Most Cited Articles
Most Cited Articles – 2017
A Conceptual Secure Blockchain Based Electronic Voting System Ahmed Ben Ayed, IJNSA Journal, Vol.9, No.3, May 2017, PP. 01-09 10.5121/ijnsa.2017.9301 |
Node Authentication Using BLS Signature in Distributed PKI Based MANETs N Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, V. Ch. Venkaiah and Y. V. Subba Rao, IJNSA Journal, Vol.9, No.4, July 2017, PP. 33-44 DOI: 10.5121/ijnsa.2017.9403 |
A Comparative Study of the Approach Provided for Preventing the Data Leakage Kamaljeet Kaur, Ishu Gupta and Ashutosh Kumar Singh, IJNSA Journal, Vol.9, No.5, September 2017, PP. 21-33 DOI: 10.5121/ijnsa.2017.9502 |
Feature Extraction and Feature Selection : Reducing Data Complexity with Apache Spark Dimitrios Sisiaridis and Olivier Markowitch, IJNSA Journal, Vol.9, No.6, November 2017, PP. 39-51 DOI: 10.5121/ijnsa.2017.9604 |
Most Cited Articles – 2016
The Internet of Things : New Interoperability, Management and Security Challenges Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung, IJNSA Journal, Vol.8, No.2, March 2016, PP. 85-102 DOI : 10.5121/ijnsa.2016.8206 |
Wearable Technology Devices Security and Privacy Vulnerability Analysis Ke Wan Ching and Manmeet Mahinderjit Singh, IJNSA Journal, Vol.8, No.3, May 2016, PP. 19-30 DOI: 10.5121/ijnsa.2016.8302 |
Big Data Security and Privacy Issues in the CLOUD Ali Gholami and Erwin Laure, IJNSA Journal, Vol.8, No.1, January 2016, PP. 59-79 DOI : 10.5121/ijnsa.2016.8104 |
An Intelligent Classification Model for Phishing Email Detection Adwan Yasin and Abdelmunem Abuhasan, IJNSA Journal, Vol.8, No.4, July 2016, PP. 55-72 DOI: 10.5121/ijnsa.2016.8405 |
Most Cited Articles – 2015
A New Image Steganography Algorithm Based on MLSB Method with Random Pixels Selection Odai M. Al-Shatanawi and Nameer N. El. Emam, IJNSA Journal, Vol.7, No.2, March 2015, PP. 37-53 DOI : 10.5121/ijnsa.2015.7203 |
A Machine Learning Approach to Anomaly-Based Detection on Android Platforms Joshua Abah, Waziri O.V, Abdullahi M.B, Arthur U.M and Adewale O.S, IJNSA Journal, Vol.7, No.6, November 2015, PP. 15-35 DOI : 10.5121/ijnsa.2015.7602 |
Accessing Secured Data in Cloud Computing Environment Hasan Omar Al-Sakran, IJNSA Journal, Vol.7, No.1, January 2015, PP. 19-28 DOI : 10.5121/ijnsa.2015.7102 |
Comprehensive Survey of Possible Security Issues on 4G Networks Sumant Ku Mohapatra, BiswaRanjan Swain and Pravanjan Das, IJNSA Journal, Vol.7, No.2, March 2015, PP. 61-69 DOI : 10.5121/ijnsa.2015.7205 |
Most Cited Articles - 2014
CLOUD COMPUTING AND SECURITY ISSUES IN THE CLOUD Monjur Ahmed and Mohammad Ashraf Hossain, Vol.6, No.1, January 2014, PP. 25-36 DOI : 10.5121/ijnsa.2014.6103 |
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING Venkata Narasimha Inukollu , Sailaja Arsi and Srinivasa Rao Ravuri, Vol.6, No.3, May 2014, PP. 45-56 DOI : 10.5121/ijnsa.2014.6304 |
Most Cited Articles - 2013
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET Ram Shringar Raw , Manish Kumar , Nanhay Singh, Vol.5, No.5, September 2013,PP. 95-105 DOI : 10.5121/ijnsa.2013.5508 |
