Current Issue
November 2019, Volume 11, Number 6
Quality Assessment of Access Security Controls over Financial Information
Angel R. Otero, Christian Sonnenberg and LuAnn Bean, Florida Institute of Technology, USA |
September 2019, Volume 11, Number 5
Machine Learning in Network Security Using KNIME Analytics
Munther Abualkibash, Eastern Michigan University, USA |
EUNICERT: Ethereum Based Digital Certificate Verification System Trong Thua Huynh1, Dang-Khoa Pham2, 1Posts and Telecommunications Institute of Technology, Vietnam and 2FPT Telecom, Vietnam |
Map Reduce Implementation for Malicious Websites Classification Md Maminur Islam1, Subash Poudyal1 and Kishor Datta Gupta2, 1University of Memphis, USA and 2Lamar University, USA |
July 2019, Volume 11, Number 4
Authentication Mechanism Enhancement Utilising Secure Repository for Passwordless Handshake Ioannis A. Pikrammenos, Panagiotis Tolis and Panagiotis Perakis, University of Derby, Greece |
A Chaotic Confusion-Diffusion Image Encryption Based on Henon Map
Ashraf Afifi, Taif University, Kingdom of Saudi Arabia |
System Call Dependence Graph Based Behavior Decomposition of Android Applications Bin Zhao, JD.com Silicon Valley R&D Center, USA |
A Novel Image Encryption Scheme with Huffman Encoding and Steganography Technique Manju Kumari1, Vipin Pawar2 and Pawan Kumar3, 1YMCA University of Science and Technology, India, 2Deenbandhu Chotu Ram University of Science and Technology, India and 3University of Delhi, India |
Exploring Challenges and Opportunities in Cybersecurity Risk and Threat Communications Related to the Medical Internet of Things (MIOT) George W. Jackson, Jr.1 and Shawon S. M. Rahman2, 1Capella University, USA and 2University of Hawaii-Hilo, USA |
Generalized Legendre Polynomials for Support Vector Machines (SVMS) Classification Ashraf Afifi1 and E.A.Zanaty2, 1Taif University, Kingdom of Saudi Arabia and 2Sohag University, Egypt |
May 2019, Volume 11, Number 3
Enhancing the Wordpress System: from Role to Attribute-Based Access Control Lifeng Cao, Jia Ying Ou and Amirhossein Chinaei, York University, Canada |
Classification Procedures for Intrusion Detection Based on KDD CUP 99 Data Set Shaker El-Sappagh, Ahmed Saad Mohammed and Tarek Ahmed AlSheshtawy, Benha University, Egypt |
Xdoser, A Benchmarking Tool for System Load Measurement Using Denial of Service Features AKM Bahalul Haque, Rabeya Sultana, Mohammad Sajid Fahad , MD Nasif Latif and Md. Amdadul Bari, North South University, Bangladesh |
Multi-Layer Classifier for Minimizing False Intrusion
Shaker El-Sappagh, Ahmed saad Mohammed and Tarek Ahmed AlSheshtawy, Benha University, Egypt |
Methods Toward Enhancing RSA Algorithm : A Survey
Shaheen Saad Al-Kaabi and Samir Brahim Belhaouari, Hamad Bin Khalifa University (HBKU), Qatar |
Survey on Secure Routing in Vanets
Afef Slama1 and Ilhem Lengliz2, 1University of Manouba, Tunisia and 2Military Academy, Tunisia |
A Combination of Temporal Sequence Learning and Data Description for Anomaly - based NIDS Nguyen Thanh Van1,2, Tran Ngoc Thinh1 and Le Thanh Sach1, 1Ho Chi Minh City University of Technology, VietNam and 2Ho Chi Minh City University of Technology and Education, VietNam |
March 2019, Volume 11, Number 2
Performance Analysis of Routing Protocols in MANET Under Malicious Attacks Gorine1 and Rabia Saleh, 1Gloucestershire University, England |
Dual Security Using Image Steganography Based Matrix Partition Huda H.Al.Ghuraify, Ali A.Al-Bakry, Ahmad T. Al-Jayashi, al-furat al-awsat university, Iraq |
A Review of Selected Proposals for Improving Identity Privacy in UMTS Hiten Choudhury, Cotton University, India |
KVEFS: Encrypted File System Based on Distributed Key-Value Stores and FUSE Giau Ho Kim, Son Hai Le, Trung Manh Nguyen, Vu Thi Ly, Thanh Nguyen Kim, Nguyen Van Cuong, Thanh Nguyen Trung, and Ta Minh Thanh, Le Quy Don Technical University, Vietnam |
Security& Privacy Threats, Attacks and Countermeasures in Internet of Things Faheem Masoodi1, Shadab Alam2 and Shams Tabrez Siddiqui2, 1University of Kashmir, India and 2Jazan University, KSA |
January 2019, Volume 11, Number 1
Malware Detection Using Machine Learning Algorithms and Reverse Engineering of Android Java Code Michal Kedziora, Paulina Gawin, Michal Szczepanik and Ireneusz Jozwiak, University of Science and Technology Wroclaw, Poland |
A Light Weight Solution for Detecting De-Authentication Attack
Rajinder Singh and Satish Kumar, PUSSGRC Hoshiarpur, Punjab, India |
A Multi-Layer Arabic Text Steganographic Method Based on Letter Shaping
A.F. Al Azzawi, Philadelphia University, Jordan |
Performance Evaluation of Parallel International Data Encryption Algorithm on IMAN1 Super Computer Ahmad Bany Doumi and Mohammad Qatawneh, University of Jordan, Amman-Jordan |
A Survey on Optimization Based Spectrum Sensing Techniques to Reduce ISI and PAPR In OFDM Based Cognitive Radio System 1B.Maheswara Rao, 2S.Baskar, 1Research scholar and 2Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology |