Personal Information
Website
About
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Tags
phishing
worms
peer-to-peer network security
database and system security
spam
cryptographic protocols
mobile
virus
ad hoc and sensor network security
e-mail fraud
network and wireless network security
web 2.0 security
security & network management
ubiquitous computing security
security
intrusion detection and prevention
network security
trojan protection
e-mail security
internet security & applications
session hijacking
mim
artificial intelligence
machine learning
ddos
performance evaluations of protocols & security ap
hardware-based attacks
intrusion detection
web based applications
services security
blockchain technology
social networking
crowd sourcing
authentication
security of virtual machines
replay attack etc
network management
machine learning for security
replay attack
cyber security
body-area networks
system security
home networks
blockchain
cryptography
privacy
data mining
sensor network security
sdn
wireless network security
vanets
deep learning
industrial control systems
trojan protectio
autonomous vehicles
cloud computing
security and optimization
internet of things (iot) secur
intrusion detection and preven
encryption
internet security & applicatio
big data
security application
cryptocurrencies
neural networks
cognitive security
ad hoc and sensor network security peer-to-peer ne
e-mail fraud virus
trojan protection security threats & countermeasur
network and wireless network s
bioinformatics
information security
network and wireless network security mobile
internet of things
manet
electronic voting security
trust
database
wireless sensor networks
natural language processing
) ubiquitous computing security web 2.0 security c
steganography
ad hoc and sensor netw
fuzzy logic
security and privacy for iot
computer vision
privacy challenges
routing
intrusion detection system
performance evaluations
connectivity and networking
security threats & countermeasures
security threats
information retrieval
detection
security threats & countermeasures (ddos
)
iot applications and services
malware
• e-mail security
aodv
• ubiquitous computing security
peer-to-peer
• cryptographic protocols
• mobile
cloud
• peer-to-peer network security
• virus
ontology
• intrusion detection and prevention
image segmentation
internet of things (iot)
• network and wireless network security
internet security
pattern recognition
• web 2.0 security
• performance evaluations of protocols & security
• security & network management
• internet security & applications
attack
image encryption
robotics
knowledge processing
game theory
cyber physical system (cps)
aes
block cipher
key management
text mining
information extraction
network
nlp
ad hoc
attacks
decryption
android
classification
• database and system security
wireless network
ubiquitous computing
resource provisioning
iot
cloud security
web security
cloud and grid computing for big data
information hiding
soft computing
performance evaluations of pro
data security
cyber physical system
vanet
e-commerce
dos
substitution
phishin
parallel processing
usability
fuzzy systems
steganalysis
permutation
rsa
security.
ssl
wireless sensor network (wsn)
cybersecurity
electronics and signal processing for iot
mobile ad-hoc networks
denial of service
qos
electronics
deployment scenarios
password
malicious node
iot-enabled innovation
virtualization
mobile ad hoc networks
network protocols
signal processing for iot
entrepreneurship
symmetric key
machine translation
wsn
data protection
hacking
generalized arnold map
wimax
semantic processing
machine learning and ai for big data
cryptosystem
wireless sensor network
visualization
random forest
security techniques
anonymity
hybrid intelligent systems
experimental results
distributed denial of service
ethereum
discrete fourier transform
kyoto2006+ dataset
data center network control
array signal processing
icmp flood
secret sharing
intrusion detection system (ids)
business intelligence
access control
smart grid
udp flood
watermarking
quantum cryptography
genetic algorithm
hash function
morphology
phonology
malware analysis
predictive learning
trojon protection
chaotic system
optimization
threats
cooperation
manets
dns reflection or amplification attack
fog computing
grid computing
blockchain scalability
http flood attack
ad hoc and sensor network security • peer-to-peer
syn flood
• network and wireless network security • mobile
iot-enabled innovation and entrepreneurship
visual cryptography
verification
lexical semantics
secure routing
key distribution
service oriented architecture
ddos attack
biometrics
chunking/shallow parsing
group testing
cyberattack
digital image processing
protocol
e-voting
scanning
vpn
social engineering
question answering
biometric security
block chain issues and trends
elliptic curve cryptography
reputation-based
confidentiality
mobile security
chaos
intrusion
dynamic analysis
wireless ad hoc networks
malware detection
data science
wlan
secure cloud computing
wireless networks and mobile computing
user identity
3d and stereo imaging
mobile network
ns2
dsr
mobile banking
mobile payment
machine learning algorithms
firewall
big data mining
text steganography
framework
it security
bayesian network
intrusion prevention
mobile agent
information technology
computer & network security
quantum key distribution
security management
data visualization
hamiltonian model
management
intrusion detection systems
network performance
bluetooth
cloud storage and file systems
deadlock-free
color and texture
penetration testing
critical infrastructures
anomaly
man-in-the-middle attack
trust management
feature selection
ipsec
broadcasting communication
feature
internet signal processing
wormhole routing
wearable technology
tdes
wearable devices
vulnerability assessment
window function
wormhole
social media
honeypots
m/g/r processor sharing queue
packet flow
abnormal.
