Personal Information
Website
About
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Tags
phishing
worms
peer-to-peer network security
database and system security
spam
cryptographic protocols
mobile
virus
e-mail fraud
web 2.0 security
ad hoc and sensor network security
network and wireless network security
ubiquitous computing security
security & network management
security
network security
e-mail security
intrusion detection and prevention
trojan protection
internet security & applications
session hijacking
mim
artificial intelligence
machine learning
ddos
hardware-based attacks
performance evaluations of protocols & security ap
intrusion detection
web based applications
blockchain technology
services security
crowd sourcing
social networking
security of virtual machines
replay attack
authentication
machine learning for security
replay attack etc
home networks
body-area networks
network management
cyber security
system security
blockchain
privacy
cryptography
sdn
data mining
sensor network security
vanets
industrial control systems
deep learning
trojan protectio
autonomous vehicles
wireless network security
cloud computing
internet of things (iot) secur
security and optimization
cryptocurrencies
encryption
intrusion detection and preven
internet security & applicatio
cognitive security
big data
security application
neural networks
wireless sensor networks
electronic voting security
trojan protection security threats & countermeasur
e-mail fraud virus
ad hoc and sensor network security peer-to-peer ne
manet
internet of things
network and wireless network security mobile
network and wireless network s
bioinformatics
information security
trust
database
natural language processing
) ubiquitous computing security web 2.0 security c
ad hoc and sensor netw
steganography
intrusion detection system
security threats
computer vision
security and privacy for iot
privacy challenges
fuzzy logic
routing
cloud
performance evaluations
information retrieval
connectivity and networking
detection
security threats & countermeasures
malware
)
security threats & countermeasures (ddos
iot applications and services
peer-to-peer
• ubiquitous computing security
• cryptographic protocols
• virus
• e-mail security
• intrusion detection and prevention
• peer-to-peer network security
ontology
• mobile
key management
aodv
image segmentation
knowledge processing
pattern recognition
image encryption
• performance evaluations of protocols & security
• web 2.0 security
• security & network management
• internet security & applications
• network and wireless network security
robotics
internet security
attack
cyber physical system (cps)
aes
internet of things (iot)
block cipher
game theory
• database and system security
wireless network
attacks
cybersecurity
classification
ad hoc
information extraction
network
text mining
decryption
nlp
android
ubiquitous computing
data security
iot
substitution
e-commerce
cloud security
resource provisioning
web security
cyber physical system
performance evaluations of pro
dos
cloud and grid computing for big data
soft computing
vanet
information hiding
predictive learning
fuzzy systems
steganalysis
permutation
ssl
virtualization
signal processing for iot
electronics
security.
parallel processing
deployment scenarios
entrepreneurship
phishin
iot-enabled innovation
network protocols
wireless sensor network (wsn)
cryptosystem
mobile ad-hoc networks
rsa
denial of service
qos
mobile ad hoc networks
password
electronics and signal processing for iot
usability
malicious node
hash function
kyoto2006+ dataset
quantum cryptography
discrete fourier transform
access control
wimax
fog
data center network control
intrusion detection system (ids)
optimization
genetic algorithm
udp flood
icmp flood
business intelligence
trojon protection
malware analysis
smart grid
wireless sensor network
malware detection
array signal processing
watermarking
data protection
visualization
random forest
wsn
phonology
morphology
semantic processing
machine translation
scanning
hacking
bayesian network
ethereum
threats
machine learning and ai for big data
experimental results
secret sharing
hybrid intelligent systems
chaotic system
symmetric key
generalized arnold map
security techniques
anonymity
distributed denial of service
lexical semantics
mobile payment
dsr
ns2
mobile banking
elliptic curve cryptography
biometric security
ddos attack
wireless ad hoc networks
group testing
secure routing
biometrics
data science
intrusion prevention
mobile network
cooperation
vpn
verification
grid computing
wireless networks and mobile computing
wlan
social engineering
key distribution
visual cryptography
digital image processing
3d and stereo imaging
cyberattack
e-voting
machine learning algorithms
• network and wireless network security • mobile
ad hoc and sensor network security • peer-to-peer
dynamic analysis
mobile security
secure cloud computing
big data mining
mobile agent
blockchain scalability
question answering
fog computing
protocol
it security
text steganography
manets
block chain issues and trends
iot-enabled innovation and entrepreneurship
chunking/shallow parsing
service oriented architecture
firewall
framework
intrusion
chaos
computer & network security
user identity
information technology
reputation-based
dns reflection or amplification attack
syn flood
http flood attack
confidentiality
unsw-nb15
digital forensics
blowfish
support vector machine
secret key
deadlock-free
critical infrastructures
kleptography
network forensics
honeypots
challenges
man-in-the-middle attack
trust determination
hamiltonian model
trust-based routing protocols
network security.
