Personal Information
Website
About
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Tags
phishing
peer-to-peer network security
worms
spam
database and system security
cryptographic protocols
mobile
virus
e-mail fraud
web 2.0 security
ad hoc and sensor network security
ubiquitous computing security
network and wireless network security
security
security & network management
network security
e-mail security
trojan protection
intrusion detection and prevention
internet security & applications
session hijacking
mim
artificial intelligence
ddos
machine learning
hardware-based attacks
web based applications
intrusion detection
services security
performance evaluations of protocols & security ap
blockchain technology
crowd sourcing
social networking
security of virtual machines
machine learning for security
authentication
replay attack
replay attack etc
cyber security
body-area networks
home networks
network management
sensor network security
system security
blockchain
cryptography
privacy
industrial control systems
sdn
vanets
autonomous vehicles
data mining
deep learning
wireless network security
trojan protectio
cryptocurrencies
cognitive security
internet of things (iot) secur
cloud computing
security and optimization
electronic voting security
internet security & applicatio
big data
security application
encryption
intrusion detection and preven
neural networks
trojan protection security threats & countermeasur
e-mail fraud virus
ad hoc and sensor network security peer-to-peer ne
trust
bioinformatics
wireless sensor networks
internet of things
natural language processing
manet
information security
network and wireless network s
network and wireless network security mobile
database
) ubiquitous computing security web 2.0 security c
privacy challenges
fuzzy logic
ad hoc and sensor netw
steganography
computer vision
information retrieval
cloud
intrusion detection system
security threats
routing
security and privacy for iot
performance evaluations
security threats & countermeasures
connectivity and networking
detection
malware
iot applications and services
)
ontology
security threats & countermeasures (ddos
aodv
pattern recognition
peer-to-peer
key management
• ubiquitous computing security
• cryptographic protocols
• virus
• e-mail security
• intrusion detection and prevention
• peer-to-peer network security
• mobile
attack
knowledge processing
internet security
text mining
information extraction
• performance evaluations of protocols & security
• web 2.0 security
block cipher
• security & network management
• internet security & applications
• network and wireless network security
aes
internet of things (iot)
cyber physical system (cps)
image segmentation
android
robotics
image encryption
game theory
cybersecurity
decryption
attacks
• database and system security
classification
nlp
cyber physical system
network
ad hoc
wireless network
cloud security
e-commerce
iot
substitution
cloud and grid computing for big data
information hiding
dos
soft computing
resource provisioning
web security
performance evaluations of pro
semantic processing
ubiquitous computing
morphology
vanet
phonology
data security
hash function
qos
security.
rsa
business intelligence
wireless sensor network (wsn)
electronics and signal processing for iot
fog
steganalysis
permutation
ssl
cryptosystem
predictive learning
parallel processing
phishin
password
fuzzy systems
bayesian network
mobile ad-hoc networks
virtualization
signal processing for iot
electronics
malicious node
denial of service
mobile ad hoc networks
iot-enabled innovation
network protocols
usability
deployment scenarios
entrepreneurship
hacking
scanning
malware analysis
optimization
chaotic system
genetic algorithm
ethereum
udp flood
dynamic analysis
intrusion detection system (ids)
grid
machine learning algorithms
wireless sensor network
data protection
smart city
machine learning and ai for big data
icmp flood
wimax
kyoto2006+ dataset
discrete fourier transform
biometrics
hybrid intelligent systems
random forest
secret sharing
lexical semantics
access control
chunking/shallow parsing
watermarking
wsn
machine translation
malware detection
smart grid
anonymity
experimental results
distributed denial of service
threats
generalized arnold map
symmetric key
trojon protection
security techniques
visualization
data center network control
array signal processing
quantum cryptography
secure routing
information technology
cooperation
elliptic curve cryptography
firewall
framework
user identity
ad hoc and sensor network security • peer-to-peer
• network and wireless network security • mobile
blockchain scalability
knowledge representation
ai algorithms
vpn
biometric security
iot-enabled innovation and entrepreneurship
wireless ad hoc networks
block chain issues and trends
question answering
data science
manets
3d and stereo imaging
digital image processing
wireless networks and mobile computing
e-voting
grid computing
http flood attack
mobile security
risk management
cyberattack
big data mining
syn flood
dns reflection or amplification attack
key distribution
text steganography
intrusion
mobile network
computer & network security
protocol
ns2
ddos attack
dsr
social engineering
mobile banking
chaos
wlan
verification
intrusion prevention
service oriented architecture
mobile agent
secure cloud computing
intrusion detection systems
group testing
mobile payment
fog computing
visual cryptography
reputation-based
it security
confidentiality
data
critical infrastructures
cloud storage and file systems
ipsec
man-in-the-middle attack
denial-of-service attack
text stenography
private key
window function
benchmarks
unsw-nb15
public key
quantum key distribution
anomaly-based detection
decentralized trust management
python programming language
nlp and machine learning
spoken language processing
consensus
secret key
big data applications
multimedia etc
5g and networks for big data
blockchain based security for the iot
blockchain authentication and authorization
economics
support vector machine
cpu
anomaly
ecc
trojan protection • security threats & countermeas
risk mitigation
mapreduce
virtual machines
collaborative environments
unfettered rules
e-mail fraud • virus
kleptography
data visualization
device authentication
edge
performance evaluation
methodology
feature
protocols
voip
experimental results and deployment scenarios
natural language computing
bluetooth
multimedia
integrity
network protocols & wireless networks
feature selection
classifier
social media
color and texture
intruders
image processing
tdes
internet signal processing
vulnerability assessment
security management
cybercrime
user authentication
rsa algorithm
programming languages
learning problems
rotor cipher
wormhole
brute force attack
honeypots
denial of service attack
vanet attacks
data mining techniques
blowfish
bro ids
inventory
trust management
device fingerprinting
endpoint security
authorization
device deployment
spectral analysis
twitter
initial trust
fuzzy logic.
