Personal Information
Website
About
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Tags
phishing
worms
peer-to-peer network security
database and system security
spam
mobile
cryptographic protocols
ad hoc and sensor network security
virus
e-mail fraud
network and wireless network security
web 2.0 security
security & network management
ubiquitous computing security
security
intrusion detection and prevention
e-mail security
trojan protection
network security
internet security & applications
session hijacking
mim
artificial intelligence
machine learning
performance evaluations of protocols & security ap
ddos
intrusion detection
hardware-based attacks
web based applications
services security
blockchain technology
crowd sourcing
social networking
authentication
replay attack etc
security of virtual machines
machine learning for security
replay attack
network management
system security
cryptography
blockchain
cyber security
privacy
data mining
home networks
body-area networks
wireless network security
sdn
vanets
sensor network security
trojan protectio
cloud computing
deep learning
industrial control systems
autonomous vehicles
internet of things (iot) secur
security and optimization
encryption
internet security & applicatio
big data
intrusion detection and preven
cryptocurrencies
security application
trojan protection security threats & countermeasur
neural networks
e-mail fraud virus
ad hoc and sensor network security peer-to-peer ne
manet
bioinformatics
cognitive security
network and wireless network security mobile
network and wireless network s
trust
wireless sensor networks
database
internet of things
information security
) ubiquitous computing security web 2.0 security c
steganography
natural language processing
electronic voting security
ad hoc and sensor netw
fuzzy logic
routing
computer vision
security and privacy for iot
performance evaluations
detection
connectivity and networking
intrusion detection system
security threats
security threats & countermeasures
information retrieval
)
security threats & countermeasures (ddos
iot applications and services
• intrusion detection and prevention
malware
• e-mail security
• virus
aodv
privacy challenges
peer-to-peer
cloud
• peer-to-peer network security
• cryptographic protocols
• mobile
• ubiquitous computing security
attack
ontology
key management
• network and wireless network security
• internet security & applications
• security & network management
• web 2.0 security
• performance evaluations of protocols & security
internet security
image segmentation
robotics
pattern recognition
knowledge processing
image encryption
block cipher
cyber physical system (cps)
game theory
aes
nlp
decryption
wireless network
text mining
• database and system security
attacks
android
classification
ad hoc
vanet
cloud security
substitution
e-commerce
performance evaluations of pro
iot
network
soft computing
dos
information hiding
ubiquitous computing
cloud and grid computing for big data
usability
cyber physical system
internet of things (iot)
mobile ad hoc networks
ssl
resource provisioning
denial of service
qos
security.
phishin
permutation
steganalysis
malicious node
wireless sensor network (wsn)
mobile ad-hoc networks
data security
fuzzy systems
parallel processing
signal processing for iot
electronics
deployment scenarios
information extraction
electronics and signal processing for iot
iot-enabled innovation
entrepreneurship
network protocols
cybersecurity
rsa
access control
discrete fourier transform
data center network control
symmetric key
web security
watermarking
cryptosystem
security techniques
smart grid
data protection
virtualization
kyoto2006+ dataset
hacking
wsn
visualization
intrusion detection system (ids)
quantum cryptography
trojon protection
array signal processing
optimization
random forest
anonymity
predictive learning
hybrid intelligent systems
wimax
malware analysis
icmp flood
business intelligence
password
chaotic system
secret sharing
wireless sensor network
threats
udp flood
experimental results
machine learning and ai for big data
generalized arnold map
hash function
biometric security
dns reflection or amplification attack
block chain issues and trends
digital image processing
blockchain scalability
3d and stereo imaging
information technology
vpn
• network and wireless network security • mobile
elliptic curve cryptography
iot-enabled innovation and entrepreneurship
ad hoc and sensor network security • peer-to-peer
e-voting
secure cloud computing
wireless networks and mobile computing
user identity
grid computing
bayesian network
service oriented architecture
distributed denial of service
firewall
genetic algorithm
http flood attack
big data mining
framework
data science
machine translation
wireless ad hoc networks
syn flood
semantic processing
manets
morphology
phonology
it security
malware detection
secure routing
biometrics
reputation-based
verification
mobile agent
scanning
intrusion
cyberattack
cooperation
wlan
social engineering
computer & network security
mobile security
visual cryptography
chaos
mobile network
dsr
protocol
key distribution
fog computing
confidentiality
ns2
text steganography
machine learning algorithms
mobile banking
mobile payment
intrusion prevention
ethereum
ddos attack
group testing
dynamic analysis
social media
initial trust
3-d mesh
methodology
quantum key distribution
integrity
pervasive computation trust
denial of service attack
decentralized trust management
device authentication
question answering
management
web authentication
twitter
mobile authentication
algorithms and applications
classifier
optical computing
computer networks & communications
information centric network
networking and architectures
theory of parallel / distributed computing
cyber trust and security
software systems and technologies
network protocols & wireless networks
anomaly
packet flow
virtual machines
color and texture
feature
window function
intruders
spectral analysis
data mining techniques
performance evaluation
intrusion detection systems
bluetooth
security management
trust management
cloud storage and file systems
user authentication
rsa algorithm
support vector machine
voip
man-in-the-middle attack
critical infrastructures
unsw-nb15
abnormal.
hamiltonian model
device deployment
deadlock-free
economics
broadcasting communication
wormhole routing
risk management
smartwatch
protocols
wormhole
wearable devices
image processing
cpu
honeypots
multimedia
wearable technology
ipsec
internet signal processing
software security
security engineering
network security.
ad hoc network
blowfish
internal controls
blockchain authentication and authorization
smart city
kleptography
network forensics
bb84 protocol
grid
entropy
cipher text
blockchain based security for the iot
wireshark
fuzzy logic.
