Personal Information
Website
About
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Tags
phishing
worms
peer-to-peer network security
spam
database and system security
cryptographic protocols
mobile
virus
e-mail fraud
ad hoc and sensor network security
network and wireless network security
web 2.0 security
security & network management
ubiquitous computing security
security
intrusion detection and prevention
network security
e-mail security
trojan protection
internet security & applications
session hijacking
mim
artificial intelligence
machine learning
ddos
performance evaluations of protocols & security ap
hardware-based attacks
intrusion detection
web based applications
blockchain technology
services security
social networking
crowd sourcing
authentication
security of virtual machines
replay attack etc
network management
machine learning for security
replay attack
cyber security
cryptography
home networks
blockchain
body-area networks
system security
privacy
data mining
sdn
sensor network security
wireless network security
vanets
trojan protectio
industrial control systems
deep learning
security and optimization
autonomous vehicles
cloud computing
internet of things (iot) secur
intrusion detection and preven
big data
internet security & applicatio
encryption
cryptocurrencies
security application
neural networks
trojan protection security threats & countermeasur
e-mail fraud virus
ad hoc and sensor network security peer-to-peer ne
cognitive security
information security
network and wireless network s
network and wireless network security mobile
manet
bioinformatics
internet of things
natural language processing
electronic voting security
database
wireless sensor networks
trust
) ubiquitous computing security web 2.0 security c
ad hoc and sensor netw
steganography
routing
privacy challenges
security and privacy for iot
fuzzy logic
intrusion detection system
computer vision
security threats
security threats & countermeasures
information retrieval
detection
connectivity and networking
performance evaluations
malware
security threats & countermeasures (ddos
iot applications and services
)
ontology
• ubiquitous computing security
• peer-to-peer network security
• cryptographic protocols
peer-to-peer
• mobile
• virus
aodv
• intrusion detection and prevention
• e-mail security
cloud
• web 2.0 security
• network and wireless network security
knowledge processing
• security & network management
internet of things (iot)
• internet security & applications
internet security
pattern recognition
key management
cyber physical system (cps)
block cipher
image encryption
image segmentation
• performance evaluations of protocols & security
robotics
aes
attack
game theory
• database and system security
text mining
network
android
information extraction
attacks
ad hoc
wireless network
classification
decryption
nlp
cloud security
cloud and grid computing for big data
performance evaluations of pro
information hiding
cyber physical system
ubiquitous computing
resource provisioning
substitution
data security
soft computing
iot
vanet
dos
e-commerce
deployment scenarios
entrepreneurship
iot-enabled innovation
network protocols
electronics
signal processing for iot
malicious node
wireless sensor network (wsn)
usability
rsa
security.
phishin
fuzzy systems
ssl
web security
permutation
password
steganalysis
virtualization
denial of service
mobile ad-hoc networks
mobile ad hoc networks
electronics and signal processing for iot
qos
cybersecurity
parallel processing
array signal processing
icmp flood
trojon protection
cryptosystem
kyoto2006+ dataset
symmetric key
hybrid intelligent systems
discrete fourier transform
predictive learning
visualization
wireless sensor network
wsn
phonology
access control
anonymity
distributed denial of service
smart grid
ethereum
intrusion detection system (ids)
business intelligence
threats
optimization
genetic algorithm
wimax
data protection
random forest
generalized arnold map
security techniques
chaotic system
data center network control
malware analysis
morphology
semantic processing
hash function
experimental results
udp flood
machine learning and ai for big data
secret sharing
machine translation
watermarking
quantum cryptography
hacking
wireless networks and mobile computing
• network and wireless network security • mobile
ad hoc and sensor network security • peer-to-peer
framework
dns reflection or amplification attack
bayesian network
intrusion prevention
iot-enabled innovation and entrepreneurship
blockchain scalability
data science
syn flood
block chain issues and trends
grid computing
http flood attack
vpn
chunking/shallow parsing
biometric security
service oriented architecture
question answering
information technology
lexical semantics
intrusion
computer & network security
chaos
reputation-based
confidentiality
wlan
machine learning algorithms
malware detection
secure cloud computing
user identity
elliptic curve cryptography
text steganography
firewall
manets
key distribution
visual cryptography
scanning
dsr
ddos attack
ns2
group testing
verification
mobile network
dynamic analysis
mobile banking
social engineering
mobile payment
mobile security
wireless ad hoc networks
biometrics
it security
secure routing
3d and stereo imaging
mobile agent
digital image processing
fog computing
cooperation
big data mining
protocol
e-voting
cyberattack
consensus
classifier
big data applications
multimedia etc
5g and networks for big data
blockchain based security for the iot
wormhole
blockchain authentication and authorization
email spam
trust determination
wearable technology
wearable devices
smartwatch
wormhole routing
broadcasting communication
man-in-the-middle attack
critical infrastructures
unsw-nb15
window function
deadlock-free
hamiltonian model
3-d mesh
device deployment
initial trust
device authentication
methodology
information centric network
risk management
fuzzy logic.