zigzag scanning
subliminal channel
psnr
ascii code
trapdoors
covert channel
cad design and testing
mobile devices
least significant bit (lsb)
3-d mesh
cipher text
hamiltonian model
management
security engineering
algorithms and applications
forecasting
databases
optical computing
network security.
network performance
deadlock-free
computer networks & communications
wireshark
nwtd
trust-based routing protocols
trust determination
security properties
wireless
digital forensics
trusted third party
bb84 protocol
text-based captcha
email spam
denial-of-service
vehicular forensics
network intrusion detection
software security
information centric network
computer science
challenges
ad hoc network
brute force attacks
big data techniques
models and algorithms
edge & cognitive s
wearable technology
network forensics
smart card
password handling
internal controls
quantitative trait loci
carry select adder
dual-port read-only memory
xor
symmetric cryptography
pox
topology discovery
software defined network
web authentication
nlp and ai
ldap
kerberos v5
packet flow
mobile authentication
abnormal.
pervasive computation trust
entropy
trust and privacy challenges
broadcasting communication
networking and architectures
wormhole routing
integrity.
frequent sequence mining
behavioural pattern
api calls
reinforcement learning
sha-1
color space
benchmark
trust and privacy ch
natural language prepossessing
smartwatch
multi-layer encoding
m/g/r processor sharing queue
theory of parallel / distributed computing
cyber trust and security
software systems and technologies
wearable devices
penetration testing
medical system
• theoretical computer science and algebra
lte
umts
imsi
identity
kvefs
encrypt file system
key-value store
file system in user space (fuse)
routing protocols
image steganography
spatial domain
matrix partition
least significant bit
protocols.
electronic voting system
plain text
cybersecurity culture
assessment survey
covid-19 pandemic
cryptocurrency exchange
mitm attack
key spoofing
beacon
seed
smartphone
disaster
lea
password.
markov-model
rfid
brute-force attack
svm
internet of thing
the mapping study
biometric authentication
traceback
shortest path
manet(mobile adhoc network).
email classification
metric
availability
distributed denial-of-service (ddos)
dependency
face
fingerprint
application-layer ddos attack
sybil attack
browsing model
digital signature
false alarm
firewalls
connectivity
• database
notification
appliance
end-to-end security model
els
network defenses
web server handlers
zero trust architecture
mse
sgd
• security threats & countermeasures
security information systems architecture and desi
security and privacy in mobile systems
access control and intrusion detection
encrypting
decrypting
social networks & web 2.0 trust management
diffusion.
confusion
tools
shuffle
henon map
iot connectivity and networking
encryptions
) • ubiquitous computing security • web 2.0 securi
wireless mesh networks
healthcare cybersecurity
iot security
reliability
sniffing
surveillance
usable security
location privacy
cryptanalysis
arithmetic coding
public-key cryptography
data description
temporal sequence
anomaly-based network intrusion detection system
blockchain privacy
attacks & performance
mobile ip
standard
access security controls
analytic hierarchy process
pairwise comparisons.
performance
congestion control
session key establishment
security policy
model checking
computing
data hiding
automation
error detection
fault tolerant
rc4
crypto stream ciphers
security for grid computing
detection rate
decision tree
a digital certificate
public key cryptography
big data search and mining
nsl-kdd
blockchain attacks on existing systems
matlab
random number generator
administrator
bloom filter
mutual authentication
secure communication
mobile ad-hoc network
fair exchange protcocol
insider threats and countermeasures
bfmawddl
bfcdnba
bfma
dpa
wddl
logistic map
bf
securing windows
microsoft domain environment
spectrum analysis
automated ids
distributed denial of service (ddos)
elliptic curve
policy management
agent based trust management
authentication and identity management
insider threat
p2p
esrm
clusters and grid computing : security and role of
maturation of a profession
risk mechanism
enterprise risk management
risk principles management
manage security programs
pki
ivote
smart vehicles
dispute settlement
interworking
i-voting
image classification
simulation
device association
tls
incident response
reputation system
vulnerability
vanet security and privacy approaches
vanet adversaries and attackers
security and privacy requirements in vanet
exploit.
okhttpclient
mix zone
pseudonyms
httprequests
unavailability
click spam
false alarms
web advertising
google ads
pay-per-click advertising
apache spark
kdd cup 99
security analytics
content management
wordpress
attribute-base-access-control
role-base-access-control
network architectures
mobile networks & wireless lan
training
feature extraction
cross site scripting
security risks
big data management
netstat
the sleuth kit (tsk)
autopsy
tcpview
sparql
emerging attack vectors
all-optical network security
n-triples
owl
rdf.
k-means clustering
recommender system
frequent itemset
decision making
optical switch crosstalk
digital signal processing
threshold cryptography
erbium-doped fiber amplifier (edfa) gain adjustmen
false positive rate (fpr)
aodv.
rul
hmac
swifi
online social networks
quantitative evaluation
anomaly severity evaluation
profile cloning
computer network
multi-anomalies evaluation.
semantic evaluation
evolutionary computation
anomaly severity classification
cloud service
visual information processing
sql injection
distributed computing
conditional entropy
wardriving
shares
greying effect
key share.
energy efficiency
denial of service (dos)
wireless local area network (wlan)
wired equivalent privacy (wep).
hadoop
protection m echanism
prognostic
secret image sharing
quadratic residues
wi-fi
wireless networks
ns2[1]
image coding
data type
data size
cipher algorithms
semantic processing & nlp
security protocol
caesar cipher[2]
question answering (qa)
data density and encryption time
gpu
cuda
coefficient of variance
quality of service
tkip
radius
signal or image processing
syn flooding
tcp sequence number attack
mog-hmm
cooperative transmission
packet broadcast
healthcare
opportunistic large array
mis
quality
alert correlation
data integrity
data center network
svm.
risk assessment
privacy protection
role-based access control
xacml
file upload
video upload
virtual system
study material
data & system integrity
privacy and authentication
multi-som
som
computerbased information system
and pso.
iqim
dabechies4
interweaving
flash crowds
credits.
mom
wire antennas
gain
dct based steganography
current distribution
vswr
random grids
fractal
input impedance
polarization
resonant
bgp protocol
hashing.
interoperability
bmp image file
iris
sobel
prewitt
canny
zero cross
daugman
non-adaptive group testing
ddisjunct matrix.
pos tagging
ditributed denial-of-service attack
critical infrastructures.
man-in-the-browser
8 bits microcontroller
iaas& authentication
aran
paas
ndm
knowledge-based authentication
smt
vn
vanet architecture
ariadne
clustering
sead
intrusion detection system.
mobile agents
multi-agent systems
mobile code
common control channel challenge
crahn
multi-channel mac
network-level security and protection
idpf
ip falsifying
infrastructures for big data
service discovery
network simulation tool
encryption\decryption
bgp
pgp
signal processing
botnets
exploring data analysis
data storage
cyber defense
internet casinos
mechatronics
map reduce
lsb steganography
hybrid
mitigation
agent based intrusion detection system (aids)
black hole attack
lstm
security plan
policy deployment
small business
risk planning
parsing
internet attacks
neural languages
knowledge base
local authentication protocols
software engineering
mobile cloud computing
finger print authentication
data center
dmt
firewall policy
stemming
dft
intelligent system architectur
3gpp
4g
security architecture
rhetorical relations
probability model
hvac
ir circuit
extractive text summarization
signal identification
text clustering
distributed ac
peer-to-peer network
embedded systems
markov random walk model
video signal processing
des
attribute reduction
artificial neural network
covert schemes
security solutions
pre-hacking
necessary information
gsm security
mobile communication
email fraud
secret handshakes
dynamic matching
bilinear pairing
multi-faceted model
utm clinic
online social network
updater identification
application whitelisting
resource description framework(rdf)
service-oriented approach
version control
virtual password
mix
secure communication channel
linguistic resources
strong authentication
shared secret session key
blue-tooth
temperature control
file systems
temperature monitoring
scenario-based approach
visualization and animation
empirical evaluation
key escrow
certificate less cryptography
multiple encryption
blockchain in digital forensic
big data analytics and social media
rotation of the bits
management & interoperability
method engineering
threat modeling
cloud software development
security event management
data correlation
network dependency analysis
sensors
googleglass
distributed ledger technology
collective digital signature
ubiquitous
historical
response
attack detection
bloom filter.
distributed denial-of-service attack
particles swarm optimization.
radial basis function neural networks
mansim.
smart cities
mnist benchmark.
security and privacy
static analysis
adaptive neural network
resource injection
aco
comprehensive evaluation
lightweight
software vulnerabilities
path manipulation
k-nearest neighbour
anomaly detection
practical testing system
unreleased resource
avispa.
industrial communication security
source code analysis
low-resource
mode of operation
network steganography
real-time networking
tcp/ip communications
inspection game.
agile programming
waterfall methodology
owasp
braiding/entanglement
information security.
multipath routing
qos routing
priority scheduling
application resource
graphical password
legitimate traffic.
dll. llc
media access control
physical layer
watch dog
packet dropping attack
information flow tracking
functional call monitoring
smart contracts
mobile adhoc network
encryption/decryption[2]
selfishness
alert aggregation
cognitive load
hamming distance
attribute-based encryption
multiparty micropayment
payment certificate
ccmp
³Ùé±ô鳦´Ç³¾³¾³Ü²Ô¾±³¦²¹³Ù¾±´Ç²Ô²õ
porter stemmer
pairing based cryptography
coefficient correlation
shiftrows
nist
energy-aware routing
dna
threshold level
mac-layer
trust-based routing
coercing
secure routing protocol
secure servers
hybrid intrusion detection system
support vector machine (svm)
cryptoviral extortion.