TEXT STEGANOGRAPHIC APPROACHES: A COMPARISON Monika Agarwal, Vol.5, No.1, January 2013, PP. 91-106 DOI : 10.5121/ijnsa.2013.5107 |
A NEW STEMMER TO IMPROVE INFORMATION RETRIEVAL Wahiba Ben Abdessalem Karaa, Vol.5, No.4, July 2013, PP. 143-154 DOI : 10.5121/ijnsa.2013.5411 |
CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC Mostaque Md. Morshedur Hassan, Vol.4, No.2, March 2013, PP. 35-47 DOI : 10.5121/ijdps.2013.4204 |
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE Arijit Ukil , Debasish Jana and Ajanta De Sarkar, Vol.5, No.5, September 2013, PP. 11 to 24 DOI : 10.5121/ijnsa.2013.5502 |
Most Cited Articles - 2012
An Implementation of Intrusion Detection System Using Genetic Algorithm Mohammad Sazzadul Hoque, Md. Abdul Mukit and Md. Abu Naser Bikas, IJNSA Journal, Vol.4, No.2, March 2012, PP. 109-120 DOI : 10.5121/ijnsa.2012.4208 |
Provable Secure Identity Based Signcryption Schemes Without Random Oracles Prashant Kushwah and Sunder Lal, IJNSA Journal, Vol.4, No.3, May 2012, PP. 97-110 DOI : 10.5121/ijnsa.2012.4306 |
Non-Profit Organizations' Need to Address Security for Effective Government Contracting Lee E. Rice and Syed (Shawon) M. Rahman, IJNSA Journal, Vol.4, No.4, July 2012, PP. 53-71 DOI : 10.5121/ijnsa.2012.4404 |
Most Cited Articles - 2011
An Overview of the Security Concerns in Enterprise Cloud Computing Anthony Bisong and Syed (Shawon) M. Rahman, IJNSA Journal, Vol.3, No.1, January 2011, PP. 30-45 DOI : 10.5121/ijnsa.2011.3103 |
Analysis of Web Logs and Web User in Web Mining L.K. Joshila Grace,V.Maheswari and Dhinaharan Nagamalai, IJNSA Journal, Vol.3, No.1, January 2011, PP. 99-110 DOI : 10.5121/ijnsa.2011.3107 |
Authentication Schemes for Session Passwords using Color and Images M Sreelatha,M Shashi,M Anirudh,Md Sultan Ahamer and V Manoj Kumar , IJNSA Journal, Vol.3, No.3, May 2011, PP. 111-119 DOI : 10.5121/ijnsa.2011.3308 |
Data Security using Private Key Encryption System Based on Arithmetic Coding Ajit Singh and Rimple Gilhotra, IJNSA Journal, Vol.3, No.3, May 2011, PP. 58-67 DOI : 10.5121/ijnsa.2011.3305 |
Wavelet Thresholding Approach for Image Denoising Pankaj Hedaoo and Swati S Godbole, IJNSA Journal, Vol.3, No.4, July 2011, PP. 16-21 DOI : 10.5121/ijnsa.2011.3402 |
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks S.A.Arunmozhi and Y.Venkataramani, IJNSA Journal, Vol.3, No.3, May 2011, PP. 182-187 DOI : 10.5121/ijnsa.2011.3312 |
Replication Attack Mitigations for Static and Mobile WSN V.Manjula and C.Chellappan, IJNSA Journal, Vol.3, No.2, March 2011, PP. 122-133 DOI : 10.5121/ijnsa.2011.3210 |
Prevention of Wormhole Attack in Wireless Sensor network Dhara Buch and Devesh Jinwala , IJNSA Journal, Vol.3, No.5, Sep 2011, PP. 85-98 DOI : 10.5121/ijnsa.2011.3507 |
Information Security Synthesis in Online Universities Maria Schuett,Crisc and Syed(Shawon)M.Rahman, IJNSA Journal, Vol.3, No.5, Sep 2011, PP. 1-20 DOI : 10.5121/ijnsa.2011.3501 |
Enhancing Infrastructure Security in Real Estate Kyle Dees,M.S and Syed(Shawon)Rahman, IJNSA Journal, Vol.3, No.6, November 2011, PP. 59-80 DOI : 10.5121/ijnsa.2011.3604 |
Cryptanalysis and Further Improvement of a Biometric-Based Remote User Authentication Scheme using Smart Cards Ashok Kumar Das, IJNSA Journal, Vol.3, No.2, March 2011, PP. 13-28 DOI : 10.5121/ijnsa.2011.3202 |
A Human-Centric Approach to Group-Based Context-Awareness Nasser Ghadiri,Ahmad Baraani-Dastjerdi,Nasser Ghasem-Aghaee and Mohammad A. Nematbakhsh, IJNSA Journal, Vol.3, No.1, January 201, PP. 47-66 DOI : 10.5121/ijnsa.2011.3104 |
A Light Weight Protocol to Provide Location Privacy in Wireless Body Area Networks Mohammed Mana,Mohammed Feham and Boucif Amar Bensaber, IJNSA Journal, Vol.3, No.2, March 2011, PP. 1-11 DOI : 10.5121/ijnsa.2011.3201 |
Most Cited Articles - 2010
Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection Dewan Md. Farid,Nouria Harbi and Mohammad Zahidur Rahman, IJNSA Journal, Volume 2, Number 2, April 2010, PP. 12-25 DOI:10.5121/ijnsa.2010.2202 |
Hierarchical Design Based Intrusion Detection System for Wireless Ad Hoc Sensor Network Mohammad Saiful Islam Mamun and A.F.M. Sultanul Kabir, IJNSA Journal, Vol.2, No.3, July 2010, PP. 102-117 DOI : 10.5121/ijnsa.2010.2307 |
Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video Cover Media Natarajan Meghanathan and Lopamudra Nayak, IJNSA Journal, Vol.2, No.1, January 2010, PP. |
Design and Implementation of a Trust-Aware Routing Protocol for Large WSNS Theodore Zahariadis,Helen Leligou,Panagiotis Karkazis,Panagiotis Trakadas,Ioannis Papaefstathiou,Charalambos Vangelatos and Lionel Besson, IJNSA Journal, Vol.2, No.3, July 2010, PP. 52-68 DOI:10.5121/ijnsa.2010.2304 |
A Multi-Criteria Evaluation of Information Security Controls Using Boolean Features Angel R. Otero,Carlos E. Otero and Abrar Qureshi, IJNSA Journal, Vol.2, No.4, October 2010, PP. 1-11 DOI : 10.5121/ijnsa.2010.2401 |
Modeling yhe Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in Manet T.V.P.Sundararajan and A.Shanmugam Volume 2, Number 2, April 2010, PP. 147-160 DOI:10.5121/ijnsa.2010.2212 |
Cryptanalysis of a More Efficient and Secure Dynamic Id-Based Remote User Authentication Scheme Mueen Uddin,Kamran Khowaja and Azizah Abdul Rehman, IJNSA Journal, Vol.2, No.4, October 2010, PP. 129-141 DOI : 10.5121/ijnsa.2010.2411 |
Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2) Ulrich Herberg and Thomas Clausen, IJNSA Journal, Volume 2, Number 2, April 2010, PP. 162-181 DOI:10.5121/ijnsa.2010.2213 |
Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor Mohsen Machhout,Zied Guitouni,Kholdoun Torki,Lazhar Khriji and Rached Tourki, IJNSA Journal, Volume 2, Number 2, April 2010, PP. 100-112 DOI:10.5121/ijnsa.2010.2208 |
Dynamic Multi Layer Signature Based Intrusion Detection System Using Mobile Agents Mueen Uddin,Kamran Khowaja and Azizah Abdul Rehman, IJNSA Journal, Vol.2, No.4, October 2010, PP. 129-141 DOI : 10.5121/ijnsa.2010.2411 |
