43 Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in MANET T.V.P.Sundararajan and A.Shanmugam,Bannari Amman Institute of Technology, Sathyamangalam,India 26 44 Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2) Ulrich Herberg and Thomas Clausen,Ecole Polytechnique, France 24 Volume 2, Number 3, July 2010 45 A Novel Web-based Approach for Balancing Usability and Security Requirements of Text Passwords Dhananjay Kulkarni, Boston University, USA. 02 46 Cross-Layer Resource Allocation Scheme Under Heterogeneous Constranits For Next Generation High Rate WPAN Ayman Khalil, Matthieu Crussiere and Jean-Francois Helard, Institute of Electronics and Telecommunications of Rennes (IETR), France. 12 47 Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers Chang N. Zhang, Qian Yu and Xiao Wei Liu, University of Regina, Canada. 0
  • 10. 48 Design And Implementation Of a Trust-Aware Routing Protocol For Large WSNs Theodore Zahariadis1 , Helen Leligou1 , Panagiotis Karkazis4 ,Panagiotis Trakadas2 , Ioannis Papaefstathiou4 ,Charalambos Vangelatos3 and Lionel Besson4 , 1 Technological Educational Institute of Chalkis, Greece, 2 Hellenic Authority for Communications Security and Privacy (ADAE), Greece, 3 Hellenic Aerospace Industry S.A., Greece, Thales Communications, France and 4 Technical University of Crete, Greece. 46 49 Investigating & Improving The Reliability And Repeatability Of Keystorke Dynamics Timers Pavaday Narainsamy,Soyjaudah Sunjiv and Nugessur Shrikaant, University of Mauritius. 05 50 Improving TLS Security By Quantum Cryptography Mohamed Elboukhari1 , Mostafa Azizi2 and Abdelmalek Azizi3 , 1 FSO, University Mohamed Ist, Morocco, 2 ESTO, University Mohamed Ist,Morocco and 3 Academy Hassan II of Sciences & Technology, Morocco. 05 51 Hierarchical Design Based Intrusion Detection System For Wireless Ad Hoc Sensor Network Mohammad Saiful Islam Mamun1 and A.F.M. Sultanul Kabir2 , 1 Stamford University, Bangladesh and 2 American International University, Bangladesh. 43 52 Byzantine Behaviour (B2) - Mitigating Midway Multicast Misbehaviour (M4) In Adhoc Network S. Albert Raebra1 and S. Vijayalakshmi2 , 1 St.Josephs College, Bharathidasan University, India and 2 Pondicherry University, India 01 53 An Efficient IP Traceback Through Packet Marking Algorithm Y.Bhavani and P.Niranjan Reddy, Kakatiya Institute of Technology and Science,India. 08 54 Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment K R Chandrasekhara Pillai1 and M P Sebastian2 ,1 N S S College of Engineering,India and ²Indian Institute of Management, India 08 55 Wireless Security Measurement Using Data Value Index Reza Amirpoor, ¹Ajay Kumar ² and Satish R. Deavne ³,¹Bharati Vidyapeeth University,India, ²JSPMs JAYAWANT Institute of Computer Applications,India and ³DR.D. Y. Patil Ramrao Adik Institute of Technology, India. 0 56 An Efficient M-ARY QIM Data Hiding Algorithm For The Application To Image Error Concealment Amit Phadikar¹ and Santi P. Maity ², ¹MCKV Institute of Engineering,India and ²Bengal Engineering and Science University, India 0 57 Pattern Analysis and Signature Extraction For Intrusion Attacks On Web Services Urjita Thakar¹, Nirmal Dagdee² and Sudarshan Varma³, ¹Shri G.S. Institute of Technology and Science,India, ²S.D. Bansal College of Technology,India and ³Ideavate Solutions, USA. 15 Volume 2, Number 4, October 2010 58 A Multi-Criteria Evaluation of Information Security Controls Using Boolean Features Angel R. Otero¹, Carlos E. Otero² and Abrar Qureshi², ¹Nova Southeastern University, USA and ²University of Virginia's College at Wise, USA 20
  • 11. 59 Securing Data Transfer in the Cloud Through Introducing Identification Packet and UDT- Authentication Option FIeld:A Characterization Danilo Valeros Bernardo and Doan B Hoang, The University of Technology- Sydney, Australia 06 60 Efficient Digital Encryption Algorithm Based on Matrix Scrambling Technique M. Kiran Kumar¹, S. Mukthyar Azam¹ and Shaik Rasool², ¹R.V.R & J.C College of Engg, India and ²S.C.E.T, India 31 61 Verification of Quantum Cryptography Protocols by Model Checking Mohamed Elboukhari¹, Mostafa Azizi² and Abdelmalek Azizi¹,¹ , ¹FSO, University Mohamed Ist, Morocco, ²ESTO, University Mohamed Ist, Morocco and ³Academy Hassan II of Sciences & Technology, Morocco 02 62 Evaluating Galois Counter Mode in Link Layer Security Architecture for Wireless Sensor Networks Vivaksha Jariwala¹ and D. C. Jinwala², ¹C. K. Pithawalla College of Engineering and Technology, India and ²S. V. National Institute of Technology, India 03 63 Security in Wireless Sensor Networks: Key Management Module in SOOAWSN Mohammed A. Abuhelaleh and Khaled M. Elleithy, University Of Bridgeport, USA 26 64 Effect of Hash Function on Performance of Low Power Wake up Receiver for Wireless Sensor Network Vikas Kumar¹ and Rajender Kumar², NIT- kurukshetra, India 00 65 A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network Jaydip Sen, Tata Consultancy Services Ltd - Kolkata, India 14 66 Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-Server Environment Rafael Martinez-Pelaez¹,² , Francisco Rico-Novella¹, Cristina Satizabal2 and Jacek Pomykala³, ¹Technical University of Catalonia, Spain, ²Universidad de la Sierra Sur, Mexico and ³Warsaw University, Poland 05 67 A (2,N) Visual Cryptographic Technique for Banking Applications Jayanta Kumar Pal¹, J. K. Mandal² and Kousik Dasgupta¹, ¹Kalyani Government Engineering College, India and ²University of Kalyani, India 13 68 Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents Mueen Uddin¹, Kamran Khowaja² and Azizah Abdul Rehman¹, ¹UTM, Malaysia and 2 Isra University, Pakistan 24 69 A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks Emmanouil A. Panaousis, George Drew, Grant P. Millar, Tipu A. Ramrekha and Christos Politis, Kingston University - London, United Kingdom 07 70 Lightweight C&C based botnet detection using Aho-Corasick NFA Udhayan J¹, Anitha R² and Hamsapriya T², ¹Karunya University, India and ²PSG College of Technology, India 06
  • 12. 71 Emergency Response Communications and Associated Security Challenges Muhammad Ibrahim Channa and Kazi M. Ahmed, Asian Institute of Technology, Thailand 10 72 A Formal Verification Framework for Security Policy Management in Mobile IP Based WLAN Soumya Maity, P Bera, S K Ghosh and Pallab Dasgupta, Indian Institute of Technology - Kharagpur, India 02 73 Effective Voice Calls Admission for Authorized User in Inter VOIP Network Subashri T and Vaidehi V, Anna University - Chennai, India 0 74 ADRISYA: A Flow Based Anomaly Detection System for Slow and Fast Scan Muraleedharan N and Arun Parmar, Centre for Development of Advanced Computing (C-DAC), India 04 75 Improving the Reliability of Detection of LSB Replacement Steganography Shreelekshmi R¹, Wilscy M² and C E Veni Madhavan³, ¹College of Engineering - Trivandrum, India, ²University of Kerala, India and ³Indian Institute of Science, India 0 76 Zero Data Remnance Proof in Cloud Storage Mithun Paul and Ashutosh Saxena, Infosys Technologies Ltd - Hyderabad, India 3 77 Bayesian Based Comment Spam Defending Tool Dhinaharan Nagamalai¹, Beatrice Cynthia Dhinakaran² and Jae Kwang Lee², ¹Wireilla Net Solutions, Australia and ²Hannam University, South Korea 2 Volume 3, Number 1, January 2011 78 Virtual Machines And Networks - Installation, Performance, Study, Advantages And Virtualization Options Ishtiaq Ali and Natarajan Meghanathan, Jackson State University, USA 19 79 Comparison Process Long Execution Between PQ Algorthm And New Fuzzy Logic Algorithm For VOIP Suardinata, Kamalrulnizam bin Abu Bakar and Nimitr Suanmali, University Teknologi Malaysia, Malaysia 01 80 An Ov erview Of The Security Concerns In Enterprise Cloud Computing Anthony Bisong¹ and Syed (Shawon) M. Rahman², ¹Capella University,USA and ²University of Hawaii-Hilo, USA 182 81 A Human-Centric Approach To Group-Based Context-Awareness Nasser Ghadiri, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee and Mohammad A. Nematbakhsh, University of Isfahan, Iran 08