5g and networks for big data
multimedia etc
digital forensics
trust and privacy ch
sha-1
trust-based routing protocols
security properties
wireless
nwtd
denial-of-service
trust determination
text-based captcha
trusted third party
smart card
network intrusion detection
edge & cognitive s
fog
password handling
ldap
kerberos v5
trust and privacy challenges
ecc
integrity.
subliminal channel
databases
mobile devices
big data techniques
trapdoors
challenges
trojan protection • security threats & countermeas
data visualization
denial-of-service attack
e-mail fraud • virus
private key
public key
lexical semantics
computer science
chunking/shallow parsing
covert channel
big data applications
consensus
network performance
m/g/r processor sharing queue
email spam
mapreduce
cybercrime
collaborative environments
benchmark
brute force attack
models and algorithms
secret key
experimental results and deployment scenarios
forecasting
rotor cipher
data correlation
cybersecurity culture
pki
security event management
sgd
electronic voting system
cloud software development
threat modeling
mse
appliance
end-to-end security model
zero trust architecture
web server handlers
email classification
i-voting
ivote
network defenses
els
googleglass
markov-model
information security.
disaster
particles swarm optimization.
lea
policy management
agent based trust management
historical
response
authorization
authentication and identity management
bloom filter.
data
clusters and grid computing : security and role of
distributed denial-of-service attack
password.
medical system
metric
availability
dependency
application-layer ddos attack
browsing model
network dependency analysis
mansim.
notification
beacon
fingerprint
seed
radial basis function neural networks
face
brute-force attack
smartphone
rfid
kdd cup 99
content management
wordpress
attribute-base-access-control
role-base-access-control
wireless mesh networks
network architectures
mobile networks & wireless lan
reliability
location privacy
cryptanalysis
arithmetic coding
public-key cryptography
training
interworking
lte
umts
imsi
identity
iot security
sniffing
surveillance
bloom filter
usable security
mutual authentication
secure communication
frequent sequence mining
behavioural pattern
api calls
mobile ad-hoc network
data description
temporal sequence
anomaly-based network intrusion detection system
attacks & performance
okhttpclient
httprequests
unavailability
false alarms
risk mitigation
vehicular forensics
distributed denial-of-service (ddos)
plain text
false alarm
firewalls
svm
traceback
manet(mobile adhoc network).
• database
shortest path
biometric authentication
the mapping study
internet of thing
color space
natural language prepossessing
multi-layer encoding
python programming language
text stenography
kvefs
encrypt file system
key-value store
file system in user space (fuse)
protocols.
least significant bit
matrix partition
spatial domain
image steganography
routing protocols
logistic map
• theoretical computer science and algebra
distributed denial of service (ddos)
sybil attack
digital signature
insider threat
anomaly-based detection
benchmarks
unfettered rules
blockchain privacy
iot connectivity and networking
tools
tls
social networks & web 2.0 trust management
device association
simulation
standard
blockchain attacks on existing systems
big data search and mining
mobile ip
) • ubiquitous computing security • web 2.0 securi
computing
software defined network
topology discovery
pox
symmetric cryptography
xor
dual-port read-only memory
p2p
elliptic curve
automated ids
spectrum analysis
penetration testing
reputation system
vulnerability assessment
tdes
incident response
feature selection
endpoint security
device fingerprinting
inventory
bro ids
exploit.
security and privacy requirements in vanet
vanet adversaries and attackers
vanet attacks
vanet security and privacy approaches
security for grid computing
a digital certificate
nsl-kdd
administrator
session key establishment
security policy
data hiding
fair exchange protcocol
insider threats and countermeasures
security information systems architecture and desi
security and privacy in mobile systems
access control and intrusion detection
diffusion.
confusion
shuffle
henon map
encryptions
healthcare cybersecurity
random number generator
carry select adder
quantitative trait loci
least significant bit (lsb)
ascii code
psnr
zigzag scanning
public key cryptography
pairwise comparisons.
analytic hierarchy process
access security controls
decision tree
detection rate
crypto stream ciphers
rc4
performance
congestion control
fault tolerant
error detection
model checking
• security threats & countermeasures
cross site scripting
data & system integrity
privacy and authentication
computer network
cloud service
distributed computing
security risks
emerging attack vectors
shares
greying effect
key share.
