International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks.
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
IJNSA Citation Details (2009 - 2016)
1. International Journal of Network Security & Its Applications
(IJNSA)
ISSN : 0974 - 9330 (Online); 0975 – 2307 (Print)
http://airccse.org/journal/ijnsa.html
2. SCOPE OF THE JOURNAL
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open
access peer-reviewed journal that publishes articles which contribute new results in all areas of the
computer Network Security & its applications. The journal focuses on all technical and practical
aspects of security and its applications for wired and wireless networks. The goal of this journal is
to bring together researchers and practitioners from academia and industry to focus on
understanding Modern security threats and countermeasures, and establishing new collaborations in
these areas.
Topics of Interest
Network and Wireless Network Security
Mobile, Ad Hoc and Sensor Network Security
Peer-to-Peer Network Security
Database and System Security
Intrusion Detection and Prevention
Internet Security & Applications
Security & Network Management
E-mail security, Spam, Phishing, E-mail fraud
Virus, worms, Trojon Protection
Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
Ubiquitous Computing Security
Web 2.0 security
Cryptographic protocols
Performance Evaluations of Protocols & Security Application
http://airccse.org/journal/ijnsa.html
3. Members of the Editorial Board
Editor In Chief:
Jae-Kwang Lee, Hannam University, South Korea
Associate Editor
Dhinaharan Nagamalai, KTO Karatay University, Turkey
Editorial Board
A.K. Vatsa, Shobhit University, India
Abdul Kadir Ozcan, The American university, Cyprus
Alireza Nemaney Pour, Islamic Azad University of Abhar, Iran
Anas Abou El Kalam, UCA/ENSA of Marrakesh, Morocco
Annamma Abraham, B M S Institute of Technology, India
Asadollah Shahbahrami, University of Guilan, Iran
Ashok Kumar Das, International Institute of Information Technology, India
Belhamri Azeddine, Universite Mentori, Algerie
Boo-Hyung Lee, KongJu National University, South Korea
Carlos E. Otero, The University of Virginia's College at Wise, USA
Ching-Hsien Hsu, Chung Hua University, Taiwan
Denivaldo Lopes, Federal University of Maranhao, Brazil
Dhinaharan Nagamalai, Wireilla Net Solutions PTY LTD, Australia
Gurdev Singh, Adesh Institute of Engineering & Technology, India
Hani H. Qusa, University College of Applied Sciences, Palestine
Henrique Joao Lopes Domingos, New University of Lisbon, Portugal
Hossain Shahriar, Kennesaw State University, USA
Ihab A. Ali, Helwan University, Egypt
Isaac Agudo, University of Malaga, Spain
Ismael Etxeberria-Agiriano, University of the Basque Country, Spain
Jaydip Sen, Tata Consultancy Services, India
Jeong-Hyun Park, Electronics Telecommunication Research Institute, South Korea
Jose Enrique Armendariz-Inigo, Universidad Publica de Navarra, Spain
Jungwook Song, Konkuk University, South Korea
M Rajarajan, City University, United Kingdom
M. B. Ghaznavi-Ghoushchi, Shahed University, Iran
http://airccse.org/journal/ijnsa.html
4. Editorial Board
Madhan KS, Infosys Technologies Limited, India.
Madhavi Latha, Jawaharlal Nehru Technological University, India
Mahdi Aiash, Middlesex University, London - United Kingdom
Manabu Okamoto, Kanagawa Institute of Technology, Japan
Marc Rader, Capella University, USA
Marjan Gusev, Univ. Sts Cyril and Methodius, Macedoni
Mina Rahbari, Islamic Azad University, Iran
Mohammad A. Alia, Al Zaytoonah University of Jordan, Jordan
Mohammad Ali Jabreil Jamali, Islamic Azad University, Iran
Mohammad Momani, University of technology Sydney, Australia
Mritunjay Rai, Indian Institute of Information Technology and Management, India
Narendra Kr Pareek, Mohanlal Sukhadia University, India
Natarajan Meghanathan, Jackson State University, USA
R.Ramesh, Anna University, India
Raja Kumar M, Universiti Sains Malaysia, Malaysia
Ram Kumar Singh, Swami Vivekanand Subharti University, India
S. K. Ghosh, Indian Institute of Technology, India
Saad M. Darwish, Alexandria University, Egypt
Salman Abdul Moiz, Centre for Development of Advanced Computing, India
Sarah M. North, Kennesaw State University, USA
Santosh Biswas, Indian Institute of Technology Guwahati, India
Shekoofeh Ghiam, Sharif University of Technology, Iran
Sherif S. Rashad, Morehead State University, USA
Susantha Herath, St. Cloud State University, USA
Talal Mousa Alkharobi, King Fahd University of Petroleum & Minerals, Saudi Arabia
V. Lakshmi Narasimhan, East Carolina University, USA
William R Simpson, The Institute for Defense Analyses, USA
Xiaohong Yuan, North Carolina A&T State University, USA
Yasir Arfat Malkani, University of Sindh, Pakistan
Yeong Deok Kim, WooSong University , South Korea
Zakaria Saleh, Yarmouk University, Jordan
Roka Imareef, University of Sabha, Libya
Nameer Emam, Philadelphia University, Jordan
Asimi Ahmed, Ibn Zohr University, Morocco
Hasan Alsakran, King Saud University, Saudi Arabia
http://airccse.org/journal/ijnsa.html
5. Paper Submission & Manuscript preparation Guide
Authors are invited to submit papers for this journal through E-mail ijnsa@airccse.org.
Submissions must be original and should not have been published previously or be under
consideration for publication while being evaluated for this Journal. For paper format
download the template in this page
Manuscript Template
Review Process
Submissions are accepted for review with the understanding that the same work has been
neither submitted to, nor published in, another publication. Simultaneous submission to other
publications will result in immediate rejection of the paper. Papers are not within the journal
scope will be rejected immediately after the pre review process.
All manuscripts will be subject to a well established, fair, unbiased peer review and refereeing
procedure, and are considered on the basis of their significance, novelty and usefulness to the
Journals readership. The reviewing structure will always ensure the anonymity of the referees
& it will be reviewed by 3 experts in the field. The review output will be one of the following
decisions:
1. Accept
2. Accept with minor changes
3. Weak Accept with major changes
4. Reject
The review process may take approximately two to three months to be completed. The Editor
reserves the right to reject a paper if it does not meet the aims and scope of the journal and if
it is not revised as per instructions.
Copy right form
After submitting final manuscript, you can get copy right form from AIRCC secretary
Publication charges: 120 USD (Maximum 20 pages)
Publication Frequency - Bi Monthly
January, March, May, July, September, November
Special Issue Proposal
IJNSA invite proposals for special issues on topics that fall within the scope of this journal.
You can send your proposal directly to editor in chief & secretary, AIRCC by email
Contact Us
Here's where you can reach us : ijnsa@airccse.org
http://airccse.org/journal/ijnsa.html
6. Volume 1, Number 1, April 2009
S.No Paper Title Citation
1
Using Rough Set and Support Vector Machine for Network Intrusion Detection
Rung-Ching Chen, Kai-Fan Cheng and Chia-Fen Hsieh, Chaoyang University of
Technology,Taiwan, R.O.C
97
2
Tools and Techniques for Network Forensics
Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore Jackson State
University,USA
51
3
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its
Modified Version using Digital Images
Krishnamurthy G N, Dr. V Ramaswamy,Bapuji Institute of Engineering &
Technology, India
19
4
A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of
Simplified Data Encryption Standard Algorithm
Poonam Garg,Institute of Management Technology, India
73
5
A New Cluster - Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc
Networks
Debdutta Barman Roy,Rituparna Chaki,Nabendu Chaki,Calcutta Institute of
Engineering and Management, India, West Bengal University of Technology,India,
University of Calcutta,India
84
Volume 1, Number 2, July 2009
6
Iterative method for improvement of coding and decryption
Natasa Zivic, Institute for Data Communication Systems, University of
Siegen,Germany
04
7
Tools A new key establishment Scheme for wireless sensor networks
Eric Ke Wang, Lucas C.K.Hui and S.M.Yiu, Department of Computer Science, The
University of Hong Kong, Hong Kong
04
8
Dynamic IDP signature processing by fast elimination using DFA
Mohammed Misbahuddin, Sachin Narayanan and Bishwa Ranjan Ghosh,Computer
Networks & Internet Engineering
Division, Centre for Development of Advanced Computing, Bangalore, India
03
9
Effect of inter packet delay in performance analysis of coexistence heterogeneous wireless
packet networks
G.M.Tamilselvan and A.Shanmugam,Bannariamman Institute of
Technology,Tamilnadu, India
09
10
Clustered Hierarchy in Sensor Networks: Performance and Security
Mohammed Abuhelaleh, Khaled Elleithy and Thabet Mismar, School of Engineering,
University of Bridgeport USA
01
7. 11
Quantum Three-Pass Protocol: Key Distribution using Quantum Superposition States
Yoshito Kanamori1
and Seong-Moo Yoo 2
, 1
University of Alaska Anchorage, Alaska,
USA, 2
The University of Alabama
in Huntsville, Alabama, USA
06
12
Intelligent Intrusion Detection System Framework Using Mobile Agents
N.Jaisankar, R.Saravanan and K. Durai Swamy, School of Computing Sciences, VIT
University, India
19
13
On Generation of Firewall Log Status Reporter (SRr) Using Perl
Sugam Sharma1
, Hari Cohly2
, and Tzusheng Pei2
, 1
Iowa State University,
USA, 2
Jackson State University, USA
09
14
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and
Integration
Alan Mink, Sheila Frankel and Ray Perlner, National Institute of Standards and
Technology (NIST), USA
27
Volume 1, Number 3, October 2009
15
Integrating Identity-Based Cryptography in IMS Service Authentication
Mohamed Abid1
, Songbo Song2
, Hassnaa Moustafa2
and Hossam Afifi1
, 1
Telecom &
Management SudParis ,Evry, France
07
16
Agent Based Trust Management Model Based on Weight Value Model for Online Auctions
E.Sathiyamoorthy, N.Ch.Sriman Narayana Iyenger & V.Ramachandran, VIT
University,INDIA.
09
17
Cryptanalysis of a more efficient and secure Dynamic ID-Based Remote User Authentication
Scheme
Mohammed Aijaz Ahmed1
, D. Rajya Lakshmi2
and Sayed Abdul Sattar3
, GITAM
University, India
17
18
PSIM: A Tool for Analysis of Device Pairing Methods
Yasir Arfat Malkani and Lachhman Das Dhomeja, University of Sussex, Brighton, UK
05
19
Data Security in Mobile Devices by GEO Locking
M Prabu Kumar and K Praneesh Kumar Yadav, VIT University, India
04
20
Performance Evaluation of a New Route Optimization Technique for Mobile IP
Moheb r. Girgis, Tarek m. Mahmoud,Youssef s. Takroni and hassan s. Hassan,Minia
University, Egypt
01
21
Security Properties in an Open Peer-to-Peer Network
Jean-Francois Lalande, David Rodriguez, Christian Toinard,Laboratoire
DInformatique Fondamentale DOrleans, Universite, DOrleans, Ensi de Bourges,
France
03
22
A Security Framework for SOA Applications in Mobile Environment
Zair Abdelouahab,Federal University of Maranhao, CCET/DEEE Av. Dos
portugueses, Campus do Bacanga, Sao Luis, Brazil
15
8. 23
Securing AODV for MANETs using Message Digest with Secret Key
Kamaljit Lakhtaria,Bhaskar N. Patel, Satish G. Prajapati,N. N. Jani, Atmiya Institute
of Technology & Science, India
08
24
Application Specific Usage control Implementation Verification
Rajkumar P.V, S.K.Ghosh and Pallab Dasgupta Indian Institute of Technology-
Kharagpur, India
03
Volume 2, Number 1, January 2010
25
Dynamic Neural Networks in the Detection of Distributed Attacks in Mobile Ad-Hoc
Networks
James Cannady, Nova Southeastern University, USA
09
26
A Frame Work for Ontological Privacy Preserved Mining
Geetha Mary. A and Sriman Narayana Iyengar. N.Ch, VIT University, India.