voip
nwtd
models and algorithms
security properties
big data techniques
network intrusion detection
mobile authentication
broadcasting communication
multimedia
device fingerprinting
collaborative environments
zigzag scanning
psnr
ascii code
least significant bit (lsb)
quantitative trait loci
forecasting
carry select adder
endpoint security
dual-port read-only memory
xor
symmetric cryptography
pox
databases
topology discovery
software defined network
wearable devices
cloud storage and file systems
classifier
wormhole
internet signal processing
internal controls
color and texture
device deployment
methodology
m/g/r processor sharing queue
wearable technology
private key
benchmark
integrity.
spectral analysis
device authentication
initial trust
quantum key distribution
data mining techniques
sha-1
public key
trojan protection • security threats & countermeas
ecc
web authentication
wireshark
text-based captcha
vulnerability assessment
3-d mesh
economics
denial-of-service attack
security management
rotor cipher
e-mail fraud • virus
software security
cybercrime
brute force attack
network protocols & wireless networks
social media
anomaly
trusted third party
security engineering
computer science
cyber trust and security
covert channel
theory of parallel / distributed computing
bluetooth
networking and architectures
reinforcement learning
edge & cognitive s
mobile devices
computer networks & communications
optical computing
feature selection
algorithms and applications
fuzzy logic.
email spam
denial of service attack
cpu
cipher text
grid
feature
wireless
virtual machines
integrity
packet flow
smart city
kerberos v5
ldap
abnormal.
vanet attacks
network performance
password handling
trust and privacy challenges
subliminal channel
trapdoors
smartwatch
smart card
intruders
performance evaluation
blockchain authentication and authorization
trust and privacy ch
software systems and technologies
experimental results and deployment scenarios
blockchain based security for the iot
data
pervasive computation trust
bro ids
inventory
5g and networks for big data
trust management
data visualization
user authentication
rsa algorithm
brute force attacks
multimedia etc
big data applications
consensus
intrusion detection systems
decentralized trust management
wormhole routing
bb84 protocol
ipsec
management
twitter
penetration testing
window function
denial-of-service
mapreduce
risk management
tdes
authorization
information centric network
entropy
ad hoc network
protocols
image processing
vanet adversaries and attackers
securing windows
spectrum analysis
pay-per-click advertising
microsoft domain environment
bfcdnba
pki
feature extraction
automated ids
mix zone
security analytics
vanet security and privacy approaches
pseudonyms
bf
exploit.
google ads
wddl
apache spark
bfmawddl
security and privacy requirements in vanet
bfma
elliptic curve
vulnerability
dpa
click spam
web advertising
okhttpclient
httprequests
unavailability
false alarms
kdd cup 99
content management
wordpress
attribute-base-access-control
role-base-access-control
network architectures
mobile networks & wireless lan
interworking
lte
umts
imsi
identity
kvefs
encrypt file system
key-value store
file system in user space (fuse)
protocols.
least significant bit
matrix partition
spatial domain
image steganography
routing protocols
• theoretical computer science and algebra
sybil attack
digital signature
connectivity
automation
computing
pairwise comparisons.
analytic hierarchy process
access security controls
performance
congestion control
security for grid computing
a digital certificate
nsl-kdd
administrator
fair exchange protcocol
insider threats and countermeasures
security information systems architecture and desi
security and privacy in mobile systems
access control and intrusion detection
diffusion.
confusion
shuffle
henon map
encryptions
healthcare cybersecurity
iot security
sniffing
surveillance
usable security
data description
temporal sequence
anomaly-based network intrusion detection system
cryptanalysis
location privacy
reliability
wireless mesh networks
mobile ad-hoc network
api calls
behavioural pattern
frequent sequence mining
secure communication
mutual authentication
bloom filter
random number generator
data hiding
security policy
session key establishment
model checking
error detection
fault tolerant
rc4
crypto stream ciphers
detection rate
decision tree
public key cryptography
matlab
) • ubiquitous computing security • web 2.0 securi
mobile ip
standard
simulation
device association
tls
attacks & performance
plain text
svm
traceback
manet(mobile adhoc network).
shortest path
biometric authentication
the mapping study
internet of thing
color space
natural language prepossessing
multi-layer encoding
python programming language
text stenography
• security threats & countermeasures
• database
firewalls
false alarm
distributed denial-of-service (ddos)
vehicular forensics
risk mitigation
unfettered rules
benchmarks
anomaly-based detection
insider threat
distributed denial of service (ddos)
logistic map
training
public-key cryptography
arithmetic coding
smt
vanet architecture
ariadne
sead
computerbased information system
and pso.
iqim
dabechies4
interweaving
flash crowds
credits.
mom
wire antennas
gain
current distribution
vswr
fractal
input impedance
polarization
clustering
vn
knowledge-based authentication
paas
iaas& authentication
8 bits microcontroller
ditributed denial-of-service attack
ddisjunct matrix.
non-adaptive group testing
daugman
canny
sobel
iris
prewitt
zero cross
critical infrastructures.
man-in-the-browser
aran
ndm
crahn
multi-channel mac
service discovery
encryption\decryption
pgp
hmac
swifi
online social networks
profile cloning
computer network
cloud service
distributed computing
shares
greying effect
key share.
denial of service (dos)
netstat
the sleuth kit (tsk)
autopsy
resonant
bgp protocol
hashing.