denial of service (dos)
netstat
the sleuth kit (tsk)
autopsy
semantic processing & nlp
question answering (qa)
tcpview
sparql
n-triples
all-optical network security
owl
rdf.
local authentication protocols
mobile cloud computing
finger print authentication
healthcare
dmt
conditional entropy
wardriving
dft
common control channel challenge
crahn
multi-channel mac
alert correlation
data integrity
data center network
service discovery
encryption\decryption
pgp
hmac
wireless local area network (wlan)
swifi
online social networks
profile cloning
svm.
prognostic
risk assessment
privacy protection
role-based access control
xacml
file upload
video upload
virtual system
study material
wi-fi
map reduce
hadoop
wireless networks
ns2[1]
security protocol
caesar cipher[2]
protection m echanism
secret image sharing
quadratic residues
image coding
data type
encryption/decryption[2]
wired equivalent privacy (wep).
optical switch crosstalk
erbium-doped fiber amplifier (edfa) gain adjustmen
false positive rate (fpr)
aodv.
k-means clustering
recommender system
frequent itemset
rul
ai algorithms
knowledge representation
decision making
signal or image processing
³Ùé±ô鳦´Ç³¾³¾³Ü²Ô¾±³¦²¹³Ù¾±´Ç²Ô²õ
brute force attacks
syn flooding
tcp sequence number attack
mog-hmm
cooperative transmission
packet broadcast
opportunistic large array
mis
quality
prewitt
zero cross
critical infrastructures.
man-in-the-browser
data center
firewall policy
stemming
aran
porter stemmer
intrusion detection system.
ndm
smt
vanet architecture
ariadne
sead
computerbased information system
and pso.
iqim
dabechies4
mobile agents
infrastructures for big data
interweaving
signal processing
som
dct based steganography
multi-som
clustering
random grids
nlp and ai
vn
knowledge-based authentication
mitigation
paas
iaas& authentication
8 bits microcontroller
ditributed denial-of-service attack
neural languages
ddisjunct matrix.
non-adaptive group testing
daugman
software engineering
hybrid
policy deployment
canny
sobel
mobile code
network-level security and protection
idpf
ip falsifying
network simulation tool
bgp
security plan
botnets
small business
cyber defense
internet casinos
risk planning
quantitative evaluation
anomaly severity evaluation
multi-anomalies evaluation.
semantic evaluation
anomaly severity classification
parsing
internet attacks
digital signal processing
knowledge base
threshold cryptography
sql injection
iris
cad design and testing
data storage
flash crowds
mechatronics
credits.
mom
wire antennas
gain
current distribution
vswr
fractal
input impedance
polarization
resonant
bgp protocol
hashing.
big data management
bmp image file
lsb steganography
agent based intrusion detection system (aids)
multi-agent systems
black hole attack
functional call monitoring
application resource
information flow tracking
packet dropping attack
email fraud
qos routing
mobile communication
watch dog
multipath routing
priority scheduling
energy-aware routing
exploring data analysis
gsm security
nist
dna
big data analytics and social media
blockchain in digital forensic
necessary information
pre-hacking
software vulnerabilities
reinforcement learning
video signal processing
dll. llc
anomaly detection
alert aggregation
attack detection
source code analysis
legitimate traffic.
k-nearest neighbour
unreleased resource
lightweight
selfishness
comprehensive evaluation
collective digital signature
aco
distributed ledger technology
mobile adhoc network
adaptive neural network
static analysis
path manipulation
graphical password
security and privacy
utm clinic
hvac
version control
virtual password
secure communication channel
strong authentication
shared secret session key
ir circuit
distributed ac
scenario-based approach
visualization and animation
empirical evaluation
key escrow
certificate less cryptography
des
markov random walk model
3gpp
text clustering
4g
security architecture
rhetorical relations
probability model
shiftrows
security solutions
coefficient correlation
covert schemes
pairing based cryptography
artificial neural network
secret handshakes
resource injection
dynamic matching
resource description framework(rdf)
bilinear pairing
mix
multi-faceted model
blue-tooth
online social network
updater identification
temperature control
attribute reduction
application whitelisting
temperature monitoring
service-oriented approach
quality of service
smart cities
coefficient of variance
media access control
mnist benchmark.
key spoofing
cuda
linguistic resources
method engineering
management & interoperability
natural language computing
lstm
image classification
mode of operation
ubiquitous
rotation of the bits
multiple encryption
braiding/entanglement
file systems
owasp
cipher algorithms
network steganography
physical layer
real-time networking
tcp/ip communications
inspection game.
data density and encryption time
agile programming
gpu
extractive text summarization
cognitive load
low-resource
hamming distance
assessment survey
embedded systems
practical testing system
peer-to-peer network
attribute-based encryption
data size
signal identification
avispa.
multiparty micropayment
covid-19 pandemic
radius
industrial communication security
ccmp
tkip
mitm attack
payment certificate
waterfall methodology
cryptocurrency exchange
rigging
diffie-hellman algorithm
performance measurement
covert channel.
flow
ipfix
confidence level
system information leak
network virtualization
probabilistic encryption
authentication.
lsb replacement steganography
switching and addressing techniques self-organizin
& privacy next generation internet & web architect
deniable encryption
coercing
data shredding
phonology and morphology addressing & location man
cobit
diophantine equation
pragmatic web
one-way function
community consensus
location-dependent social networks
blom
judy array
clustering routing
niger-delta
wireless body area networks
performance evaluation.