08
27
Workload Characterization of Spam Email Filtering Systems
Yan Luo, University of Massachusetts Lowell, USA
07
28
Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video
Cover Media
Natarajan Meghanathan and Lopamudra Nayak, Jackson State University, USA
61
29
Weakness on Cryptographic Schemes Based on Regular LDPC Codes
Omessaad Hamdi1
, Manel abdelhedi2
, Ammar Bouallegue2
and Sami
Harari3
, 1
SYSTEL, SUPCOM, Tunisia, 2
SYSCOM, ENIT, Tunisia and 3
SIS, USTV,
France.
00
30
Advanced Security Management in Metro Ethernet Networks
Ammar Rayes, Cisco Systems, USA
0
31
Combining Private and Public Key Encryption Techniques for Providing Extreme Secure
Environment for an Academic Institution Application
1
Syed S. Rizvi, 2
Aasia Riasat and 3
Khaled M. Elleithy, 1,3
University of Bridgeport, USA
and 2
Institute of Business Management, Pakistan.
07
32
Pledge: A Policy-Based Security Protocol for Protecting Content Addressable Storage
Architectures
Wassim Itani, Ayman Kayssi and Ali Chehab,American University of Beirut, Lebanon
01
Volume 2, Number 2, April 2010
33
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
Rajesh P Singh, Anupam Saikia and B. K. Sarma, Indian Institute of Technology,
Guwahati, India
05
34
Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection
Dewan Md. Farid1
, Nouria Harbi1
, and Mohammad Zahidur Rahman2
, 1
University
Lumiere Lyon 2 - France and 2
Jahangirnagar University, Bangladesh
96
9. 35
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Eslam Gamal Ahmed, Eman Shaaban and Mohamed Hashem, Ain Shams University,
EGYPT
24
36
Fuzzy Aided Application Layer Semantic Intrusion Detection System – FASIDS
S.Sangeetha1
& V.Vaidehi2
, 1
Angel College of Engineering, India and 2
Madras Institute
of Technology, India
07
37
Events Classification in Log Audit
Sabah Al-Fedaghi and Fahad Mahdi, Kuwait University, Kuwait
07
38
Analysis of the Security of BB84 by Model Checking
Mohamed Elboukhari1
, Mostafa Azizi2
and Abdelmalek Azizi13
, 1
FSO, University
Mohamed Ist, Morocco, 2
ESTO, University Mohamed Ist,Morocco and 3
Academy
Hassan II of Sciences & Technology, Morocco
14
39
Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor
Mohsen Machhout1
, Zied Guitouni1
, Kholdoun Torki2
, Lazhar Khriji3
and Rached
Tourki1
, 1
Faculty of Sciences of Monastir,
Tunisia, 2
TIMA - CMP Laboratory, France and 3
Sultane Qaboos University, Oman
15
40
Impersonation Attack on EKE Protocol
Shirisha Tallapally , Vaagdevi College of Engineering, India
03
41
A Light-Weight Mutual Authentication and Key-Exchange Protocol Based on Elliptical
Curve Cryptogaphy for Energy -Constrained Devices
Kin Choong Yow and Amol Dabholkar, Nanyang Technological University,Singapore
04
42
Trust Based Content Distribution for Peer-To-Peer Overlay Networks
S.Ayyasamy1
and S.N. Sivanandam2
, 1
Tamilnadu College of Engineering, India
and 2
PSG College of Technology, India
06
43
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in MANET
T.V.P.Sundararajan and A.Shanmugam,Bannari Amman Institute of Technology,
Sathyamangalam,India
26
44
Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2)
Ulrich Herberg and Thomas Clausen,Ecole Polytechnique, France
24
Volume 2, Number 3, July 2010
45
A Novel Web-based Approach for Balancing Usability and Security Requirements of Text
Passwords
Dhananjay Kulkarni, Boston University, USA.
02
46
Cross-Layer Resource Allocation Scheme Under Heterogeneous Constranits For Next
Generation High Rate WPAN
Ayman Khalil, Matthieu Crussiere and Jean-Francois Helard, Institute of Electronics
and Telecommunications of Rennes
(IETR), France.
12
47
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Chang N. Zhang, Qian Yu and Xiao Wei Liu, University of Regina, Canada.
0
10. 48
Design And Implementation Of a Trust-Aware Routing Protocol For Large WSNs
Theodore Zahariadis1
, Helen Leligou1
, Panagiotis Karkazis4
,Panagiotis Trakadas2
,
Ioannis Papaefstathiou4
,Charalambos Vangelatos3
and Lionel Besson4
, 1
Technological
Educational Institute of Chalkis, Greece, 2
Hellenic Authority for
Communications Security and Privacy (ADAE), Greece, 3
Hellenic Aerospace Industry
S.A., Greece, Thales Communications, France and 4
Technical University of Crete,
Greece.
46
49
Investigating & Improving The Reliability And Repeatability Of Keystorke Dynamics
Timers
Pavaday Narainsamy,Soyjaudah Sunjiv and Nugessur Shrikaant, University of
Mauritius.
05
50
Improving TLS Security By Quantum Cryptography
Mohamed Elboukhari1
, Mostafa Azizi2
and Abdelmalek Azizi3
, 1
FSO, University
Mohamed Ist, Morocco, 2
ESTO, University Mohamed Ist,Morocco and 3
Academy
Hassan II of Sciences & Technology, Morocco.
05
51
Hierarchical Design Based Intrusion Detection System For Wireless Ad Hoc Sensor Network
Mohammad Saiful Islam Mamun1
and A.F.M. Sultanul Kabir2
, 1
Stamford University,
Bangladesh and 2
American International University, Bangladesh.
43
52
Byzantine Behaviour (B2) - Mitigating Midway Multicast Misbehaviour (M4) In Adhoc
Network
S. Albert Raebra1
and S. Vijayalakshmi2
, 1
St.Josephs College, Bharathidasan
University, India and 2
Pondicherry University, India
01
53
An Efficient IP Traceback Through Packet Marking Algorithm
Y.Bhavani and P.Niranjan Reddy, Kakatiya Institute of Technology and Science,India.
08
54
Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security
Applications in Constrained Network Environment
K R Chandrasekhara Pillai1
and M P Sebastian2
,1
N S S College of Engineering,India
and ²Indian Institute of Management, India
08
55
Wireless Security Measurement Using Data Value Index
Reza Amirpoor, ¹Ajay Kumar ² and Satish R. Deavne ³,¹Bharati Vidyapeeth
University,India, ²JSPMs JAYAWANT Institute of Computer Applications,India
and ³DR.D. Y. Patil Ramrao Adik Institute of Technology, India.
0
56
An Efficient M-ARY QIM Data Hiding Algorithm For The Application To Image Error
Concealment
Amit Phadikar¹ and Santi P. Maity ², ¹MCKV Institute of Engineering,India
and ²Bengal Engineering and Science University, India
0
57
Pattern Analysis and Signature Extraction For Intrusion Attacks On Web Services
Urjita Thakar¹, Nirmal Dagdee² and Sudarshan Varma³, ¹Shri G.S. Institute of
Technology and Science,India, ²S.D. Bansal College of Technology,India and ³Ideavate
Solutions, USA.
15
Volume 2, Number 4, October 2010
58
A Multi-Criteria Evaluation of Information Security Controls Using Boolean Features
Angel R. Otero¹, Carlos E. Otero² and Abrar Qureshi², ¹Nova Southeastern University,
USA and ²University of Virginia's
College at Wise, USA
20
11. 59
Securing Data Transfer in the Cloud Through Introducing Identification Packet and UDT-
Authentication Option FIeld:A Characterization
Danilo Valeros Bernardo and Doan B Hoang, The University of Technology- Sydney,
Australia
06
60
Efficient Digital Encryption Algorithm Based on Matrix Scrambling Technique
M. Kiran Kumar¹, S. Mukthyar Azam¹ and Shaik Rasool², ¹R.V.R & J.C College of
Engg, India and ²S.C.E.T, India
31
61
Verification of Quantum Cryptography Protocols by Model Checking
Mohamed Elboukhari¹, Mostafa Azizi² and Abdelmalek Azizi¹,¹
, ¹FSO, University
Mohamed Ist, Morocco, ²ESTO, University
Mohamed Ist, Morocco and ³Academy Hassan II of Sciences & Technology, Morocco
02
62
Evaluating Galois Counter Mode in Link Layer Security Architecture for Wireless Sensor
Networks
Vivaksha Jariwala¹ and D. C. Jinwala², ¹C. K. Pithawalla College of Engineering and
Technology, India and ²S. V. National Institute of Technology, India
03
63
Security in Wireless Sensor Networks: Key Management Module in SOOAWSN
Mohammed A. Abuhelaleh and Khaled M. Elleithy, University Of Bridgeport, USA
26
64
Effect of Hash Function on Performance of Low Power Wake up Receiver for Wireless
Sensor Network
Vikas Kumar¹ and Rajender Kumar², NIT- kurukshetra, India
00
65
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping
Nodes in a Mobile Ad Hoc Network
Jaydip Sen, Tata Consultancy Services Ltd - Kolkata, India
14
66
Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme with Session
Key Agreement for Multi-Server Environment
Rafael Martinez-Pelaez¹,²
, Francisco Rico-Novella¹, Cristina Satizabal2
and Jacek
Pomykala³, ¹Technical University of Catalonia, Spain, ²Universidad de la Sierra Sur,
Mexico and ³Warsaw University, Poland
05
67
A (2,N) Visual Cryptographic Technique for Banking Applications
Jayanta Kumar Pal¹, J. K. Mandal² and Kousik Dasgupta¹, ¹Kalyani Government
Engineering College, India and ²University of Kalyani, India
13
68
Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents
Mueen Uddin¹, Kamran Khowaja² and Azizah Abdul Rehman¹, ¹UTM, Malaysia
and 2
Isra University, Pakistan
24
69
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
Emmanouil A. Panaousis, George Drew, Grant P. Millar, Tipu A. Ramrekha and
Christos Politis, Kingston University - London, United Kingdom
07
70
Lightweight C&C based botnet detection using Aho-Corasick NFA
Udhayan J¹, Anitha R² and Hamsapriya T², ¹Karunya University, India and ²PSG
College of Technology, India
06
12. 71
Emergency Response Communications and Associated Security Challenges
Muhammad Ibrahim Channa and Kazi M. Ahmed, Asian Institute of Technology,
Thailand
10
72
A Formal Verification Framework for Security Policy Management in Mobile IP Based
WLAN
Soumya Maity, P Bera, S K Ghosh and Pallab Dasgupta, Indian Institute of Technology
- Kharagpur, India
02
73
Effective Voice Calls Admission for Authorized User in Inter VOIP Network
Subashri T and Vaidehi V, Anna University - Chennai, India 0
74
ADRISYA: A Flow Based Anomaly Detection System for Slow and Fast Scan
Muraleedharan N and Arun Parmar, Centre for Development of Advanced Computing
(C-DAC), India
04
75
Improving the Reliability of Detection of LSB Replacement Steganography
Shreelekshmi R¹, Wilscy M² and C E Veni Madhavan³, ¹College of Engineering -
Trivandrum, India, ²University of Kerala, India and ³Indian Institute of Science, India
0
76
Zero Data Remnance Proof in Cloud Storage
Mithun Paul and Ashutosh Saxena, Infosys Technologies Ltd - Hyderabad, India
3
77
Bayesian Based Comment Spam Defending Tool
Dhinaharan Nagamalai¹, Beatrice Cynthia Dhinakaran² and Jae Kwang Lee², ¹Wireilla
Net Solutions, Australia and ²Hannam University, South Korea
2
Volume 3, Number 1, January 2011
78
Virtual Machines And Networks - Installation, Performance, Study, Advantages And
Virtualization Options
Ishtiaq Ali and Natarajan Meghanathan, Jackson State University, USA
19
79
Comparison Process Long Execution Between PQ Algorthm And New Fuzzy Logic
Algorithm For VOIP
Suardinata, Kamalrulnizam bin Abu Bakar and Nimitr Suanmali, University
Teknologi Malaysia, Malaysia
01
80
An Ov erview Of The Security Concerns In Enterprise Cloud Computing
Anthony Bisong¹ and Syed (Shawon) M. Rahman², ¹Capella University,USA
and ²University of Hawaii-Hilo, USA
182
81
A Human-Centric Approach To Group-Based Context-Awareness
Nasser Ghadiri, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee and Mohammad
A. Nematbakhsh, University of Isfahan,
Iran
08
13. 82
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas
Sector
Iwendi, C. O and Allen, A. R. , University of Aberdeen, Scotland, UK
14
83
Failure of A Mix Network
Kun Peng, Institute for Infocomm Research, Singapore
03
84
Analysis of Web Logs And Web User In Web Mining
L.K. Joshila Grace¹, V.Maheswari¹ and Dhinaharan Nagamalai², ¹Sathyabama
University, India and ²Wireilla Net Solutions PTY Ltd, Australia
96
Volume 3, Number 2, March 2011
85
A Light Weight Protocol To Provide Location Privacy In Wireless Body Area Networks
Mohammed Mana¹, Mohammed Feham¹ and Boucif Amar Bensaber², ¹University of
Tlemcen, Algeria and²Universite du Quebec a Trois-Rivieres, Canada
11
86
Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication
Scheme Using Smart Cards
Ashok Kumar Das, International Institute of Information Technology - Hyderabad,
India
18
87
Digital Watermarking through Embedding of Encrypted and Arithmetically Compressed
Data into Image using Variable Length Key
Sabyasachi Samanta¹, Saurabh Dutta² and Goutam Sanyal³, ¹Haldia Institute of
Technology, India, ²Dr. B. C. Roy Engineering College - Durgapur, India and ³National
Institute of Technology - Durgapur, India
02
88
The Key Exchange Cryptosystem Used With Higher Order Diophantine Equations
Harry Yosh, HECO Ltd - Canberra, Australia
08
89
Design And Efficient Deployment Of Honeypot And Dynamic Rule Based Live Network
Intrusion Collaborative System
Renuka Prasad.B¹, Annamma Abraham², Abhas Abhinav³, Sunil.V.Gurlahosur⁴⁴⁴⁴ and
Srinivasa Y⁴⁴⁴⁴, ¹R.V.College of Engineering, India, ²BMSIT - Bengaluru,
India, ³DeepRootLinux Pvt Ltd, India, ⁴⁴⁴⁴SIT - Tumkur, India
01
90
Confidentiality & Authentication Mechanism for Biometric Information Transmitted over
Low Bandwidth & Unreliable channel
Raju Singh and A.K.Vatsa, Shobhit University, India.