  • 13. 82 Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas Sector Iwendi, C. O and Allen, A. R. , University of Aberdeen, Scotland, UK 14 83 Failure of A Mix Network Kun Peng, Institute for Infocomm Research, Singapore 03 84 Analysis of Web Logs And Web User In Web Mining L.K. Joshila Grace¹, V.Maheswari¹ and Dhinaharan Nagamalai², ¹Sathyabama University, India and ²Wireilla Net Solutions PTY Ltd, Australia 96 Volume 3, Number 2, March 2011 85 A Light Weight Protocol To Provide Location Privacy In Wireless Body Area Networks Mohammed Mana¹, Mohammed Feham¹ and Boucif Amar Bensaber², ¹University of Tlemcen, Algeria and²Universite du Quebec a Trois-Rivieres, Canada 11 86 Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards Ashok Kumar Das, International Institute of Information Technology - Hyderabad, India 18 87 Digital Watermarking through Embedding of Encrypted and Arithmetically Compressed Data into Image using Variable Length Key Sabyasachi Samanta¹, Saurabh Dutta² and Goutam Sanyal³, ¹Haldia Institute of Technology, India, ²Dr. B. C. Roy Engineering College - Durgapur, India and ³National Institute of Technology - Durgapur, India 02 88 The Key Exchange Cryptosystem Used With Higher Order Diophantine Equations Harry Yosh, HECO Ltd - Canberra, Australia 08 89 Design And Efficient Deployment Of Honeypot And Dynamic Rule Based Live Network Intrusion Collaborative System Renuka Prasad.B¹, Annamma Abraham², Abhas Abhinav³, Sunil.V.Gurlahosur⁴⁴⁴⁴ and Srinivasa Y⁴⁴⁴⁴, ¹R.V.College of Engineering, India, ²BMSIT - Bengaluru, India, ³DeepRootLinux Pvt Ltd, India, ⁴⁴⁴⁴SIT - Tumkur, India 01 90 Confidentiality & Authentication Mechanism for Biometric Information Transmitted over Low Bandwidth & Unreliable channel Raju Singh and A.K.Vatsa, Shobhit University, India. 06 91 Investigating the Combination of Text and Graphical Passwords for a more secure and usable experience C Singh, L Singh and E Marks, University of Guyana 09 92 Uncoercibility In E-Voting And E-Auctioning Mechanisms Using Deniable Encryption Jaydeep Howlader, Vivek Nair, Saikat Basu and A. K. Mal, National Institute of Technology - Durgapur, India 07 93 A Novel Data Encryption Technique By Genetic Crossover Of Robust Biometric Key And Session Based Password Tanmay Bhattacharya¹, Sirshendu Hore², Ayan Mukherjee³ and S. R. Bhadra Chaudhuri⁴⁴⁴⁴, ¹JIS College Engineering, India, ²Hooghly Engineering & Technology College, India, ³Institute of Science & Technology, India and ⁴⁴⁴⁴Bengal Engineering & Science University, India 02
  • 14. 94 Replication Attack Mitigations for Static And Mobile WSN V.Manjula and C.Chellappan, Anna University - Chennai, India 19 95 Stage Staffing Scheme for Copyright Protection In Multimedia Sumit Kumar, Santosh Kumar and Sukumar Nandi, Indian Institute of Technology - Guwahati, India 0 96 Substitution-diffusion based Image Cipher Narendra K Pareek¹, Vinod Patidar² and Krishan K Sud², ¹M L Sukhadia University - Udaipur, India and ²Sir Padampat Singhania University, India 14 97 A Robust Mechanism For Defending Distributed Denial Of Service Attacks On Web Servers Jaydip Sen, Innovation Lab, Tata Consultancy Services Ltd.,- Kolkata, India 12 98 Image Encryption Based On Diffusion And Multiple Chaotic Maps G.A.Sathishkumar¹, K.Bhoopathy bagan² and N.Sriraam³, ¹Sri Venkateswara College of Engineering, India, ²Madras Institute of Technology, India and ³SSN College of Engineering, India 35 99 A QoS Based MAC Protocol For Wireless Ad-hoc Network Vandana khare¹, D.SrinivasRao² and Y.Madhavee Latha³, ¹CMEC - Hyd, India, ²JNTUH - Hyd, India and ³MRECW - Hyd, India 0 Volume 3, Number 3, May 2011 100 System Dynamics Based Insider Threats Modeling Sang-Chin Yang and Yi-Lu Wang, National Defense University, Republic of China 08 101 Countermeasure Tool - Carapace for Network Security Anand Bisen, Shrinivas Karwa and B.B. Meshram, Veermata Jijabai Technological Institute, India 01 102 On Design of PUF-Based Random Number Generators Mehdi Ayat¹, Reza Ebrahimi Atani² and Sattar Mirzakuchaki¹, ¹Iran University of Science and Technology, Iran and ²The University of Guilan, Iran 03 103 Credential Based Mediator Architecture for Access Control and Data Integration in Multiple Data Sources Environment Nirmal Dagdee and Ruchi Vijaywargiya, S.D. Bansal College Of Technology, India 05 104 Data Security Using Private Key Encryption System Based on Arithmetic Coding Ajit Singh and Rimple Gilhotra, BPS Mahila Vishwavidyalaya, India 28 105 PKI in Government Identity Management Systems Ali M. Al-Khouri, Emirates Identity Authority, United Arab Emirates 10 106 Maintaining Uniform Density and Minimizing the Chance of Error in a Large Scale WSN Asis Kumar Tripathy, Shradhananda Beura, Muralidhar Behera and Gunanidhi Pradhan, NM Institute of Engineering and Technology, India 00
  • 15. 107 Authentication Schemes for Session Passwords Using Color and Images M Sreelatha¹, M Shashi², M Anirudh¹, Md Sultan Ahamer¹ and V Manoj Kumar¹, ¹RVR & JC College of Engineering, India and ²Andhra University College of Engineering, India 50 108 Transformation from Identity Stone Age to Digital Identity Mohit Kohli, Rolta Technology Limited (RIL), India 02 109 Enterprise Delegation for Service Based Systems Coimbatore Chandersekaran¹ and William R. Simpson², ¹The Secretary of the Air Force, USA and ²The Institute for Defense Analyses, USA 0 110 An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification Ferdous A Barbhuiya, Santosh Biswas and Sukumar Nandi, Indian Institute of Technology - Guwahati, India 04 111 DDoS Attack and Defense Scheme in Wireless Ad hoc Networks S.A.Arunmozhi and Y.Venkataramani, Saranathan College of Engineering, India 40 112 TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for MANET Ahmed M. Abd El-Haleem and Ihab A. Ali, Helwan University, Egypt 04 Volume 3, Number 4, July 2011 113 Novel Hybrid Intrusion Detection System For Clustered Wireless Sensor Network Hichem Sedjelmaci and Mohamed Feham, Abou Bakr Belkaid University - Tlemcen, Algeria 32 114 Wavelet Thresholding Approach For Image Denoising Pankaj Hedaoo and Swati S Godbole, G. H. Raisoni College of Engineering, Nagpur, India. 44 115 Architecture Of A Identity Based Firewall System Nenad Stojanovski¹ and Marjan Gusev², ¹Makedonski Telekom AD, Orce Nikolov BB, 1000 Skopje, Macedonia and ²Ss. Cyril and Methodius University, Macedonia 07 116 Cryptovirology: Virus Approach Shivale Saurabh Anandrao, Vishwakarma Institute Of Information Technology - Pune, India 02 117 Security Apprehensions In Different Regions Of Cloud Captious Grounds Gurdev Singh¹ Amit Sharma¹ and Manpreet Singh Lehal², ¹Eternal University, HP India and ²Lyallpur Khalsa College, India 15
  • 16. 118 A Novel Header Matching Algorithm For Intrusion Detection Systems Mohammad A. Alia¹, Adnan A. Hnaif¹, Hayam K. Al-Anie¹, Khulood Abu Maria¹, Ahmed M. Manasrah² and M. Imran Sarwar³, ¹Al Zaytoonah University, Jordan, ²Al Yarmouk University, Jordon and ³Universiti Sains Malaysia, Malaysia 01 119 A Novel Scheme For Deviation Detection In Asynchronous Distributed Pricing S.S. Prasad, Rithika Baruah and Siddharth.A, National Institute of Technology, Jamshedpur, India 0 120 E-Voting Protocol Based On Public-Key Cryptography Hayam K. Al-Anie, Mohammad A. Alia and Adnan A. Hnaif, Al Zaytoonah University, Jordan 12 121 Optimizing And Analysing The Effectiveness Of Security Hardening Measures Using Various Optimization Techniques as Well as Network Management Models Giving Special Emphasis To Attack Tree Model Prabhat Kumar Vishwakarma, University of Gondar, Ethiopia 01 122 Governing Information Security In Conjunction With Cobit And Iso 27001 Tolga Mataracioglu¹ and Sevgi Ozkan², ¹TUBITAK National Research Institute of Electronics and Cryptology (UEKAE), Turkey and ²Middle East Technical University, Turkey 17 123 An Evaluation Of Fingerprint Security Using Noninvertible Biohash N.Radha¹ and S.Karthikeyan², ¹Karpagam University, India and ²College of Applied Sciences, Sultanate of Oman 15 124 RTOS Based Secure Shortest Path Routing Algorithm In Mobile Ad- Hoc Networks R. Ramesh and S. Gayathri, Anna University, India 02 125 An Approach To Provide Security In Mobile Ad-Hoc Networks Using Counter Mode Of Encryption On Mac Layer Gulshan Kumar and Mritunjay Rai, Lovely Professional University, Jalandhar, India. 02 126 An Ancient Indian Board Game as a Tool for Authentication Sreelatha Malempati¹ and Shashi Mogalla², ¹RVR & JC College of Engineering, Guntur, A.P and ²Andhra University College of Engineering, Visakhapatnam, A.P 03 127 Ensemble of Blowfish With Chaos Based S Box Design For Text And Image Encryption Jeyamala Chandrasekaran¹ Subramanyan B¹ and Raman G.S², ¹Thiagarajar College of Engineering, Madurai and ²KLN College of Information Technology, Madurai 09 Volume 3, Number 5, September 2011 128 Information Security Synthesis in Online Universities Maria Schuett, Crisc and Syed (Shawon) M. Rahman, Capella University, USA 10 129 A Multiple Ballots Election Scheme Using Anonymous Distribution Manabu Okamoto, Kanagawa Institute of Technology, Japan 01