web authentication
mobile authentication
virtual machines
support vector machine
network protocols & wireless networks
unsw-nb15
cpu
private key
public key
smartwatch
voip
authorization
security properties
rsa algorithm
spectral analysis
benchmark
sha-1
brute force attack
big data applications
consensus
twitter
challenges
network forensics
network security.
kleptography
secret key
mobile devices
covert channel
trapdoors
subliminal channel
ad hoc network
classifier
email spam
computer science
trojan protection • security threats & countermeas
blockchain authentication and authorization
collaborative environments
mapreduce
software security
bb84 protocol
security engineering
trust determination
databases
forecasting
trust-based routing protocols
internal controls
nwtd
text-based captcha
data
network intrusion detection
blockchain based security for the iot
5g and networks for big data
denial-of-service attack
multimedia
data mining techniques
cybercrime
protocols
multimedia etc
rotor cipher
device deployment
integrity
trust and privacy ch
grid
cipher text
theory of parallel / distributed computing
cyber trust and security
software systems and technologies
edge & cognitive s
fog
smart card
password handling
ldap
wireshark
blowfish
performance evaluation
entropy
kerberos v5
digital forensics
experimental results and deployment scenarios
pervasive computation trust
decentralized trust management
fuzzy logic.
3-d mesh
ecc
e-mail fraud • virus
big data techniques
methodology
trusted third party
models and algorithms
image processing
risk management
denial-of-service
integrity.
user authentication
algorithms and applications
smart city
wireless
economics
device authentication
optical computing
computer networks & communications
trust and privacy challenges
networking and architectures
initial trust
denial of service attack
information centric network
intruders
application-layer ddos attack
availability
dependency
svm
metric
distributed denial-of-service attack
bloom filter.
face
fingerprint
response
historical
appliance
end-to-end security model
els
network defenses
web server handlers
zero trust architecture
mse
sgd
cybersecurity culture
assessment survey
covid-19 pandemic
cryptocurrency exchange
mitm attack
key spoofing
googleglass
browsing model
notification
beacon
seed
smartphone
disaster
lea
information security.
password.
markov-model
rfid
brute-force attack
email classification
policy management
agent based trust management
authentication and identity management
p2p
clusters and grid computing : security and role of
mansim.
radial basis function neural networks
encrypt file system
a digital certificate
kvefs
nsl-kdd
identity
imsi
umts
lte
interworking
logistic map
administrator
session key establishment
security policy
training
data hiding
fair exchange protcocol
insider threats and countermeasures
security information systems architecture and desi
security and privacy in mobile systems
access control and intrusion detection
rc4
fault tolerant
pairwise comparisons.
analytic hierarchy process
access security controls
error detection
• theoretical computer science and algebra
performance
congestion control
model checking
distributed denial of service (ddos)
routing protocols
image steganography
security for grid computing
spatial domain
matrix partition
least significant bit
protocols.
file system in user space (fuse)
behavioural pattern
api calls
mobile ad-hoc network
wireless mesh networks
data description
temporal sequence
anomaly-based network intrusion detection system
attacks & performance
mobile networks & wireless lan
okhttpclient
httprequests
unavailability
false alarms
kdd cup 99
content management
wordpress
attribute-base-access-control
role-base-access-control
network architectures
reliability
key-value store
random number generator
diffusion.
confusion
shuffle
henon map
encryptions
healthcare cybersecurity
iot security
public-key cryptography
arithmetic coding
sniffing
surveillance
bloom filter
cryptanalysis
location privacy
mutual authentication
secure communication
usable security
frequent sequence mining
apache spark
pay-per-click advertising
google ads
web advertising
click spam
incident response
endpoint security
device fingerprinting
inventory
bro ids
exploit.
security and privacy requirements in vanet
vanet adversaries and attackers
vanet attacks
vanet security and privacy approaches
firewalls
plain text
blockchain privacy
false alarm
vulnerability
particles swarm optimization.
medical system
electronic voting system
i-voting
ivote
pki
elliptic curve
automated ids
spectrum analysis
microsoft domain environment
securing windows
bf
wddl
dpa
bfma
bfcdnba
bfmawddl
feature extraction
reputation system
computing
benchmarks
anomaly-based detection
software defined network
topology discovery
pox
symmetric cryptography
xor
dual-port read-only memory
carry select adder
quantitative trait loci
least significant bit (lsb)
ascii code
psnr
zigzag scanning
insider threat
public key cryptography
decision tree
detection rate
crypto stream ciphers
security analytics
distributed denial-of-service (ddos)
iot connectivity and networking
tools
tls
device association
simulation
standard
social networks & web 2.0 trust management
mobile ip
connectivity
blockchain attacks on existing systems
big data search and mining
) • ubiquitous computing security • web 2.0 securi
vehicular forensics
risk mitigation
digital signature
unfettered rules
sybil attack
interweaving
data center
flash crowds
credits.
mom
wire antennas
gain
current distribution
vswr
fractal
infrastructures for big data
input impedance
polarization
resonant
signal processing
cad design and testing
data storage
bgp protocol
mechatronics
hashing.