06
91
Investigating the Combination of Text and Graphical Passwords for a more secure and usable
experience
C Singh, L Singh and E Marks, University of Guyana
09
92
Uncoercibility In E-Voting And E-Auctioning Mechanisms Using Deniable Encryption
Jaydeep Howlader, Vivek Nair, Saikat Basu and A. K. Mal, National Institute of
Technology - Durgapur, India
07
93
A Novel Data Encryption Technique By Genetic Crossover Of Robust Biometric Key And
Session Based Password
Tanmay Bhattacharya¹, Sirshendu Hore², Ayan Mukherjee³ and S. R. Bhadra
Chaudhuri⁴⁴⁴⁴, ¹JIS College Engineering, India, ²Hooghly Engineering & Technology
College, India, ³Institute of Science & Technology, India and ⁴⁴⁴⁴Bengal Engineering
& Science University, India
02
14. 94
Replication Attack Mitigations for Static And Mobile WSN
V.Manjula and C.Chellappan, Anna University - Chennai, India
19
95
Stage Staffing Scheme for Copyright Protection In Multimedia
Sumit Kumar, Santosh Kumar and Sukumar Nandi, Indian Institute of Technology -
Guwahati, India
0
96
Substitution-diffusion based Image Cipher
Narendra K Pareek¹, Vinod Patidar² and Krishan K Sud², ¹M L Sukhadia University -
Udaipur, India and ²Sir Padampat Singhania University, India
14
97
A Robust Mechanism For Defending Distributed Denial Of Service Attacks On Web Servers
Jaydip Sen, Innovation Lab, Tata Consultancy Services Ltd.,- Kolkata, India
12
98
Image Encryption Based On Diffusion And Multiple Chaotic Maps
G.A.Sathishkumar¹, K.Bhoopathy bagan² and N.Sriraam³, ¹Sri Venkateswara College
of Engineering, India, ²Madras Institute of Technology, India and ³SSN College of
Engineering, India
35
99
A QoS Based MAC Protocol For Wireless Ad-hoc Network
Vandana khare¹, D.SrinivasRao² and Y.Madhavee Latha³, ¹CMEC - Hyd,
India, ²JNTUH - Hyd, India and ³MRECW - Hyd, India
0
Volume 3, Number 3, May 2011
100
System Dynamics Based Insider Threats Modeling
Sang-Chin Yang and Yi-Lu Wang, National Defense University, Republic of China
08
101
Countermeasure Tool - Carapace for Network Security
Anand Bisen, Shrinivas Karwa and B.B. Meshram, Veermata Jijabai Technological
Institute, India
01
102
On Design of PUF-Based Random Number Generators
Mehdi Ayat¹, Reza Ebrahimi Atani² and Sattar Mirzakuchaki¹, ¹Iran University of
Science and Technology, Iran and ²The University of Guilan, Iran
03
103
Credential Based Mediator Architecture for Access Control and Data Integration in Multiple
Data Sources Environment
Nirmal Dagdee and Ruchi Vijaywargiya, S.D. Bansal College Of Technology, India
05
104
Data Security Using Private Key Encryption System Based on Arithmetic Coding
Ajit Singh and Rimple Gilhotra, BPS Mahila Vishwavidyalaya, India
28
105
PKI in Government Identity Management Systems
Ali M. Al-Khouri, Emirates Identity Authority, United Arab Emirates
10
106
Maintaining Uniform Density and Minimizing the Chance of Error in a Large Scale WSN
Asis Kumar Tripathy, Shradhananda Beura, Muralidhar Behera and Gunanidhi
Pradhan, NM Institute of Engineering and Technology, India
00
15. 107
Authentication Schemes for Session Passwords Using Color and Images
M Sreelatha¹, M Shashi², M Anirudh¹, Md Sultan Ahamer¹ and V Manoj
Kumar¹, ¹RVR & JC College of Engineering, India
and ²Andhra University College of Engineering, India
50
108
Transformation from Identity Stone Age to Digital Identity
Mohit Kohli, Rolta Technology Limited (RIL), India 02
109
Enterprise Delegation for Service Based Systems
Coimbatore Chandersekaran¹ and William R. Simpson², ¹The Secretary of the Air
Force, USA and ²The Institute for Defense Analyses, USA
0
110
An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its
Verification
Ferdous A Barbhuiya, Santosh Biswas and Sukumar Nandi, Indian Institute of
Technology - Guwahati, India
04
111
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
S.A.Arunmozhi and Y.Venkataramani, Saranathan College of Engineering, India
40
112
TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for
MANET
Ahmed M. Abd El-Haleem and Ihab A. Ali, Helwan University, Egypt 04
Volume 3, Number 4, July 2011
113
Novel Hybrid Intrusion Detection System For Clustered Wireless Sensor Network
Hichem Sedjelmaci and Mohamed Feham, Abou Bakr Belkaid University - Tlemcen,
Algeria
32
114
Wavelet Thresholding Approach For Image Denoising
Pankaj Hedaoo and Swati S Godbole, G. H. Raisoni College of Engineering, Nagpur,
India.
44
115
Architecture Of A Identity Based Firewall System
Nenad Stojanovski¹ and Marjan Gusev², ¹Makedonski Telekom AD, Orce Nikolov BB,
1000 Skopje, Macedonia and ²Ss. Cyril and Methodius University, Macedonia
07
116
Cryptovirology: Virus Approach
Shivale Saurabh Anandrao, Vishwakarma Institute Of Information Technology - Pune,
India
02
117
Security Apprehensions In Different Regions Of Cloud Captious Grounds
Gurdev Singh¹ Amit Sharma¹ and Manpreet Singh Lehal², ¹Eternal University, HP
India and ²Lyallpur Khalsa College, India
15
16. 118
A Novel Header Matching Algorithm For Intrusion Detection Systems
Mohammad A. Alia¹, Adnan A. Hnaif¹, Hayam K. Al-Anie¹, Khulood Abu Maria¹,
Ahmed M. Manasrah² and M. Imran Sarwar³, ¹Al Zaytoonah University, Jordan, ²Al
Yarmouk University, Jordon and ³Universiti Sains Malaysia, Malaysia
01
119
A Novel Scheme For Deviation Detection In Asynchronous Distributed Pricing
S.S. Prasad, Rithika Baruah and Siddharth.A, National Institute of Technology,
Jamshedpur, India
0
120
E-Voting Protocol Based On Public-Key Cryptography
Hayam K. Al-Anie, Mohammad A. Alia and Adnan A. Hnaif, Al Zaytoonah University,
Jordan
12
121
Optimizing And Analysing The Effectiveness Of Security Hardening Measures Using
Various Optimization Techniques as Well as Network Management Models Giving Special
Emphasis To Attack Tree Model
Prabhat Kumar Vishwakarma, University of Gondar, Ethiopia
01
122
Governing Information Security In Conjunction With Cobit And Iso 27001
Tolga Mataracioglu¹ and Sevgi Ozkan², ¹TUBITAK National Research Institute of
Electronics and Cryptology (UEKAE), Turkey and ²Middle East Technical University,
Turkey
17
123
An Evaluation Of Fingerprint Security Using Noninvertible Biohash
N.Radha¹ and S.Karthikeyan², ¹Karpagam University, India and ²College of Applied
Sciences, Sultanate of Oman
15
124
RTOS Based Secure Shortest Path Routing Algorithm In Mobile Ad- Hoc Networks
R. Ramesh and S. Gayathri, Anna University, India
02
125
An Approach To Provide Security In Mobile Ad-Hoc Networks Using Counter Mode Of
Encryption On Mac Layer
Gulshan Kumar and Mritunjay Rai, Lovely Professional University, Jalandhar, India.