  • 17. 130 Enhanced Secure Algorithm for Message Communication Shaik Rasool, G. Sridhar, K. Hemanth Kumar and P. Ravi Kumar, S.C.E.T., India 01 131 Design & Implementation of Secure AODV in Multicast Routing to Detect DDOS Attack Vikram Singh and Vatika, Chaudhary Devi Lal University, India 0 132 An ISP Based Notification and Detection System to Maximize Efficiency of Client Honeypots in Protection of End Users Masood Mansoori and Ray Hunt, University of Canterbury, New Zealand 0 133 Simulation of the Combined Method Ilya Levin and Victor Yakovlev, State University of Telecommunication, Russia 00 134 Prevention of Wormhole Attack in Wireless Sensor Network Dhara Buch¹ and Devesh Jinwala², ¹Government Engineering College Rajkot, India and ²S.V. National Institute of Technology, India 19 135 DDNFS: A Distributed Digital Notary File System Alexander Zanger, Bond University, Australia 00 136 Method for reducing of noise by improving Signal-to-Noise-Ratio in wireless LAN R.Seshadri¹ and N. Penchalaiah², ¹S.V.University, India and ²ASCET, India 00 137 Handwritten Text Image Authentication Using Back Propagation A S N Chakravarthy¹, Penmetsa V Krishna Raja² and P S Avadhani³, ¹Sri Aditya Engineering College, India, ²JNTUK, India and ³Andhra University, India 04 138 A Hierarchical Intrusion Detection Architecture for Wireless Sensor Networks Hossein Jadidoleslamy, The University of Guilan, Iran 18 139 BSK-WBSN: BioMetric Symmetric Keys tO Secure Wireless Body Sensors Networks Mesmoudi Samira and Feham Mohammed, University of Tlemcen, Algeria 17 140 Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent Chintan Bhatt, Asha Koshti, Hemant Agrawal, Zakiya Malek and Bhushan Trivedi, GLS Institute of Computer Technology, India 04 141 Botnet Command Detection using Virtual Honeynet J.S.Bhatia, R.K.Sehgal and Sanjeev Kumar, CDAC Mohali, India 12 142 CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack L.Kavisankar and C.Chellappan, Anna University, India 06 143 Assured Full Communication by Merging BlocksRandomly in Wireless Sensor Networks usingReed Solomon Code for Key Predistribution Pinaki Sarkar¹ and Aritra Dhar², ¹Jadavpur University, India and ²Gurunanak Institute of Technology, India 01
  • 18. 144 Trust Enhanced Data Security in Free Roaming Mobile agents using Symmetric Key cryptography G.Geetha¹ and C.Jayakumar², ¹Jerusalem college of Engineering, India and ²RMK Engineering college, India 04 145 Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism Preeti Sachan and Pabitra Mohan Khilar, National Institute of Technology Rourkela, India 16 146 Adaptive Association Rule Mining Based Cross Layer Intrusion Detection System for MANET V. Anjana Devi¹ and R. S. Bhuvaneswaran², ¹St. Joseph's College of Engineering, India and ²Anna University, India 03 147 Error Detection and Correction for Distributed Group Key Agreement Protocol P.Vijayakumar, S.Bose and A.Kannan, Anna University - Chennai, India 0 Volume 3, Number 6, November 2011 148 Rational Secret Sharing Over an Asynchronous Broadcast Channel With Information Theoretic Security William K. Moses Jr. and C. Pandu Rangan, Indian Institute of Technology - Chennai, India 02 149 An Overview of Penetration Testing Aileen G. Bacudio¹, Xiaohong Yuan¹, Bei-Tseng Bill Chu² and Monique Jones¹, ¹North Carolina A&T State University, USA and ²University of North Carolina at Charlotte, USA 27 150 The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks Novarun Deb, Manali Chakraborty and Nabendu Chaki, University of Calcutta, India 0 151 Enhancing Infrastructure Security in Real Estate Kyle Dees and Syed (Shawon) Rahman, Capella University, USA 09 152 Implementation of Cryptographic Algorithm for GSM and UMTS Systems. Alpesh R. Sankaliya, V.Mishra and Abhilash Mandloi, Sardar Vallabhbhai National Institute of Technology, India 07 153 Role of Multiple Encryption in Secure Electronic Transaction Himanshu Gupta¹ and Vinod Kumar Sharma², ¹Amity University Campus, India and ²Gurukula Kangri Vishwavidyalaya, India 19 154 Securing IEEE 802.11g WLAN Using Open VPN and its Impact Analysis Praveen Likhar, Ravi Shankar Yadav and Keshava Rao M, Defence Research and Development Organisation (DRDO) - Bangalore, India 12
  • 19. 155 Statistical Quality Control Approaches to Network Intrusion Detection Rohitha Goonatilake¹, Rafic Bachnak¹ and Susantha Herath², ¹Texas A&M International University, USA and ²St. Cloud State University, USA 02 156 Security Enhanced Key Predistribution Scheme Using Transversal Designs and Reed Muller Codes for Wireless Sensor Networks Pinaki Sarkar¹, Amrita Saha² and Samiran Bag³, ¹Jadavpur University, India, ²IIT Bombay, India and ³Indian Statistical Institute, India 01 157 Scheme of Encryption for Block Ciphers and Multi Code Generation Based on Secret Key P. Anuradha Kameswari, R. Chaya Kumari and L. Praveen Kumar, Andhra University, India 00 158 User Authentication using Native Language Passwords Sreelatha Malempati¹ and Shashi Mogalla², ¹R.V.R. & J.C. College of Engineering, India and ²Andhra University College of Engineering, India 03 159 Prediction of Malicious Objects in Computer Network and Defense Hemraj Sainia¹, T. C. Panda² and Minaketan Panda³, ¹Alwar Institute of Engineering & Technology, India, ²Orissa Engineering College, India and ³SPANCO TELE, India 05 160 Blind Signature Scheme Based on Chebyshev Polynomials Maheswara Rao Valluri, Salalah College of Technology, Oman 01 161 Efficient Detection of Sybil attack Based on Cryptography in Vanet Mina Rahbari and Mohammad Ali Jabreil Jamali, Islamic Azad University, Iran 26 162 Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm Debasis Das and Rajiv Misra, Indian Institute of Technology - Patna, India 20 163 Experimenting with the Novel Approaches in Text Steganography Shraddha Dulera¹, Devesh Jinwala1 and Aroop Dasgupta², ¹S V National Institute of Technology, India and ²Bhaskaracharya Institute for Space Applications and Geo- Informatics, India 10 164 Techniques and Tools for Forensic Investigation of E-mail M. Tariq Banday, University of Kashmir, India 13 165 Enhanced OneTime Pad Cipher with MoreArithmetic and Logical Operations with Flexible Key Generation Algorithm S.G.Srikantaswamy¹ and H.D.Phaneendra², ¹National Institute of Engineering - Mysore, India and ² CSE NIE - Mysore, India 05 166 An Effective Prevention of Attacks using GI Time Frequency Algorithm under DDoS K.Kuppusamy¹ and S.Malathi², ¹Alagappa University, India and ²Manonmaniam Sundaranar University, India 07 167 Securing Mobile Agents in MANET against Attacks using Trust Chandreyee Chowdhury and Sarmistha Neogy, Jadavpur University, India 03
  • 20. Volume 4, Number 1, January 2012 168 Optimizing One Fair Document Exchange Protocol Abdullah M. Alaraj, Qassim University, Saudi Arabia 03 169 IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots K.Munivara Prasad¹, A.Rama Mohan Reddy² and V Jyothsna³, ¹Rayalaseema University, India, ²SV University, India and ³Sree vidyanikethan Engg.College, India 10 170 Protected Data Objects Replication in Data Grid G. Aruna Kranthi and D. Shashi Rekha, S.R. Engineering College - Warangal, India Erratum : Due to a serious case of plagiarism this paper has been retracted. 0 171 Efficient & Secure Data Hiding Using Secret Reference Matrix Laxman Tawade¹, Rajshree Mahajan² and Chandan Kulthe², ¹Pune University, India and ²Aditya Engineering College, India 04 172 Risks and Remedies in E-Learning System Nikhilesh Barik and Sunil Karforma, Burdwan University, India 28 173 Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks Priyank Singhal and Nataasha Raul, Sardar Patel Institute of Technology - University of Mumbai, India 19 174 DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network G.Padmavathi, P.Subashini and D.Devi Aruna, Avinashiligam University for Women, India 03 175 Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks Sridhar Subramanian¹ and Baskaran Ramachandran², ¹Easwari Engineering College - Chennai, India and ²Anna University - Chennai, India 18 176 A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Security Minal Moharir and A V Suresh, R V College of Engineering Bangalore, India 01 177 A Security Suite for Wireless Body Area Networks Raghav V. Sampangi¹, Saurabh Dey², Shalini R. Urs³ and Srinivas Sampalli¹, ¹Dalhousie University, Canada, ²Analytics Quotient Bangalore, India and 3 University of Mysore, India 21 178 A Defensive Mechanism Cross Layer Architecture for Manets to Identify and Correct Misbehaviour in Routing G.S. Mamatha, R.V. College of Engineering Bangalore, India 02 179 The Coordinate Ratios as a Tool to Analyze the Intrusion based on Buzek-Hillery Quantum Copying Machine Besma Othmani¹, Mohsen Machhout², Houcine Mejri¹,² , Hafedh Belmabrouk¹ and Rached Tourki¹, ¹Laboratoire d'Electronique et Micro Electronique Faculte des Sciences de Monastir, Tunisia and ²Ecole Preparatoire aux Academies Melitaires, Tunisia 0