bmp image file
lsb steganography
agent based intrusion detection system (aids)
black hole attack
ditributed denial-of-service attack
ddisjunct matrix.
mitigation
non-adaptive group testing
daugman
canny
sobel
iris
prewitt
zero cross
critical infrastructures.
man-in-the-browser
neural languages
aran
ndm
smt
software engineering
vanet architecture
ariadne
sead
computerbased information system
and pso.
iqim
online social networks
alert correlation
profile cloning
computer network
data integrity
data center network
cloud service
distributed computing
shares
greying effect
key share.
denial of service (dos)
netstat
the sleuth kit (tsk)
data & system integrity
privacy and authentication
autopsy
tcpview
sparql
n-triples
owl
rdf.
k-means clustering
recommender system
dabechies4
security plan
small business
risk planning
parsing
internet attacks
big data management
knowledge base
local authentication protocols
mobile cloud computing
finger print authentication
digital signal processing
dmt
threshold cryptography
dft
common control channel challenge
crahn
multi-channel mac
healthcare
service discovery
encryption\decryption
pgp
hmac
dll. llc
media access control
physical layer
text stenography
python programming language
multi-layer encoding
encryption/decryption[2]
natural language prepossessing
caesar cipher[2]
security protocol
ns2[1]
wireless networks
wi-fi
prognostic
svm.
mog-hmm
rul
lstm
aodv.
false positive rate (fpr)
erbium-doped fiber amplifier (edfa) gain adjustmen
optical switch crosstalk
all-optical network security
emerging attack vectors
ubiquitous
mode of operation
low-resource
source code analysis
unreleased resource
path manipulation
software vulnerabilities
resource injection
distributed ac
ir circuit
hvac
temperature monitoring
temperature control
blue-tooth
mix
resource description framework(rdf)
utm clinic
energy-aware routing
multipath routing
qos routing
application resource
graphical password
legitimate traffic.
multi-agent systems
mobile agents
intrusion detection system.
porter stemmer
stemming
firewall policy
the mapping study
policy deployment
hybrid
random grids
dct based steganography
som
multi-som
clustering
biometric authentication
vn
nlp and ai
knowledge-based authentication
paas
iaas& authentication
8 bits microcontroller
interoperability
shortest path
swifi
exploring data analysis
security risks
color space
cross site scripting
wired equivalent privacy (wep).
wireless local area network (wlan)
wardriving
conditional entropy
sql injection
anomaly severity classification
semantic evaluation
multi-anomalies evaluation.
anomaly severity evaluation
quantitative evaluation
internet casinos
cyber defense
botnets
bgp
network simulation tool
ip falsifying
idpf
network-level security and protection
internet of thing
dynamic matching
bilinear pairing
multi-faceted model
online social network
reinforcement learning
updater identification
application whitelisting
• database
service-oriented approach
version control
virtual password
secure communication channel
strong authentication
shared secret session key
scenario-based approach
visualization and animation
empirical evaluation
key escrow
certificate less cryptography
3gpp
4g
security architecture
rhetorical relations
probability model
extractive text summarization
ccmp
file systems
payment certificate
multiparty micropayment
attribute-based encryption
hamming distance
cognitive load
alert aggregation
selfishness
mobile adhoc network
functional call monitoring
information flow tracking
packet dropping attack
watch dog
signal identification
peer-to-peer network
embedded systems
priority scheduling
video signal processing
nist
dna
shiftrows
coefficient correlation
pairing based cryptography
secret handshakes
text clustering
collective digital signature
attack detection
avispa.
industrial communication security
traceback
network steganography
real-time networking
tcp/ip communications
smart cities
mnist benchmark.
image classification
inspection game.
agile programming
waterfall methodology
owasp
braiding/entanglement
multiple encryption
rotation of the bits
management & interoperability
method engineering
threat modeling
cloud software development
security event management
data correlation
network dependency analysis
markov random walk model
des
attribute reduction
artificial neural network
covert schemes
security solutions
pre-hacking
necessary information
gsm security
mobile communication
email fraud
security and privacy
blockchain in digital forensic
big data analytics and social media
static analysis
adaptive neural network
aco
comprehensive evaluation
lightweight
manet(mobile adhoc network).
k-nearest neighbour
anomaly detection
sensors
distributed ledger technology
practical testing system
risk assessment
privacy protection
role-based access control
smart contracts
xacml
file upload
video upload
virtual system
study material
• security threats & countermeasures
map reduce
hadoop
protection m echanism
secret image sharing
quadratic residues
image coding
data type
mobile code
frequent itemset
decision making
brute force attacks
semantic processing & nlp
question answering (qa)
syn flooding
tcp sequence number attack
cooperative transmission
packet broadcast
opportunistic large array
mis
ai algorithms
knowledge representation
signal or image processing
³Ùé±ô鳦´Ç³¾³¾³Ü²Ô¾±³¦²¹³Ù¾±´Ç²Ô²õ
quality
data density and encryption time
gpu
tkip
quality of service
coefficient of variance
radius
cipher algorithms
linguistic resources
cuda
data size
automation
natural language computing
secure servers
pixel
smart cards
one time pad
cobit
remote user authentication
attack games.