02
126
An Ancient Indian Board Game as a Tool for Authentication
Sreelatha Malempati¹ and Shashi Mogalla², ¹RVR & JC College of Engineering,
Guntur, A.P and ²Andhra University
College of Engineering, Visakhapatnam, A.P
03
127
Ensemble of Blowfish With Chaos Based S Box Design For Text And Image Encryption
Jeyamala Chandrasekaran¹ Subramanyan B¹ and Raman G.S², ¹Thiagarajar College of
Engineering, Madurai and ²KLN College of Information Technology, Madurai
09
Volume 3, Number 5, September 2011
128
Information Security Synthesis in Online Universities
Maria Schuett, Crisc and Syed (Shawon) M. Rahman, Capella University, USA
10
129
A Multiple Ballots Election Scheme Using Anonymous Distribution
Manabu Okamoto, Kanagawa Institute of Technology, Japan
01
17. 130
Enhanced Secure Algorithm for Message Communication
Shaik Rasool, G. Sridhar, K. Hemanth Kumar and P. Ravi Kumar, S.C.E.T., India
01
131
Design & Implementation of Secure AODV in Multicast Routing to Detect DDOS Attack
Vikram Singh and Vatika, Chaudhary Devi Lal University, India
0
132
An ISP Based Notification and Detection System to Maximize Efficiency of Client
Honeypots in Protection of End Users
Masood Mansoori and Ray Hunt, University of Canterbury, New Zealand
0
133
Simulation of the Combined Method
Ilya Levin and Victor Yakovlev, State University of Telecommunication, Russia
00
134
Prevention of Wormhole Attack in Wireless Sensor Network
Dhara Buch¹ and Devesh Jinwala², ¹Government Engineering College Rajkot, India
and ²S.V. National Institute of Technology, India
19
135
DDNFS: A Distributed Digital Notary File System
Alexander Zanger, Bond University, Australia
00
136
Method for reducing of noise by improving Signal-to-Noise-Ratio in wireless LAN
R.Seshadri¹ and N. Penchalaiah², ¹S.V.University, India and ²ASCET, India
00
137
Handwritten Text Image Authentication Using Back Propagation
A S N Chakravarthy¹, Penmetsa V Krishna Raja² and P S Avadhani³, ¹Sri Aditya
Engineering College, India, ²JNTUK, India and ³Andhra University, India
04
138
A Hierarchical Intrusion Detection Architecture for Wireless Sensor Networks
Hossein Jadidoleslamy, The University of Guilan, Iran
18
139
BSK-WBSN: BioMetric Symmetric Keys tO Secure Wireless Body Sensors Networks
Mesmoudi Samira and Feham Mohammed, University of Tlemcen, Algeria
17
140
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent
Chintan Bhatt, Asha Koshti, Hemant Agrawal, Zakiya Malek and Bhushan Trivedi,
GLS Institute of Computer Technology, India
04
141
Botnet Command Detection using Virtual Honeynet
J.S.Bhatia, R.K.Sehgal and Sanjeev Kumar, CDAC Mohali, India
12
142
CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN
spoofing attack
L.Kavisankar and C.Chellappan, Anna University, India
06
143
Assured Full Communication by Merging BlocksRandomly in Wireless Sensor Networks
usingReed Solomon Code for Key Predistribution
Pinaki Sarkar¹ and Aritra Dhar², ¹Jadavpur University, India and ²Gurunanak
Institute of Technology, India
01
18. 144
Trust Enhanced Data Security in Free Roaming Mobile agents using Symmetric Key
cryptography
G.Geetha¹ and C.Jayakumar², ¹Jerusalem college of Engineering, India and ²RMK
Engineering college, India
04
145
Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication
Mechanism
Preeti Sachan and Pabitra Mohan Khilar, National Institute of Technology Rourkela,
India
16
146
Adaptive Association Rule Mining Based Cross Layer Intrusion Detection System for
MANET
V. Anjana Devi¹ and R. S. Bhuvaneswaran², ¹St. Joseph's College of Engineering, India
and ²Anna University, India
03
147
Error Detection and Correction for Distributed Group Key Agreement Protocol
P.Vijayakumar, S.Bose and A.Kannan, Anna University - Chennai, India
0
Volume 3, Number 6, November 2011
148
Rational Secret Sharing Over an Asynchronous Broadcast Channel With Information
Theoretic Security
William K. Moses Jr. and C. Pandu Rangan, Indian Institute of Technology - Chennai,
India
02
149
An Overview of Penetration Testing
Aileen G. Bacudio¹, Xiaohong Yuan¹, Bei-Tseng Bill Chu² and Monique Jones¹, ¹North
Carolina A&T State University, USA and ²University of North Carolina at Charlotte,
USA
27
150
The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks
Novarun Deb, Manali Chakraborty and Nabendu Chaki, University of Calcutta,
India
0
151
Enhancing Infrastructure Security in Real Estate
Kyle Dees and Syed (Shawon) Rahman, Capella University, USA
09
152
Implementation of Cryptographic Algorithm for GSM and UMTS Systems.
Alpesh R. Sankaliya, V.Mishra and Abhilash Mandloi, Sardar Vallabhbhai National
Institute of Technology, India
07
153
Role of Multiple Encryption in Secure Electronic Transaction
Himanshu Gupta¹ and Vinod Kumar Sharma², ¹Amity University Campus, India
and ²Gurukula Kangri Vishwavidyalaya, India
19
154
Securing IEEE 802.11g WLAN Using Open VPN and its Impact Analysis
Praveen Likhar, Ravi Shankar Yadav and Keshava Rao M, Defence Research and
Development Organisation (DRDO) - Bangalore, India
12
19. 155
Statistical Quality Control Approaches to Network Intrusion Detection
Rohitha Goonatilake¹, Rafic Bachnak¹ and Susantha Herath², ¹Texas A&M
International University, USA and ²St. Cloud State University, USA
02
156
Security Enhanced Key Predistribution Scheme Using Transversal Designs and Reed Muller
Codes for Wireless Sensor Networks
Pinaki Sarkar¹, Amrita Saha² and Samiran Bag³, ¹Jadavpur University, India, ²IIT
Bombay, India and ³Indian Statistical Institute, India
01
157
Scheme of Encryption for Block Ciphers and Multi Code Generation Based on Secret Key
P. Anuradha Kameswari, R. Chaya Kumari and L. Praveen Kumar, Andhra
University, India
00
158
User Authentication using Native Language Passwords
Sreelatha Malempati¹ and Shashi Mogalla², ¹R.V.R. & J.C. College of Engineering,
India and ²Andhra University College of Engineering, India
03
159
Prediction of Malicious Objects in Computer Network and Defense
Hemraj Sainia¹, T. C. Panda² and Minaketan Panda³, ¹Alwar Institute of Engineering
& Technology, India, ²Orissa Engineering College, India and ³SPANCO TELE, India
05
160
Blind Signature Scheme Based on Chebyshev Polynomials
Maheswara Rao Valluri, Salalah College of Technology, Oman
01
161
Efficient Detection of Sybil attack Based on Cryptography in Vanet
Mina Rahbari and Mohammad Ali Jabreil Jamali, Islamic Azad University, Iran
26
162
Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm
Debasis Das and Rajiv Misra, Indian Institute of Technology - Patna, India
20
163
Experimenting with the Novel Approaches in Text Steganography
Shraddha Dulera¹, Devesh Jinwala1 and Aroop Dasgupta², ¹S V National Institute of
Technology, India and ²Bhaskaracharya Institute for Space Applications and Geo-
Informatics, India
10
164
Techniques and Tools for Forensic Investigation of E-mail
M. Tariq Banday, University of Kashmir, India
13
165
Enhanced OneTime Pad Cipher with MoreArithmetic and Logical Operations with Flexible
Key Generation Algorithm
S.G.Srikantaswamy¹ and H.D.Phaneendra², ¹National Institute of Engineering -
Mysore, India and ² CSE NIE - Mysore, India
05
166
An Effective Prevention of Attacks using GI Time Frequency Algorithm under DDoS
K.Kuppusamy¹ and S.Malathi², ¹Alagappa University, India and ²Manonmaniam
Sundaranar University, India
07
167
Securing Mobile Agents in MANET against Attacks using Trust
Chandreyee Chowdhury and Sarmistha Neogy, Jadavpur University, India
03
20. Volume 4, Number 1, January 2012
168
Optimizing One Fair Document Exchange Protocol
Abdullah M. Alaraj, Qassim University, Saudi Arabia
03
169
IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots
K.Munivara Prasad¹, A.Rama Mohan Reddy² and V Jyothsna³, ¹Rayalaseema
University, India, ²SV University, India and ³Sree vidyanikethan Engg.College, India
10
170
Protected Data Objects Replication in Data Grid
G. Aruna Kranthi and D. Shashi Rekha, S.R. Engineering College - Warangal, India
Erratum : Due to a serious case of plagiarism this paper has been retracted.
0
171
Efficient & Secure Data Hiding Using Secret Reference Matrix
Laxman Tawade¹, Rajshree Mahajan² and Chandan Kulthe², ¹Pune University, India
and ²Aditya Engineering College, India
04
172
Risks and Remedies in E-Learning System
Nikhilesh Barik and Sunil Karforma, Burdwan University, India
28
173
Malware Detection Module using Machine Learning Algorithms to Assist in Centralized
Security in Enterprise Networks
Priyank Singhal and Nataasha Raul, Sardar Patel Institute of Technology - University
of Mumbai, India
19
174
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc
Network
G.Padmavathi, P.Subashini and D.Devi Aruna, Avinashiligam University for Women,
India
03
175
Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks
Sridhar Subramanian¹ and Baskaran Ramachandran², ¹Easwari Engineering College -
Chennai, India and ²Anna University - Chennai, India
18
176
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Security
Minal Moharir and A V Suresh, R V College of Engineering Bangalore, India
01
177
A Security Suite for Wireless Body Area Networks
Raghav V. Sampangi¹, Saurabh Dey², Shalini R. Urs³ and Srinivas Sampalli¹,
¹Dalhousie University, Canada, ²Analytics Quotient Bangalore, India and 3
University of
Mysore, India
21
178
A Defensive Mechanism Cross Layer Architecture for Manets to Identify and Correct
Misbehaviour in Routing
G.S. Mamatha, R.V. College of Engineering Bangalore, India
02
179
The Coordinate Ratios as a Tool to Analyze the Intrusion based on Buzek-Hillery Quantum
Copying Machine
Besma Othmani¹, Mohsen Machhout², Houcine Mejri¹,²
, Hafedh Belmabrouk¹ and Rached
Tourki¹, ¹Laboratoire d'Electronique et Micro Electronique Faculte des Sciences de Monastir,
Tunisia and ²Ecole Preparatoire aux Academies Melitaires, Tunisia
0
21. Volume 4, Number 2, March 2012
180
A Generic Framework for Device Pairing in Ubiquitous Computing Environments
Yasir Arfat Malkani, Dan Chalmers, Ian Wakeman and Lachhman Das Dhomeja,
University of Sussex, UK
01
181
LSR Protocol Based on Nodes Potentiality in Trust and Residual Energy for WSNs
Shaik Sahil Babu, Arnab Raha and M.K.Naskar, Jadavpur University, India
01
182
Cross Layer Intrusion Detection System for Wireless Sensor Network
Djallel Eddine Boubiche and Azeddine Bilami, LaSTIC Laboratory - UHL Batna,
Algeria
25
183
Minimizing the Time of Spam Mail Detection by Relocating Filtering System to the Sender
Mail Server
Alireza Nemaney Pour¹, Raheleh Kholghi² and Soheil Behnam Roudsari²,¹Islamic Azad
University of Abhar, Iran and ²Sharif University of Technology, Iran
03
184
A Bayesian Classification on Asset Vulnerability for Real Time Reduction of False Positives
in Ids
G.Jacob Victor¹, M Sreenivasa Rao² and V.CH. Venkaiah³, ¹SERP - RD Department,
India, ²JNTU - Hyderabad, India and ³CRRao AIMS & CS - Hyderabad, India
03
185
Cloud Computing Security in Business Information Systems
Sasko Ristov, Marjan Gusev and Magdalena Kostoska, Ss. Cyril and Methodius
University, Macedonia
28
186
Design and Analysis of a Novel Digital Image Encryption Scheme
Narendra K Pareek, M L Sukhadia University, India
27
187
An Implementation of Intrusion Detection System Using Genetic Algorithm
Mohammad Sazzadul Hoque, Md. Abdul Mukit and Md. Abu Naser Bikas, Shahjalal
University of Science and Technology, Bangladesh
183
188
Forensic Analysis of Windows Registry Against Intrusion
Haoyang Xie¹, Keyu Jiang¹, Xiaohong Yuan² and Hongbiao Zeng¹, ¹Fort Hays State
University, USA and ²North Carolina A&T State University, USA
08
189
LPM: A Distributed Architecture and Algorithms for Location Privacy in LBS
Muhamed Ilyas and R. Vijayakumar, Mahatma Gandhi University Kottayam, India
03
190
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Ashvini Vyavhare, Varsharani Bhosale, Mrunal Sawant and Fazila Girkar, College of
Engineering - Pune, India
02
191
Lattice Based Tools in Cryptanalysis for Public Key Cryptography
R.Santosh Kumar¹, C.Narasimham² and S.Pallam Setty³, ¹MVGR College of Engg.,