social media
feature selection
m/g/r processor sharing queue
web authentication
mobile authentication
feature
trust management
cloud storage and file systems
data mining techniques
rsa algorithm
spectral analysis
user authentication
voip
color and texture
internet signal processing
penetration testing
vulnerability assessment
tdes
honeypots
packet flow
abnormal.
trust-based routing protocols
cybercrime
nwtd
text-based captcha
ecc
data
security properties
authorization
challenges
network forensics
kleptography
benchmark
blowfish
experimental results and deployment scenarios
entropy
cpu
ipsec
ldap
kerberos v5
multimedia
intruders
bluetooth
network performance
sha-1
network security.
secret key
virtual machines
mobile devices
covert channel
trapdoors
support vector machine
subliminal channel
network protocols & wireless networks
computer science
trojan protection • security threats & countermeas
e-mail fraud • virus
big data techniques
models and algorithms
trusted third party
integrity.
algorithms and applications
smart city
ad hoc network
twitter
brute force attack
rotor cipher
denial-of-service attack
image processing
protocols
bb84 protocol
denial-of-service
collaborative environments
economics
mapreduce
software security
security engineering
wireless
databases
forecasting
denial of service attack
internal controls
integrity
grid
cipher text
smart card
password handling
data visualization
management
intrusion detection systems
security management
quantum key distribution
decentralized trust management
pervasive computation trust
performance evaluation
digital forensics
anomaly
public key
private key
wireshark
fog
edge & cognitive s
software systems and technologies
network intrusion detection
optical computing
computer networks & communications
trust and privacy challenges
networking and architectures
cyber trust and security
theory of parallel / distributed computing
trust and privacy ch
training
content management
session key establishment
authentication and identity management
p2p
security policy
kdd cup 99
false alarms
appliance
network architectures
mobile networks & wireless lan
data hiding
wireless mesh networks
clusters and grid computing : security and role of
key spoofing
mitm attack
unavailability
cryptocurrency exchange
fair exchange protcocol
insider threats and countermeasures
security information systems architecture and desi
security and privacy in mobile systems
encrypt file system
kvefs
identity
imsi
umts
a digital certificate
lte
els
email classification
role-base-access-control
attribute-base-access-control
nsl-kdd
reliability
interworking
policy management
wordpress
end-to-end security model
logistic map
historical
googleglass
agent based trust management
administrator
arithmetic coding
particles swarm optimization.
temporal sequence
distributed denial-of-service attack
cryptanalysis
bloom filter.
mse
sniffing
surveillance
bloom filter
location privacy
face
mutual authentication
zero trust architecture
secure communication
fingerprint
usable security
frequent sequence mining
behavioural pattern
api calls
anomaly-based network intrusion detection system
mobile ad-hoc network
access control and intrusion detection
httprequests
covid-19 pandemic
random number generator
assessment survey
okhttpclient
mansim.
cybersecurity culture
network defenses
data description
radial basis function neural networks
diffusion.