  • 21. Volume 4, Number 2, March 2012 180 A Generic Framework for Device Pairing in Ubiquitous Computing Environments Yasir Arfat Malkani, Dan Chalmers, Ian Wakeman and Lachhman Das Dhomeja, University of Sussex, UK 01 181 LSR Protocol Based on Nodes Potentiality in Trust and Residual Energy for WSNs Shaik Sahil Babu, Arnab Raha and M.K.Naskar, Jadavpur University, India 01 182 Cross Layer Intrusion Detection System for Wireless Sensor Network Djallel Eddine Boubiche and Azeddine Bilami, LaSTIC Laboratory - UHL Batna, Algeria 25 183 Minimizing the Time of Spam Mail Detection by Relocating Filtering System to the Sender Mail Server Alireza Nemaney Pour¹, Raheleh Kholghi² and Soheil Behnam Roudsari²,¹Islamic Azad University of Abhar, Iran and ²Sharif University of Technology, Iran 03 184 A Bayesian Classification on Asset Vulnerability for Real Time Reduction of False Positives in Ids G.Jacob Victor¹, M Sreenivasa Rao² and V.CH. Venkaiah³, ¹SERP - RD Department, India, ²JNTU - Hyderabad, India and ³CRRao AIMS & CS - Hyderabad, India 03 185 Cloud Computing Security in Business Information Systems Sasko Ristov, Marjan Gusev and Magdalena Kostoska, Ss. Cyril and Methodius University, Macedonia 28 186 Design and Analysis of a Novel Digital Image Encryption Scheme Narendra K Pareek, M L Sukhadia University, India 27 187 An Implementation of Intrusion Detection System Using Genetic Algorithm Mohammad Sazzadul Hoque, Md. Abdul Mukit and Md. Abu Naser Bikas, Shahjalal University of Science and Technology, Bangladesh 183 188 Forensic Analysis of Windows Registry Against Intrusion Haoyang Xie¹, Keyu Jiang¹, Xiaohong Yuan² and Hongbiao Zeng¹, ¹Fort Hays State University, USA and ²North Carolina A&T State University, USA 08 189 LPM: A Distributed Architecture and Algorithms for Location Privacy in LBS Muhamed Ilyas and R. Vijayakumar, Mahatma Gandhi University Kottayam, India 03 190 Co-operative Wireless Intrusion Detection System Using MIBs From SNMP Ashvini Vyavhare, Varsharani Bhosale, Mrunal Sawant and Fazila Girkar, College of Engineering - Pune, India 02 191 Lattice Based Tools in Cryptanalysis for Public Key Cryptography R.Santosh Kumar¹, C.Narasimham² and S.Pallam Setty³, ¹MVGR College of Engg., India, ²VR Siddhartha Engineering College, India and ³Andhra University, India 03 192 Identification of Image Spam by Using Low Level & Metadata Features Anand Gupta, Chhavi Singhal and Somya Aggarwal, Netaji Subhas Institute of Technology, India 02
  • 22. 193 Efficient Conditional Proxy Re-Encryption With Chosen Cipher Text Security S. Sree Vivek¹, S. Sharmila Deva Selvi¹, V. Radhakishan¹, C. Pandu Rangan¹, ¹IIT Madras, India and ²NIT Trichy, India 79 194 Passblot: A Highly Scalable Graphical one Time Password System Sainath Gupta, Shashank Sahni, Pruthvi Sabbu, Siddhartha Varma and Suryakanth V Gangashetty, IIIT - Hyderabad, India 05 Volume 4, Number 3, May 2012 195 Generating Representative Attack Test Cases for Evaluating and Testing Wireless Intrusion Detection Systems Khalid Nasr, Anas Abou El Kalam and Christian Fraboul, Universite de Toulouse Toulouse, France 05 196 Survey and Taxonomy of Key Management Protocols for Wired and Wireless Networks Adarsh Kumar, Alok Aggarwal and Charu, Jaypee Institute of Information and Technology Noida, India 13 197 Security Threats Analysis in Bluetooth-Enabled Mobile Devices Robayet Nasim, University of Science & Technology Chittagong, Bangladesh 03 198 Energy Constrained Reliable Routing Optimized Cluster Head Protocol for Multihop under Water Acoustic Sensor Networks Padmavathy.T.V, Gayathri.V, Indhumathi.V and Karthiga.G, R.M.K Collge of Engineering Chennai, India 03 199 The New Age of Computer Virus and Their Detection Nitesh Kumar Dixit¹, Lokesh mishra², Mahendra Singh Charan¹ and Bhabesh Kumar Dey¹, ¹BIET Sikar, India and ²NCAC Sikar, India 05 200 Provable Secure Identity Based Signcryption Schemes without Random Oracles Prashant Kushwah¹ and Sunder Lal², ¹Banasthali University, India and ²Veer Bahadur Singh Purvanchal University, India 09 201 Lossless Reconstruction of Secret Image Using Threshold Secret Sharing and Transformation P. Devaki and G. Raghavendra Rao, NIE Mysore, India 05 202 Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection P.Natesan and P.Balasubramanie, Kongu Engineering College, India 09 Volume 4, Number 4, July 2012 203 Resilient Voting Mechanisms for Mission Survivability in Cyberspace: Combining Replication and Diversity Charles A. Kamhoua¹, Patrick Hurley¹, Kevin A. Kwiat¹ and Joon S. Park², ¹Air Force Research Laboratory - Information Directorate, USA and ²Syracuse University, USA 02
  • 23. 204 Design and Evaluation of a New Fair Exchange Protocol Based on an Online TTP Abdullah AlOtaibi and Hamza Aldabbas, De Montfort University, United Kingdom 0 205 Evaluation of Security Attacks on UMTS Authentication Mechanism Mojtaba Ayoubi Mobarhan, Mostafa Ayoubi Mobarhan and Asadollah Shahbahrami, University of Guilan, Iran 19 206 Non-Profit Organizations' Need to Address Security for Effective Government Contracting Lee E. Rice¹ and Syed (Shawon) M. Rahman¹,² , ¹Capella University,USA and ²University of Hawaii-Hilo, USA 07 207 A Novel Energy Efficient and Administrator Based Secured Routing in MANET Himadri Nath Saha¹, Debika Bhattacharyya¹ and P. K.Banerjee², ¹Institute of Engineering and Management West Bengal, India and ²Jadavpur university, India 02 208 Dominant Features Identification for Covert Nodes in 9/11 Attack Using their Profile S.Karthika, A.Kiruthiga And S.Bose, Anna University, India 02 209 How to Avoid the N-1 Attack Without Costly Implementations David Tinoco Varela, Universidad Nacional Autonoma de Mexico, Mexico 0 210 A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security Manas Paul¹ and Jyotsna Kumar Mandal², ¹JIS College of Engineering, India and ²Kalyani University, India 06 211 Comprehensive Comparison of VoIP SIP Protocol Problems and Cisco VoIP System TALAL AL-KHAROBI and Mohmmed Abduallah Al-Mehdhar, King Fahd University of Petroleum & Minerals(KFUPM), Saudi Arabia 0 212 A Comparative Study of the Traditional Model of IEEE 802.15.4 and Non-Overlapping Binary Exponential Backoff IEEE 802.15.4 Archit Verma Pushpinder Singh Patheja and Akhilesh Waoo, BIST Bhopal, India 01 213 An Improved Watchdog Technique Based On Power-Aware Hierarchical Design For Ids In Wireless Sensor Networks A. Forootaninia¹ and M. B. Ghaznavi-Ghoushchi², ¹Tehran University, Iran and ²Shahed University, Iran 10 214 Personal Safety Triggering System on Android Mobile Platform Ashokkumar Ramalingam, Prabhu Dorairaj and Saranya Ramamoorthy, Blekinge Institute of Technology, Sweden 12 215 A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks Mahdi Aiash, Glenford Mapp and Aboubaker Lasebae, Middlesex University, UK 15 216 Implementation and Test of a Secure Mechanism's Modules in Routing Protocol of MANETs with the Theory of Games Karim KONATE and Abdourahime GAYE, University Cheikh Anta DIOP, Dakar 0
  • 24. Volume 4, Number 5, September 2012 217 Simple Post Quantum Scheme for Higher Key Rate Multiparty Quantum Key Distribution Abudhahir Buhari¹, Zuriati Ahmad Zukarnain¹, Shamala K. Subramaniam¹, Hisham Zainuddin¹ and Suhairi Saharudin², ¹University Putra Malaysia, Malaysia and ²Technology Park Malaysia, Malaysia 0 218 Comparison of High Speed Congestion Control Protocols Jawhar Ben Abed¹, Laarif Sinda², Mohamed Ali Mani³ and Rachid Mbarek², ¹Polytech Sousse, ²ISITCOM Hammam Sousse and ³ISTLS Sousse, Tunisia 04 219 Handoff Based Secure Checkpointing and Log Based Rollback Recovery for Mobile Hosts Priyanka Dey and Suparna Biswas, West Bengal University, India 01 220 A Framework For Performance Evaluation Of ASIPs in Network-Based IDS Majid Nezakatolhoseini¹ and Mohammad Amin Taherkhani², ¹Science and Research Branch Islamic Azad University, Iran and ²Shahid Beheshti University, Iran 01 221 Design And Validation Of Specification Based Ids For Power Enhancement Related Vulnerabilities In AODV Chaitali Biswas Dutta and Utpal Biswas, University of Kalyani, India 0 222 Security V/S Qos for LTE Authentication and Key Agreement Protocol Jacques Bou Abdo¹, Jacques Demerjian² and Hakima Chaouchi³, ¹Nokia Siemens Networks, Lebanon, ²Antonine University, Lebanon and ³Telecom Sud Paris, France 09 223 Comparison of Certificate Policies Formerging Public Key Infrastructuresduring Merger and Acquisition of Companies Balachandra Muniyal¹, Prema K.V² and Mamatha Balachandra¹, ¹Manipal University, India and ²Modi Institute of Technological Sciences, India 01 224 Healthcare IT: Is Your Information At Risk? Kimmarie Donahue¹ and Syed (Shawon) M. Rahman², ¹San Antonio, USA and ²Capella University, USA 05 225 A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications H.Jayasree¹ and A.Damodaram², ¹ATRI, India and ²JNTUH - Kukatpally, India 05 226 A Survey on Web Spam Detection Methods: Taxonomy Shekoofeh Ghiam¹ and Alireza Nemaney Pour², ¹Sharif University of Technology, Iran and ²Islamic Azad University of Abhar, Iran 09 227 Sybil Attack on Lowest Id Clustering Algorithm in The Mobile Ad Hoc Network Amol Vasudeva¹ and Manu Sood², ¹Jaypee University of Information Technology, India and ²Himachal Pradesh University, India 18 228 A Simple and Reliable Touch Sensitive Security System Adamu Murtala Zungeru¹, Jonathan Gana Kolo¹ and Ijarotimi Olumide², ¹University of Nottingham, Malaysia and ²Rufus Giwa Polytechnic, Nigeria 11 229 Taxonomy Based Intrusion Attacks and Detection Management Scheme in Peer-Topeer Network Prashant Kumar Singh¹, A. K. Vatsa¹, Reetu Sharma² and Priyanka Tyagi³, ¹Shobhit University, India, ²CERT, India and ³DVSIET, India 0