conficker
classification accuracy
gpcode.ak
cancellable biometrics
non-invertible transformation
attackers .
authentication.
covert channel.
medium accesscontrol
packet detection and packet header matching (phm)
sha-512
snort
sessionbased
minutiae
network intrusion detection system (nids)
we propose a novel distributed intrusion detection
bandwidth reservation
ad hoc and sensor
ann
secure network
distributed rate control.
biohashing
probabilistic encryption
deniable encryption
receipt-free
fingerprint biometrics
rigging
cryptotrojan
firewall systems design
z-transform; frequency domain; watermarking; mean
graphical passwords
dns poising
fuzzy neural network
cryptovirology
cryptovirus
iptables
network intrusion prevention
np-complete
quotient ring
diophantine equation
one-way function
snakes & ladders game
nonlinear function.
fuzzy c-means clustering
invisible digital watermarking
pixel
diffie-hellman algorithm
arithmetic encoding
image denoising
password (information) snatching
evasive/ deniable/ untraceable attacks
hash function [2].
db index.
wavelet thresholding
noise categories
etc.
proposed method.
information theory
electronic espionage threats
identity based firewalls
electronic warfare threats
computer networks
biometric information
honeypot and nics.
sensor network
network density
enterprises security risk management
physical cryptography
network security; malware propagation modelling; b
credential
compression-crypto
ip spoofing
• security
modeling
• internet security
system dynamics
mediator
delay.
cdma throughput
data integration
mobile ad hoc networking
floating point number
active detection
in order to the rapid growth of the network applic
diffusion process and stream cipher.
priori probability
session passwords
shoulder surfing
life time
mapping
biometrics; biometric fusion; face; fingerprint; c
enterprises security risk managemen
pdca
information security management systems (isms)
iso 27001
digital identity
openid
cobit
nsgaii.
objective functions
oix
oauth
attack tree
physical unclonable functions
user authentication; group communication; secret s
buffer
traffic flow
performance evaluation.
diffusion
it governance
deviation detection
stage staffing
best practice
2-d arnold cat map
distributed resource allocation
encryption and decryption algorithm for watermarki
digital multimedia
asynchronous distributed pricing
stage staffing watermarking
copyright protection
static and mobile wsn.
node replication attack
sybil
clone
crossover
data and grid room
and bernoulli map
quadratic map
tent map
statistical hypothesis testing
kolmogorov-smirnov test
statistical test of significance
arp spoofing
it is necessary that this security concern must be
queuing model
system information leak
host based ids
poisson arrival
new kinds of network attacks are emerging endlessl
lan attack
and public-key.
rtos
system access control
one time pad
real time application
workload characterization
knowledge discovery in databases and privacy prese
integrated verification.
software implementation
usage control
malicious
mechanism
message digest
routing protocol
soa
cryptographic algorithm.
selinux
registration time.
packet loss
handoff delay
triangle routing
route optimization
tunneling
longitudes
latitudes
location coordinates
transposition cipher
rangoli
masquerade attack
remote user
smartcard
batch verification
service authentication
identity based cryptography (ibc)
ip multimedia subsystem (ims)
network security protocols
http intrusion detection.
fuzzy cognitive mapping
fuzzy intrusion detection
application layer misuse detector
semantic intrusion detection
naive bayesian classifier
false positive
big-dragon cryptosystem.
little dragon cryptosystem
multivariate cryptography
and matlab.
customizable security.
policy-driven security
content-addressable storage security
smurf attacks.
adhoc network
multi input multi output (mimo)
computer
and services.
attack graph
interactive education.
hdfs (hadoop distributed file system)
network security management
complexity.
ldpc codes
chained codes
image
video
cover media
anti-spam
email filtering
ip traceback
zss signature.
data outsourcing; privacy; public cloud severs; ac
usable security.
software configuration management
authorization and password.
cyber-defense.
hdl.
steganography; image segmentation; byte characteri
threshold cryptography.
anomaly-based intrusion detection system
protocol safety.
software
secured watermark system (sws) and computer securi
networking
wireless.
and exemption.
intellect learning.
finite elements.
malware detection and mobile device.
information system.
one-class support vector machine
shared register array
self-propagating malware
connection failure behavior
rate limitation
shared bitmap
encryption and decryption.
mobile ad hoc networks security
authentication & q-learning
j48.
quantum networks
file handler
regexpr
html
sub
perl
quantum superposition state
no key-exchange
password replace ment
inter packet delay
ieee 802.11b
ieee 802.15.4
heterogeneous wireless network
coexistence
dfa
and crypt ography.
signature processing
signature formulation
intrusion detection / prevention systems
key establishment
lu matrix composition
feedback
convolutional coding
soft input
iterations
guard node
cluster
key sensitivity
avalanche
legal aspects
packet sniffers
lu-cac
caca
bandwidth link utilization
reliability.
emergency response communication
wave files.
signature based detection
behaviour based detection
flow based detection
c&c
irc
botnet
share
n) visual cryptography
(2
smart-card
multi-server
low-cost cryptography
node misbehaviour.