eavesdroppers
packet detection and packet header matching (phm)
wireless body area networks
niger-delta
snort
network intrusion detection system (nids)
clustering routing
judy array
blom
secure routing protocol
trust-based routing
distributed rate control.
bandwidth reservation
medium accesscontrol
np-complete
asynchronous distributed pricing
quotient ring
data integration
diophantine equation
one-way function
lan attack
nonlinear function.
floating point number
host based ids
mediator
invisible digital watermarking
location-dependent social networks
& privacy next generation internet & web architect
information security management systems (isms)
phonology and morphology addressing & location man
pdca
system dynamics
delay.
active detection
cdma throughput
session passwords
shoulder surfing
digital identity
openid
ad hoc and sensor
mapping
it governance
oix
oauth
diffusion process and stream cipher.
electronic warfare threats
data shredding
secure network
cryptotrojan
compression-crypto
network density
iso 27001
community consensus
pragmatic web
agent-based systems
spatial reasoning
computing with words
uncertainty
language-action perspective
and delay
life time
arp spoofing
priori probability
vmware
performance measurement
network virtualization
risk mechanism
identity based firewalls
enterprise risk management
risk principles management
manage security programs
statistical test of significance
enterprises security risk managemen
kolmogorov-smirnov test
smart vehicles
and public-key.
stage staffing
2-d arnold cat map
dispute settlement
encryption and decryption algorithm for watermarki
digital multimedia
stage staffing watermarking
copyright protection
static and mobile wsn.
physical unclonable functions
electronic espionage threats
gpcode.ak
diffusion
traffic flow
buffer
ip spoofing
poisson arrival
password (information) snatching
nsgaii.
conficker
• security
cryptovirology
• internet security
enterprises security risk management
firewall systems design
esrm
maturation of a profession
cryptovirus
computer networks
evasive/ deniable/ untraceable attacks
queuing model
node replication attack
arithmetic encoding
wavelet thresholding
statistical hypothesis testing
image denoising
biometric information
honeypot and nics.
cryptoviral extortion.
modeling
iptables
deviation detection
classification accuracy
tent map
network intrusion prevention
support vector machine (svm)
physical cryptography
hybrid intrusion detection system
quadratic map
distributed resource allocation
and bernoulli map
credential
sybil
clone
objective functions
crossover
sha-512
proposed method.
noise categories
attack tree
sessionbased
minutiae
ann
probabilistic encryption
deniable encryption
receipt-free
rigging
coercing
authentication.
covert channel.
diffie-hellman algorithm
system access control
switching and addressing techniques self-organizin
regexpr
html
sub
perl
quantum superposition state
no key-exchange
inter packet delay
ieee 802.11b
ieee 802.15.4
heterogeneous wireless network
coexistence
dfa
signature processing
signature formulation
intrusion detection / prevention systems
key establishment
lu matrix composition
feedback
convolutional coding
soft input
iterations
guard node
cluster
key sensitivity
avalanche
legal aspects
packet sniffers
ip traceback
mix zone
pseudonyms
authorization and password.
knowledge discovery in databases and privacy prese
integrated verification.
software implementation
usage control
malicious
mechanism
message digest
routing protocol
soa
selinux
registration time.
packet loss
handoff delay
triangle routing
route optimization
tunneling
longitudes
latitudes
location coordinates
transposition cipher
rangoli
masquerade attack
remote user
smartcard
batch verification
service authentication
identity based cryptography (ibc)
ip multimedia subsystem (ims)
network security protocols
quantum networks
file handler
cryptographic algorithm.
hdfs (hadoop distributed file system)
interactive education.
attack graph
and services.
computer
multi input multi output (mimo)
adhoc network
smurf attacks.
fair exchange
dst
hybrid covert channel
z-transform; frequency domain; watermarking; mean
sensor network
etc.
db index.
performance evaluation.
network security; malware propagation modelling; b
biometrics; biometric fusion; face; fingerprint; c
information theory
dns poising
hash function [2].
we propose a novel distributed intrusion detection
new kinds of network attacks are emerging endlessl
it is necessary that this security concern must be
in order to the rapid growth of the network applic
user authentication; group communication; secret s
fuzzy c-means clustering
fuzzy neural network
data and grid room
system information leak
hdl.
anomaly-based intrusion detection system
protocol safety.
software
networking
and exemption.
information system.
one-class support vector machine
j48.
authentication & q-learning
mobile ad hoc networks security
encryption and decryption.
shared bitmap
rate limitation
connection failure behavior
self-propagating malware
shared register array
malware detection and mobile device.
finite elements.
intellect learning.
wireless.
secured watermark system (sws) and computer securi
threshold cryptography.
steganography; image segmentation; byte characteri
cyber-defense.
software configuration management
usable security.
data outsourcing; privacy; public cloud severs; ac
zss signature.
and crypt ography.
wake up receiver
vlsi
low power
multigeneration keys.
random kd (key distribution)
sec-leach (secure leach)
sensor networks
leach (low energy adaptive clustering hierarchy)
galois counter mode.
link layer security
circular queue.
md5
sha-256
ip
ao
udt
high speed bandwidth
next generation network protocol
desirability functions
best practice frameworks
baseline manuals
risk analysis and management
information security controls
signatures
web services
interpolation.
qim
m-ary modulation
error concealment
data value
network security & identity privacy
confidence level
lsb replacement steganography
ipfix
flow
scan detection
mac addresses hash value.
lu-cac
caca
bandwidth link utilization
reliability.
emergency response communication
wave files.
decrypting
encrypting
signature based detection
behaviour based detection
flow based detection
c&c
irc
botnet
share
n) visual cryptography
(2
smart-card
multi-server
low-cost cryptography
node misbehaviour.
malicious packet dropping
controlled flooding
reputation
mobile ad hoc network (manet)
finite fields & montgomery algorithm.
cellular automata
log analysis.
audit system
event classification
http intrusion detection.
fuzzy cognitive mapping
fuzzy intrusion detection
application layer misuse detector
semantic intrusion detection
naive bayesian classifier
false positive
big-dragon cryptosystem.
little dragon cryptosystem
multivariate cryptography
and matlab.
customizable security.
policy-driven security
content-addressable storage security
matlab
network security management
complexity.
ldpc codes
chained codes
image
video
cover media
anti-spam
email filtering
workload characterization
password replace ment
attack graph.
efficient probabilistic packet marking algorithm
probabilistic packet marking algorithm
online auction network
byzantine behavior
multicast communication
ad-hoc networks
hierarchical design
ids
tls protocol
timers
typing rhythms
keystroke
passwords
implementation cost
service differentiation.
mb-ofdm
interference limitation
pareto-efficiency
password strength
text passwords
vulnerability analysis
olsrv2
selfish nodes
content
clusters
overlay
replica
impersonation attack.
undetectable online password guessing attack
constraint processing
filter design and structures
signal reconstruction
network layer security
radar signal processing
medical image analysis
medical image processing
ad hoc and sensor network
multi input multi output (mimo
smurf attacks
electronics and signal process
services
salting techniques
hash analysis
security breaches
threats and attacks
lan
protection mechanism
interactive education
face recognition
hdfs (hadoop distributed file
cloud storage
mobile computing
context-aware computing
smartwatches
assessment
fuzzy set theory
accounting
random forest algorithm
pe header
pe file
higher education
mobile education
indexing cipher
dna cryptography
nb.
knn
cnn
offline signature recognition
smart contracts.
decentralized application
added value applications
enablers
arxiv
reddit
stackexchange
text classification
topic modeling
dst.
internet of things (iot) security
face and gesture
passphrase
mixture words
nouns
recall
recognition
user behavior
optimal path
big data tools and systems
virtualization on platforms in the cloud
data storage and management in cloud computing
security techniques for the cloud
virtual compute clusters
system integration
cloud based
reference dna
group key management
electronic payment
hash chain
multimedia & cognitive informa
symbolic machine learning
security posture
open-source erp software
factors
attributes
measurement framework
parsing/grammatical formalisms
monetary policy
socioeconomic impact
peer-to-peer transactions
fintech
central bank digital currency
digital rupee
web and internet computing
ontology and semantic web
machine learning & application
grid and scalable computing
information technology trends
bitwise-based hash
split sketch
principle component analysis
victim identification
ddos detection
claims processing
process improvement
insurance
security logs
hypergraphs
cloud data security
block ciphers
encryption time
cryptographic algorithm
wormholes
spread spectrum
selective jamming
detection models
ensemble machine learning
ddos attacks
r360
web intelligence
evolutionary computing
ai in cyber security
nids
software defined networking
network intrusion detection sy
multilayer security
fine grained access
smart banking
survey
domain analysis
scoring benchmark
http strict transport security
shape representation
text processing
document recognition
signal noise control
victimization
information
emotion
signal
ciphers identification
encryption modes
health belief model
windows api calls.
term frequency-inverse document frequency vectors
n-gram analysis
malware classification
convolutional neural network
risk and threats
bayesian belief network
malware propagation modelling
shifting
shifting.
sprase svd (ssvd)
singular value decomposition (svd)
multimodal authentication
exponential kronecker product (ekp)
kronecker product
context-sensitive exponent associative memory mode
information-centric
internet-of-things.
intelligent transportation system
sensor network.
etc
db index
cyber human behaviour
stylometric analysis
phishing email attack
cyber-security
security policies
defense mechanisms
employee awareness
wimd cybersecurity
wimd
wireless implanted medical devices
matlab simulation
chaotic algorithms
images security
hash function [2]
open application
xml-dsig
ws-security
soap
httpi
https
http
signature-based
misuse detection
architecture
agent
trojan protectionstem security
database and syvirus
cardiac implanted device
biometric fusion
information theor
engineering cybernetics
decision support system
multimedia & telecommunications
database & information retrieval
image signal processing
networks & fuzzy system
dns poising.
legal.
regulation
protection
personal
law general
trust in service-oriented architecture- open archi
information systems
cisco packet tracer
cyber-attack
security issue
smart devices
incentive schemes.
rewards
federated learning
incentive schemes
high port application
sinet
port filtering
data flow pipeline
traffic patterns
covid-19 related ioc
prediction support parameter.
k-means clustering algorithm
feature engineering
blockchain technology and cyber security
we introduce new detection engine for hybrid cover
a variant of covert channelworks similarly as netw
the privacy. most of such attacksare devised using
computer network is unpredictable due to informati
iot devices.
technical and security issues
comparison.
review
mare
sama
software architecture
microservices
trojan.
human factors
land
http flood
tcp syn flood
markov chain
structural similarity index measurement (ssim).
universal quality image (uqi)
image fidelity (if)
peak signal to noise ratio (psnr)
mean square error (mse)
frequency domain
z-transform
identity federation.
limitations
identity management
federated identity management
distributed system.
and nist statistical tests
end-user errors
detection model
malicious javascript
firmware
resource management
ngns
finding roots modulo.
signing group
group digital signature
implementation
technology
power distribution
social computing
consensus mechanism
signing group.
difficult computational problems
groupdigital signature
threat intelligence
zero-day vulnerabilities
advanced persistent threats (a
multi-vector attacks
mesa security model
stealth data exfiltration (sde
sustainable agriculture
water management
dc water pump
water & humidity sensors
soil sensor
vulnerability identification
smart irrigation system
semantic web
conceptual modeling
unsupervised machine learning
learning problems
xg boost
nft
crypto
agreements
blockchains
smart grids
real-time systems
maintenance engineering
production
worms &trojan
mobile clouds
sla management
machine learning and ai
network traffic analysis
asset inventory
data classification
data privacy
low carbon blockchain
security key
public cryptography
argumentation mining
massive parallel sequencing
forensic examinations
bio-examinations
deoxyribonucleic acid (dna) da
particles swarm
radial basis function
computational linguistics
spoken language processing
nlp and machine learning
distributed denial-of-service
machine learning problems
morphic computing
cybersecurity frameworks
j48
network control
mansim
pos tagging
explainable artificial intelli
shapley additive explanation
recurrent neural networks (rnn
deep learning (dl)
empirical studies
vulnerabilities
access control mechanisms
anonymization techniques
authentication mechanisms
encryption techniques
diffusion of innovation theory
protocol safety
big data in cloud
cloud management
cloud storage for iot
sensitive data
insider attacks
data leakage prevention (dlp)
data access & protection
micro medical processors
knowledge instruction
medical sensor network
micro knowledge processors
knowledge processors
image analysis
multimedia data mining
multimodal skew tent map
interchange permutation
hdl
network mapping
nmap
social clouds
consolidation
software defined networking (s
patient empowerment
ehr management
blockchain in healthcare
actuators
neural network
url
phishing detection
network cybersecurity
storage and retrieval
coding and transmission
techniques
ipv4
exemption
information system
digital investigations
digital forensics readiness
digital evidence
wireless medical networks
ad-hoc on-demand distance vect
mobile ad-hoc network (manet)
one-class support vector machi
sharing queue
m/g/r processor
operating systems
computer architecture
fake profiles
national security
anomaly-based intrusion detect
eap-ttls
visual information processing
inductive learning
evolutionary computation
nlp and information retrieval
and text mining
web
machine learning techniques
bls signature
secret sharing technique
bi-variate polynomial
security for emerging networks
modelling
cyber attacks
tree
security behavior
self-efficacy
pre-processing
alert prioritization
alert clustering
merging
trellis coded genetic algorith
session key matrix
pseudo random key generator
finite automata
xperimental results
ultrasonic audio
voice activation
byte characteristic
zss signature
cyberdefense
double spending
cctv
cyberattack impact
cyberattack types
personal privacy
economic stability
cyberattacks
saudi arabia
parameters
sensor node
leach
energy efficiency
cluster head selection algorit
cluster head
big data analytics
big data and iot
application security
network traffic
dos attack
secure division
secure sum
naive bayesian
privacy preservation
authentication scheme
cryptography primitives
password replacement
sequence number
monitoring agent
side channel monitoring
hooks
system call
hybrid analysis
android banking trojans
security threats & countermeas
awareness
cybercrime awareness
cybercrime on social media
education
self-sovereign identity
digital transformation
software configuration managem
public cloud severs
data outsourcing
pervasive/ubiquitous computing
regulation and trust mechanism
software-defined networks
rerouting
devices authentication
security metrics
packet analyzer
traffic light control (tlc)
requirements engineering (re)
networks for big data
encryption and decryption
inspection game
confusion matrix
impersonation
phishing attack
email users
data analytics
correlation
log loss
hot log
live log
insufficient logging
soc
siem
bayes
q-learning
mobile ad hoc networks securit
big data and the cloud
cloud computing architecture
cloud business
google glass
stacked auto encoder
relieff algorithm
email forensic dataset
cybercrimes
aquila optimization
likability
traceability
software maintenance
separation of concerns
information retrieval and ai
neural languages and nlp
gitlab
jenkins
cve-2021-44228
ci/cd
continuous delivery
continuous integration
dimensionality reduction
educational data mining
computer security
secured watermark system (sws)
embedded system
nosql data stores
public safety
crowd monitoring
tcp
context-aware traffic light co
countermeasures
avispa
industrial communication secu
data management
mobile networks
semi-trusted third party
fairness
verifiability
secret-sharing
optimistic multi-party computa
trustworthiness
autoencoder
invertible
mobile device
intellect learning
it policy
common vulnerability exposure (cve)
spam email
sender mail server
receiver mail server
anti-spams
wsn security
cross layer architecture
packet latency.
benevolent node
base station (bs)
route trust (rt)
indirect trust
direct trust
geometric mean (gm)
device discovery
physical proximity
intrusion detection is one of the standard stages
image cipher.
scrambling
multimedia networking
mobile & broadband wireless internet
network based applications
network operations & management
measurement & performance analysis
internet and web applications
high speed networks
adhoc and sensor networks
heterogeneous wireless networks
security standards
security assessment
business information security
false positives
enterprise
machinelearning
information gain
e-learning security
e-remedies
e-risks
e-learning
secret reference matrix (srm)
peak-signal-to-noise-ratio (psnr)
discrete cosine transformed (dct)
botnet and honeypot.
iptrcing
flooding attack
internet threat monitors (itm)
• peer to peer and overlay networks
• optical networks and systems
• next generation web architectures
true positives
fidelity
coordinate ratios
equatorial cloning
isotropic cloning
quantum copying machines
eavesdropping
todv
cross layer detection
body area network security
body area networks
misbehaving node
tbraodv
ad-hoc
isakmp
dsss
huffman coding
thematic analysis
medical internet of things
classification problem.
svms
functional analysis
kernel functions
legendre polynomials
man-in-the-middle.
obfuscation
server less
server based
escrow less
tree based
hierarchical
multicast
group
signcryption
fairness.
ttp (trusted third party)
security and privacy in pervasive/ubiquitous compu
authentication and non-repudiation
intrusion detection and vulnerability assessment
untraceability
cryptography and coding
survivability
intrusion resilience
fault-tolerant networks
diversity
androidapis
privilege escalation
system call dependence graph
behavior representation
merkle-hellman.
simultaneous diophantine
subset sum
coppersmith
lattice reduction
lattices
snmp
mib
multi- agent
distributed query processing
location cloaking
location based services
windows registry
forensics
kdd cup 1999 dataset.
which motivates many researchers to discover metho
• network
data compression.
peer to peer
key management protocols
wireless attacks
wireless intrusion detection system
attack test cases
attack taxonomy
cueing.
interfaces
one-time passwords
chosen ciphertext security.
conditional proxy re-encryption
proxy re-cryptography
random oracle model
noise & entropy
anti obfuscation technique
inter symbol interference (isi)
cognitive radio
mpi.
encrypted data
international data encryption algorithm (idea)
hiding information
unicode
multi-layers
arabic text
python
scapy
kali linux
de-authentication attack
(ddos
logistic regression
k-nn
naive bayes
wireless mesh network
wireless ad-hoc networks
web application penetration testing
security testing
) * ubiquitous computing security *
trojon protection * security threats & cou
e-mail fraud * virus
ad hoc and sensor network security * peer-
information theoretic security
rational secret sharing
fault tolerance
topology.
authenticated symmetric key establishment
biometric key
wireless body sensor network (wbsn)
ofdm
non linearity
s box
memorability of passwords
snakes & ladders game
graphical passwords
attackers .
mac-layer
threshold level
real time application
rtos
mobile ad hoc networking
non-invertible transformation
cancellable biometrics
fingerprint biometrics
biohashing
best practice
ecc-3peke protocol
spectrum sensing
response & tracking.
base station
sensor nodes
attack path reconstruction
ddos-attacks
icap
client honeypot
browser vulnerability
adhoc on demand distance vector protocol(aodv)
translation.
elecronic voting
user lifecycle
workflows
provisioning
security synthesis
• natural language processing
• cryptography
• computational science and applications
• machine learning
• information theory
• computational physics & biology
geometry
• computational complexity
• automata theory
• algorithms and data structures
e-mail architecture
header analysis
e-mail headers
e-mail forensics
feature coding
pca
ca
low level feature
• measurement & performance analysis
• internet and web applications
• high speed networks
• adhoc and sensor networks
• next generation internet
• heterogeneous wireless networks
fair exchange protocols
fair document exchange
dempster–shafer belief theory
hashcode
hacker
websites
• quantum computation
• program semantics and verification
• probabilistic computation
communication
and quality control
network system
control charts
anomalies
ieee 802.11g
multiple encryption.
secure electronic transaction
f8
a5/3
stream cipher
unauthorized access
network design
real estate
infrastructure security
wireless sensor network.