Analysis of the Security of BB84 by Model Checking Mohamed Elboukhari,Mostafa Azizi and Abdelmalek Azizi, IJNSA Journal, Volume 2, Number 2, April 2010, PP. 87-98 DOI:10.5121/ijnsa.2010.2207 |
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network Jaydip Sen, IJNSA Journal, Vol.2, No.4, October 2010, PP. 92-104 DOI : 10.5121/ijnsa.2010.2408 |
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags Eslam Gamal Ahmed,Eman Shaaban and Mohamed Hashem, IJNSA Journal, Volume 2, Number 2, April 2010, PP. 27-37 DOI:10.5121/ijnsa.2010.2203 |
Workload Characterization of Spam Email Filtering Systems Yan Luo, IJNSA Journal, Vol.2, No.1, January 2010, PP. 22-41 |
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services Urjita Thakar,Nirmal Dagdee and Sudarshan Varma, IJNSA Journal, Vol.2, No.3, July 2010, PP. 190-205 DOI : 10.5121/ijnsa.2010.2313 |
An Efficient IP Traceback through Packet Marking Algorithm Y.Bhavani and P.Niranjan Reddy , IJNSA Journal, Vol.2, No.3, July 2010, PP. 132-142 DOI : 10.5121/ijnsa.2010.2309 |
A Testbed Implementation for Securing OLSR In Mobile Ad Hoc Networks Emmanouil A. Panaousis, George Drew, Grant P. Millar, Tipu A. Ramrekha and Christos Politis, IJNSA Journal, Vol.2, No.4, October 2010, PP. 140-161 DOI : 10.5121/ijnsa.2010.2412 |
Most Cited Articles - 2009
A New Cluster-Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc Networks Debdutta Barman Roy,Rituparna Chaki and Nabendu Chaki, IJNSA Journal, Vol.1,No.1,April2009, PP. 44-52 | ||||
A Comparison Between Memetic algorithm and Genetic Algorithm for the Cryptanalysis of Simplified Data Encryption Standard Algorithm Poonam Garg, IJNSA Journal, Vol.1, No 1, April 2009, PP. 34-42 | ||||
Using Rough Set and Support Vector Machine for Network Intrusion Detection Rung-Ching Chen,Kai-Fan Cheng and Chia-Fen Hsieh, IJNSA Journal, Vol 1, No 1, April 2009, PP. 1-13 | ||||
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration Alan Mink, Sheila Frankel and Ray Perlner, IJNSA Journal, Vol 1, No 2, July 2009, PP. 101-112 | ||||
Tools and Techniques for Network Forensics Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore, IJNSA Journal, Vol .1, No.1,April 2009, PP. 14-25 | ||||
Cryptanalysis of a More Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme Mohammed Aijaz Ahmed,D. Rajya Lakshmi and Sayed Abdul Sattar, IJNSA Journal, Vol.1, No.3, October 2009, PP. 32-37 Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images | Krishnamurthy G N and Dr. V Ramaswamy , IJNSA Journal, Vol.1, No 1, April 2009, PP. 28-33 Intelligent Detection System Framework Using Mobile Agents | N.Jaisankar,R.Saravanan and K. Durai Swamy, IJNSA Journal, Vol 1, No 2, July 2009, PP. 72-88 Integrating Identity-Based Cryptography in IMS Service Authentication | Mohamed Abid,Songbo Song,Hassnaa Moustafa and Hossam Afifi , IJNSA Journal, Vol.1, No.3, October 2009, PP. 1-13 Agent Based Trust Management Model Based on Weight Value Model for Online Auctions | E.Sathiyamoorthy, N.Ch.Sriman Narayana Iyenger and V.Ramachandran , IJNSA Journal, Vol.1, No.3, October 2009, PP. 15-31 |