malicious packet dropping
controlled flooding
reputation
mobile ad hoc network (manet)
wake up receiver
vlsi
low power
multigeneration keys.
random kd (key distribution)
sec-leach (secure leach)
sensor networks
leach (low energy adaptive clustering hierarchy)
smart cards
remote user authentication
attack games.
eavesdroppers
wireless body area networks
niger-delta
clustering routing
judy array
blom
location-dependent social networks
community consensus
pragmatic web
agent-based systems
spatial reasoning
computing with words
uncertainty
language-action perspective
and delay
vmware
performance measurement
network virtualization
switching and addressing techniques self-organizin
& privacy next generation internet & web architect
phonology and morphology addressing & location man
data shredding
confidence level
lsb replacement steganography
ipfix
flow
scan detection
mac addresses hash value.
multicast communication
ad-hoc networks
hierarchical design
ids
tls protocol
timers
typing rhythms
keystroke
passwords
implementation cost
service differentiation.
mb-ofdm
interference limitation
pareto-efficiency
password strength
text passwords
vulnerability analysis
olsrv2
selfish nodes
content
clusters
overlay
replica
impersonation attack.
undetectable online password guessing attack
ecc-3peke protocol
finite fields & montgomery algorithm.
cellular automata
log analysis.
audit system
event classification
galois counter mode.
link layer security
circular queue.
hybrid covert channel
dst
md5
sha-256
ip
ao
udt
high speed bandwidth
next generation network protocol
desirability functions
best practice frameworks
baseline manuals
risk analysis and management
information security controls
signatures
web services
interpolation.
qim
m-ary modulation
error concealment
data value
network security & identity privacy
fair exchange
attack graph.
efficient probabilistic packet marking algorithm
probabilistic packet marking algorithm
online auction network
ciphers identification
encryption modes
feature engineering
block ciphers
encryption time
cryptographic algorithm
wormholes
spread spectrum
selective jamming
detection models
ensemble machine learning
ddos attacks
r360
web intelligence
evolutionary computing
ai in cyber security
nids
peer-to-peer transactions
fintech
central bank digital currency
digital rupee
smart banking
survey
domain analysis
scoring benchmark
http strict transport security
shape representation
text processing
document recognition
signal noise control
victimization
information
emotion
signal
mobile education
face and gesture
constraint processing
filter design and structures
signal reconstruction
network layer security
radar signal processing
medical image analysis
medical image processing
ad hoc and sensor network
multi input multi output (mimo
smurf attacks
electronics and signal process
services
salting techniques
hash analysis
security breaches
software defined networking
network intrusion detection sy
protection mechanism
interactive education
face recognition
hdfs (hadoop distributed file
cloud storage
mobile computing
context-aware computing
smartwatches
assessment
fuzzy set theory
accounting
random forest algorithm
pe header
pe file
higher education
devices authentication
security metrics
packet analyzer
tcp
network traffic
dos attack
secure division
secure sum
naive bayesian
privacy preservation
authentication scheme
cryptography primitives
password replacement
sequence number
monitoring agent
side channel monitoring
hooks
voice activation
byte characteristic
zss signature
cyberdefense
double spending
cybercrime awareness
cybercrime on social media
education
self-sovereign identity
digital transformation
software configuration managem
public cloud severs
data outsourcing
pervasive/ubiquitous computing
regulation and trust mechanism
software-defined networks
rerouting
security logs
hypergraphs
cloud data security
fine grained access
group key management
electronic payment
hash chain
multimedia & cognitive informa
symbolic machine learning
security posture
open-source erp software
factors
attributes
measurement framework
parsing/grammatical formalisms
monetary policy
socioeconomic impact
system call
hybrid analysis
android banking trojans
security threats & countermeas
web and internet computing
ontology and semantic web
machine learning & application
grid and scalable computing
information technology trends
bitwise-based hash
split sketch
principle component analysis
victim identification
ddos detection
claims processing
process improvement
insurance
http flood
tcp syn flood
markov chain
structural similarity index measurement (ssim).
universal quality image (uqi)
image fidelity (if)
peak signal to noise ratio (psnr)
mean square error (mse)
frequency domain
z-transform
identity federation.
limitations
identity management
federated identity management
distributed system.
information-centric
internet-of-things.
detection model
malicious javascript
firmware
resource management
ngns
finding roots modulo.
signing group
group digital signature
implementation
technology
power distribution
social computing
consensus mechanism
signing group.
difficult computational problems
groupdigital signature
land
term frequency-inverse document frequency vectors
n-gram analysis
malware classification
convolutional neural network
risk and threats
bayesian belief network
malware propagation modelling
shifting
shifting.
sprase svd (ssvd)
singular value decomposition (svd)
multimodal authentication
exponential kronecker product (ekp)
kronecker product
context-sensitive exponent associative memory mode
biometric fusion
information theor
intelligent transportation system
sensor network.
etc
db index
cyber human behaviour
stylometric analysis
phishing email attack
cyber-security
security policies
defense mechanisms
employee awareness
wimd cybersecurity
wimd
wireless implanted medical devices
cardiac implanted device
health belief model
windows api calls.