• security
eavesdroppers
attack games.
remote user authentication
smart cards
nonlinear function.
invisible digital watermarking
receipt-free
arithmetic encoding
biometric information
honeypot and nics.
iptables
vmware
nsgaii.
objective functions
and delay
language-action perspective
uncertainty
computing with words
spatial reasoning
attack tree
agent-based systems
network intrusion prevention
np-complete
quotient ring
pixel
cryptovirus
digital identity
shoulder surfing
cryptotrojan
session passwords
priori probability
life time
network density
compression-crypto
one time pad
electronic warfare threats
floating point number
data integration
mediator
credential
physical cryptography
electronic espionage threats
evasive/ deniable/ untraceable attacks
password (information) snatching
gpcode.ak
physical unclonable functions
dispute settlement
smart vehicles
enterprises security risk managemen
manage security programs
risk principles management
enterprise risk management
risk mechanism
we propose a novel distributed intrusion detection
secure routing protocol
hybrid intrusion detection system
trust-based routing
distributed rate control.
bandwidth reservation
medium accesscontrol
support vector machine (svm)
hash function [2].
classification accuracy
lan attack
host based ids
arp spoofing
active detection
image denoising
wavelet thresholding
noise categories
proposed method.
new kinds of network attacks are emerging endlessl
identity based firewalls
it is necessary that this security concern must be
oauth
computer networks
firewall systems design
in order to the rapid growth of the network applic
oix
openid
cryptovirology
tent map
statistical hypothesis testing
kolmogorov-smirnov test
statistical test of significance
queuing model
poisson arrival
buffer
traffic flow
diffusion
stage staffing
information theory
2-d arnold cat map
• internet security
encryption and decryption algorithm for watermarki
digital multimedia
stage staffing watermarking
copyright protection
static and mobile wsn.
node replication attack
biometrics; biometric fusion; face; fingerprint; c
network security; malware propagation modelling; b
data and grid room
sybil
clone
crossover
sha-512
sessionbased
minutiae
maturation of a profession
esrm
enterprises security risk management
ip spoofing
modeling
conficker
cryptoviral extortion.
secure servers
secure network
ad hoc and sensor
network intrusion detection system (nids)
system dynamics
snort
packet detection and packet header matching (phm)
asynchronous distributed pricing
distributed resource allocation
delay.
cdma throughput
deviation detection
dns poising
system access control
and public-key.
user authentication; group communication; secret s
diffusion process and stream cipher.
fuzzy c-means clustering
and bernoulli map
fuzzy neural network
quadratic map
ann
attack graph
interactive education.
hdfs (hadoop distributed file system)
masquerade attack
remote user
smartcard
batch verification
service authentication
identity based cryptography (ibc)
ip multimedia subsystem (ims)
network security protocols
quantum networks
file handler
regexpr
html
sub
perl
quantum superposition state
no key-exchange
inter packet delay
ieee 802.11b
ieee 802.15.4
heterogeneous wireless network
coexistence
dfa
vulnerability
signature processing
signature formulation
intrusion detection / prevention systems
key establishment
cover media
anti-spam
email filtering
workload characterization
knowledge discovery in databases and privacy prese
integrated verification.
software implementation
usage control
malicious
mechanism
message digest
routing protocol
soa
smurf attacks.
selinux
registration time.
packet loss
handoff delay
triangle routing
route optimization
tunneling
adhoc network
longitudes
latitudes
multi input multi output (mimo)
computer
location coordinates
and services.
transposition cipher
rangoli
lu matrix composition
microsoft domain environment
password replace ment
anomaly-based intrusion detection system
protocol safety.
and crypt ography.
software
networking
zss signature.
and exemption.
data outsourcing; privacy; public cloud severs; ac
usable security.
information system.
software configuration management
one-class support vector machine
cyber-defense.
steganography; image segmentation; byte characteri
threshold cryptography.
secured watermark system (sws) and computer securi
j48.
wireless.
intellect learning.
finite elements.
malware detection and mobile device.
authentication & q-learning
mobile ad hoc networks security
shared register array
self-propagating malware
connection failure behavior
rate limitation
shared bitmap
feedback
convolutional coding
soft input
iterations
guard node
cluster
key sensitivity
avalanche
cryptographic algorithm.
legal aspects
packet sniffers
ip traceback
mix zone
pseudonyms
click spam
web advertising
google ads
pay-per-click advertising
authorization and password.
apache spark
security analytics
feature extraction
hdl.
bfmawddl
bfcdnba
bfma
dpa
wddl
bf
securing windows
encryption and decryption.
mobile ad hoc network (manet)
wake up receiver
vlsi
low power
multigeneration keys.