bmp image file
lsb steganography
agent based intrusion detection system (aids)
black hole attack
security plan
small business
risk planning
parsing
internet attacks
knowledge base
local authentication protocols
mobile cloud computing
finger print authentication
dmt
dft
qos routing
application resource
graphical password
legitimate traffic.
dll. llc
media access control
physical layer
encryption/decryption[2]
caesar cipher[2]
security protocol
ns2[1]
wireless networks
wi-fi
prognostic
svm.
mog-hmm
rul
aodv.
false positive rate (fpr)
ubiquitous
mode of operation
low-resource
source code analysis
unreleased resource
path manipulation
software vulnerabilities
resource injection
distributed ac
ir circuit
hvac
temperature monitoring
temperature control
blue-tooth
mix
resource description framework(rdf)
utm clinic
energy-aware routing
multipath routing
bgp
network simulation tool
ip falsifying
idpf
network-level security and protection
mobile code
multi-agent systems
mobile agents
intrusion detection system.
porter stemmer
stemming
firewall policy
policy deployment
hybrid
random grids
dct based steganography
som
multi-som
common control channel challenge
erbium-doped fiber amplifier (edfa) gain adjustmen
optical switch crosstalk
all-optical network security
emerging attack vectors
security risks
cross site scripting
wired equivalent privacy (wep).
wireless local area network (wlan)
wardriving
conditional entropy
sql injection
anomaly severity classification
semantic evaluation
multi-anomalies evaluation.
anomaly severity evaluation
quantitative evaluation
internet casinos
cyber defense
botnets
email fraud
security and privacy
static analysis
adaptive neural network
aco
comprehensive evaluation
lightweight
k-nearest neighbour
anomaly detection
practical testing system
avispa.
industrial communication security
network steganography
real-time networking
tcp/ip communications
inspection game.
agile programming
waterfall methodology
owasp
key escrow
certificate less cryptography
3gpp
4g
security architecture
rhetorical relations
probability model
extractive text summarization
text clustering
markov random walk model
des
attribute reduction
artificial neural network
covert schemes
security solutions
pre-hacking
necessary information
gsm security
mobile communication
brute-force attack
rfid
markov-model
password.
lea
disaster
smartphone
seed
beacon
notification
browsing model
application-layer ddos attack
dependency
availability
metric
medical system
electronic voting system
i-voting
ivote
braiding/entanglement
multiple encryption
rotation of the bits
management & interoperability
method engineering
threat modeling
cloud software development
security event management
data correlation
network dependency analysis
googleglass
historical
response
bloom filter.
distributed denial-of-service attack
particles swarm optimization.
radial basis function neural networks
mansim.
xacml
file upload
video upload
virtual system
study material
map reduce
hadoop
protection m echanism
secret image sharing
quadratic residues
image coding
data type
data size
cipher algorithms
data density and encryption time
gpu
cuda
coefficient of variance
quality of service
tcpview
sparql
n-triples
owl
rdf.
k-means clustering
recommender system
frequent itemset
decision making
syn flooding
tcp sequence number attack
cooperative transmission
packet broadcast
opportunistic large array
mis
quality
risk assessment
privacy protection
role-based access control
coefficient correlation
pairing based cryptography
secret handshakes
dynamic matching
bilinear pairing
multi-faceted model
online social network
updater identification
application whitelisting
service-oriented approach
version control
virtual password
secure communication channel
strong authentication
shared secret session key
scenario-based approach
visualization and animation
empirical evaluation
email classification
tkip
radius
ccmp
payment certificate
multiparty micropayment
attribute-based encryption
hamming distance
cognitive load
alert aggregation
selfishness
mobile adhoc network
functional call monitoring
information flow tracking
packet dropping attack
watch dog
priority scheduling
nist
dna
shiftrows
exploring data analysis
mitm attack
information security.
key spoofing
semantic processing & nlp
question answering (qa)
nlp and ai
fingerprint
video signal processing
data center network
data integrity
face
embedded systems
peer-to-peer network
blockchain in digital forensic
signal identification
big data analytics and social media
mechatronics
data storage
ai algorithms
knowledge representation
image classification
mnist benchmark.
lstm
blockchain attacks on existing systems
social networks & web 2.0 trust management
assessment survey
covid-19 pandemic
data & system integrity
privacy and authentication
big data management
blockchain privacy
big data search and mining
incident response
reputation system
energy efficiency
cybersecurity culture
sgd
mse
zero trust architecture
web server handlers
network defenses
els
end-to-end security model
appliance
cryptocurrency exchange
digital signal processing
natural language computing
smart contracts
linguistic resources
p2p
threshold cryptography
neural languages
edge
attack detection
sensors
authentication and identity management
software engineering
agent based trust management
tools
collective digital signature
policy management
data center
distributed ledger technology
healthcare
signal or image processing
smart cities
³Ùé±ô鳦´Ç³¾³¾³Ü²Ô¾±³¦²¹³Ù¾±´Ç²Ô²õ
cad design and testing
signal processing
interoperability
alert correlation
mitigation
infrastructures for big data
clusters and grid computing : security and role of
file systems
iot connectivity and networking
arxiv
review
mare
j48.