  • 25. 230 Secured Text Message Transmission in Pre -Channel Equalization Based MIMO- OFDM System with Implementation of Concatenated ECB and CFB Cryptographic Algorithm Laila Naznin,Shahrina Sultana, M. Golam Rashed and Shaikh Enayet Ullah, University of Rajshahi, Bangladesh 0 231 Explore Ten Different Types of Software Engineering Principles S.Thulasee Krishna¹, S.Sreekanth¹, B. Bhaskar¹ and N.Pavan Kumar², ¹Kuppam Engineering College, India and ²Sitams, Chittoo(DT), India 03 Volume 4, Number 6, November 2012 232 RSAED: Robust and Secure Aggregation of Encrypted Data in Wireless Sensor Networks Merad Boudia Omar Rafik and Feham Mohamed, University of Tlemcen, Algeria 07 233 Secured RFID Mutual Authentication Scheme for Mifare Systems Kuo-Tsang Huang and Jung-Hui Chiu, Chang Gung University, Taiwan 02 234 Malware Detection, Supportive Software Agents and Its Classification Schemes Adebayo, Olawale Surajudeen¹, M.A. Mabayoje², Amit Mishra³ and Osho Oluwafemi¹, ¹Federal University of Technology, Nigeria, ²University of Ilorin, Nigeria and ³IBB University Lapai, Nigeria 11 235 Mining Techniques in Network Security to Enhance Intrusion Detection Systems Maher Salem and Ulrich Buehler, University of Applied Sciences, Germany 06 236 A Quantum based Challenge-Response User Authentication Scheme over Noiseless Channel Abudhahir Buhari¹, Zuriati Ahmad Zukarnain¹, Shamala K. Subramaniam¹ , Hisham Zainuddin1 and Suhairi Saharudin², ¹University Putra Malaysia, Malaysia and ²MIMOS - Technology Park Malaysia, Malaysia 02 237 Modelling and Verification of Extensible Authentication Protocol Using Spin Model Checker Manu S. Hegde, Jnanamurthy HK and Sanjay Singh, Manipal University, India 03 238 The Effect of the Number of Mobile Nodes on Varying Speeds of MANETS John Tengviel¹, K. Diawuo² and K. A. Dotche², ¹Sunyani Polytechnic, Ghana and ²KNUST Kumasi, Ghana 0 239 Wireless Public Key Infrastructure for Mobile Phones Balachandra Muniyal, Krishna Prakash and Shashank Sharma, Manipal University, India 04 240 Secure Key Management Protocol in WIMAX Noudjoud Kahya¹, Nacira Ghoualmi¹ and Pascal Lafourcade², ¹Badji Mokhtar University, Algeria and ²Joseph Fourier University, France 04 241 A Novel Multipoint Relay based Secure Routing in MANET Himadri Nath Saha, Debika Bhattacharyya and P.K.Banerjee, IEM KolaKata, India 01 242 Network Threat Characterization in Multiple Intrusion Perspectives using Data Mining Technique Oluwafemi Oriola, Adesesan B. Adeyemo and Oluwaseyitanfunmi Osunade, University of Ibadan, Nigeria 02
  • 26. 243 Removal of Certificates from Set Protocol Using Certificateless Public Key Cryptography Arpita Sarkar and Sachin Tripathi, Indian School of Mines Dhanbad, India 01 244 Review on IPv6 Security Vulnerability Issues and Mitigation Methods Supriyanto¹, Raja Kumar Murugesan² and Sureswaran Ramadass³, ¹Universitas Sultan Ageng Tirtayasa, Indonesia, ²Taylor's University, Malaysia and ³National Advanced IPv6 Centre (NAv6) Universiti Sains, Malaysia 07 Volume 5, Number 1, January 2013 255 Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study Natarajan Meghanathan, Jackson State University, USA 0 256 A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers Kuo-Tsang Huang¹, Jung-Hui Chiu¹ and Sung-Shiou Shen², ¹Chang Gung University, Taiwan and ²DE LIN Institute of Technology, Taiwan 08 257 An Integrated Solution for both Monitoring and Controlling for Automization Using Wireless Sensor Networks: A Case Study M Gnana Seelan and Ch AS Murty, Centre for Development of Advanced Computing - Hyderabad, India 0 258 How to Find a Fixed Point in Shuffle Efficiently Mikako Kageshima and Manabu Okamoto, Kanagawa Institute of Technology, Japan 0 259 Ontology-Driven Information Retrieval for Healthcare Information System : A Case Study Aidarus M. Ibrahim, Hussein A. Hashi and Abdullalem A. Mohamed, University Technology Malaysia (UTM), Malaysia 09 260 Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and Support Vector Machines A. M. Chandrashekhar¹ and K. Raghuveer², ¹Sri Jayachamarajendra College of Engineering (SJCE), India and ²National Institute of Engineering (NIE) Mysore, India 12 261 Text Steganographic Approaches: A Comparison Monika Agarwal, PDPM-IIITDM Jabalpur, India 40 Volume 5, Number 2, March 2013 262 Incident Response Plan for a Small to Medium Sized Hospital Charles DeVoe and Syed (Shawon) M. Rahman, Capella University, USA 0 263 Privacy Preserving Data Mining by using Implicit Function Theorem Pasupuleti Rajesh¹ and Gugulothu Narsimha², ¹VVIT College, India and ²JNTUH University, India. 02 264 Tulungan: A Slandering-Resistant Reputation System for Collaborative Web Filtering Systems Alexis V. Pantola¹, Susan Pancho-Festin² and Florante Salvador¹, ¹De La Salle University, Philippines and ²University of the Philippines, Philippines 0
  • 27. 265 Design Issues on Software Aspects and Simulation Tools for Wireless Sensor Networks Leelavathi G¹, Shaila K², Venugopal K R³ and L M Patnaik⁴⁴⁴⁴, ¹Govt.S.K.S.J. Technological Institute, India, ²Vivekananda Institute of Technology, India, ³University Visvesvaraya College of Engineering, India and ⁴⁴⁴⁴Indian Institute of Science, India 03 267 Using Bias Optimiazation for Reversible Data Hiding using Image Interpolation Andrew Rudder, Wayne Goodridge and Shareeda Mohammed, The University of the West Indies, Trinidad and Tobago. 0 268 A 64 Bits Rotor Enhanced Block Cipher (Rebc3) Ahmed ElShafee, Ahram Canadian University, Egypt. 0 269 A Robust Background Removal Algortihms Using Fuzzy C-Means Clustering S.Lakshmi¹ and V.Sankaranarayanan², ¹Jeppiaar Engineering College, India and ²Crescent Engineering College, India. 01 270 Efficacy of Attack Detection Capability of IDPS Based on its Deployment in Wired and Wireless Environment Shalvi Dave¹, Bhushan Trivedi² and Jimit Mahadevia³, ¹Indus University, India, ²GLSICT,India and ³Elitecore Technologies Pvt. Ltd., India 02 271 Code Aware Dynamic Source Routing for Distributed Sensor Network M Abdul Rahiman¹, Nishanth Jain¹, Arun K. Dubey² and G Manoj Kumar³, ¹AICTE, Ministry of HRD,Govt of India, India, ²Bharati Vidyapeeth College of Engineering, India and ³LBS Inst of Tech for Women, India. 01 272 Resonance Based Micromechanical Cantilever for Gas Sensing Subhashini. S¹ and Vimala Juliet. A², ¹Sathyabama University, India and ²SRM University, India 0 273 Traceback of DOS Over Autonomous Systems Mohammed Alenezi and Martin J Reed, School of Computer Science and Electronic Engineering, University of Essex, UK 04 274 Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicular Ad- hoc Network Environment Vaishali D. Khairnar and Ketan Kotecha, Institute of Technology Nirma University, India 25 275 A Novel Secure Cosine Similarity Computation Scheme with Malicious Adversaries Dexin Yang¹, Chunjing Lin² and Bo Yang², ¹Guangzhou City Polytechnic, China and ²Shaanxi Normal University, China 01 276 Improved Ids using Layered CRFS with Logon Restrictions and Mobile Alerts Based on Deviant System Behaviour Arpitha M1, Geetha V¹,Gowranga K H² and Bhakthavathsalam R², ¹Alpha College Of Engineering, India and ²Indian Institute of Science, India 0 278 E-Commerce Systems Security for Small Businesses Syed (Shawon) M. Rahman and Robert Lackey, Capella University, Minneapolis, USA. 04