web server handlers
confusion
shuffle
henon map
encryptions
attacks & performance
public-key cryptography
sgd
healthcare cybersecurity
iot security
response
feature extraction
blockchain attacks on existing systems
bfmawddl
vehicular forensics
big data search and mining
bfcdnba
bfma
dpa
wddl
bf
) • ubiquitous computing security • web 2.0 securi
securing windows
microsoft domain environment
spectrum analysis
automated ids
risk mitigation
digital signature
unfettered rules
elliptic curve
sybil attack
benchmarks
anomaly-based detection
automation
computing
insider threat
software defined network
pki
topology discovery
vulnerability
distributed denial-of-service (ddos)
iot connectivity and networking
blockchain privacy
tools
false alarm
tls
device association
plain text
vanet security and privacy approaches
vanet attacks
vanet adversaries and attackers
simulation
standard
social networks & web 2.0 trust management
connectivity
mobile ip
security and privacy requirements in vanet
exploit.
bro ids
inventory
device fingerprinting
endpoint security
firewalls
incident response
apache spark
security analytics
browsing model
access security controls
notification
error detection
• theoretical computer science and algebra
distributed denial of service (ddos)
beacon
seed
smartphone
disaster
lea
information security.
performance
congestion control
model checking
routing protocols
password.
image steganography
spatial domain
matrix partition
least significant bit
protocols.
security for grid computing
file system in user space (fuse)
key-value store
markov-model
rfid
brute-force attack
reputation system
pox
ivote
symmetric cryptography
xor
dual-port read-only memory
carry select adder
quantitative trait loci
least significant bit (lsb)
ascii code
psnr
zigzag scanning
i-voting
public key cryptography
electronic voting system
decision tree
detection rate
crypto stream ciphers
rc4
fault tolerant
pairwise comparisons.
medical system
metric
availability
dependency
svm
application-layer ddos attack
analytic hierarchy process
interweaving
data center
flash crowds
credits.
mom
wire antennas
gain
current distribution
vswr
fractal
infrastructures for big data
input impedance
polarization
resonant
signal processing
cad design and testing
data storage
bgp protocol
mechatronics
hashing.
bmp image file
lsb steganography
agent based intrusion detection system (aids)
black hole attack
ditributed denial-of-service attack
ddisjunct matrix.
mitigation
non-adaptive group testing
daugman
canny
sobel
iris
prewitt
zero cross
critical infrastructures.
man-in-the-browser
neural languages
aran
ndm
smt
software engineering
vanet architecture
ariadne
sead
computerbased information system
and pso.
iqim
online social networks
alert correlation
profile cloning
computer network
data integrity
data center network
cloud service
distributed computing
shares
greying effect
key share.
denial of service (dos)
netstat
the sleuth kit (tsk)
data & system integrity
privacy and authentication
autopsy
tcpview
sparql
n-triples
owl
rdf.
k-means clustering
recommender system
dabechies4
security plan
small business
risk planning
parsing
internet attacks
big data management
knowledge base
local authentication protocols
mobile cloud computing
finger print authentication
digital signal processing
dmt
threshold cryptography
dft
common control channel challenge
crahn
multi-channel mac
healthcare
service discovery
encryption\decryption
pgp
hmac
dll. llc
media access control
physical layer
text stenography
python programming language
multi-layer encoding
encryption/decryption[2]
natural language prepossessing
caesar cipher[2]
security protocol
ns2[1]
wireless networks
wi-fi
prognostic
svm.
mog-hmm
rul
lstm
aodv.
false positive rate (fpr)
erbium-doped fiber amplifier (edfa) gain adjustmen
optical switch crosstalk
all-optical network security
emerging attack vectors
ubiquitous
mode of operation
low-resource
source code analysis
unreleased resource
path manipulation
software vulnerabilities
resource injection
distributed ac
ir circuit
hvac
temperature monitoring
temperature control
blue-tooth
mix
resource description framework(rdf)
utm clinic
energy-aware routing
multipath routing
qos routing
application resource
graphical password
legitimate traffic.
multi-agent systems
mobile agents
intrusion detection system.
porter stemmer
stemming
firewall policy
the mapping study
policy deployment
hybrid
random grids
dct based steganography
som
multi-som
clustering
biometric authentication
vn
nlp and ai
knowledge-based authentication
paas
iaas& authentication
8 bits microcontroller
interoperability
shortest path
swifi
exploring data analysis
security risks
color space
cross site scripting
wired equivalent privacy (wep).
wireless local area network (wlan)
wardriving
conditional entropy
sql injection
anomaly severity classification
semantic evaluation
multi-anomalies evaluation.