India, ²VR Siddhartha Engineering College, India and ³Andhra University, India
03
192
Identification of Image Spam by Using Low Level & Metadata Features
Anand Gupta, Chhavi Singhal and Somya Aggarwal, Netaji Subhas Institute of
Technology, India
02
22. 193
Efficient Conditional Proxy Re-Encryption With Chosen Cipher Text Security
S. Sree Vivek¹, S. Sharmila Deva Selvi¹, V. Radhakishan¹, C. Pandu Rangan¹, ¹IIT
Madras, India and ²NIT Trichy, India
79
194
Passblot: A Highly Scalable Graphical one Time Password System
Sainath Gupta, Shashank Sahni, Pruthvi Sabbu, Siddhartha Varma and Suryakanth V
Gangashetty, IIIT - Hyderabad, India
05
Volume 4, Number 3, May 2012
195
Generating Representative Attack Test Cases for Evaluating and Testing Wireless Intrusion
Detection Systems
Khalid Nasr, Anas Abou El Kalam and Christian Fraboul, Universite de Toulouse
Toulouse, France
05
196
Survey and Taxonomy of Key Management Protocols for Wired and Wireless Networks
Adarsh Kumar, Alok Aggarwal and Charu, Jaypee Institute of Information and
Technology Noida, India
13
197
Security Threats Analysis in Bluetooth-Enabled Mobile Devices
Robayet Nasim, University of Science & Technology Chittagong, Bangladesh
03
198
Energy Constrained Reliable Routing Optimized Cluster Head Protocol for Multihop under
Water Acoustic Sensor Networks
Padmavathy.T.V, Gayathri.V, Indhumathi.V and Karthiga.G, R.M.K Collge of
Engineering Chennai, India
03
199
The New Age of Computer Virus and Their Detection
Nitesh Kumar Dixit¹, Lokesh mishra², Mahendra Singh Charan¹ and Bhabesh Kumar
Dey¹, ¹BIET Sikar, India and ²NCAC Sikar, India
05
200
Provable Secure Identity Based Signcryption Schemes without Random Oracles
Prashant Kushwah¹ and Sunder Lal², ¹Banasthali University, India and ²Veer Bahadur
Singh Purvanchal University, India
09
201
Lossless Reconstruction of Secret Image Using Threshold Secret Sharing and
Transformation
P. Devaki and G. Raghavendra Rao, NIE Mysore, India
05
202
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
P.Natesan and P.Balasubramanie, Kongu Engineering College, India
09
Volume 4, Number 4, July 2012
203
Resilient Voting Mechanisms for Mission Survivability in Cyberspace: Combining
Replication and Diversity
Charles A. Kamhoua¹, Patrick Hurley¹, Kevin A. Kwiat¹ and Joon S. Park², ¹Air Force
Research Laboratory - Information
Directorate, USA and ²Syracuse University, USA
02
23. 204
Design and Evaluation of a New Fair Exchange Protocol Based on an Online TTP
Abdullah AlOtaibi and Hamza Aldabbas, De Montfort University, United Kingdom
0
205
Evaluation of Security Attacks on UMTS Authentication Mechanism
Mojtaba Ayoubi Mobarhan, Mostafa Ayoubi Mobarhan and Asadollah Shahbahrami,
University of Guilan, Iran
19
206
Non-Profit Organizations' Need to Address Security for Effective Government Contracting
Lee E. Rice¹ and Syed (Shawon) M. Rahman¹,²
, ¹Capella University,USA
and ²University of Hawaii-Hilo, USA
07
207
A Novel Energy Efficient and Administrator Based Secured Routing in MANET
Himadri Nath Saha¹, Debika Bhattacharyya¹ and P. K.Banerjee², ¹Institute of
Engineering and Management West Bengal, India and ²Jadavpur university, India
02
208
Dominant Features Identification for Covert Nodes in 9/11 Attack Using their Profile
S.Karthika, A.Kiruthiga And S.Bose, Anna University, India
02
209
How to Avoid the N-1 Attack Without Costly Implementations
David Tinoco Varela, Universidad Nacional Autonoma de Mexico, Mexico
0
210
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance
the Information Security
Manas Paul¹ and Jyotsna Kumar Mandal², ¹JIS College of Engineering, India
and ²Kalyani University, India
06
211
Comprehensive Comparison of VoIP SIP Protocol Problems and Cisco VoIP System
TALAL AL-KHAROBI and Mohmmed Abduallah Al-Mehdhar, King Fahd University
of Petroleum & Minerals(KFUPM), Saudi Arabia
0
212
A Comparative Study of the Traditional Model of IEEE 802.15.4 and Non-Overlapping
Binary Exponential Backoff IEEE 802.15.4
Archit Verma Pushpinder Singh Patheja and Akhilesh Waoo, BIST Bhopal, India
01
213
An Improved Watchdog Technique Based On Power-Aware Hierarchical Design For Ids In
Wireless Sensor Networks
A. Forootaninia¹ and M. B. Ghaznavi-Ghoushchi², ¹Tehran University, Iran
and ²Shahed University, Iran
10
214
Personal Safety Triggering System on Android Mobile Platform
Ashokkumar Ramalingam, Prabhu Dorairaj and Saranya Ramamoorthy, Blekinge
Institute of Technology, Sweden
12
215
A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks
Mahdi Aiash, Glenford Mapp and Aboubaker Lasebae, Middlesex University, UK 15
216
Implementation and Test of a Secure Mechanism's Modules in Routing Protocol of MANETs
with the Theory of Games
Karim KONATE and Abdourahime GAYE, University Cheikh Anta DIOP, Dakar 0
24. Volume 4, Number 5, September 2012
217
Simple Post Quantum Scheme for Higher Key Rate Multiparty Quantum Key Distribution
Abudhahir Buhari¹, Zuriati Ahmad Zukarnain¹, Shamala K. Subramaniam¹, Hisham
Zainuddin¹ and Suhairi Saharudin², ¹University Putra Malaysia, Malaysia
and ²Technology Park Malaysia, Malaysia
0
218
Comparison of High Speed Congestion Control Protocols
Jawhar Ben Abed¹, Laarif Sinda², Mohamed Ali Mani³ and Rachid Mbarek², ¹Polytech
Sousse, ²ISITCOM Hammam Sousse and ³ISTLS Sousse, Tunisia
04
219
Handoff Based Secure Checkpointing and Log Based Rollback Recovery for Mobile Hosts
Priyanka Dey and Suparna Biswas, West Bengal University, India
01
220
A Framework For Performance Evaluation Of ASIPs in Network-Based IDS
Majid Nezakatolhoseini¹ and Mohammad Amin Taherkhani², ¹Science and Research
Branch Islamic Azad University, Iran and ²Shahid Beheshti University, Iran
01
221
Design And Validation Of Specification Based Ids For Power Enhancement Related
Vulnerabilities In AODV
Chaitali Biswas Dutta and Utpal Biswas, University of Kalyani, India
0
222
Security V/S Qos for LTE Authentication and Key Agreement Protocol
Jacques Bou Abdo¹, Jacques Demerjian² and Hakima Chaouchi³, ¹Nokia Siemens
Networks, Lebanon, ²Antonine University, Lebanon and ³Telecom Sud Paris, France
09
223
Comparison of Certificate Policies Formerging Public Key Infrastructuresduring Merger and
Acquisition of Companies
Balachandra Muniyal¹, Prema K.V² and Mamatha Balachandra¹, ¹Manipal University,
India and ²Modi Institute of Technological Sciences, India
01
224
Healthcare IT: Is Your Information At Risk?
Kimmarie Donahue¹ and Syed (Shawon) M. Rahman², ¹San Antonio, USA and ²Capella
University, USA
05
225
A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications
H.Jayasree¹ and A.Damodaram², ¹ATRI, India and ²JNTUH - Kukatpally, India
05
226
A Survey on Web Spam Detection Methods: Taxonomy
Shekoofeh Ghiam¹ and Alireza Nemaney Pour², ¹Sharif University of Technology, Iran
and ²Islamic Azad University of Abhar, Iran
09
227
Sybil Attack on Lowest Id Clustering Algorithm in The Mobile Ad Hoc Network
Amol Vasudeva¹ and Manu Sood², ¹Jaypee University of Information Technology, India
and ²Himachal Pradesh University, India
18
228
A Simple and Reliable Touch Sensitive Security System
Adamu Murtala Zungeru¹, Jonathan Gana Kolo¹ and Ijarotimi Olumide², ¹University
of Nottingham, Malaysia and ²Rufus Giwa Polytechnic, Nigeria
11
229
Taxonomy Based Intrusion Attacks and Detection Management Scheme in Peer-Topeer
Network
Prashant Kumar Singh¹, A. K. Vatsa¹, Reetu Sharma² and Priyanka Tyagi³, ¹Shobhit
University, India, ²CERT, India and ³DVSIET, India
0
25. 230
Secured Text Message Transmission in Pre -Channel Equalization Based MIMO- OFDM
System with Implementation of Concatenated ECB and CFB Cryptographic Algorithm
Laila Naznin,Shahrina Sultana, M. Golam Rashed and Shaikh Enayet Ullah, University
of Rajshahi, Bangladesh
0
231
Explore Ten Different Types of Software Engineering Principles
S.Thulasee Krishna¹, S.Sreekanth¹, B. Bhaskar¹ and N.Pavan Kumar², ¹Kuppam
Engineering College, India and ²Sitams, Chittoo(DT), India
03
Volume 4, Number 6, November 2012
232
RSAED: Robust and Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Merad Boudia Omar Rafik and Feham Mohamed, University of Tlemcen, Algeria
07
233
Secured RFID Mutual Authentication Scheme for Mifare Systems
Kuo-Tsang Huang and Jung-Hui Chiu, Chang Gung University, Taiwan
02
234
Malware Detection, Supportive Software Agents and Its Classification Schemes
Adebayo, Olawale Surajudeen¹, M.A. Mabayoje², Amit Mishra³ and Osho
Oluwafemi¹, ¹Federal University of Technology, Nigeria, ²University of Ilorin, Nigeria
and ³IBB University Lapai, Nigeria
11
235
Mining Techniques in Network Security to Enhance Intrusion Detection Systems
Maher Salem and Ulrich Buehler, University of Applied Sciences, Germany
06
236
A Quantum based Challenge-Response User Authentication Scheme over Noiseless Channel
Abudhahir Buhari¹, Zuriati Ahmad Zukarnain¹, Shamala K. Subramaniam¹ , Hisham
Zainuddin1
and Suhairi Saharudin², ¹University Putra Malaysia, Malaysia
and ²MIMOS - Technology Park Malaysia, Malaysia
02
237
Modelling and Verification of Extensible Authentication Protocol Using Spin Model
Checker
Manu S. Hegde, Jnanamurthy HK and Sanjay Singh, Manipal University, India
03
238
The Effect of the Number of Mobile Nodes on Varying Speeds of MANETS
John Tengviel¹, K. Diawuo² and K. A. Dotche², ¹Sunyani Polytechnic, Ghana
and ²KNUST Kumasi, Ghana
0
239
Wireless Public Key Infrastructure for Mobile Phones
Balachandra Muniyal, Krishna Prakash and Shashank Sharma, Manipal University,
India
04
240
Secure Key Management Protocol in WIMAX
Noudjoud Kahya¹, Nacira Ghoualmi¹ and Pascal Lafourcade², ¹Badji Mokhtar
University, Algeria and ²Joseph Fourier University, France
04
241
A Novel Multipoint Relay based Secure Routing in MANET
Himadri Nath Saha, Debika Bhattacharyya and P.K.Banerjee, IEM KolaKata, India
01
242
Network Threat Characterization in Multiple Intrusion Perspectives using Data Mining
Technique
Oluwafemi Oriola, Adesesan B. Adeyemo and Oluwaseyitanfunmi Osunade, University
of Ibadan, Nigeria
02
26. 243
Removal of Certificates from Set Protocol Using Certificateless Public Key Cryptography
Arpita Sarkar and Sachin Tripathi, Indian School of Mines Dhanbad, India
01
244
Review on IPv6 Security Vulnerability Issues and Mitigation Methods
Supriyanto¹, Raja Kumar Murugesan² and Sureswaran Ramadass³, ¹Universitas Sultan
Ageng Tirtayasa, Indonesia, ²Taylor's University, Malaysia and ³National Advanced
IPv6 Centre (NAv6) Universiti Sains, Malaysia
07
Volume 5, Number 1, January 2013
255
Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case
Study
Natarajan Meghanathan, Jackson State University, USA
0
256
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
Kuo-Tsang Huang¹, Jung-Hui Chiu¹ and Sung-Shiou Shen², ¹Chang Gung University,
Taiwan and ²DE LIN Institute of Technology, Taiwan
08
257
An Integrated Solution for both Monitoring and Controlling for Automization Using
Wireless Sensor Networks: A Case Study
M Gnana Seelan and Ch AS Murty, Centre for Development of Advanced Computing -
Hyderabad, India
0
258
How to Find a Fixed Point in Shuffle Efficiently
Mikako Kageshima and Manabu Okamoto, Kanagawa Institute of Technology, Japan
0
259
Ontology-Driven Information Retrieval for Healthcare Information System : A Case Study
Aidarus M. Ibrahim, Hussein A. Hashi and Abdullalem A. Mohamed, University
Technology Malaysia (UTM), Malaysia
09
260
Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and
Support Vector Machines
A. M. Chandrashekhar¹ and K. Raghuveer², ¹Sri Jayachamarajendra College of
Engineering (SJCE), India and ²National Institute of Engineering (NIE) Mysore, India
12
261
Text Steganographic Approaches: A Comparison
Monika Agarwal, PDPM-IIITDM Jabalpur, India
40
Volume 5, Number 2, March 2013
262
Incident Response Plan for a Small to Medium Sized Hospital
Charles DeVoe and Syed (Shawon) M. Rahman, Capella University, USA
0
263
Privacy Preserving Data Mining by using Implicit Function Theorem
Pasupuleti Rajesh¹ and Gugulothu Narsimha², ¹VVIT College, India and ²JNTUH
University, India.