  • 28. Volume 5, Number 3, May 2013 279 Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and Energy Depletion Parameters S.Prabhakara Rao¹, E.Nagabhooshanam² and S.Ramesh Babu¹, ¹Nigama Engineering College, India and ²Sridevi Womens Engineering College, India 0 280 An Efficient Group Authentication for Group Communications Lein Harn¹ and Changlu Lin², ¹University of Missouri, USA and ²Fujian Normal University, P. R. China 06 281 Password Based Scheme and Group Testing for Defending DDOS Attacks G Dayanandam¹, T V Rao², S Pavan Kumar Reddy¹ and Ravinuthala Sruthi¹, ¹QIS Institute of Technology (QISIT), India and ²KL University (KLU), India 03 282 Security Algorithms for WIMAX M Alzaabi¹, K D Ranjeeth¹, T Alukaidey¹ and K Salman², ¹University of Hertfordshire, UK and ²Middle Tennessee State University, USA 02 283 Hybrid Architecture for Distributed Intrusion Detection System in Wireless Network Seyedeh Yasaman Rashida, Islamic Azad University Shirgah, Iran 04 284 HTTPI Based Web Service Security over SOAP Pankaj Choudhary, Rajendra Aaseri and Nirmal Roberts, ABV - Indian Institute of Information Technology & Management, India 05 285 Implementation of a Security Protocol for Bluetooth and WI-FI U. Pavan Kumar, Amity University, India 03 286 Bearings Prognostic Using Mixture of Gaussians Hidden Markov Model and Support Vector Machine Fatima Ezzahra Sloukia¹, Rajae Bouarfa¹, Hicham Medromi² and Mohammed Wahbi¹, ¹SIR2C2S/LASI-EHTP, Morocco and ²Hassan II University, Morocco 11 287 Trust Value Algorithm: A Secure Approach against Packet Drop Attack in Wireless Ad-Hoc Networks Rajendra Aaseri, Pankaj Choudhary and Nirmal Roberts, ABV-Indian Institute of Information Technology, India 02 Volume 5, Number 4, July 2013 288 Real Time Securing of All-Optical Networks Against Security Attacks at the Physical Level Fahmida Rahman and Mohammed Arozullah, The Catholic University of America, USA 0 289 Phishing Techniques and Mitigating the Associated Security Risks Marc A. Rader and Syed (Shawon) M. Rahman, Capella University, USA 290 Wireless Networks Security in Jordan: A Field Study Ahmad S. Mashhour¹ and Zakaria Saleh², ¹University of Bahrain, Bahrain and ²Yarmouk University, Jordan 02
  • 29. 291 Early Detection of SQL Injection Attacks Hossain Shahriar, Sarah North and Wei-Chuen Chen, Kennesaw State University, USA 06 292 A Framework for Security Components Anomalies Severity Evaluation and Classification Kamel Karoui, Fakher Ben Ftima and Henda Ben Ghezala, University of Manouba, Tunisia 0 293 Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authentication Pavan Kumar K, P. E. S. N. Krishna Prasad, M. V. Ramakrishna and B.D.C.N. Prasad, Prasad V. Potluri Siddhartha Institute of Technology, India 03 294 Defence Schemes From Attacker's Own Reward Processes L-F Pau, Copenhagen Business School, Denmark 01 295 Controlling IP Falsifying Using Realistic Simulation Govindavaram Madhusri¹ and Chakunta Venkata Guru Rao², ¹Kakatiya University, India and ²JNTU University, India 0 296 Malware Risk Analysis on the Campus Network with Bayesian Belief Network Aliyu Mohammed, Haitham A. Jamil, Sulaiman Mohd Nor and Muhammad NadzirMarsono, Universiti Teknologi Malaysia, Malaysia 1 297 Internal Security on an IDS Based on Agents Rafael Paez, Mery Yolima Uribe and Miguel Torres, Pontificia Universidad Javeriana, Colombia 02 298 A New Stemmer to Improve Information Retrieval Wahiba Ben Abdessalem Karaa, University of Tunis. Tunisia 16 299 Performance Evaluation of Enhancedgreedy-Two-Phase Deployment Algorithm Kartit Ali, University Mohammed V-Agdal, Morocco 0 300 Steganography and Random Grids Pratarshi Saha¹, Sandeep Gurung¹ and Kunal Krishanu Ghose², ¹Sikkim Manipal Institute of Technology, India and ²QualComm, USA 0 301 An Improved MULTI-SOM Algorithm Imen Khanchouch, Khaddouja Boujenfa and Mohamed Limam, University of Tunis, Tunisia and Dhofar University, Oman 02 302 Experimental Analysis of AODV and DSR with Varying Vehicle Mobility and Density in Vanet Scenario Arzoo Dahiya and R.K.Chauhan, Kurukshetra University, India 01 Volume 5, Number 5, September 2013 303 Knowledge-Based Authentication using Twitter Can We Use Lunch Menus As Passwords? ManabuOkamoto, Kanagawa Institute of Technology, Japan 02 304 A Security Framework in Cloud Computing Infrastructure Arijit Ukil¹, Debasish Jana² and Ajanta De Sarkar², ¹Tata Consultancy Services, India and ²Birla Institute of Technology, India 13
  • 30. 305 Micro Rotor Enhanced Block Cipher Designed For Eight Bits Micro-Controllers (MREBC) Ahmed ElShafee, Ahram Canadian University, Egypt 0 306 Image Authentication Through ZTransform with Low Energy And Bandwidth (IAZT Madhumita Sengupta and J. K. Mandal, University of Kalyani, India 0 307 Fast Detection of Ddos Attacks Using Non-Adaptive Group Testing Huynh Nguyen Chinh, Tan Hanh and Nguyen Dinh Thuc, HCMC,Vietnam 06 308 Effectiveness of Feature Detectionoperators on the Performance of Iris Biometric Recognition System Binsu C. Kovoor, Supriya M.H. and K. Poulose Jacob, Cochin University of Science and Technology, India 07 309 Secure Collaborative Processing Architecture for MITB Attack Detection Hani Qusa and Shadi Abudalfa, University College of Applied Science, Palestine 02 310 Security Challenges, Issues and Their Solutions For Vanet Ram Shringar Raw, Manish Kumar and Nanhay Singh, Ambedkar Institute of Advanced communication Technologies & Research, India 59 311 Defense Mechanisms for Computer-Based Information Systems Majid Alshammari and Christian Bach, University of Bridgeport, USA 02 312 Optimized Hybrid Security Mechanism for Image Authentication and Secrecy using PSO K.Kuppusamy and K.Thamodaran, Alagappa University, India 02 313 Credit Based Methodology to Detect and Discriminate DDOS Attack From Flash Crowd in A Cloud Computing Environment N.Jeyanthi, Hena Shabeeb and Mogankumar P.C, VIT University, India 05 314 Z-Shaped Dipole Antenna and its Fractal Iterations Mustafa H. Abu Nasr, Al- Azhar University, Palestine 04 315 A Novel Approach for Secure Routing Through BGP Using Symmetric Key Divan Raimagia, Shraddha Singh and Sameena Zafar, PIES College, India 01 316 Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm Adnan M. Shihab, Raghad K. Mohammed and Woud M. Abed, University of Baghdad, Iraq 0 317 A Novel Technique to Detect Intrusion in Manet J. K. Mandal¹ and Khondekar Lutful Hassan², ¹University of Kalyani, India and ²University of Calcutta,India 03 Volume 5, Number 6, November 2013 318 Complete Network Security Protection for SME's within Limited Resources Margie S. Todd¹ and Syed (Shawon) M. Rahman¹,² , ¹Capella University, USA and ²University of Hawaii-Hilo, USA 01
  • 31. 319 Multi-Level Parsing Based Approach Against Phishing Attacks With the Help of Knowledge Bases Gaurav Kumar Tak¹ and Gaurav Ojha², ¹Lovely Professional University, India and ²Indian Institute of Information Technology and Management, India 02 320 A Need for Peer-To-Peer Strong Local Authentication Protocol (P2PSLAP) in Mobile Banking Bossi Masamila, Dublin Institute of Technology, Ireland 01 321 Securing Mobile Cloud Using Finger Print Authentication IehabALRassan and HananAlShaher, King Saud University, Saudi Arabia 12 322 Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection Engine Anjan K¹, Srinath N K¹ and Jibi Abraham², ¹R V College of Engineering, India and ²College of Engineering, India 01 323 Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive Channel Shortening in Multi-carrier Systems Samir Abd Elghafar¹,² , Salaheldin M. Diab¹, Bassiouny M. Sallam¹, Moawad I. Dessouky¹, El-Sayed M. El-Rabaie¹ and Fathi E. Abd El-Samie¹, ¹Menoufia University, Egypt and ²Jazan University, Saudi Arabia 0 324 Investigating the Effects of the Common Control Channel Challenge in Multichannel Cognitive Networks With Hypothetical Spectrum Hole Mthulisi Velempini¹ and Mqhele E. Dlodlo², ¹North-West University, South Africa and ²University of Cape Town, South Africa 0 Volume 6, Number 1, January 2014 325 Optimised Malware Detection in Digital Forensics SaeedAlmarri¹ and Paul Sant², ¹University of Bedfordshire, United Kingdom and ²University Campus Milton Keynes, United Kingdom 05 326 A Novel Paradigm in Authentication System Using Swifi Encryption /Decryption Approach Shadi R. Masadeh¹, Ahmad Azzazi², Bassam A. Y. Alqaralleh³ and Ali, Mousa.Al Sbou³, ¹Isra University, Jordan, ²Applied Science University, Jordan and ³Al-Hussein Bin Talal University, Jordan 01 327 Cloud Computing and Security Issues in the Cloud Monjur Ahmed¹ and Mohammad Ashraf Hossain², ¹Daffodil Institute of IT, Bangladesh and ²Freelance IT Consultant, Bangladesh 61 328 A Novel Approach: A Hybrid Semantic Matchmaker for Service Discovery in Service Oriented Architecture Soodeh Pakari, Esmaeel Kheirkhah and Mehrdad Jalali, Islamic Azad University, Mashhad, Iran 02 329 SPARQL: Semantic Information Retrieval by Embedding Prepositions Sneha Kumari, Rajiv Pandey, Amit Singh and Himanshu Pathak, Amity University, India 01
  • 32. 330 A Fair Exchange & Customer Anonymity Protocol Using A Trusted Third Party for Electronic Commerce Transactions and Payments Fahad A Alqahtani, De Montfort University, United Kingdom 0 331 An IAC Approach for Detecting Profile Cloning in Online Social Networks MortezaYousefi Kharaji¹ and FatemehSalehi Rizi², ¹Mazandaran University of Science and Technology, Iran and ²Sheikhbahaee University of Isfahan, Iran 04 332 Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares Pallavi Vijay Chavan¹, Mohammad Atique² and Latesh Malik¹, ¹GHRCE - Nagpur, India and ²SGBAU -Amravati, India 09 Volume 6, Number 2, March 2014 333 The Impact of Management Information systems(MIS) Technologies on the quality of Services provided at the University of TABUK Hiyam S. Ensour and Tareg M. Alinizi, Petra of university, Jordan 03 334 Enhancing the Impregnability of Linux Servers Rama Koteswara Rao G¹, Satya Prasad R², Pathanjali Sastri A² and P.E.S.N. Prasad¹, ¹Prasad V. Potluri Siddhartha Institute of Technology, India and ²Acharya Nagarjuna University, India 0 335 Implementing Packet Broadcasting Algorithm Of Mimo Based Mobile Ad-Hoc Networks To Exploit Diversity Swati Chowdhuri¹, Santanu Maiti¹, Sheli Sinha Chaudhuriand² and P.K.Baneerjee², ¹Seacom Engineering College, India and ²Jadavpur University, India 02 336 A New Hybrid Algorithm for Business Intelligence Recommender System P.Prabhu and N.Anbazhagan, Alagappa University, India 0 Volume 6, Number 3, May 2014 337 Privacy Protection for Role-Based Access Control in Service Oriented Architecture Helen Cheung, Celia Li, Ye Yu and Cungang Yang, Ryerson University, Canada 01 338 Survey of Manet Misbehaviour Detection Approaches Punya Peethambaran and Jayasudha J. S, SCT College of Engineering, India 08 339 Attack Graph-Based Risk Assessment and Optimisation Approach Mohammed Alhomidi and Martin Reed, University of Essex, UK 05 340 Security Issues Associated with Big Data in Cloud Computing Venkata Narasimha Inukollu¹ , Sailaja Arsi¹ and Srinivasa Rao Ravuri², ¹Texas Tech University, USA and ²Cognizant Technology Solutions, India 50 341 A Survey of Trends in Massive DDOS Attacks and Cloud-Based Mitigations FuiFui Wong and Cheng Xiang Tan, TongJi University, China 17
  • 33. 342 Role of Integrated Virtual E-Learning System for Distance Learning Students Shweta Soni and M.D.Katkar, G.H.Raisoni Institute of Engineering and Technology for Women, India 0 343 Self-Protection Mechanism For Wireless Sensor Networks Hosam Soleman and Ali Payandeh, Maleke-Ashtar university Islamic Republic of Iran 04 344 Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes Divya Ann Luke, Jayasudha. J.S, SCT College of Engineering, India 01 Volume 6, Number 4, July 2014 345 End to End Quality of Service Assurance for Multi-Service Provisioning in Mobile Ad Hoc Networks. Prabesh Dongol and Dhadesugoor R. Vaman, Prairie View A&M University, USA 01 346 Analysis of RSA Algorithm using GPU Programming Sonam Mahajan and Maninder Singh, Thapar University, India 10 347 Evaluation of Enhanced Security Solutions in 802.11-Based Networks Ajah Ifeyinwa Angela, Ebonyi State University Abakaliki, Nigeria 01 348 Analysis and Comparison of Symmetric Key Cryptographic Algorithms Based on Various File Features Ranjeet Masram, Vivek Shahare, Jibi Abraham, Rajni Moona, College of Engineering Pune, India 23 349 State of Mobile Banking in Tanzania and Security Issues Bossi Masamila, Dublin Institute of Technology, Ireland 09 350 A Novel (K,N) Secret Sharing Scheme from Quadratic Residues for Grayscale Images El-Tigani B. Abdelsatir, Sahar Salahaldeen, Hyam Omar and Afra Hashim, University of Khartoum, Sudan 03 Volume 6, Number 5, September 2014 351 A Secure Electronic Payment Protocol for Wireless Mesh Networks Helen Cheung and Cungang Yang, Ryerson University, Canada 01 352 Cloud Based Access Control Model for Selective Encryption of Documents with Traitor Detection Punya Peethambaran and. Jayasudha J. S, Sct College of Engineering, India 02 353 Reducing the Cognitive Load on Analysts through Hamming Distance Based Alert Aggregation Peter Mell¹ and Richard Harang², ¹National Institute of Standards and Technology, USA and ²U.S. Army Research Laboratory, USA 0 354 A Secure Cluster Based Communication in Wireless Network using Cryptographic Reports Hamsha and Nagaraj, RVCE Bangalore, India 0
  • 34. 355 A Framework for Analysis and Comparison of Dynamic Malware Analysis Tools Waqas Aman, Gjovik University College, Norway 01 356 Packet Drop Attack Detection Techniques in Wireless Ad Hoc Networks: A Review Kennedy Edemacu, Martin Euku and Richard Ssekibuule, Makerere UniversityKampala, Uganda 06 Volume 6, Number 6, November 2014 357 A Cryptographic Mutual Authentication Scheme for Web Applications Yassine Sadqi, Ahmed Asimi and Younes Asimi, Ibn Zohr University, Morocco 04 358 Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data Using Secure Division Sumana M¹ and Hareesha K S², ¹M S Ramaiah Institute of Technology, India and ²Manipal Institute of Technology, India 02 359 Collaborative Defence for Distributed Attacks (Case Study of Palestinian Information Systems) Hani Qusa, University College of Applied Science, Palestine 0 360 Hybrid Cryptographic Technique Using RSA Algorithm and Scheduling Concepts Meenakshi Shankar and Akshaya.P, Sri Venkateswara College of Engineering, India 0 361 Key Management Techniques in Wireless Sensor Networks Khawla Naji Shnaikat¹ and Ayman Ahmed Qudah², ¹University of Jordan, Jordan and ²University of Dammam, KSA 03 Volume 7, Number 1, January 2015 362 Multi-Facet Trust Model for Online Social Network Environment Liu Ban Chieng¹, Manmeet Mahinderjit Singh¹, Zarul Fitri Zaaba¹ and Rohail Hassan², ¹University Sains Malaysia, Malaysia and ²Universiti Teknologi Petronas, Malaysia 02 363 Accessing Secured Data in Cloud Computing Environment Hasan Omar Al-Sakran, King Saud University, Saudi Arabia 06 364 Service Oriented Configuration Management of Software Architecture Razie Alidoosti, Shahrouz Moaven and Jafar Habibi, Sharif University of Technology, Iran 0 365 Runtime Potential Updater File(S) Identification: Does Your Software Updates Automatically With Application Whitelisting? Janardhan Reddy, Amit Kumar Jha and Sandeep Romana, Centre for Development of Advanced Computing, India 0 366 Strong Zero-Knowledge Authentication Based on the Session Keys (SASK) Younes ASIMI, Abdellah AMGHAR, Ahmed ASIMI and Yassine SADQI, Laboratoire des Systemes informatiques et Vision (LabSiV), Morocco 04
  • 35. 367 A New Secret Handshakes Scheme with Dynamic Matching Based on ZSS Preeti Kulshrestha and Arun Kumar Pal, G.B. Pant University of Agriculture and Technology, India 05 368 A New DNA Based Approach of Generating Key-Dependent Shift Rows Transformation Auday H. Al-Wattar, Ramlan Mahmod, Zuriati Ahmad Zukarnain and Nur Izura Udzir, Universiti Putra Malaysia, Malaysia 01 Volume 7, Number 2, March 2015 369 Exploiting Rhetorical Relations to Multiple Documents Text Summarization N.Adilah Hanin Zahri¹, Fumiyo Fukumoto², Matsyoshi Suguru² and Ong Bi Lynn¹, ¹University of Malaysia Perlis, Malaysia and ²University of Yamanashi, Japan 0 370 An Interactive Visualization Tool for Animating Behavior of Cryptographic Protocols Mabroka Maeref¹, Fatma Algali¹, Ahmed Patel² and Zarina Shukur², ¹Sebha University Libya and ²The National University of Malaysia, Malaysia 01 371 A New Image Steganography Algorithm Based on MLSB Method with Random Pixels Selection Odai M.Al-Shatanawi and Nameer N.El.Emam, Philadelphia University, Jordan 03 372 Certificate Less Key Management Scheme in Manet Using Threshold Cryptography Shaheena Khatoonand Balwant Singh Thakur, Pt.Ravishankar Shukla University, India 01 373 Comprehensive Survey of Possible Security Issues on 4G Networks Sumant Ku Mohapatra, Biswa Ranjan Swain and Pravanjan Das, Trident Academy of Technology, India 06 Volume 7, Number 3, May 2015 374 Security Challenges as a Factor Affecting the Security of Manet: Attacks and Security Solutions Nabeel Zanoon¹, Nashat Albdour², Hatem S. A. Hamatta¹ and Rasha Moh'd Al- Tarawneh¹, ¹Al-Balqa Applied University, Jordan and ²Tafila Technical University, Jordan 04 375 An ANN Approach for Network Intrusion Detection using Entropy based Feature Selection AshalataPanigrahi and ManasRanjanPatra, Berhampur University, India 02 376 A Performance Evaluation Of Common Encryption Techniques With Secure Watermark System (SWS) Ashraf Odeh¹, Shadi R.Masadeh¹ and Ahmad Azzazi², ¹Isra University, Jordan and ²Applied Science University, Jordan 01 377 Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channel In Secured Communication Anjan K1, Srinath N K¹ and Jibi Abraham², ¹R V College of Engineering, India and ²College of Engineering Pune, India 0