anomaly severity evaluation
quantitative evaluation
internet casinos
cyber defense
botnets
bgp
network simulation tool
ip falsifying
idpf
network-level security and protection
internet of thing
secret handshakes
dynamic matching
bilinear pairing
multi-faceted model
online social network
reinforcement learning
updater identification
application whitelisting
• database
service-oriented approach
version control
virtual password
secure communication channel
strong authentication
shared secret session key
scenario-based approach
visualization and animation
empirical evaluation
key escrow
certificate less cryptography
3gpp
4g
security architecture
rhetorical relations
probability model
natural language computing
ccmp
file systems
payment certificate
multiparty micropayment
attribute-based encryption
hamming distance
cognitive load
alert aggregation
selfishness
mobile adhoc network
functional call monitoring
information flow tracking
packet dropping attack
watch dog
signal identification
peer-to-peer network
embedded systems
priority scheduling
video signal processing
nist
dna
shiftrows
coefficient correlation
pairing based cryptography
extractive text summarization
practical testing system
collective digital signature
attack detection
avispa.
industrial communication security
traceback
network steganography
real-time networking
tcp/ip communications
smart cities
mnist benchmark.
image classification
inspection game.
agile programming
waterfall methodology
owasp
braiding/entanglement
multiple encryption
rotation of the bits
management & interoperability
method engineering
threat modeling
cloud software development
security event management
data correlation
text clustering
markov random walk model
des
attribute reduction
artificial neural network
covert schemes
security solutions
pre-hacking
necessary information
gsm security
mobile communication
email fraud
security and privacy
blockchain in digital forensic
big data analytics and social media
static analysis
adaptive neural network
aco
comprehensive evaluation
lightweight
manet(mobile adhoc network).
k-nearest neighbour
anomaly detection
sensors
distributed ledger technology
network dependency analysis
syn flooding
cipher algorithms
data size
data type
image coding
tcp sequence number attack
quadratic residues
secret image sharing
protection m echanism
hadoop
cooperative transmission
map reduce
• security threats & countermeasures
study material
virtual system
video upload
file upload
packet broadcast
xacml
smart contracts
opportunistic large array
role-based access control
mis
ai algorithms
knowledge representation
privacy protection
risk assessment
signal or image processing
quality
linguistic resources
mobile code
frequent itemset
decision making
radius
tkip
quality of service
coefficient of variance
cuda
brute force attacks
semantic processing & nlp
gpu
data density and encryption time
question answering (qa)
³Ùé±ô鳦´Ç³¾³¾³Ü²Ô¾±³¦²¹³Ù¾±´Ç²Ô²õ
information security management systems (isms)
physical cryptography
nonlinear function.
credential
secure servers
invisible digital watermarking
mediator
pixel
data shredding
smart cards
eavesdroppers
data integration
remote user authentication
floating point number
network density
& privacy next generation internet & web architect
trust-based routing
smart vehicles
dispute settlement
lsb replacement steganography
physical unclonable functions
distributed resource allocation
distributed rate control.
bandwidth reservation
oix
medium accesscontrol
pdca
asynchronous distributed pricing
oauth
phonology and morphology addressing & location man
lan attack
host based ids
arp spoofing
attack games.
compression-crypto
iso 27001
computing with words
uncertainty
ad hoc and sensor
it governance
mapping
confidence level
shoulder surfing
language-action perspective
and delay
session passwords
life time
active detection
vmware
performance measurement
priori probability
network virtualization
cobit
secure network
wireless body area networks
niger-delta
clustering routing
judy array
blom
location-dependent social networks
openid
packet detection and packet header matching (phm)
community consensus
pragmatic web
agent-based systems
spatial reasoning
snort
digital identity
network intrusion detection system (nids)
one time pad
switching and addressing techniques self-organizin
gpcode.ak
identity based firewalls
delay.
diffusion
system dynamics
conficker
nsgaii.
modeling
ip spoofing
• security
• internet security
enterprises security risk management
esrm
maturation of a profession
proposed method.
risk mechanism
enterprise risk management
risk principles management
manage security programs
enterprises security risk managemen
stage staffing
and bernoulli map
quadratic map
diffusion process and stream cipher.