multilayer security
indexing cipher
dna cryptography
nb.
knn
cnn
offline signature recognition
smart contracts.
decentralized application
added value applications
enablers
arxiv
reddit
stackexchange
text classification
topic modeling
dst.
threats and attacks
lan
passphrase
mixture words
nouns
recall
recognition
user behavior
optimal path
big data tools and systems
virtualization on platforms in the cloud
data storage and management in cloud computing
security techniques for the cloud
virtual compute clusters
system integration
cloud based
reference dna
information systems
cisco packet tracer
cyber-attack
security issue
smart devices
incentive schemes.
rewards
federated learning
incentive schemes
high port application
sinet
port filtering
data flow pipeline
traffic patterns
covid-19 related ioc
prediction support parameter.
k-means clustering algorithm
internet of things (iot) security
blockchain technology and cyber security
we introduce new detection engine for hybrid cover
a variant of covert channelworks similarly as netw
the privacy. most of such attacksare devised using
computer network is unpredictable due to informati
iot devices.
technical and security issues
comparison.
review
mare
sama
software architecture
microservices
trojan.
human factors
end-user errors
engineering cybernetics
multimodal skew tent map
interchange permutation
eap-ttls
inductive learning
nlp and information retrieval
and text mining
web
machine learning techniques
bls signature
secret sharing technique
bi-variate polynomial
security for emerging networks
modelling
cyber attacks
tree
bayes
techniques
coding and transmission
anomaly-based intrusion detect
protocol safety
big data in cloud
cloud management
cloud storage for iot
sensitive data
insider attacks
data leakage prevention (dlp)
data access & protection
micro medical processors
knowledge instruction
medical sensor network
micro knowledge processors
knowledge processors
image analysis
multimedia data mining
crypto
agreements
blockchains
smart grids
real-time systems
maintenance engineering
production
worms &trojan
mobile clouds
sla management
machine learning and ai
network traffic analysis
asset inventory
data classification
cybersecurity frameworks
threat intelligence
zero-day vulnerabilities
ipv4
exemption
information system
digital investigations
digital forensics readiness
digital evidence
wireless medical networks
ad-hoc on-demand distance vect
mobile ad-hoc network (manet)
one-class support vector machi
sharing queue
m/g/r processor
operating systems
computer architecture
fake profiles
xg boost
nft
reasoning and evolution
gpt-4
graphcodebert
codebert
source code vulnerability
powershell
microphone security
webcam security
unauthorized access detection
learning methods and analysis
cybersecurity awareness
ai-based security
phishing prevention
browser extensions
malicious url detection
media computing
information fusion
host-based intrusion detection
network-based intrusion detect
small-to-medium enterprises
rough and fuzzy rough set
hybrid and nonlinear system
data and web mining
automated machine learning
programming models
static testing tools
openmp
software testing
exascale systems
preferential attachment topolo
model simulation
netlogo
horizontal scalability
direct acyclic distributed led
packet delivery ratio
throughput
hdl
network mapping
nmap
social clouds
consolidation
software defined networking (s
patient empowerment
ehr management
blockchain in healthcare
actuators
neural network
url
phishing detection
network cybersecurity
storage and retrieval
enterprises security
pervasive computing
wave files
password complexity
password length
password security
ht detection
hardware trojans (ht)
path selection
test generation
path delay fault (pdf) testing
model interpretability
explainable ai
vanet security and privacy app
vanet adversaries and attacker
security and privacy requireme
exploit
secret-sharing
optimistic multi-party computa
trustworthiness
autoencoder
invertible
mobile device
intellect learning
finite elements
information retrieval and ai
neural languages and nlp
gitlab
jenkins
cve-2021-44228
ci/cd
continuous delivery
continuous integration
dimensionality reduction
email users
data analytics
correlation
log loss
hot log
live log
insufficient logging
soc
siem
countermeasures
avispa
industrial communication secu
data management
mobile networks
semi-trusted third party
fairness
verifiability
cluster head selection algorit
cluster head
big data analytics
big data and iot
application security
awareness
security behavior
self-efficacy
pre-processing
alert prioritization
alert clustering
merging
trellis coded genetic algorith
session key matrix
pseudo random key generator
finite automata
xperimental results
educational data mining
computer security
secured watermark system (sws)
embedded system
nosql data stores
public safety
crowd monitoring
cctv
cyberattack impact
cyberattack types
personal privacy
economic stability
cyberattacks
saudi arabia
parameters
sensor node
leach
explainable artificial intelli
shapley additive explanation
recurrent neural networks (rnn
deep learning (dl)
empirical studies
vulnerabilities
access control mechanisms
anonymization techniques
authentication mechanisms
encryption techniques
diffusion of innovation theory
national security
data privacy
low carbon blockchain
security key
public cryptography
argumentation mining
advanced persistent threats (a
multi-vector attacks
mesa security model
stealth data exfiltration (sde
sustainable agriculture
water management
dc water pump
water & humidity sensors
soil sensor
vulnerability identification
smart irrigation system
semantic web
conceptual modeling
unsupervised machine learning
j48
network control
mansim
relieff algorithm
email forensic dataset
cybercrimes
aquila optimization
likability
traceability
software maintenance
separation of concerns
context-aware traffic light co
traffic light control (tlc)
requirements engineering (re)
networks for big data
encryption and decryption
inspection game
confusion matrix
impersonation
phishing attack
massive parallel sequencing
forensic examinations
bio-examinations
deoxyribonucleic acid (dna) da
particles swarm
radial basis function
computational linguistics
distributed denial-of-service
machine learning problems
morphic computing
q-learning
mobile ad hoc networks securit
big data and the cloud
cloud computing architecture
cloud business
google glass
stacked auto encoder
kdd cup 1999 dataset.