random kd (key distribution)
sec-leach (secure leach)
sensor networks
leach (low energy adaptive clustering hierarchy)
galois counter mode.
link layer security
circular queue.
md5
sha-256
ip
ao
udt
high speed bandwidth
next generation network protocol
desirability functions
best practice frameworks
baseline manuals
risk analysis and management
information security controls
signatures
web services
interpolation.
qim
m-ary modulation
error concealment
scan detection
mac addresses hash value.
lu-cac
caca
bandwidth link utilization
reliability.
db index.
etc.
sensor network
emergency response communication
wave files.
z-transform; frequency domain; watermarking; mean
decrypting
encrypting
signature based detection
behaviour based detection
flow based detection
c&c
irc
botnet
share
n) visual cryptography
(2
smart-card
multi-server
low-cost cryptography
node misbehaviour.
malicious packet dropping
controlled flooding
reputation
data value
impersonation attack.
undetectable online password guessing attack
ecc-3peke protocol
finite fields & montgomery algorithm.
cellular automata
dst
log analysis.
audit system
event classification
http intrusion detection.
fuzzy cognitive mapping
fuzzy intrusion detection
application layer misuse detector
semantic intrusion detection
fair exchange
naive bayesian classifier
false positive
big-dragon cryptosystem.
little dragon cryptosystem
multivariate cryptography
and matlab.
customizable security.
policy-driven security
content-addressable storage security
matlab
network security management
complexity.
ldpc codes
chained codes
image
network security & identity privacy
attack graph.
efficient probabilistic packet marking algorithm
probabilistic packet marking algorithm
online auction network
byzantine behavior
multicast communication
ad-hoc networks
hierarchical design
ids
tls protocol
timers
typing rhythms
keystroke
passwords
implementation cost
service differentiation.
mb-ofdm
interference limitation
pareto-efficiency
password strength
text passwords
vulnerability analysis
olsrv2
selfish nodes
content
clusters
overlay
replica
hybrid covert channel
video
smurf attacks
electronics and signal process
services
salting techniques
hash analysis
security breaches
threats and attacks
lan
passphrase
mixture words
nouns
recall
recognition
user behavior
optimal path
big data tools and systems
accounting
random forest algorithm
pe header
pe file
higher education
mobile education
face and gesture
constraint processing
filter design and structures
signal reconstruction
network layer security
radar signal processing
medical image analysis
medical image processing
ad hoc and sensor network
multi input multi output (mimo
virtualization on platforms in the cloud
enablers
arxiv
reddit
stackexchange
text classification
topic modeling
dst.
internet of things (iot) security
blockchain technology and cyber security
we introduce new detection engine for hybrid cover
a variant of covert channelworks similarly as netw
the privacy. most of such attacksare devised using
computer network is unpredictable due to informati
iot devices.
technical and security issues
comparison.
data storage and management in cloud computing
security techniques for the cloud
virtual compute clusters
system integration
cloud based
reference dna
multilayer security
indexing cipher
dna cryptography
nb.
knn
cnn
offline signature recognition
smart contracts.
decentralized application
added value applications
review
parsing/grammatical formalisms
monetary policy
socioeconomic impact
peer-to-peer transactions
fintech
central bank digital currency
digital rupee
smart contracts
smart banking
survey
domain analysis
scoring benchmark
http strict transport security
shape representation
text processing
document recognition
process improvement
insurance
security logs
hypergraphs
cloud data security
fine grained access
group key management
electronic payment
hash chain
multimedia & cognitive informa
symbolic machine learning
security posture
open-source erp software
factors
attributes
measurement framework
signal noise control
r360
web intelligence
evolutionary computing
ai in cyber security
nids
software defined networking
network intrusion detection sy
protection mechanism
interactive education
face recognition
hdfs (hadoop distributed file
cloud storage
mobile computing
context-aware computing
smartwatches
assessment
victimization
information
emotion
signal
ciphers identification
encryption modes
feature engineering
block ciphers
encryption time
cryptographic algorithm
wormholes
spread spectrum
selective jamming
detection models
ensemble machine learning
ddos attacks
fuzzy set theory
malware propagation modelling
shifting
shifting.
sprase svd (ssvd)
singular value decomposition (svd)
multimodal authentication
exponential kronecker product (ekp)
kronecker product
context-sensitive exponent associative memory mode
biometric fusion
information theor
engineering cybernetics
decision support system
multimedia & telecommunications
database & information retrieval
image signal processing
cyber-security
security policies
defense mechanisms
employee awareness
wimd cybersecurity
wimd
wireless implanted medical devices
cardiac implanted device
health belief model
windows api calls.
term frequency-inverse document frequency vectors
n-gram analysis
malware classification
convolutional neural network
risk and threats
bayesian belief network
networks & fuzzy system
httpi
https
http
signature-based
misuse detection
architecture
agent
trojan protectionstem security
database and syvirus
strong t -consistency
group communication
server security
small business security
e-commerce systems security
mobile phones
conditional random fields
dns poising.
legal.