electronic warfare threats
tent map
statistical hypothesis testing
cryptotrojan
cdma throughput
cryptovirus
cryptovirology
electronic espionage threats
kolmogorov-smirnov test
statistical test of significance
evasive/ deniable/ untraceable attacks
queuing model
poisson arrival
firewall systems design
computer networks
buffer
traffic flow
password (information) snatching
2-d arnold cat map
receipt-free
rigging
coercing
authentication.
covert channel.
diffie-hellman algorithm
classification accuracy
arithmetic encoding
biometric information
honeypot and nics.
system access control
iptables
cryptoviral extortion.
support vector machine (svm)
network intrusion prevention
np-complete
quotient ring
hybrid intrusion detection system
diophantine equation
deviation detection
secure routing protocol
noise categories
and public-key.
encryption and decryption algorithm for watermarki
digital multimedia
stage staffing watermarking
copyright protection
static and mobile wsn.
node replication attack
sybil
clone
crossover
objective functions
wavelet thresholding
sha-512
sessionbased
minutiae
ann
attack tree
image denoising
probabilistic encryption
deniable encryption
perl
quantum superposition state
no key-exchange
inter packet delay
ieee 802.11b
ieee 802.15.4
heterogeneous wireless network
coexistence
dfa
signature processing
signature formulation
intrusion detection / prevention systems
key establishment
lu matrix composition
feedback
convolutional coding
soft input
iterations
guard node
cluster
key sensitivity
avalanche
legal aspects
packet sniffers
ip traceback
mix zone
pseudonyms
click spam
web advertising
google ads
pay-per-click advertising
usage control
malicious
mechanism
message digest
routing protocol
soa
selinux
registration time.
packet loss
handoff delay
triangle routing
route optimization
tunneling
longitudes
latitudes
location coordinates
transposition cipher
rangoli
masquerade attack
remote user
smartcard
batch verification
service authentication
identity based cryptography (ibc)
ip multimedia subsystem (ims)
network security protocols
quantum networks
file handler
regexpr
html
sub
password replace ment
cryptographic algorithm.
hdfs (hadoop distributed file system)
interactive education.
attack graph
and services.
computer
multi input multi output (mimo)
adhoc network
smurf attacks.
fair exchange
dst
hybrid covert channel
z-transform; frequency domain; watermarking; mean
sensor network
etc.
db index.
performance evaluation.
network security; malware propagation modelling; b
biometrics; biometric fusion; face; fingerprint; c
information theory
dns poising
hash function [2].
we propose a novel distributed intrusion detection
new kinds of network attacks are emerging endlessl
it is necessary that this security concern must be
in order to the rapid growth of the network applic
user authentication; group communication; secret s
fuzzy c-means clustering
fuzzy neural network
data and grid room
authorization and password.
hdl.
anomaly-based intrusion detection system
protocol safety.
software
networking
and exemption.
information system.
one-class support vector machine
j48.
authentication & q-learning
mobile ad hoc networks security
encryption and decryption.
shared bitmap
rate limitation
connection failure behavior
self-propagating malware
shared register array
malware detection and mobile device.
finite elements.
intellect learning.
wireless.
secured watermark system (sws) and computer securi
threshold cryptography.
steganography; image segmentation; byte characteri
cyber-defense.
software configuration management
usable security.
data outsourcing; privacy; public cloud severs; ac
zss signature.
and crypt ography.
system information leak
vlsi
low power
multigeneration keys.
random kd (key distribution)
sec-leach (secure leach)
sensor networks
leach (low energy adaptive clustering hierarchy)
galois counter mode.
link layer security
circular queue.
md5
sha-256
ip
ao
udt
high speed bandwidth
next generation network protocol
desirability functions
best practice frameworks
baseline manuals
risk analysis and management
information security controls
signatures
web services
interpolation.
qim
m-ary modulation
error concealment
data value
network security & identity privacy
attack graph.
one-way function
ipfix
flow
scan detection
mac addresses hash value.
lu-cac
caca
bandwidth link utilization
reliability.
emergency response communication
wave files.
decrypting
encrypting
signature based detection
behaviour based detection
flow based detection
c&c
irc
botnet
share
n) visual cryptography
(2
smart-card
multi-server
low-cost cryptography
node misbehaviour.