02
264
Tulungan: A Slandering-Resistant Reputation System for Collaborative Web Filtering
Systems
Alexis V. Pantola¹, Susan Pancho-Festin² and Florante Salvador¹, ¹De La Salle
University, Philippines and ²University of the Philippines, Philippines
0
27. 265
Design Issues on Software Aspects and Simulation Tools for Wireless Sensor Networks
Leelavathi G¹, Shaila K², Venugopal K R³ and L M Patnaik⁴⁴⁴⁴, ¹Govt.S.K.S.J.
Technological Institute, India, ²Vivekananda Institute of Technology, India,
³University Visvesvaraya College of Engineering, India and ⁴⁴⁴⁴Indian Institute of
Science, India
03
267
Using Bias Optimiazation for Reversible Data Hiding using Image Interpolation
Andrew Rudder, Wayne Goodridge and Shareeda Mohammed, The University of the
West Indies, Trinidad and Tobago.
0
268
A 64 Bits Rotor Enhanced Block Cipher (Rebc3)
Ahmed ElShafee, Ahram Canadian University, Egypt.
0
269
A Robust Background Removal Algortihms Using Fuzzy C-Means Clustering
S.Lakshmi¹ and V.Sankaranarayanan², ¹Jeppiaar Engineering College, India
and ²Crescent Engineering College, India.
01
270
Efficacy of Attack Detection Capability of IDPS Based on its Deployment in Wired and
Wireless Environment
Shalvi Dave¹, Bhushan Trivedi² and Jimit Mahadevia³, ¹Indus University,
India, ²GLSICT,India and ³Elitecore Technologies Pvt. Ltd., India
02
271
Code Aware Dynamic Source Routing for Distributed Sensor Network
M Abdul Rahiman¹, Nishanth Jain¹, Arun K. Dubey² and G Manoj Kumar³, ¹AICTE,
Ministry of HRD,Govt of India, India, ²Bharati Vidyapeeth College of Engineering,
India and ³LBS Inst of Tech for Women, India.
01
272
Resonance Based Micromechanical Cantilever for Gas Sensing
Subhashini. S¹ and Vimala Juliet. A², ¹Sathyabama University, India and ²SRM
University, India
0
273
Traceback of DOS Over Autonomous Systems
Mohammed Alenezi and Martin J Reed, School of Computer Science and Electronic
Engineering, University of Essex, UK
04
274
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicular Ad-
hoc Network Environment
Vaishali D. Khairnar and Ketan Kotecha, Institute of Technology Nirma University,
India
25
275
A Novel Secure Cosine Similarity Computation Scheme with Malicious Adversaries
Dexin Yang¹, Chunjing Lin² and Bo Yang², ¹Guangzhou City Polytechnic, China
and ²Shaanxi Normal University, China
01
276
Improved Ids using Layered CRFS with Logon Restrictions and Mobile Alerts Based on
Deviant System Behaviour
Arpitha M1, Geetha V¹,Gowranga K H² and Bhakthavathsalam R², ¹Alpha College Of
Engineering, India and ²Indian Institute of Science, India
0
278
E-Commerce Systems Security for Small Businesses
Syed (Shawon) M. Rahman and Robert Lackey, Capella University, Minneapolis, USA.
04
28. Volume 5, Number 3, May 2013
279
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and Energy
Depletion Parameters
S.Prabhakara Rao¹, E.Nagabhooshanam² and S.Ramesh Babu¹, ¹Nigama Engineering
College, India and ²Sridevi Womens Engineering College, India
0
280
An Efficient Group Authentication for Group Communications
Lein Harn¹ and Changlu Lin², ¹University of Missouri, USA and ²Fujian Normal
University, P. R. China
06
281
Password Based Scheme and Group Testing for Defending DDOS Attacks
G Dayanandam¹, T V Rao², S Pavan Kumar Reddy¹ and Ravinuthala Sruthi¹, ¹QIS
Institute of Technology (QISIT), India and ²KL University (KLU), India
03
282
Security Algorithms for WIMAX
M Alzaabi¹, K D Ranjeeth¹, T Alukaidey¹ and K Salman², ¹University of Hertfordshire,
UK and ²Middle Tennessee State University, USA
02
283
Hybrid Architecture for Distributed Intrusion Detection System in Wireless Network
Seyedeh Yasaman Rashida, Islamic Azad University Shirgah, Iran
04
284
HTTPI Based Web Service Security over SOAP
Pankaj Choudhary, Rajendra Aaseri and Nirmal Roberts, ABV - Indian Institute of
Information Technology & Management, India
05
285
Implementation of a Security Protocol for Bluetooth and WI-FI
U. Pavan Kumar, Amity University, India
03
286
Bearings Prognostic Using Mixture of Gaussians Hidden Markov Model and Support Vector
Machine
Fatima Ezzahra Sloukia¹, Rajae Bouarfa¹, Hicham Medromi² and Mohammed
Wahbi¹, ¹SIR2C2S/LASI-EHTP, Morocco and ²Hassan II University, Morocco
11
287
Trust Value Algorithm: A Secure Approach against Packet Drop Attack in Wireless Ad-Hoc
Networks
Rajendra Aaseri, Pankaj Choudhary and Nirmal Roberts, ABV-Indian Institute of
Information Technology, India
02
Volume 5, Number 4, July 2013
288
Real Time Securing of All-Optical Networks Against Security Attacks at the Physical Level
Fahmida Rahman and Mohammed Arozullah, The Catholic University of America,
USA
0
289
Phishing Techniques and Mitigating the Associated Security Risks
Marc A. Rader and Syed (Shawon) M. Rahman, Capella University, USA
290
Wireless Networks Security in Jordan: A Field Study
Ahmad S. Mashhour¹ and Zakaria Saleh², ¹University of Bahrain, Bahrain
and ²Yarmouk University, Jordan
02
29. 291
Early Detection of SQL Injection Attacks
Hossain Shahriar, Sarah North and Wei-Chuen Chen, Kennesaw State University, USA
06
292
A Framework for Security Components Anomalies Severity Evaluation and Classification
Kamel Karoui, Fakher Ben Ftima and Henda Ben Ghezala, University of Manouba,
Tunisia
0
293
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authentication
Pavan Kumar K, P. E. S. N. Krishna Prasad, M. V. Ramakrishna and B.D.C.N. Prasad,
Prasad V. Potluri Siddhartha Institute of Technology, India
03
294
Defence Schemes From Attacker's Own Reward Processes
L-F Pau, Copenhagen Business School, Denmark
01
295
Controlling IP Falsifying Using Realistic Simulation
Govindavaram Madhusri¹ and Chakunta Venkata Guru Rao², ¹Kakatiya University,
India and ²JNTU University, India
0
296
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Aliyu Mohammed, Haitham A. Jamil, Sulaiman Mohd Nor and Muhammad
NadzirMarsono, Universiti Teknologi Malaysia, Malaysia
1
297
Internal Security on an IDS Based on Agents
Rafael Paez, Mery Yolima Uribe and Miguel Torres, Pontificia Universidad Javeriana,
Colombia
02
298
A New Stemmer to Improve Information Retrieval
Wahiba Ben Abdessalem Karaa, University of Tunis. Tunisia
16
299
Performance Evaluation of Enhancedgreedy-Two-Phase Deployment Algorithm
Kartit Ali, University Mohammed V-Agdal, Morocco
0
300
Steganography and Random Grids
Pratarshi Saha¹, Sandeep Gurung¹ and Kunal Krishanu Ghose², ¹Sikkim Manipal
Institute of Technology, India and ²QualComm, USA
0
301
An Improved MULTI-SOM Algorithm
Imen Khanchouch, Khaddouja Boujenfa and Mohamed Limam, University of Tunis,
Tunisia and Dhofar University, Oman
02
302
Experimental Analysis of AODV and DSR with Varying Vehicle Mobility and Density in
Vanet Scenario
Arzoo Dahiya and R.K.Chauhan, Kurukshetra University, India
01
Volume 5, Number 5, September 2013
303
Knowledge-Based Authentication using Twitter Can We Use Lunch Menus As Passwords?
ManabuOkamoto, Kanagawa Institute of Technology, Japan
02
304
A Security Framework in Cloud Computing Infrastructure
Arijit Ukil¹, Debasish Jana² and Ajanta De Sarkar², ¹Tata Consultancy Services, India
and ²Birla Institute of Technology, India
13
30. 305
Micro Rotor Enhanced Block Cipher Designed For Eight Bits Micro-Controllers (MREBC)
Ahmed ElShafee, Ahram Canadian University, Egypt
0
306
Image Authentication Through ZTransform with Low Energy And Bandwidth (IAZT
Madhumita Sengupta and J. K. Mandal, University of Kalyani, India
0
307
Fast Detection of Ddos Attacks Using Non-Adaptive Group Testing
Huynh Nguyen Chinh, Tan Hanh and Nguyen Dinh Thuc, HCMC,Vietnam
06
308
Effectiveness of Feature Detectionoperators on the Performance of Iris Biometric
Recognition System
Binsu C. Kovoor, Supriya M.H. and K. Poulose Jacob, Cochin University of Science
and Technology, India
07
309
Secure Collaborative Processing Architecture for MITB Attack Detection
Hani Qusa and Shadi Abudalfa, University College of Applied Science, Palestine
02
310
Security Challenges, Issues and Their Solutions For Vanet
Ram Shringar Raw, Manish Kumar and Nanhay Singh, Ambedkar Institute of
Advanced communication Technologies & Research, India
59
311
Defense Mechanisms for Computer-Based Information Systems
Majid Alshammari and Christian Bach, University of Bridgeport, USA
02
312
Optimized Hybrid Security Mechanism for Image Authentication and Secrecy using PSO
K.Kuppusamy and K.Thamodaran, Alagappa University, India
02
313
Credit Based Methodology to Detect and Discriminate DDOS Attack From Flash Crowd in
A Cloud Computing Environment
N.Jeyanthi, Hena Shabeeb and Mogankumar P.C, VIT University, India
05
314
Z-Shaped Dipole Antenna and its Fractal Iterations
Mustafa H. Abu Nasr, Al- Azhar University, Palestine
04
315
A Novel Approach for Secure Routing Through BGP Using Symmetric Key
Divan Raimagia, Shraddha Singh and Sameena Zafar, PIES College, India
01
316
Evaluating the Performance of the Secure Block Permutation Image Steganography
Algorithm
Adnan M. Shihab, Raghad K. Mohammed and Woud M. Abed, University of Baghdad,
Iraq
0
317
A Novel Technique to Detect Intrusion in Manet
J. K. Mandal¹ and Khondekar Lutful Hassan², ¹University of Kalyani, India
and ²University of Calcutta,India
03
Volume 5, Number 6, November 2013
318
Complete Network Security Protection for SME's within Limited Resources
Margie S. Todd¹ and Syed (Shawon) M. Rahman¹,²
, ¹Capella University, USA
and ²University of Hawaii-Hilo, USA
01
31. 319
Multi-Level Parsing Based Approach Against Phishing Attacks With the Help of Knowledge
Bases
Gaurav Kumar Tak¹ and Gaurav Ojha², ¹Lovely Professional University, India
and ²Indian Institute of Information Technology and Management, India
02
320
A Need for Peer-To-Peer Strong Local Authentication Protocol (P2PSLAP) in Mobile
Banking
Bossi Masamila, Dublin Institute of Technology, Ireland
01
321
Securing Mobile Cloud Using Finger Print Authentication
IehabALRassan and HananAlShaher, King Saud University, Saudi Arabia
12
322
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection Engine
Anjan K¹, Srinath N K¹ and Jibi Abraham², ¹R V College of Engineering, India
and ²College of Engineering, India
01
323
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive Channel
Shortening in Multi-carrier Systems
Samir Abd Elghafar¹,²
, Salaheldin M. Diab¹, Bassiouny M. Sallam¹, Moawad I.