regulation
protection
personal
law general
trust in service-oriented architecture- open archi
and nist statistical tests
matlab simulation
chaotic algorithms
images security
hash function [2]
open application
xml-dsig
ws-security
soap
layered approach
high port application
sinet
port filtering
data flow pipeline
traffic patterns
covid-19 related ioc
prediction support parameter.
k-means clustering algorithm
detection model
malicious javascript
firmware
resource management
ngns
finding roots modulo.
signing group
group digital signature
mare
sama
software architecture
microservices
trojan.
human factors
end-user errors
information systems
cisco packet tracer
cyber-attack
security issue
smart devices
incentive schemes.
rewards
federated learning
incentive schemes
implementation
mean square error (mse)
frequency domain
z-transform
identity federation.
limitations
identity management
federated identity management
distributed system.
information-centric
internet-of-things.
intelligent transportation system
sensor network.
etc
db index
cyber human behaviour
stylometric analysis
technology
sensors
power distribution
social computing
consensus mechanism
signing group.
difficult computational problems
groupdigital signature
land
http flood
tcp syn flood
markov chain
structural similarity index measurement (ssim).
universal quality image (uqi)
image fidelity (if)
peak signal to noise ratio (psnr)
semantic web
conceptual modeling
unsupervised machine learning
learning problems
j48
network control
mansim
pos tagging
explainable artificial intelli
shapley additive explanation
recurrent neural networks (rnn
deep learning (dl)
empirical studies
vulnerabilities
access control mechanisms
anonymization techniques
asset inventory
data classification
cybersecurity frameworks
threat intelligence
zero-day vulnerabilities
advanced persistent threats (a
multi-vector attacks
mesa security model
stealth data exfiltration (sde
sustainable agriculture
water management
dc water pump
water & humidity sensors
soil sensor
vulnerability identification
smart irrigation system
authentication mechanisms
nlp and machine learning
distributed denial-of-service
machine learning problems
morphic computing
q-learning
mobile ad hoc networks securit
big data and the cloud
cloud computing architecture
cloud business
google glass
stacked auto encoder
relieff algorithm
email forensic dataset
cybercrimes
aquila optimization
likability
encryption techniques
diffusion of innovation theory
national security
data privacy
low carbon blockchain
security key
public cryptography
argumentation mining
massive parallel sequencing
forensic examinations
bio-examinations
deoxyribonucleic acid (dna) da
particles swarm
radial basis function
computational linguistics
spoken language processing
traceability
image analysis
multimedia data mining
multimodal skew tent map
interchange permutation
eap-ttls
visual information processing
inductive learning
evolutionary computation
nlp and information retrieval
and text mining
web
machine learning techniques
bls signature
secret sharing technique
bi-variate polynomial
security for emerging networks
storage and retrieval
coding and transmission
anomaly-based intrusion detect
protocol safety
big data in cloud
cloud management
cloud storage for iot
sensitive data
insider attacks
data leakage prevention (dlp)
data access & protection
micro medical processors
knowledge instruction
medical sensor network
micro knowledge processors
knowledge processors
modelling
operating systems
computer architecture
fake profiles
xg boost
nft
crypto
agreements
blockchains
smart grids
real-time systems
maintenance engineering
production
worms &trojan
mobile clouds
sla management
machine learning and ai
cyber attacks
tree
bayes
techniques
ipv4
exemption
information system
digital investigations
digital forensics readiness
digital evidence
wireless medical networks
ad-hoc on-demand distance vect
mobile ad-hoc network (manet)
one-class support vector machi
sharing queue
m/g/r processor
network traffic analysis
voice activation
byte characteristic
zss signature
cyberdefense
double spending
cybercrime awareness
cybercrime on social media
education
self-sovereign identity
digital transformation
software configuration managem
public cloud severs
data outsourcing
pervasive/ubiquitous computing
regulation and trust mechanism
software-defined networks
big data analytics
big data and iot
application security
awareness
security behavior
self-efficacy
pre-processing
alert prioritization
alert clustering
merging
trellis coded genetic algorith
session key matrix
pseudo random key generator
finite automata
xperimental results
ultrasonic audio
rerouting
hooks
system call
hybrid analysis
android banking trojans
security threats & countermeas
web and internet computing
ontology and semantic web
machine learning & application
grid and scalable computing
information technology trends
bitwise-based hash
split sketch
principle component analysis
victim identification
ddos detection
claims processing
devices authentication
security metrics
packet analyzer
tcp
network traffic
dos attack
secure division
secure sum
naive bayesian
privacy preservation
authentication scheme
cryptography primitives
password replacement
sequence number
monitoring agent
side channel monitoring
phishing email attack
hot log
live log
insufficient logging
soc
siem
countermeasures
avispa
industrial communication secu
data management
mobile networks
semi-trusted third party
fairness
verifiability
secret-sharing
optimistic multi-party computa
trustworthiness
software maintenance
separation of concerns
context-aware traffic light co
traffic light control (tlc)
requirements engineering (re)
interoperability
networks for big data
encryption and decryption
inspection game
confusion matrix
impersonation
phishing attack
email users
data analytics
correlation
log loss
autoencoder
embedded system
nosql data stores
public safety
crowd monitoring
cctv
cyberattack impact
cyberattack types
personal privacy
economic stability
cyberattacks
saudi arabia
parameters
sensor node
leach
energy efficiency
cluster head selection algorit
invertible
mobile device
intellect learning
finite elements
information retrieval and ai
neural languages and nlp
gitlab
jenkins
cve-2021-44228
ci/cd
continuous delivery
continuous integration
dimensionality reduction
educational data mining
computer security
secured watermark system (sws)
cluster head
anti-spams
wsn security
cross layer architecture
packet latency.