malicious packet dropping
controlled flooding
reputation
mobile ad hoc network (manet)
wake up receiver
cellular automata
log analysis.
audit system
event classification
http intrusion detection.
fuzzy cognitive mapping
fuzzy intrusion detection
application layer misuse detector
semantic intrusion detection
naive bayesian classifier
false positive
big-dragon cryptosystem.
little dragon cryptosystem
multivariate cryptography
and matlab.
customizable security.
policy-driven security
content-addressable storage security
matlab
network security management
complexity.
ldpc codes
chained codes
image
video
cover media
anti-spam
email filtering
workload characterization
knowledge discovery in databases and privacy prese
integrated verification.
efficient probabilistic packet marking algorithm
probabilistic packet marking algorithm
online auction network
byzantine behavior
multicast communication
ad-hoc networks
hierarchical design
ids
tls protocol
timers
typing rhythms
keystroke
passwords
implementation cost
service differentiation.
mb-ofdm
interference limitation
pareto-efficiency
password strength
text passwords
vulnerability analysis
olsrv2
selfish nodes
content
clusters
overlay
replica
impersonation attack.
undetectable online password guessing attack
ecc-3peke protocol
finite fields & montgomery algorithm.
constraint processing
filter design and structures
signal reconstruction
network layer security
radar signal processing
medical image analysis
medical image processing
ad hoc and sensor network
multi input multi output (mimo
smurf attacks
electronics and signal process
services
salting techniques
hash analysis
security breaches
threats and attacks
lan
protection mechanism
interactive education
face recognition
hdfs (hadoop distributed file
cloud storage
mobile computing
context-aware computing
smartwatches
assessment
fuzzy set theory
accounting
random forest algorithm
pe header
pe file
higher education
mobile education
indexing cipher
dna cryptography
nb.
knn
cnn
offline signature recognition
smart contracts.
decentralized application
added value applications
enablers
arxiv
reddit
stackexchange
text classification
topic modeling
dst.
internet of things (iot) security
face and gesture
passphrase
mixture words
nouns
recall
recognition
user behavior
optimal path
big data tools and systems
virtualization on platforms in the cloud
data storage and management in cloud computing
security techniques for the cloud
virtual compute clusters
system integration
cloud based
reference dna
group key management
electronic payment
hash chain
multimedia & cognitive informa
symbolic machine learning
security posture
open-source erp software
factors
attributes
measurement framework
parsing/grammatical formalisms
monetary policy
socioeconomic impact
peer-to-peer transactions
fintech
central bank digital currency
digital rupee
web and internet computing
ontology and semantic web
machine learning & application
grid and scalable computing
information technology trends
bitwise-based hash
split sketch
principle component analysis
victim identification
ddos detection
claims processing
process improvement
insurance
security logs
hypergraphs
cloud data security
block ciphers
encryption time
cryptographic algorithm
wormholes
spread spectrum
selective jamming
detection models
ensemble machine learning
ddos attacks
r360
web intelligence
evolutionary computing
ai in cyber security
nids
software defined networking
network intrusion detection sy
multilayer security
fine grained access
smart banking
survey
domain analysis
scoring benchmark
http strict transport security
shape representation
text processing
document recognition
signal noise control
victimization
information
emotion
signal
ciphers identification
encryption modes
health belief model
windows api calls.
term frequency-inverse document frequency vectors
n-gram analysis
malware classification
convolutional neural network
risk and threats
bayesian belief network
malware propagation modelling
shifting
shifting.
sprase svd (ssvd)
singular value decomposition (svd)
multimodal authentication
exponential kronecker product (ekp)
kronecker product
context-sensitive exponent associative memory mode
information-centric
internet-of-things.
intelligent transportation system
sensor network.
etc
db index
cyber human behaviour
stylometric analysis
phishing email attack
cyber-security
security policies
defense mechanisms
employee awareness
wimd cybersecurity
wimd
wireless implanted medical devices
matlab simulation
chaotic algorithms
images security
hash function [2]
open application
xml-dsig
ws-security
soap
httpi
https
http
signature-based
misuse detection
architecture
agent
trojan protectionstem security
database and syvirus
cardiac implanted device
biometric fusion
information theor
engineering cybernetics
decision support system
multimedia & telecommunications
database & information retrieval
image signal processing
networks & fuzzy system
dns poising.