authentication & q-learning
sama
trojan.
comparison.
microservices
blockchain technology and cyber security
reddit
technical and security issues
iot devices.
stackexchange
we introduce new detection engine for hybrid cover
text classification
software architecture
computer network is unpredictable due to informati
topic modeling
dst.
the privacy. most of such attacksare devised using
a variant of covert channelworks similarly as netw
internet of things (iot) security
prediction support parameter.
k-means clustering algorithm
detection model
information system.
malicious javascript
firmware
resource management
ngns
finding roots modulo.
and exemption.
signing group
group digital signature
implementation
technology
power distribution
social computing
networking
software
human factors
end-user errors
information systems
cisco packet tracer
cyber-attack
security issue
smart devices
incentive schemes.
rewards
federated learning
incentive schemes
high port application
sinet
port filtering
data flow pipeline
traffic patterns
covid-19 related ioc
one-class support vector machine
consensus mechanism
cloud storage
mobile computing
context-aware computing
smartwatches
finite elements.
assessment
fuzzy set theory
accounting
random forest algorithm
pe header
malware detection and mobile device.
pe file
higher education
mobile education
face and gesture
constraint processing
filter design and structures
signal reconstruction
network layer security
radar signal processing
medical image analysis
medical image processing
block ciphers
encryption time
cryptographic algorithm
wormholes
spread spectrum
selective jamming
detection models
ensemble machine learning
ddos attacks
wireless.
r360
web intelligence
evolutionary computing
ai in cyber security
nids
software defined networking
network intrusion detection sy
protection mechanism
interactive education
face recognition
intellect learning.
optimal path
big data tools and systems
encryption and decryption.
virtualization on platforms in the cloud
data storage and management in cloud computing
security techniques for the cloud
virtual compute clusters
system integration
cloud based
reference dna
multilayer security
indexing cipher
dna cryptography
nb.
knn
cnn
offline signature recognition
smart contracts.
decentralized application
added value applications
mobile ad hoc networks security
enablers
hdfs (hadoop distributed file
ad hoc and sensor network
multi input multi output (mimo
shared register array
self-propagating malware
connection failure behavior
rate limitation
shared bitmap
smurf attacks
electronics and signal process
services
salting techniques
hash analysis
security breaches
threats and attacks
lan
passphrase
mixture words
nouns
recall
recognition
image
chained codes
ldpc codes
complexity.
network security management
sprase svd (ssvd)
singular value decomposition (svd)
multimodal authentication
exponential kronecker product (ekp)
kronecker product
context-sensitive exponent associative memory mode
content-addressable storage security
policy-driven security
customizable security.
and matlab.
multivariate cryptography
little dragon cryptosystem
big-dragon cryptosystem.
biometric fusion
false positive
naive bayesian classifier
information theor
engineering cybernetics
registration time.
malware classification
selinux
convolutional neural network
risk and threats
bayesian belief network
malware propagation modelling
shifting
shifting.
soa
routing protocol
message digest
mechanism
malicious
usage control
software implementation
integrated verification.
knowledge discovery in databases and privacy prese
workload characterization
email filtering
anti-spam
cover media
video
law general
replica
overlay
clusters
trust in service-oriented architecture- open archi
content
selfish nodes
olsrv2
vulnerability analysis
text passwords
password strength
pareto-efficiency
interference limitation
mb-ofdm
service differentiation.
implementation cost
passwords
keystroke
typing rhythms
timers
tls protocol
ids
hierarchical design
decision support system
multimedia & telecommunications
database & information retrieval
semantic intrusion detection
application layer misuse detector
fuzzy intrusion detection
fuzzy cognitive mapping
http intrusion detection.
event classification
audit system
log analysis.
image signal processing
networks & fuzzy system
dns poising.
legal.
cellular automata
finite fields & montgomery algorithm.
ecc-3peke protocol
undetectable online password guessing attack
impersonation attack.
regulation
protection
personal
ad-hoc networks
distributed system.
information-centric
internet-of-things.
intelligent transportation system
sensor network.
etc
db index
cyber human behaviour
stylometric analysis
phishing email attack
cyber-security
security policies
ip traceback
defense mechanisms
packet sniffers
legal aspects
employee awareness
avalanche
key sensitivity
wimd cybersecurity
cluster
guard node
iterations
user behavior
signing group.
difficult computational problems
protocol safety.
anomaly-based intrusion detection system
groupdigital signature
land
http flood
tcp syn flood
markov chain
structural similarity index measurement (ssim).
universal quality image (uqi)
image fidelity (if)
peak signal to noise ratio (psnr)
mean square error (mse)
frequency domain
hdl.
z-transform
identity federation.
limitations
identity management
authorization and password.
federated identity management
quantum networks
cardiac implanted device
network security protocols
ip multimedia subsystem (ims)
identity based cryptography (ibc)
service authentication
batch verification
smartcard
remote user
masquerade attack
health belief model
windows api calls.