symmetric cryptosystems
• parallel and distributed computing
certification authority
&security
chebyshev polynomials
blind signature
friendly-cooperative framework
system hardening
anti malicious objects
star topology
black scholes equations
malicious object
native language password
textual password
shape based authentication
multicode encryption
transversal designs
reed-muller codes
blockchain consensus algorithms
blockchain foundations
blockchain-based security for the iot
iot experimental results and deployment scenarios
security & network management e-mail security
multimedia etc big data tools and systems big data
privacy and trust big data applications
models and algorithmsbig data infrastructure and p
big data big data techniques
peer-to-peer network security database and system
data and grid room
system information leak
peer to peer and overlay networks
qos and resource management
dos attacks
ndp
fragment header
communication network architectures and design
features.
mlp
filtering.
enron
keyword search
report generation
digital forensic
email forensic
cassandra big data.
attacks prediction
threat activity.
cyberattack ontology
cyberattack prediction
network and wireless network securitymobile
iot security and privacy
trust management system for wireless
certificateless public key encryption
certificateless signature scheme
digital certificate
certificateless public key cryptography
set protocol
fuzzy logic & perspective of intrusions
association mining
temporal sequence patterns
ubiquitous computing security web 2.0 security
olsr
willingness function
smrr
blockchainbased security for the iot
blockchainauthentication and authorization
analyze formal
timestamps
blockchain new design
flow-label
ipv6 security vulnerability
remote authentication
man in the middle attack
user authentication framework
analysis
dynamic billing system
data aggregation
distributed hash tables & linear diophantine
decentralized network
multimedia content management
trust management for virtual organizations
policy of trust in e-leaning systems
trust and reputation management
mobile and sensor networks
packet marking
autonomous system
sensing layer
resonant frequency
micro cantilever
dynamic source routing.
network coding
hybrid idps
perimeter-based idps
network-based idps
host-based idps
idps sensors/agents
tcp re-assembly
cyber-crime & bdi.
vendor lock-in
csp
multi-cloud
finite elements
strong t -consistency
group communication
server security
small business security
e-commerce systems security
mobile phones
conditional random fields
layered approach
secure two-party computation
zero-knowledge proof
distributed eigamal encryption
similarity coefficients
vanet etc.
v2v
stdma
collaborative web systems
vector valued functions
privacy preserving
implicit function theorem
hitech act
hipaa
incident response team
cyber incidents
ecurity threats & countermeasures (ddos
network applications
emerging technologies for next generation network
discrete algorithms and discrete modeling
network operation and management
mobile and wireless networks
network security and privacy
communication network protocols
trust/risk based security frameworks
csma
feature selection.
keystroke dynamics.
biometric
web-based
fuzzy-c means clustering
background subtraction
foreground detection
background removal
x64 systems
neighbour mean interpolation
image interpolation
programming languages
operation system
simulator
emulator
improved watchdog
watchdog
security area control
regulation and trust mechanisms
biological and evolutionary computation
reinforcement and unsupervised learning
) • ubiquitous computing security
engineering
search engine optimization
malicious websites
intrusion detection and prevention internet securi
counterfeit.
and machine learning
knime
aes.
session based key
sbskct
artificial immune systems
computational intelligence in security
multiple flows
tcp protocols
high-speed
heterogeneous networks.
next generation networks
casper/fdr
authentication and key agreement protocols
heart rate device
gps
emergency
arduino microcontroller
accelerometer
accidents
hierarchical model
data loss
security breach
authentication and key agreement.
umts security
telecommunications system
gsm system
false alarm rate
naive bayes classification
multi stage filter
enhanced adaboost
compression.
transformation
threshold secret sharing
public verifiable signcryption
standard model
provable security
identity based cryptography
low-power
embedded devices.
modular exponentiation
n-1 attack
simple power analysis
dominant feature set.
outlier analysis
behavioral profile
terrorism
social network analysis (sna)
backtracking bit
watch nodes
traversed administrator field
associative node
ubiquitous computing security web 2.0 security cry
corporate infrastructure
mimo-ofdm
peerto-peer network.
intrusion attacks
taxonomy of attack
intruder
maximum power transfer
electronic circuit
control system
touch sensor
communication technologies
networks
mobile & wireless networks
lowest id clustering algorithm
sybil node
mobile ad hoc network
spammers
web spam
web filtering
nonce
pkm
informtaion technology
safety
response time
self-configuration
self-cure
self-protection
self-optimization
autonomic network
clustering technique
awgn and raleigh fading channels.
bit error rate(ber)
ecb and cfb cryptographic algorithm
pre-zf
cross-certification
certificate practice statement(cps)
certificate policy(cp)
certification authority(ca)
public key infrastructure(pki)
ngn
ec-aka
aka
eps
lte security
• intelligent agents and systems
• trust management
• privacy and authentication
• cryptography and coding
security and privacy policies
security in distributed systems
disaster recovery
pre-mmse
redirection
manipulating search engine
search engine
hiding techniques
cloaking detection
database and system security intrusion detection a
lucas
digital signatures
fair-exchange
contract signing
andit security
protected health information
personal identification information
information assurance
network security & its applications
pki interoperability
See more
Users being followed by IJNSA Journal