legal.
regulation
protection
personal
law general
trust in service-oriented architecture- open archi
information systems
cisco packet tracer
cyber-attack
security issue
smart devices
incentive schemes.
rewards
federated learning
incentive schemes
high port application
sinet
port filtering
data flow pipeline
traffic patterns
covid-19 related ioc
prediction support parameter.
k-means clustering algorithm
feature engineering
blockchain technology and cyber security
we introduce new detection engine for hybrid cover
a variant of covert channelworks similarly as netw
the privacy. most of such attacksare devised using
computer network is unpredictable due to informati
iot devices.
technical and security issues
comparison.
review
mare
sama
software architecture
microservices
trojan.
human factors
land
http flood
tcp syn flood
markov chain
structural similarity index measurement (ssim).
universal quality image (uqi)
image fidelity (if)
peak signal to noise ratio (psnr)
mean square error (mse)
frequency domain
z-transform
identity federation.
limitations
identity management
federated identity management
distributed system.
and nist statistical tests
end-user errors
detection model
malicious javascript
firmware
resource management
ngns
finding roots modulo.
signing group
group digital signature
implementation
technology
power distribution
social computing
consensus mechanism
signing group.
difficult computational problems
groupdigital signature
threat intelligence
zero-day vulnerabilities
advanced persistent threats (a
multi-vector attacks
mesa security model
stealth data exfiltration (sde
sustainable agriculture
water management
dc water pump
water & humidity sensors
soil sensor
vulnerability identification
smart irrigation system
semantic web
conceptual modeling
unsupervised machine learning
learning problems
xg boost
nft
crypto
agreements
blockchains
smart grids
real-time systems
maintenance engineering
production
worms &trojan
mobile clouds
sla management
machine learning and ai
network traffic analysis
asset inventory
data classification
data privacy
low carbon blockchain
security key
public cryptography
argumentation mining
massive parallel sequencing
forensic examinations
bio-examinations
deoxyribonucleic acid (dna) da
particles swarm
radial basis function
computational linguistics
spoken language processing
nlp and machine learning
distributed denial-of-service
machine learning problems
morphic computing
cybersecurity frameworks
j48
network control
mansim
pos tagging
explainable artificial intelli
shapley additive explanation
recurrent neural networks (rnn
deep learning (dl)
empirical studies
vulnerabilities
access control mechanisms
anonymization techniques
authentication mechanisms
encryption techniques
diffusion of innovation theory
protocol safety
big data in cloud
cloud management
cloud storage for iot
sensitive data
insider attacks
data leakage prevention (dlp)
data access & protection
micro medical processors
knowledge instruction
medical sensor network
micro knowledge processors
knowledge processors
image analysis
multimedia data mining
multimodal skew tent map
interchange permutation
hdl
network mapping
nmap
social clouds
consolidation
software defined networking (s
patient empowerment
ehr management
blockchain in healthcare
actuators
neural network
url
phishing detection
network cybersecurity
storage and retrieval
coding and transmission
techniques
ipv4
exemption
information system
digital investigations
digital forensics readiness
digital evidence
wireless medical networks
ad-hoc on-demand distance vect
mobile ad-hoc network (manet)
one-class support vector machi
sharing queue
m/g/r processor
operating systems
computer architecture
fake profiles
national security
anomaly-based intrusion detect
eap-ttls
visual information processing
inductive learning
evolutionary computation
nlp and information retrieval
and text mining
web
machine learning techniques
bls signature
secret sharing technique
bi-variate polynomial
security for emerging networks
modelling
cyber attacks
tree
security behavior
self-efficacy
pre-processing
alert prioritization
alert clustering
merging
trellis coded genetic algorith
session key matrix
pseudo random key generator
finite automata
xperimental results
ultrasonic audio
voice activation
byte characteristic
zss signature
cyberdefense
double spending
cctv
cyberattack impact
cyberattack types
personal privacy
economic stability
cyberattacks
saudi arabia
parameters
sensor node
leach
energy efficiency
cluster head selection algorit
cluster head