which motivates many researchers to discover metho
intrusion detection is one of the standard stages
image cipher.
scrambling
multimedia networking
mobile & broadband wireless internet
network based applications
network operations & management
measurement & performance analysis
internet and web applications
high speed networks
adhoc and sensor networks
heterogeneous wireless networks
security standards
security assessment
business information security
noise & entropy
anti obfuscation technique
low level feature
merkle-hellman.
simultaneous diophantine
subset sum
coppersmith
lattice reduction
lattices
snmp
mib
multi- agent
distributed query processing
location cloaking
location based services
windows registry
forensics
device discovery
physical proximity
fidelity
coordinate ratios
equatorial cloning
isotropic cloning
quantum copying machines
eavesdropping
todv
cross layer detection
body area network security
body area networks
misbehaving node
tbraodv
ad-hoc
isakmp
dsss
false positives
true positives
it policy
common vulnerability exposure (cve)
spam email
sender mail server
receiver mail server
anti-spams
wsn security
cross layer architecture
packet latency.
benevolent node
base station (bs)
route trust (rt)
indirect trust
direct trust
geometric mean (gm)
public verifiable signcryption
standard model
provable security
identity based cryptography
signcryption
fairness.
ttp (trusted third party)
security and privacy in pervasive/ubiquitous compu
authentication and non-repudiation
intrusion detection and vulnerability assessment
untraceability
cryptography and coding
survivability
intrusion resilience
fault-tolerant networks
diversity
androidapis
associative node
ubiquitous computing security web 2.0 security cry
corporate infrastructure
disaster recovery
data loss
security breach
authentication and key agreement.
umts security
telecommunications system
gsm system
false alarm rate
naive bayes classification
multi stage filter
enhanced adaboost
compression.
transformation
threshold secret sharing
tree based
hierarchical
multicast
group
peer to peer
key management protocols
wireless attacks
wireless intrusion detection system
attack test cases
attack taxonomy
cueing.
interfaces
one-time passwords
chosen ciphertext security.
conditional proxy re-encryption
proxy re-cryptography
random oracle model
privilege escalation
system call dependence graph
behavior representation
data compression.
huffman coding
thematic analysis
medical internet of things
classification problem.
svms
functional analysis
kernel functions
legendre polynomials
man-in-the-middle.
obfuscation
server less
server based
escrow less
web application penetration testing
security testing
) * ubiquitous computing security *
trojon protection * security threats & cou
e-mail fraud * virus
ad hoc and sensor network security * peer-
information theoretic security
rational secret sharing
fault tolerance
topology.
authenticated symmetric key establishment
biometric key
wireless body sensor network (wbsn)
ofdm
spectrum sensing
inter symbol interference (isi)
cognitive radio
and quality control
network system
control charts
anomalies
ieee 802.11g
multiple encryption.
secure electronic transaction
f8
a5/3
stream cipher
unauthorized access
network design
real estate
infrastructure security
wireless sensor network.
wireless mesh network
wireless ad-hoc networks
sensor nodes
attack path reconstruction
ddos-attacks
icap
client honeypot
browser vulnerability
adhoc on demand distance vector protocol(aodv)
translation.
elecronic voting
user lifecycle
workflows
provisioning
security synthesis
symmetric cryptosystems
non linearity
s box
memorability of passwords
mpi.
encrypted data
international data encryption algorithm (idea)
hiding information
unicode
multi-layers
arabic text
python
scapy
kali linux
de-authentication attack
(ddos
logistic regression
k-nn
naive bayes
response & tracking.
base station
• next generation web architectures
• measurement & performance analysis
• internet and web applications
• high speed networks
• adhoc and sensor networks
• next generation internet
• heterogeneous wireless networks
fair exchange protocols
fair document exchange
dempster–shafer belief theory
hashcode
hacker
websites
• quantum computation
• program semantics and verification
• probabilistic computation
• parallel and distributed computing
• network
enterprise
machinelearning
information gain
e-learning security
e-remedies
e-risks
e-learning
secret reference matrix (srm)
peak-signal-to-noise-ratio (psnr)
discrete cosine transformed (dct)
botnet and honeypot.