Dessouky¹, El-Sayed M. El-Rabaie¹ and Fathi E. Abd El-Samie¹, ¹Menoufia University,
Egypt and ²Jazan University, Saudi Arabia
0
324
Investigating the Effects of the Common Control Channel Challenge in Multichannel
Cognitive Networks With Hypothetical Spectrum Hole
Mthulisi Velempini¹ and Mqhele E. Dlodlo², ¹North-West University, South Africa
and ²University of Cape Town, South Africa
0
Volume 6, Number 1, January 2014
325
Optimised Malware Detection in Digital Forensics
SaeedAlmarri¹ and Paul Sant², ¹University of Bedfordshire, United Kingdom
and ²University Campus Milton Keynes, United Kingdom
05
326
A Novel Paradigm in Authentication System Using Swifi Encryption /Decryption Approach
Shadi R. Masadeh¹, Ahmad Azzazi², Bassam A. Y. Alqaralleh³ and Ali, Mousa.Al
Sbou³, ¹Isra University, Jordan, ²Applied Science University, Jordan and ³Al-Hussein
Bin Talal University, Jordan
01
327
Cloud Computing and Security Issues in the Cloud
Monjur Ahmed¹ and Mohammad Ashraf Hossain², ¹Daffodil Institute of IT,
Bangladesh and ²Freelance IT Consultant, Bangladesh
61
328
A Novel Approach: A Hybrid Semantic Matchmaker for Service Discovery in Service
Oriented Architecture
Soodeh Pakari, Esmaeel Kheirkhah and Mehrdad Jalali, Islamic Azad University,
Mashhad, Iran
02
329
SPARQL: Semantic Information Retrieval by Embedding Prepositions
Sneha Kumari, Rajiv Pandey, Amit Singh and Himanshu Pathak, Amity University,
India
01
32. 330
A Fair Exchange & Customer Anonymity Protocol Using A Trusted Third Party for
Electronic Commerce Transactions and Payments
Fahad A Alqahtani, De Montfort University, United Kingdom
0
331
An IAC Approach for Detecting Profile Cloning in Online Social Networks
MortezaYousefi Kharaji¹ and FatemehSalehi Rizi², ¹Mazandaran University of Science
and Technology, Iran and ²Sheikhbahaee University of Isfahan, Iran
04
332
Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares
Pallavi Vijay Chavan¹, Mohammad Atique² and Latesh Malik¹, ¹GHRCE - Nagpur,
India and ²SGBAU -Amravati, India
09
Volume 6, Number 2, March 2014
333
The Impact of Management Information systems(MIS) Technologies on the quality of
Services provided at the University of TABUK
Hiyam S. Ensour and Tareg M. Alinizi, Petra of university, Jordan
03
334
Enhancing the Impregnability of Linux Servers
Rama Koteswara Rao G¹, Satya Prasad R², Pathanjali Sastri A² and P.E.S.N.
Prasad¹, ¹Prasad V. Potluri Siddhartha Institute of Technology, India and ²Acharya
Nagarjuna University, India
0
335
Implementing Packet Broadcasting Algorithm Of Mimo Based Mobile Ad-Hoc Networks To
Exploit Diversity
Swati Chowdhuri¹, Santanu Maiti¹, Sheli Sinha Chaudhuriand² and P.K.Baneerjee²,
¹Seacom Engineering College, India and ²Jadavpur University, India
02
336
A New Hybrid Algorithm for Business Intelligence Recommender System
P.Prabhu and N.Anbazhagan, Alagappa University, India 0
Volume 6, Number 3, May 2014
337
Privacy Protection for Role-Based Access Control in Service Oriented Architecture
Helen Cheung, Celia Li, Ye Yu and Cungang Yang, Ryerson University, Canada
01
338
Survey of Manet Misbehaviour Detection Approaches
Punya Peethambaran and Jayasudha J. S, SCT College of Engineering, India
08
339
Attack Graph-Based Risk Assessment and Optimisation Approach
Mohammed Alhomidi and Martin Reed, University of Essex, UK
05
340
Security Issues Associated with Big Data in Cloud Computing
Venkata Narasimha Inukollu¹ , Sailaja Arsi¹ and Srinivasa Rao Ravuri², ¹Texas Tech
University, USA and ²Cognizant Technology Solutions, India
50
341
A Survey of Trends in Massive DDOS Attacks and Cloud-Based Mitigations
FuiFui Wong and Cheng Xiang Tan, TongJi University, China
17
33. 342
Role of Integrated Virtual E-Learning System for Distance Learning Students
Shweta Soni and M.D.Katkar, G.H.Raisoni Institute of Engineering and Technology
for Women, India
0
343
Self-Protection Mechanism For Wireless Sensor Networks
Hosam Soleman and Ali Payandeh, Maleke-Ashtar university Islamic Republic of Iran
04
344
Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes
Divya Ann Luke, Jayasudha. J.S, SCT College of Engineering, India
01
Volume 6, Number 4, July 2014
345
End to End Quality of Service Assurance for Multi-Service Provisioning in Mobile Ad Hoc
Networks.
Prabesh Dongol and Dhadesugoor R. Vaman, Prairie View A&M University, USA
01
346
Analysis of RSA Algorithm using GPU Programming
Sonam Mahajan and Maninder Singh, Thapar University, India
10
347
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Ajah Ifeyinwa Angela, Ebonyi State University Abakaliki, Nigeria
01
348
Analysis and Comparison of Symmetric Key Cryptographic Algorithms Based on Various
File Features
Ranjeet Masram, Vivek Shahare, Jibi Abraham, Rajni Moona, College of Engineering
Pune, India
23
349
State of Mobile Banking in Tanzania and Security Issues
Bossi Masamila, Dublin Institute of Technology, Ireland
09
350
A Novel (K,N) Secret Sharing Scheme from Quadratic Residues for Grayscale Images
El-Tigani B. Abdelsatir, Sahar Salahaldeen, Hyam Omar and Afra Hashim, University
of Khartoum, Sudan
03
Volume 6, Number 5, September 2014
351
A Secure Electronic Payment Protocol for Wireless Mesh Networks
Helen Cheung and Cungang Yang, Ryerson University, Canada
01
352
Cloud Based Access Control Model for Selective Encryption of Documents with Traitor
Detection
Punya Peethambaran and. Jayasudha J. S, Sct College of Engineering, India
02
353
Reducing the Cognitive Load on Analysts through Hamming Distance Based Alert
Aggregation
Peter Mell¹ and Richard Harang², ¹National Institute of Standards and Technology,
USA and ²U.S. Army Research Laboratory, USA
0
354
A Secure Cluster Based Communication in Wireless Network using Cryptographic Reports
Hamsha and Nagaraj, RVCE Bangalore, India
0
34. 355
A Framework for Analysis and Comparison of Dynamic Malware Analysis Tools
Waqas Aman, Gjovik University College, Norway
01
356
Packet Drop Attack Detection Techniques in Wireless Ad Hoc Networks: A Review
Kennedy Edemacu, Martin Euku and Richard Ssekibuule, Makerere
UniversityKampala, Uganda
06
Volume 6, Number 6, November 2014
357
A Cryptographic Mutual Authentication Scheme for Web Applications
Yassine Sadqi, Ahmed Asimi and Younes Asimi, Ibn Zohr University, Morocco
04
358
Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data Using Secure
Division
Sumana M¹ and Hareesha K S², ¹M S Ramaiah Institute of Technology, India
and ²Manipal Institute of Technology, India
02
359
Collaborative Defence for Distributed Attacks (Case Study of Palestinian Information
Systems)
Hani Qusa, University College of Applied Science, Palestine
0
360
Hybrid Cryptographic Technique Using RSA Algorithm and Scheduling Concepts
Meenakshi Shankar and Akshaya.P, Sri Venkateswara College of Engineering, India
0
361
Key Management Techniques in Wireless Sensor Networks
Khawla Naji Shnaikat¹ and Ayman Ahmed Qudah², ¹University of Jordan, Jordan
and ²University of Dammam, KSA
03
Volume 7, Number 1, January 2015
362
Multi-Facet Trust Model for Online Social Network Environment
Liu Ban Chieng¹, Manmeet Mahinderjit Singh¹, Zarul Fitri Zaaba¹ and Rohail
Hassan², ¹University Sains Malaysia, Malaysia and ²Universiti Teknologi Petronas,
Malaysia
02
363
Accessing Secured Data in Cloud Computing Environment
Hasan Omar Al-Sakran, King Saud University, Saudi Arabia
06
364
Service Oriented Configuration Management of Software Architecture
Razie Alidoosti, Shahrouz Moaven and Jafar Habibi, Sharif University of Technology,
Iran
0
365
Runtime Potential Updater File(S) Identification: Does Your Software Updates
Automatically With Application Whitelisting?