term frequency-inverse document frequency vectors
rangoli
transposition cipher
location coordinates
latitudes
longitudes
n-gram analysis
tunneling
route optimization
triangle routing
handoff delay
soft input
convolutional coding
feedback
lu matrix composition
key establishment
intrusion detection / prevention systems
signature formulation
signature processing
wimd
dfa
coexistence
heterogeneous wireless network
ieee 802.15.4
ieee 802.11b
inter packet delay
no key-exchange
quantum superposition state
perl
sub
html
regexpr
file handler
wireless implanted medical devices
advanced persistent threats (a
multi-vector attacks
mesa security model
stealth data exfiltration (sde
sustainable agriculture
db index.
water management
dc water pump
water & humidity sensors
soil sensor
vulnerability identification
etc.
smart irrigation system
semantic web
conceptual modeling
unsupervised machine learning
learning problems
j48
network control
mansim
pos tagging
explainable artificial intelli
shapley additive explanation
computer architecture
fake profiles
xg boost
nft
crypto
agreements
blockchains
smart grids
real-time systems
network security; malware propagation modelling; b
maintenance engineering
production
worms &trojan
mobile clouds
sla management
machine learning and ai
network traffic analysis
asset inventory
performance evaluation.
data classification
cybersecurity frameworks
threat intelligence
zero-day vulnerabilities
computational linguistics
spoken language processing
nlp and machine learning
distributed denial-of-service
machine learning problems
morphic computing
q-learning
mobile ad hoc networks securit
big data and the cloud
cloud computing architecture
cloud business
google glass
stacked auto encoder
relieff algorithm
email forensic dataset
cybercrimes
aquila optimization
likability
traceability
software maintenance
separation of concerns
context-aware traffic light co
traffic light control (tlc)
recurrent neural networks (rnn
deep learning (dl)
empirical studies
vulnerabilities
access control mechanisms
anonymization techniques
authentication mechanisms
encryption techniques
sensor network
z-transform; frequency domain; watermarking; mean
diffusion of innovation theory
national security
data privacy
low carbon blockchain
security key
public cryptography
argumentation mining
massive parallel sequencing
forensic examinations
bio-examinations
deoxyribonucleic acid (dna) da
particles swarm
radial basis function
requirements engineering (re)
software defined networking (s
patient empowerment
ehr management
blockchain in healthcare
fuzzy neural network
fuzzy c-means clustering
actuators
neural network
url
phishing detection
network cybersecurity
storage and retrieval
coding and transmission
anomaly-based intrusion detect
protocol safety
user authentication; group communication; secret s
big data in cloud
cloud management
cloud storage for iot
sensitive data
insider attacks
data leakage prevention (dlp)
data access & protection
password complexity
password length
password security
ht detection
hardware trojans (ht)
path selection
test generation
path delay fault (pdf) testing
model interpretability
explainable ai
vanet security and privacy app
system information leak
data and grid room
vanet adversaries and attacker
security and privacy requireme
exploit
packet delivery ratio
throughput
hdl
network mapping
nmap
social clouds
consolidation
secret sharing technique
bi-variate polynomial
security for emerging networks
modelling
cyber attacks
tree
bayes
dns poising
techniques
ipv4
exemption
information system
digital investigations
digital forensics readiness
digital evidence
information theory
wireless medical networks
ad-hoc on-demand distance vect
mobile ad-hoc network (manet)
one-class support vector machi
sharing queue
m/g/r processor
biometrics; biometric fusion; face; fingerprint; c
micro medical processors
knowledge instruction
medical sensor network
in order to the rapid growth of the network applic
it is necessary that this security concern must be
new kinds of network attacks are emerging endlessl
we propose a novel distributed intrusion detection
micro knowledge processors
hash function [2].
knowledge processors
image analysis
multimedia data mining
multimodal skew tent map
interchange permutation
eap-ttls
visual information processing
inductive learning
evolutionary computation
nlp and information retrieval
and text mining
web
machine learning techniques
bls signature
operating systems
cryptographic algorithm.
sequence number
monitoring agent
side channel monitoring
hooks
system call
hybrid analysis
android banking trojans
security threats & countermeas
web and internet computing
ontology and semantic web
machine learning & application
grid and scalable computing
information technology trends
bitwise-based hash
split sketch
principle component analysis
victim identification
ddos detection
claims processing
process improvement
insurance
password replace ment
digital transformation
software configuration managem
interactive education.
public cloud severs
data outsourcing
pervasive/ubiquitous computing
regulation and trust mechanism
hdfs (hadoop distributed file system)
software-defined networks
rerouting
devices authentication
security metrics
packet analyzer
tcp
network traffic
dos attack
secure division
secure sum
naive bayesian
privacy preservation
authentication scheme
cryptography primitives
password replacement
fintech
central bank digital currency
cyber-defense.
steganography; image segmentation; byte characteri
digital rupee
smart banking
survey
domain analysis
scoring benchmark
http strict transport security
threshold cryptography.
shape representation
text processing
document recognition
signal noise control
victimization
information
emotion
signal
ciphers identification
encryption modes
secured watermark system (sws) and computer securi
feature engineering
security logs
hypergraphs
cloud data security
fine grained access
group key management
and crypt ography.