iptrcing
flooding attack
internet threat monitors (itm)
• peer to peer and overlay networks
• optical networks and systems
certification authority
&security
chebyshev polynomials
blind signature
friendly-cooperative framework
system hardening
anti malicious objects
star topology
black scholes equations
malicious object
native language password
textual password
shape based authentication
multicode encryption
transversal designs
reed-muller codes
communication
• natural language processing
• cryptography
• computational science and applications
• machine learning
• information theory
• computational physics & biology
geometry
• computational complexity
• automata theory
• algorithms and data structures
e-mail architecture
header analysis
e-mail headers
e-mail forensics
feature coding
pca
ca
byzantine behavior
incident response team
cyber incidents
ecurity threats & countermeasures (ddos
network applications
emerging technologies for next generation network
discrete algorithms and discrete modeling
network operation and management
mobile and wireless networks
network security and privacy
communication network protocols
communication network architectures and design
features.
mlp
filtering.
enron
keyword search
report generation
fuzzy-c means clustering
background subtraction
foreground detection
background removal
x64 systems
neighbour mean interpolation
image interpolation
operation system
simulator
emulator
web filtering
collaborative web systems
vector valued functions
privacy preserving
implicit function theorem
hitech act
hipaa
models and algorithmsbig data infrastructure and p
big data big data techniques
peer-to-peer network security database and system
data and grid room
system information leak
peer to peer and overlay networks
qos and resource management
dos attacks
ndp
fragment header
flow-label
ipv6 security vulnerability
remote authentication
man in the middle attack
user authentication framework
analysis
dynamic billing system
digital forensic
email forensic
cassandra big data.
attacks prediction
threat activity.
cyberattack ontology
cyberattack prediction
network and wireless network securitymobile
iot security and privacy
blockchain new design
blockchain consensus algorithms
blockchain foundations
blockchain-based security for the iot
iot experimental results and deployment scenarios
security & network management e-mail security
multimedia etc big data tools and systems big data
privacy and trust big data applications
hash function [2]
open application
xml-dsig
ws-security
soap
httpi
https
http
signature-based
misuse detection
architecture
agent
trojan protectionstem security
database and syvirus
strong t -consistency
group communication
server security
ultrasonic audio
decision support system
multimedia & telecommunications
database & information retrieval
image signal processing
networks & fuzzy system
dns poising.
legal.
regulation
protection
personal
law general
trust in service-oriented architecture- open archi
and nist statistical tests
matlab simulation
chaotic algorithms
images security
micro cantilever
dynamic source routing.
network coding
hybrid idps
perimeter-based idps
network-based idps
host-based idps
idps sensors/agents
tcp re-assembly
cyber-crime & bdi.
vendor lock-in
csp
multi-cloud
feature selection.
keystroke dynamics.
biometric
web-based
small business security
e-commerce systems security
mobile phones
conditional random fields
layered approach
secure two-party computation
zero-knowledge proof
distributed eigamal encryption
similarity coefficients
vanet etc.
v2v
stdma
csma
packet marking
autonomous system
sensing layer
resonant frequency
• intelligent agents and systems
• trust management
• privacy and authentication
• cryptography and coding
security and privacy policies
security in distributed systems
artificial immune systems
computational intelligence in security
multiple flows
tcp protocols
high-speed
heterogeneous networks.
next generation networks
casper/fdr
authentication and key agreement protocols
heart rate device
gps
contract signing
andit security
protected health information
personal identification information
information assurance
network security & its applications
pki interoperability
cross-certification
certificate practice statement(cps)
certificate policy(cp)
certification authority(ca)
public key infrastructure(pki)
ngn
ec-aka
aka
eps
lte security
counterfeit.
and machine learning
knime
aes.
session based key
sbskct
embedded devices.
modular exponentiation
n-1 attack
simple power analysis
dominant feature set.
outlier analysis
behavioral profile
terrorism
social network analysis (sna)
backtracking bit
watch nodes
emergency
arduino microcontroller
accelerometer
accidents
hierarchical model
low-power
improved watchdog
watchdog
security area control
regulation and trust mechanisms
biological and evolutionary computation
reinforcement and unsupervised learning
) • ubiquitous computing security
engineering
search engine optimization
malicious websites
intrusion detection and prevention internet securi
temporal sequence patterns
ubiquitous computing security web 2.0 security
olsr
willingness function
smrr
blockchainbased security for the iot
blockchainauthentication and authorization
analyze formal
timestamps
nonce
pkm
informtaion technology
safety
response time
self-configuration
self-cure
self-protection
data aggregation
distributed hash tables & linear diophantine
decentralized network
multimedia content management
trust management for virtual organizations
policy of trust in e-leaning systems
trust and reputation management
mobile and sensor networks
trust/risk based security frameworks
trust management system for wireless
certificateless public key encryption
certificateless signature scheme
digital certificate
certificateless public key cryptography
set protocol
fuzzy logic & perspective of intrusions
association mining
communication technologies
networks
mobile & wireless networks
lowest id clustering algorithm
sybil node
mobile ad hoc network
spammers
web spam
redirection
manipulating search engine
search engine
hiding techniques
cloaking detection
database and system security intrusion detection a
lucas
digital signatures
fair-exchange
self-optimization
autonomic network
clustering technique
awgn and raleigh fading channels.
bit error rate(ber)
ecb and cfb cryptographic algorithm
pre-zf
pre-mmse
mimo-ofdm
peerto-peer network.
intrusion attacks
taxonomy of attack
intruder
maximum power transfer
electronic circuit
control system
touch sensor
traversed administrator field
See more
- Presentations
- Documents
- Infographics