Janardhan Reddy, Amit Kumar Jha and Sandeep Romana, Centre for Development of
Advanced Computing, India
0
366
Strong Zero-Knowledge Authentication Based on the Session Keys (SASK)
Younes ASIMI, Abdellah AMGHAR, Ahmed ASIMI and Yassine SADQI, Laboratoire
des Systemes informatiques et Vision (LabSiV), Morocco
04
35. 367
A New Secret Handshakes Scheme with Dynamic Matching Based on ZSS
Preeti Kulshrestha and Arun Kumar Pal, G.B. Pant University of Agriculture and
Technology, India
05
368
A New DNA Based Approach of Generating Key-Dependent Shift Rows Transformation
Auday H. Al-Wattar, Ramlan Mahmod, Zuriati Ahmad Zukarnain and Nur Izura
Udzir, Universiti Putra Malaysia, Malaysia
01
Volume 7, Number 2, March 2015
369
Exploiting Rhetorical Relations to Multiple Documents Text Summarization
N.Adilah Hanin Zahri¹, Fumiyo Fukumoto², Matsyoshi Suguru² and Ong Bi
Lynn¹, ¹University of Malaysia Perlis, Malaysia and ²University of Yamanashi, Japan
0
370
An Interactive Visualization Tool for Animating Behavior of Cryptographic Protocols
Mabroka Maeref¹, Fatma Algali¹, Ahmed Patel² and Zarina Shukur², ¹Sebha University
Libya and ²The National University of Malaysia, Malaysia
01
371
A New Image Steganography Algorithm Based on MLSB Method with Random Pixels
Selection
Odai M.Al-Shatanawi and Nameer N.El.Emam, Philadelphia University, Jordan
03
372
Certificate Less Key Management Scheme in Manet Using Threshold Cryptography
Shaheena Khatoonand Balwant Singh Thakur, Pt.Ravishankar Shukla University,
India
01
373
Comprehensive Survey of Possible Security Issues on 4G Networks
Sumant Ku Mohapatra, Biswa Ranjan Swain and Pravanjan Das, Trident Academy of
Technology, India
06
Volume 7, Number 3, May 2015
374
Security Challenges as a Factor Affecting the Security of Manet: Attacks and Security
Solutions
Nabeel Zanoon¹, Nashat Albdour², Hatem S. A. Hamatta¹ and Rasha Moh'd Al-
Tarawneh¹, ¹Al-Balqa Applied University, Jordan and ²Tafila Technical University,
Jordan
04
375
An ANN Approach for Network Intrusion Detection using Entropy based Feature Selection
AshalataPanigrahi and ManasRanjanPatra, Berhampur University, India
02
376
A Performance Evaluation Of Common Encryption Techniques With Secure Watermark
System (SWS)
Ashraf Odeh¹, Shadi R.Masadeh¹ and Ahmad Azzazi², ¹Isra University, Jordan
and ²Applied Science University, Jordan
01
377
Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channel In Secured
Communication
Anjan K1, Srinath N K¹ and Jibi Abraham², ¹R V College of Engineering, India
and ²College of Engineering Pune, India
0
36. Volume 7, Number 4, July 2015
378
Deterring Hacking Strategies via Targeting Scanning Properties
Saad Alsunbul¹,²
, Phu Dung Le¹, Jefferson Tan¹, ¹Monash University, Australia
and ²King Abdullaziz for Science and Technology, Saudi Arabia
0
379
Providing End-To-End Secure Communications in GSM Networks
Heshem A.El Zouka, Arab Academy for Science & Technology and Maritime
Transport, Egypt
38
Volume 7, Number 5, September 2015
380
ANDROINSPECTOR: A System for Comprehensive Analysis of Android Applications
Babu Rajesh V, Phaninder Reddy, Himanshu P and Mahesh U Patil, Centre for
Development of Advanced Computing, India
0
381
Improved Steganographic Security by Applying an Irregular Image Segmentation and
Hybrid Adaptive Neural Networks with Modified Ant Colony Optimization
Nameer N. El. Emam¹ and Kefaya S. Qaddoum², ¹Philadelphia University, Jordan
and ²Warwick University, UK
0
382
An Intellect Learning on E-Mail Security and Fraud, Spam and Phishing
P.S.Jagadeesh Kumar, S.Meenakshi Sundaram and Ranjeet Kumar, Don Bosco
Institute of Technology, India
0
Volume 7, Number 6, November 2015
383
A Novel Evaluation Approach to Finding Lightweight Machine Learning Algorithms for
Intrusion Detection in Computer Network
Yuchen Wang¹, Shuxiang Xu² and Qiongfang Huang¹, ¹Zhejiang University of
Technology, China and ²University of Tasmania, Australia
0
384
A Machine Learning Approach to Anomaly-Based Detection on Android Platforms
Joshua Abah, Waziri O.V, Abdullahi M.B, Arthur U.M and Adewale O.S, Federal
University of Technology Minna, Nigeria
04
385
A System for Validating and Comparing Host-Based Ddos Detection Mechanisms
Nguyen Hong Son, Post and Telecommunication Institute of Technology, Vietnam 0
Volume 8, Number 1, January 2016
386
Limiting Self-Propagating Malware Based On Connection Failure Behavior Through Hyper-
Compact Estimators
You Zhou¹, Yian Zhou¹, Shigang Chen¹ and O. Patrick Kreidl², ¹University of Florida,
USA and ²University of North Florida, USA
0
387
Employee Trust Based Industrial Device Deployment and Initial Key Establishment
Apala Ray¹,²
and Johan Akerberg²,³
and Mats Bjorkman³ and Mikael Gidlund⁴⁴⁴⁴, ¹ABB
Corporate Research- Bangalore, India, ²Malardalen University, Sweden, ³ABB
Corporate Research-Vasteras, Sweden and ⁴⁴⁴⁴Mid Sweden University, Sundsvall,
Sweden
03
37. 388
A Security Strategy against STEAL-AND-PASS Credential Attacks
Juan Ceballos, Security Consulting & Engineering, T-Systems International, Germany
0
389
Big Data Security and Privacy Issues in the CLOUD
Ali Gholami and Erwin Laure, KTH- Royal Institute of Technology, Sweden
01
Volume 8, Number 2, March 2016
390
Trends Toward Real-Time Network Data Steganography
James Collins, Sos Agaian, The University of Texas at San Antonio, USA
01
391
Intrusion Detection System Using Discrete Fourier Transform with Window Function
Yusuke Tsuge and HidemaTanaka, National Defense Academy of Japan, Japan
0
392
A Novel Charging and Accounting Scheme in Mobile Ad-Hoc Networks
Inna Kofman¹ and Nurul Huda², ¹University of Duesseldorf, Germany and ²Ryerson
University, Canada
0
393
A Security Evaluation Framework for U.K. E-Government Services Agile Software
Development
Steve Harrison¹,Antonis Tzounis², Leandros Maglaras¹, Francois Siewe¹, Richard
Smith¹ and Helge Janicke¹, ¹De Montfort University, United Kingdom and ²University
of Thessaly, Greece
01
394
Cascade Block Cipher Using Braiding/Entanglement of Spin Matrices and Bit Rotation
D.Sravana Kumar¹, P.Sirisha² and CH. Suneetha³, ¹Dr. V.S. Krishna Government
Degree College, India, ²Indian Maritime University, India and ³GITAM University,
India
0
395
The Internet of Things : New Interoperability, Management and Security Challenges
Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung, Western Sydney University,
Australia
06
396
Design and Implementation of the Advanced Cloud Privacy Threat Modeling
Ali Gholami¹, Anna-Sara Lind², Jane Reichel², Jan-Eric Litton³, Ake Edlund¹, Erwin
Laure¹, ¹KTH Royal Institute of Technology, Sweden, ²Uppsala University, Sweden
and ³Karolinska Institutet, Sweden
04
Volume 8, Number 3, May 2016
397
Using a Deep Understanding of Network Activities for Security Event Management
Mona Lange¹, Felix Kuhr² and Ralf Moller¹, ¹Universitat zu Lubeck, Germany
and ²Technical Universitat Hamburg-Harburg, Germany
0
398
Wearable Technology Devices Security and Privacy Vulnerability Analysis
Ke Wan Ching and Manmeet Mahinderjit Singh, University Sains Malaysia Penang,
Malaysia
0
399
Y-Hamiltonian Layers Broadcast Algorithm
Amnah El-Obaid and Nagham_Al-Madi, Zaytoonah University of Jordan, Jordan
01
38. 400
Authentication Using Trust to Detect Misbehaving Nodes in Mobile Ad hoc Networks Using
Q-Learning
S.Sivagurunathan¹, K.Prathapchandran¹ and A.Thirumavalavan², ¹Gandhigram Rural
Institute-Deemed University, India and ²Arignar Anna Government Arts College, India
0
Volume 8, Number 4, July 2016
401
Proactive Detection of DDOS Attacks in Publish-Subscribe Networks
Bander Alzahrani¹, Vassilios Vassilakis², Mohammed Alreshoodi³, Fawaz Alarfaj⁴⁴⁴⁴ and
Ahmed Alhindi⁴⁴⁴⁴, ¹King Abdulaziz University, Saudi Arabia, ²University of Brighton,
United Kingdom, ³Qassim University, Saudi Arabia, ⁴⁴⁴⁴Al Imam Mohammad Ibn Saud
Islamic University (IMSIU), Saudi Arabia and ⁴⁴⁴⁴Umm Al-Qura University, Saudi
Arabia
01
402
Email Spam Classification Using Hybrid Approach of RBF Neural Network and Particle
Swarm Optimization
Mohammed Awad and Monir Foqaha, Arab American University, Palestine
0
403
Performance Analysis of the Neighbor Weight Trust Determination Algorithm in MANETs
Ali Abu Romman¹ and Hussein Al-Bahadili², ¹Princess Sumaya University for
Technology, Jordan and ²University of Petra, Jordan
0
404
A Benchmark for Designing Usable and Secure Text-Based Captchas
Suliman A. Alsuhibany, Qassim University, Saudi Arabia
03
405
An Intelligent Classification Model for Phishing Email Detection
Adwan Yasin and Abdelmunem Abuhasan, Arab American University, Palestine 0
Volume 8, Number 5, September 2016
406
A Hybrid Approach Combining Rule-Based and Anomaly-Based Detection Against DDoS
Attacks
Chin-Ling Chen¹ and Hsin-Chiao Chen², ¹National Pingtung University, Taiwan
and ²National Pingtung Institute of Commerce, Taiwan
0
407
Enhance RFID Security Against Brute Force Attack Based on Password Strength and
Markov Model
Adwan Yasin and Fadi AbuAlrub, Arab American University, Palestine
0
408
Color Image Encryption Based on Multiple Chaotic Systems
Adwan Yasin and Fadi AbuAlrub, Arab American University, Palestine
Yuting Xi, Xing Zhang and Ruisong Ye, Shantou University, P. R. China
0
Volume 8, Number 6, November 2016
409
Steganalysis Algorithm for PNG Images Based on Fuzzy Logic Technique
Jawaher alqahtani¹, Daniyal Alghazzawi¹ and Li Cheng², ¹King Abdulaziz University,
Saudi Arabia and ²Chinese Academy of Sciences, China
0
39. 410
A Mechanism for Early Detecting DDOS Attacks Based on M/G/R PS Queue
Nguyen Hong Son, Post and Telecommunication Institute of Technology, Vietnam
0
411
A Bastion Mobile ID-Based Authentication Technique (BMBAT)
Abdelmunem Abuhasan and Adwan Yasin, Arab American University, Palestine
0
Volume 9, Number 1, January 2017
412
A Study on LEA and Seed Algorithms for Data Protection of Smartphone Based Disaster
Notification System
Jae Pil Lee, Jae Gwang Lee, Jun hyeon Lee, Ki-su Yoon and Jae Kwang Lee, Han Nam
University, Korea
0
413
Application-Layer DDOS Detection Based on a One-Class Support Vector Machine
Chuyu She¹, ², ³
, Wushao Wen¹,
, Zaihua Lin¹ and Kesong Zheng¹, ¹Sun Yat-Sen
University, China, ²SYSU-CMU Shunde International Joint Research Institute, China
and ³Guangdong University of Finance & Economics, China
0
414
A Survey on Security in Wireless Sensor Networks
Waleed Al Shehri, King Abdul-Aziz University, Saudi Arabia
06
Volume 9, Number 2, March 2017
415
Metric for Evaluating Availability of an Information System : A Quantitative Approach
Based on Component Dependency
Suhail Qadir Mir1
and S.M.K. Quadri2
, 1
University of Kashmir, India and 2
Jamia
Millia Islamia, India
0
416
A Secure E-Medical Exemption System (E-MES): Jordan Case
Heba N. Kamel, Mohammad A. Alia, Bara'aha. Al Saeq and Eman Abu Maria, Al
Zaytoonah University of Jordan, Jordan
0
Volume 9, Number 3, May 2017
417
A Conceptual Secure Blockchain Based Electronic Voting System
Ahmed Ben Ayed, Colorado Technical University, USA
0
418
Enhancing Cyber Security of Online Accounts via A Novel Protocol and New Techniques
Mehrdad Nourai and Haim Levkowitz, University of Massachusetts Lowell, USA 0
40. Projected citation counts in 2020 for International Journal of Network
Security & Its Applications (IJNSA)
Calendar
Year
(A): # Papers
published per
year
(B): Total
# citations
(as of Oct.
2016)
(C): Median
# of citations
per paper
(D):
Average #
citations
per paper
per year
(E):
Projected
total #
citations
in 2020
2009 24 478 9 2.5 717
2010 53 647 7 1.7 1012
2011 90 1063 5.5 2 1770
2012 77 724 3 1.9 1305
2013 80 305 2 1 608
2014 37 545 2 5 1274
2015 24 74 1 1.5 222
2016 26 21 0 0.8 105