electronic payment
hash chain
multimedia & cognitive informa
symbolic machine learning
zss signature.
data outsourcing; privacy; public cloud severs; ac
security posture
open-source erp software
usable security.
factors
attributes
measurement framework
software configuration management
parsing/grammatical formalisms
monetary policy
socioeconomic impact
peer-to-peer transactions
packet loss
secret-sharing
optimistic multi-party computa
trustworthiness
autoencoder
invertible
mobile device
intellect learning
finite elements
hybrid covert channel
information retrieval and ai
dst
neural languages and nlp
gitlab
jenkins
cve-2021-44228
fair exchange
ci/cd
continuous delivery
continuous integration
dimensionality reduction
educational data mining
computer security
secured watermark system (sws)
networks for big data
encryption and decryption
inspection game
confusion matrix
impersonation
phishing attack
email users
data analytics
correlation
log loss
hot log
live log
insufficient logging
soc
siem
countermeasures
avispa
industrial communication secu
data management
mobile networks
semi-trusted third party
fairness
verifiability
alert prioritization
alert clustering
merging
trellis coded genetic algorith
session key matrix
pseudo random key generator
smurf attacks.
finite automata
xperimental results
adhoc network
ultrasonic audio
multi input multi output (mimo)
voice activation
computer
byte characteristic
and services.
zss signature
cyberdefense
double spending
cybercrime awareness
cybercrime on social media
attack graph
education
embedded system
nosql data stores
public safety
crowd monitoring
cctv
cyberattack impact
cyberattack types
personal privacy
economic stability
cyberattacks
saudi arabia
parameters
sensor node
leach
cluster head selection algorit
cluster head
big data analytics
big data and iot
application security
awareness
security behavior
self-efficacy
pre-processing
benevolent node
packet latency.
cross layer architecture
wsn security
anti-spams
receiver mail server
sender mail server
spam email
common vulnerability exposure (cve)
it policy
true positives
false positives
business information security
security assessment
security standards
heterogeneous wireless networks
adhoc and sensor networks
high speed networks
internet and web applications
measurement & performance analysis
network operations & management
data and grid room
network based applications
system information leak
dsss
isakmp
big data big data techniques
ad-hoc
tbraodv
misbehaving node
peer-to-peer network security database and system
body area networks
body area network security
cross layer detection
todv
eavesdropping
quantum copying machines
isotropic cloning
equatorial cloning
coordinate ratios
fidelity
physical proximity
device discovery
geometric mean (gm)
direct trust
indirect trust
route trust (rt)
base station (bs)
location based services
location cloaking
distributed query processing
multi- agent
mib
snmp
lattices
lattice reduction
coppersmith
subset sum
simultaneous diophantine
merkle-hellman.
low level feature
anti obfuscation technique
noise & entropy
random oracle model
proxy re-cryptography
conditional proxy re-encryption
chosen ciphertext security.
multimedia content management
one-time passwords
interfaces
cueing.
attack taxonomy
peer to peer and overlay networks
mobile & broadband wireless internet
multimedia networking
scrambling
image cipher.
qos and resource management
dos attacks
ndp
fragment header
flow-label
ipv6 security vulnerability
remote authentication
man in the middle attack
intrusion detection is one of the standard stages
which motivates many researchers to discover metho
user authentication framework
analysis
dynamic billing system
data aggregation
distributed hash tables & linear diophantine
decentralized network
kdd cup 1999 dataset.
forensics
windows registry
chebyshev polynomials
digital forensic
&security
email forensic
certification authority
ca
pca
feature coding
e-mail forensics
e-mail headers
header analysis
e-mail architecture
• algorithms and data structures
• automata theory
• computational complexity
geometry
• computational physics & biology
• information theory
• machine learning
• computational science and applications
• cryptography
• natural language processing
• parallel and distributed computing
• probabilistic computation
f8
secure electronic transaction
multiple encryption.
ieee 802.11g
keyword search
anomalies
control charts
network system
and quality control
report generation
communication
reed-muller codes
transversal designs
multicode encryption
shape based authentication
textual password
native language password
malicious object
black scholes equations
star topology
anti malicious objects
system hardening
friendly-cooperative framework
blind signature
• heterogeneous wireless networks
• next generation internet
• adhoc and sensor networks
• high speed networks
• internet and web applications
• measurement & performance analysis
• next generation web architectures
• optical networks and systems
• peer to peer and overlay networks
internet threat monitors (itm)
flooding attack
iptrcing
botnet and honeypot.
discrete cosine transformed (dct)
peak-signal-to-noise-ratio (psnr)
secret reference matrix (srm)
e-learning
e-risks
e-remedies
e-learning security
information gain
machinelearning
enterprise
• network
cassandra big data.