  • 36. Volume 7, Number 4, July 2015 378 Deterring Hacking Strategies via Targeting Scanning Properties Saad Alsunbul¹,² , Phu Dung Le¹, Jefferson Tan¹, ¹Monash University, Australia and ²King Abdullaziz for Science and Technology, Saudi Arabia 0 379 Providing End-To-End Secure Communications in GSM Networks Heshem A.El Zouka, Arab Academy for Science & Technology and Maritime Transport, Egypt 38 Volume 7, Number 5, September 2015 380 ANDROINSPECTOR: A System for Comprehensive Analysis of Android Applications Babu Rajesh V, Phaninder Reddy, Himanshu P and Mahesh U Patil, Centre for Development of Advanced Computing, India 0 381 Improved Steganographic Security by Applying an Irregular Image Segmentation and Hybrid Adaptive Neural Networks with Modified Ant Colony Optimization Nameer N. El. Emam¹ and Kefaya S. Qaddoum², ¹Philadelphia University, Jordan and ²Warwick University, UK 0 382 An Intellect Learning on E-Mail Security and Fraud, Spam and Phishing P.S.Jagadeesh Kumar, S.Meenakshi Sundaram and Ranjeet Kumar, Don Bosco Institute of Technology, India 0 Volume 7, Number 6, November 2015 383 A Novel Evaluation Approach to Finding Lightweight Machine Learning Algorithms for Intrusion Detection in Computer Network Yuchen Wang¹, Shuxiang Xu² and Qiongfang Huang¹, ¹Zhejiang University of Technology, China and ²University of Tasmania, Australia 0 384 A Machine Learning Approach to Anomaly-Based Detection on Android Platforms Joshua Abah, Waziri O.V, Abdullahi M.B, Arthur U.M and Adewale O.S, Federal University of Technology Minna, Nigeria 04 385 A System for Validating and Comparing Host-Based Ddos Detection Mechanisms Nguyen Hong Son, Post and Telecommunication Institute of Technology, Vietnam 0 Volume 8, Number 1, January 2016 386 Limiting Self-Propagating Malware Based On Connection Failure Behavior Through Hyper- Compact Estimators You Zhou¹, Yian Zhou¹, Shigang Chen¹ and O. Patrick Kreidl², ¹University of Florida, USA and ²University of North Florida, USA 0 387 Employee Trust Based Industrial Device Deployment and Initial Key Establishment Apala Ray¹,² and Johan Akerberg²,³ and Mats Bjorkman³ and Mikael Gidlund⁴⁴⁴⁴, ¹ABB Corporate Research- Bangalore, India, ²Malardalen University, Sweden, ³ABB Corporate Research-Vasteras, Sweden and ⁴⁴⁴⁴Mid Sweden University, Sundsvall, Sweden 03
  • 37. 388 A Security Strategy against STEAL-AND-PASS Credential Attacks Juan Ceballos, Security Consulting & Engineering, T-Systems International, Germany 0 389 Big Data Security and Privacy Issues in the CLOUD Ali Gholami and Erwin Laure, KTH- Royal Institute of Technology, Sweden 01 Volume 8, Number 2, March 2016 390 Trends Toward Real-Time Network Data Steganography James Collins, Sos Agaian, The University of Texas at San Antonio, USA 01 391 Intrusion Detection System Using Discrete Fourier Transform with Window Function Yusuke Tsuge and HidemaTanaka, National Defense Academy of Japan, Japan 0 392 A Novel Charging and Accounting Scheme in Mobile Ad-Hoc Networks Inna Kofman¹ and Nurul Huda², ¹University of Duesseldorf, Germany and ²Ryerson University, Canada 0 393 A Security Evaluation Framework for U.K. E-Government Services Agile Software Development Steve Harrison¹,Antonis Tzounis², Leandros Maglaras¹, Francois Siewe¹, Richard Smith¹ and Helge Janicke¹, ¹De Montfort University, United Kingdom and ²University of Thessaly, Greece 01 394 Cascade Block Cipher Using Braiding/Entanglement of Spin Matrices and Bit Rotation D.Sravana Kumar¹, P.Sirisha² and CH. Suneetha³, ¹Dr. V.S. Krishna Government Degree College, India, ²Indian Maritime University, India and ³GITAM University, India 0 395 The Internet of Things : New Interoperability, Management and Security Challenges Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung, Western Sydney University, Australia 06 396 Design and Implementation of the Advanced Cloud Privacy Threat Modeling Ali Gholami¹, Anna-Sara Lind², Jane Reichel², Jan-Eric Litton³, Ake Edlund¹, Erwin Laure¹, ¹KTH Royal Institute of Technology, Sweden, ²Uppsala University, Sweden and ³Karolinska Institutet, Sweden 04 Volume 8, Number 3, May 2016 397 Using a Deep Understanding of Network Activities for Security Event Management Mona Lange¹, Felix Kuhr² and Ralf Moller¹, ¹Universitat zu Lubeck, Germany and ²Technical Universitat Hamburg-Harburg, Germany 0 398 Wearable Technology Devices Security and Privacy Vulnerability Analysis Ke Wan Ching and Manmeet Mahinderjit Singh, University Sains Malaysia Penang, Malaysia 0 399 Y-Hamiltonian Layers Broadcast Algorithm Amnah El-Obaid and Nagham_Al-Madi, Zaytoonah University of Jordan, Jordan 01
  • 38. 400 Authentication Using Trust to Detect Misbehaving Nodes in Mobile Ad hoc Networks Using Q-Learning S.Sivagurunathan¹, K.Prathapchandran¹ and A.Thirumavalavan², ¹Gandhigram Rural Institute-Deemed University, India and ²Arignar Anna Government Arts College, India 0 Volume 8, Number 4, July 2016 401 Proactive Detection of DDOS Attacks in Publish-Subscribe Networks Bander Alzahrani¹, Vassilios Vassilakis², Mohammed Alreshoodi³, Fawaz Alarfaj⁴⁴⁴⁴ and Ahmed Alhindi⁴⁴⁴⁴, ¹King Abdulaziz University, Saudi Arabia, ²University of Brighton, United Kingdom, ³Qassim University, Saudi Arabia, ⁴⁴⁴⁴Al Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia and ⁴⁴⁴⁴Umm Al-Qura University, Saudi Arabia 01 402 Email Spam Classification Using Hybrid Approach of RBF Neural Network and Particle Swarm Optimization Mohammed Awad and Monir Foqaha, Arab American University, Palestine 0 403 Performance Analysis of the Neighbor Weight Trust Determination Algorithm in MANETs Ali Abu Romman¹ and Hussein Al-Bahadili², ¹Princess Sumaya University for Technology, Jordan and ²University of Petra, Jordan 0 404 A Benchmark for Designing Usable and Secure Text-Based Captchas Suliman A. Alsuhibany, Qassim University, Saudi Arabia 03 405 An Intelligent Classification Model for Phishing Email Detection Adwan Yasin and Abdelmunem Abuhasan, Arab American University, Palestine 0 Volume 8, Number 5, September 2016 406 A Hybrid Approach Combining Rule-Based and Anomaly-Based Detection Against DDoS Attacks Chin-Ling Chen¹ and Hsin-Chiao Chen², ¹National Pingtung University, Taiwan and ²National Pingtung Institute of Commerce, Taiwan 0 407 Enhance RFID Security Against Brute Force Attack Based on Password Strength and Markov Model Adwan Yasin and Fadi AbuAlrub, Arab American University, Palestine 0 408 Color Image Encryption Based on Multiple Chaotic Systems Adwan Yasin and Fadi AbuAlrub, Arab American University, Palestine Yuting Xi, Xing Zhang and Ruisong Ye, Shantou University, P. R. China 0 Volume 8, Number 6, November 2016 409 Steganalysis Algorithm for PNG Images Based on Fuzzy Logic Technique Jawaher alqahtani¹, Daniyal Alghazzawi¹ and Li Cheng², ¹King Abdulaziz University, Saudi Arabia and ²Chinese Academy of Sciences, China 0
  • 39. 410 A Mechanism for Early Detecting DDOS Attacks Based on M/G/R PS Queue Nguyen Hong Son, Post and Telecommunication Institute of Technology, Vietnam 0 411 A Bastion Mobile ID-Based Authentication Technique (BMBAT) Abdelmunem Abuhasan and Adwan Yasin, Arab American University, Palestine 0 Volume 9, Number 1, January 2017 412 A Study on LEA and Seed Algorithms for Data Protection of Smartphone Based Disaster Notification System Jae Pil Lee, Jae Gwang Lee, Jun hyeon Lee, Ki-su Yoon and Jae Kwang Lee, Han Nam University, Korea 0 413 Application-Layer DDOS Detection Based on a One-Class Support Vector Machine Chuyu She¹, ², ³ , Wushao Wen¹, , Zaihua Lin¹ and Kesong Zheng¹, ¹Sun Yat-Sen University, China, ²SYSU-CMU Shunde International Joint Research Institute, China and ³Guangdong University of Finance & Economics, China 0 414 A Survey on Security in Wireless Sensor Networks Waleed Al Shehri, King Abdul-Aziz University, Saudi Arabia 06 Volume 9, Number 2, March 2017 415 Metric for Evaluating Availability of an Information System : A Quantitative Approach Based on Component Dependency Suhail Qadir Mir1 and S.M.K. Quadri2 , 1 University of Kashmir, India and 2 Jamia Millia Islamia, India 0 416 A Secure E-Medical Exemption System (E-MES): Jordan Case Heba N. Kamel, Mohammad A. Alia, Bara'aha. Al Saeq and Eman Abu Maria, Al Zaytoonah University of Jordan, Jordan 0 Volume 9, Number 3, May 2017 417 A Conceptual Secure Blockchain Based Electronic Voting System Ahmed Ben Ayed, Colorado Technical University, USA 0 418 Enhancing Cyber Security of Online Accounts via A Novel Protocol and New Techniques Mehrdad Nourai and Haim Levkowitz, University of Massachusetts Lowell, USA 0
  • 40. Projected citation counts in 2020 for International Journal of Network Security & Its Applications (IJNSA) Calendar Year (A): # Papers published per year (B): Total # citations (as of Oct. 2016) (C): Median # of citations per paper (D): Average # citations per paper per year (E): Projected total # citations in 2020 2009 24 478 9 2.5 717 2010 53 647 7 1.7 1012 2011 90 1063 5.5 2 1770 2012 77 724 3 1.9 1305 2013 80 305 2 1 608 2014 37 545 2 5 1274 2015 24 74 1 1.5 222 2016 26 21 0 0.8 105