benevolent node
base station (bs)
route trust (rt)
indirect trust
direct trust
geometric mean (gm)
device discovery
physical proximity
fidelity
coordinate ratios
equatorial cloning
isotropic cloning
network operations & management
measurement & performance analysis
internet and web applications
high speed networks
adhoc and sensor networks
heterogeneous wireless networks
security standards
security assessment
business information security
false positives
true positives
it policy
common vulnerability exposure (cve)
spam email
sender mail server
receiver mail server
quantum copying machines
e-risks
e-learning
secret reference matrix (srm)
peak-signal-to-noise-ratio (psnr)
discrete cosine transformed (dct)
botnet and honeypot.
iptrcing
flooding attack
internet threat monitors (itm)
• peer to peer and overlay networks
• optical networks and systems
• next generation web architectures
• measurement & performance analysis
• internet and web applications
• high speed networks
• adhoc and sensor networks
eavesdropping
todv
cross layer detection
body area network security
body area networks
misbehaving node
tbraodv
ad-hoc
isakmp
dsss
• network
enterprise
machinelearning
information gain
e-learning security
e-remedies
• next generation internet
functional analysis
kernel functions
legendre polynomials
man-in-the-middle.
obfuscation
server less
server based
escrow less
tree based
hierarchical
multicast
group
peer to peer
key management protocols
wireless attacks
wireless intrusion detection system
untraceability
cryptography and coding
survivability
intrusion resilience
fault-tolerant networks
diversity
androidapis
privilege escalation
system call dependence graph
behavior representation
data compression.
huffman coding
thematic analysis
medical internet of things
classification problem.
svms
attack test cases
lattices
snmp
mib
multi- agent
distributed query processing
location cloaking
location based services
windows registry
forensics
kdd cup 1999 dataset.
which motivates many researchers to discover metho
intrusion detection is one of the standard stages
image cipher.
scrambling
multimedia networking
mobile & broadband wireless internet
attack taxonomy
cueing.
interfaces
one-time passwords
chosen ciphertext security.
conditional proxy re-encryption
proxy re-cryptography
random oracle model
noise & entropy
anti obfuscation technique
low level feature
merkle-hellman.
simultaneous diophantine
subset sum
coppersmith
lattice reduction
network based applications
international data encryption algorithm (idea)
hiding information
unicode
multi-layers
arabic text
python
scapy
kali linux
de-authentication attack
(ddos
logistic regression
k-nn
naive bayes
response & tracking.
base station
sensor nodes
trojon protection * security threats & cou
e-mail fraud * virus
ad hoc and sensor network security * peer-
information theoretic security
rational secret sharing
fault tolerance
topology.
authenticated symmetric key establishment
biometric key
wireless body sensor network (wbsn)
ofdm
spectrum sensing
inter symbol interference (isi)
cognitive radio
mpi.
encrypted data
attack path reconstruction
graphical passwords
attackers .
mac-layer
threshold level
real time application
rtos
mobile ad hoc networking
non-invertible transformation
cancellable biometrics
fingerprint biometrics
biohashing
best practice
it governance
mapping
pdca
information security management systems (isms)
ddos-attacks
icap
client honeypot
browser vulnerability
adhoc on demand distance vector protocol(aodv)
translation.
elecronic voting
user lifecycle
workflows
provisioning
security synthesis
symmetric cryptosystems
non linearity
s box
memorability of passwords
snakes & ladders game
iso 27001
• computational physics & biology
geometry
• computational complexity
• automata theory
• algorithms and data structures
e-mail architecture
header analysis
e-mail headers
e-mail forensics
feature coding
pca
ca
certification authority
&security
chebyshev polynomials
blind signature
• heterogeneous wireless networks
fair exchange protocols
fair document exchange
dempster–shafer belief theory
hashcode
hacker
websites
• quantum computation
• program semantics and verification
• probabilistic computation
• parallel and distributed computing
• natural language processing
• cryptography
• computational science and applications
• machine learning
• information theory
friendly-cooperative framework
anomalies
ieee 802.11g
multiple encryption.
secure electronic transaction
f8
a5/3
stream cipher
unauthorized access
network design
real estate
infrastructure security
wireless sensor network.