• program semantics and verification
• quantum computation
websites
hacker
hashcode
dempster–shafer belief theory
fair document exchange
fair exchange protocols
attacks prediction
threat activity.
cyberattack ontology
cyberattack prediction
network and wireless network securitymobile
iot security and privacy
blockchain new design
blockchain consensus algorithms
blockchain foundations
blockchain-based security for the iot
iot experimental results and deployment scenarios
security & network management e-mail security
multimedia etc big data tools and systems big data
privacy and trust big data applications
models and algorithmsbig data infrastructure and p
heterogeneous networks.
high-speed
tcp protocols
analyze formal
timestamps
multiple flows
computational intelligence in security
artificial immune systems
nonce
pkm
security in distributed systems
security and privacy policies
informtaion technology
• cryptography and coding
• privacy and authentication
• trust management
• intelligent agents and systems
safety
response time
self-configuration
self-cure
lte security
eps
aka
blockchainauthentication and authorization
counterfeit.
intrusion detection and prevention internet securi
malicious websites
search engine optimization
engineering
) • ubiquitous computing security
reinforcement and unsupervised learning
biological and evolutionary computation
regulation and trust mechanisms
security area control
watchdog
improved watchdog
low-power
hierarchical model
accidents
accelerometer
arduino microcontroller
emergency
gps
heart rate device
authentication and key agreement protocols
casper/fdr
next generation networks
spammers
mobile ad hoc network
sybil node
lowest id clustering algorithm
mobile & wireless networks
networks
communication technologies
self-protection
touch sensor
self-optimization
control system
electronic circuit
maximum power transfer
intruder
taxonomy of attack
intrusion attacks
peerto-peer network.
mimo-ofdm
pre-mmse
pre-zf
ecb and cfb cryptographic algorithm
bit error rate(ber)
awgn and raleigh fading channels.
clustering technique
ec-aka
ngn
public key infrastructure(pki)
certification authority(ca)
certificate policy(cp)
certificate practice statement(cps)
cross-certification
pki interoperability
network security & its applications
information assurance
personal identification information
protected health information
andit security
contract signing
fair-exchange
digital signatures
lucas
database and system security intrusion detection a
cloaking detection
hiding techniques
search engine
manipulating search engine
redirection
web spam
thematic analysis
huffman coding
data compression.
behavior representation
system call dependence graph
privilege escalation
androidapis
trust/risk based security frameworks
trust management system for wireless
certificateless public key encryption
certificateless signature scheme
digital certificate
certificateless public key cryptography
set protocol
fuzzy logic & perspective of intrusions
diversity
fault-tolerant networks
intrusion resilience
survivability
cryptography and coding
untraceability
association mining
intrusion detection and vulnerability assessment
authentication and non-repudiation
attack test cases
wireless intrusion detection system
wireless attacks
key management protocols
peer to peer
group
multicast
hierarchical
tree based
escrow less
server based
server less
trust management for virtual organizations
obfuscation
policy of trust in e-leaning systems
man-in-the-middle.
legendre polynomials
kernel functions
functional analysis
svms
classification problem.
trust and reputation management
medical internet of things
mobile and sensor networks
data loss
disaster recovery
corporate infrastructure
ubiquitous computing security web 2.0 security cry
smrr
associative node
traversed administrator field
watch nodes
backtracking bit
social network analysis (sna)
terrorism
behavioral profile
outlier analysis
dominant feature set.
simple power analysis
n-1 attack
modular exponentiation
embedded devices.
sbskct
session based key
aes.
knime
blockchainbased security for the iot
and machine learning
security and privacy in pervasive/ubiquitous compu
temporal sequence patterns
ubiquitous computing security web 2.0 security
olsr
willingness function
ttp (trusted third party)
fairness.
signcryption
identity based cryptography
provable security
standard model
public verifiable signcryption
threshold secret sharing
transformation
compression.
enhanced adaboost
multi stage filter
naive bayes classification
false alarm rate
gsm system
telecommunications system
umts security
authentication and key agreement.
security breach
autonomic network
zero-knowledge proof
smart cards
pixel
invisible digital watermarking
distributed eigamal encryption
nonlinear function.
similarity coefficients
one-way function
diophantine equation
quotient ring
np-complete
network intrusion prevention
iptables
honeypot and nics.
biometric information
arithmetic encoding
diffie-hellman algorithm
covert channel.
authentication.
coercing
rigging
receipt-free
deniable encryption
probabilistic encryption
switching and addressing techniques self-organizin
network virtualization
performance measurement
vmware
conditional random fields
layered approach
and delay
language-action perspective
uncertainty
computing with words
spatial reasoning
agent-based systems
pragmatic web
community consensus
location-dependent social networks
blom
judy array
clustering routing
niger-delta
wireless body area networks
secure two-party computation
eavesdroppers
attack games.
remote user authentication
statistical test of significance
kolmogorov-smirnov test
statistical hypothesis testing
tent map
quadratic map
and bernoulli map
packet marking
diffusion process and stream cipher.
autonomous system
sensing layer
resonant frequency
cdma throughput
delay.
system dynamics
micro cantilever
modeling
ip spoofing
dynamic source routing.
network coding
enterprises security risk management
esrm
maturation of a profession
hybrid idps
perimeter-based idps
ann
minutiae
sessionbased
vanet etc.
sha-512
crossover
clone
sybil
node replication attack
static and mobile wsn.