wireless mesh network
wireless ad-hoc networks
web application penetration testing
security testing
system hardening
anti malicious objects
star topology
black scholes equations
malicious object
native language password
textual password
shape based authentication
multicode encryption
transversal designs
reed-muller codes
communication
connectivity
and quality control
network system
control charts
big data big data techniques
peer-to-peer network security database and system
data and grid room
system information leak
peer to peer and overlay networks
qos and resource management
dos attacks
ndp
fragment header
flow-label
ipv6 security vulnerability
remote authentication
man in the middle attack
user authentication framework
analysis
dynamic billing system
cassandra big data.
attacks prediction
threat activity.
cyberattack ontology
cyberattack prediction
network and wireless network securitymobile
iot security and privacy
blockchain new design
blockchain consensus algorithms
blockchain foundations
blockchain-based security for the iot
iot experimental results and deployment scenarios
security & network management e-mail security
multimedia etc big data tools and systems big data
privacy and trust big data applications
models and algorithmsbig data infrastructure and p
data aggregation
temporal sequence patterns
ubiquitous computing security web 2.0 security
olsr
willingness function
smrr
blockchainbased security for the iot
blockchainauthentication and authorization
analyze formal
timestamps
nonce
pkm
informtaion technology
safety
response time
self-configuration
self-cure
distributed hash tables & linear diophantine
decentralized network
multimedia content management
trust management for virtual organizations
policy of trust in e-leaning systems
trust and reputation management
mobile and sensor networks
trust/risk based security frameworks
trust management system for wireless
certificateless public key encryption
certificateless signature scheme
digital certificate
certificateless public key cryptography
set protocol
fuzzy logic & perspective of intrusions
association mining
self-protection
perimeter-based idps
network-based idps
host-based idps
idps sensors/agents
tcp re-assembly
cyber-crime & bdi.
vendor lock-in
csp
multi-cloud
feature selection.
keystroke dynamics.
biometric
web-based
fuzzy-c means clustering
background subtraction
foreground detection
secure two-party computation
zero-knowledge proof
distributed eigamal encryption
similarity coefficients
vanet etc.
v2v
stdma
csma
packet marking
autonomous system
sensing layer
resonant frequency
micro cantilever
dynamic source routing.
network coding
hybrid idps
background removal
ecurity threats & countermeasures (ddos
network applications
emerging technologies for next generation network
discrete algorithms and discrete modeling
network operation and management
mobile and wireless networks
network security and privacy
communication network protocols
communication network architectures and design
features.
mlp
filtering.
enron
keyword search
report generation
digital forensic
x64 systems
neighbour mean interpolation
image interpolation
programming languages
operation system
simulator
emulator
web filtering
collaborative web systems
vector valued functions
privacy preserving
implicit function theorem
hitech act
hipaa
incident response team
cyber incidents
email forensic
engineering
search engine optimization
malicious websites
intrusion detection and prevention internet securi
counterfeit.
and machine learning
knime
aes.
session based key
sbskct
embedded devices.
modular exponentiation
n-1 attack
simple power analysis
dominant feature set.
outlier analysis
authentication and key agreement protocols
heart rate device
gps
emergency
arduino microcontroller
accelerometer
accidents
hierarchical model
low-power
improved watchdog
watchdog
security area control
regulation and trust mechanisms
biological and evolutionary computation
reinforcement and unsupervised learning
) • ubiquitous computing security
behavioral profile
naive bayes classification
multi stage filter
enhanced adaboost
compression.
transformation
threshold secret sharing
public verifiable signcryption
standard model
provable security
identity based cryptography
signcryption
fairness.
ttp (trusted third party)
security and privacy in pervasive/ubiquitous compu
authentication and non-repudiation
intrusion detection and vulnerability assessment
terrorism
social network analysis (sna)
backtracking bit
watch nodes
traversed administrator field
associative node
ubiquitous computing security web 2.0 security cry
corporate infrastructure
disaster recovery
data loss
security breach
authentication and key agreement.
umts security
telecommunications system
gsm system
false alarm rate
) * ubiquitous computing security *
automation
touch sensor
communication technologies
networks
mobile & wireless networks
lowest id clustering algorithm
sybil node
mobile ad hoc network
spammers
web spam
redirection
manipulating search engine
search engine
hiding techniques
cloaking detection
database and system security intrusion detection a
self-optimization
autonomic network
clustering technique
awgn and raleigh fading channels.
bit error rate(ber)
ecb and cfb cryptographic algorithm
pre-zf
pre-mmse
mimo-ofdm
peerto-peer network.
intrusion attacks
taxonomy of attack
intruder
maximum power transfer
electronic circuit
control system
lucas
aka
eps
lte security
• intelligent agents and systems
• trust management
• privacy and authentication
• cryptography and coding
security and privacy policies
security in distributed systems
artificial immune systems
computational intelligence in security
multiple flows
tcp protocols
high-speed
heterogeneous networks.
next generation networks
digital signatures
fair-exchange
contract signing
andit security
protected health information
personal identification information
information assurance
network security & its applications
pki interoperability
cross-certification
certificate practice statement(cps)
certificate policy(cp)
certification authority(ca)
public key infrastructure(pki)
ngn
ec-aka
casper/fdr
See more
Users being followed by IJNSA Journal