copyright protection
stage staffing watermarking
digital multimedia
encryption and decryption algorithm for watermarki
v2v
2-d arnold cat map
stage staffing
stdma
diffusion
csma
traffic flow
buffer
poisson arrival
queuing model
next generation network protocol
high speed bandwidth
udt
ao
ip
sha-256
md5
hash function [2]
open application
xml-dsig
circular queue.
ws-security
soap
httpi
https
http
signature-based
misuse detection
link layer security
galois counter mode.
leach (low energy adaptive clustering hierarchy)
sensor networks
architecture
sec-leach (secure leach)
self-sovereign identity
multicast communication
byzantine behavior
online auction network
probabilistic packet marking algorithm
efficient probabilistic packet marking algorithm
attack graph.
and nist statistical tests
network security & identity privacy
data value
matlab simulation
chaotic algorithms
error concealment
images security
m-ary modulation
qim
interpolation.
web services
signatures
information security controls
risk analysis and management
baseline manuals
best practice frameworks
desirability functions
c&c
flow based detection
behaviour based detection
signature based detection
encrypting
decrypting
wave files.
emergency response communication
small business security
reliability.
bandwidth link utilization
caca
lu-cac
mac addresses hash value.
scan detection
flow
ipfix
e-commerce systems security
lsb replacement steganography
confidence level
mobile phones
data shredding
phonology and morphology addressing & location man
& privacy next generation internet & web architect
random kd (key distribution)
multigeneration keys.
low power
vlsi
wake up receiver
agent
mobile ad hoc network (manet)
reputation
controlled flooding
malicious packet dropping
node misbehaviour.
low-cost cryptography
multi-server
trojan protectionstem security
database and syvirus
smart-card
(2
n) visual cryptography
share
strong t -consistency
group communication
server security
botnet
irc
threshold level
mac-layer
attackers .
mobile and wireless networks
graphical passwords
snakes & ladders game
memorability of passwords
s box
non linearity
symmetric cryptosystems
security synthesis
provisioning
workflows
user lifecycle
elecronic voting
translation.
adhoc on demand distance vector protocol(aodv)
network security and privacy
browser vulnerability
client honeypot
icap
communication network protocols
ddos-attacks
attack path reconstruction
best practice
biohashing
fingerprint biometrics
cancellable biometrics
non-invertible transformation
simulator
emulator
web filtering
collaborative web systems
vector valued functions
privacy preserving
implicit function theorem
hitech act
hipaa
incident response team
mobile ad hoc networking
cyber incidents
rtos
real time application
ecurity threats & countermeasures (ddos
network applications
emerging technologies for next generation network
discrete algorithms and discrete modeling
network operation and management
ofdm
wireless body sensor network (wbsn)
biometric key
authenticated symmetric key establishment
topology.
fault tolerance
rational secret sharing
information theoretic security
ad hoc and sensor network security * peer-
e-mail fraud * virus
trojon protection * security threats & cou
) * ubiquitous computing security *
security testing
web application penetration testing
filtering.
enron
wireless ad-hoc networks
wireless mesh network
wireless sensor network.
infrastructure security
real estate
network design
unauthorized access
stream cipher
sensor nodes
base station
response & tracking.
communication network architectures and design
features.
naive bayes
k-nn
logistic regression
(ddos
de-authentication attack
kali linux
scapy
python
arabic text
multi-layers
unicode
hiding information
international data encryption algorithm (idea)
mlp
encrypted data
mpi.
cognitive radio
inter symbol interference (isi)
spectrum sensing
oauth
host-based idps
idps sensors/agents
tcp re-assembly
cyber-crime & bdi.
vendor lock-in
active detection
arp spoofing
host based ids
lan attack
csp
medium accesscontrol
bandwidth reservation
distributed rate control.
trust-based routing
secure routing protocol
multi-cloud
hybrid intrusion detection system
support vector machine (svm)
classification accuracy
feature selection.
image denoising
wavelet thresholding
noise categories
risk mechanism
enterprise risk management
risk principles management
manage security programs
enterprises security risk managemen
network-based idps
smart vehicles
dispute settlement
physical unclonable functions
physical cryptography
credential
mediator
data integration
floating point number
one time pad
compression-crypto
network density
life time
priori probability
session passwords
shoulder surfing
digital identity
openid
oix
distributed resource allocation
deviation detection
system access control
and public-key.
fuzzy-c means clustering
background subtraction
foreground detection
background removal
• internet security
• security
x64 systems
neighbour mean interpolation
image interpolation
programming languages
operation system
attack tree
objective functions
nsgaii.
cobit
iso 27001
information security management systems (isms)
pdca
mapping
it governance
proposed method.
keystroke dynamics.
identity based firewalls
biometric
computer networks
firewall systems design
cryptovirology
cryptovirus
cryptotrojan
electronic warfare threats
electronic espionage threats
evasive/ deniable/ untraceable attacks
password (information) snatching
gpcode.ak
conficker
cryptoviral extortion.
secure servers
secure network
ad hoc and sensor
web-based
network intrusion detection system (nids)
snort
packet detection and packet header matching (phm)
asynchronous distributed pricing
a5/3
See more
Users being followed by IJNSA Journal