big data analytics
big data and iot
application security
network traffic
dos attack
secure division
secure sum
naive bayesian
privacy preservation
authentication scheme
cryptography primitives
password replacement
sequence number
monitoring agent
side channel monitoring
hooks
system call
hybrid analysis
android banking trojans
security threats & countermeas
awareness
cybercrime awareness
cybercrime on social media
education
self-sovereign identity
digital transformation
software configuration managem
public cloud severs
data outsourcing
pervasive/ubiquitous computing
regulation and trust mechanism
software-defined networks
rerouting
devices authentication
security metrics
packet analyzer
traffic light control (tlc)
requirements engineering (re)
networks for big data
encryption and decryption
inspection game
confusion matrix
impersonation
phishing attack
email users
data analytics
correlation
log loss
hot log
live log
insufficient logging
soc
siem
bayes
q-learning
mobile ad hoc networks securit
big data and the cloud
cloud computing architecture
cloud business
google glass
stacked auto encoder
relieff algorithm
email forensic dataset
cybercrimes
aquila optimization
likability
traceability
software maintenance
separation of concerns
information retrieval and ai
neural languages and nlp
gitlab
jenkins
cve-2021-44228
ci/cd
continuous delivery
continuous integration
dimensionality reduction
educational data mining
computer security
secured watermark system (sws)
embedded system
nosql data stores
public safety
crowd monitoring
tcp
context-aware traffic light co
countermeasures
avispa
industrial communication secu
data management
mobile networks
semi-trusted third party
fairness
verifiability
secret-sharing
optimistic multi-party computa
trustworthiness
autoencoder
invertible
mobile device
intellect learning
it policy
common vulnerability exposure (cve)
spam email
sender mail server
receiver mail server
anti-spams
wsn security
cross layer architecture
packet latency.
benevolent node
base station (bs)
route trust (rt)
indirect trust
direct trust
geometric mean (gm)
device discovery
physical proximity
intrusion detection is one of the standard stages
image cipher.
scrambling
multimedia networking
mobile & broadband wireless internet
network based applications
network operations & management
measurement & performance analysis
internet and web applications
high speed networks
adhoc and sensor networks
heterogeneous wireless networks
security standards
security assessment
business information security
false positives
enterprise
machinelearning
information gain
e-learning security
e-remedies
e-risks
e-learning
secret reference matrix (srm)
peak-signal-to-noise-ratio (psnr)
discrete cosine transformed (dct)
botnet and honeypot.
iptrcing
flooding attack
internet threat monitors (itm)
• peer to peer and overlay networks
• optical networks and systems
• next generation web architectures
true positives
fidelity
coordinate ratios
equatorial cloning
isotropic cloning
quantum copying machines
eavesdropping
todv
cross layer detection
body area network security
body area networks
misbehaving node
tbraodv
ad-hoc
isakmp
dsss
huffman coding
thematic analysis
medical internet of things
classification problem.
svms
functional analysis
kernel functions
legendre polynomials
man-in-the-middle.
obfuscation
server less
server based
escrow less
tree based
hierarchical
multicast
group
signcryption
fairness.
ttp (trusted third party)
security and privacy in pervasive/ubiquitous compu
authentication and non-repudiation
intrusion detection and vulnerability assessment
untraceability
cryptography and coding
survivability
intrusion resilience
fault-tolerant networks
diversity
androidapis
privilege escalation
system call dependence graph
behavior representation
merkle-hellman.
simultaneous diophantine
subset sum
coppersmith
lattice reduction
lattices
snmp
mib
multi- agent
distributed query processing
location cloaking
location based services
windows registry
forensics
kdd cup 1999 dataset.
which motivates many researchers to discover metho
• network
data compression.
peer to peer
key management protocols
wireless attacks
wireless intrusion detection system
attack test cases
attack taxonomy
cueing.
interfaces
one-time passwords
chosen ciphertext security.
conditional proxy re-encryption
proxy re-cryptography
random oracle model
noise & entropy
anti obfuscation technique
inter symbol interference (isi)
cognitive radio
mpi.
encrypted data
international data encryption algorithm (idea)
hiding information
unicode
multi-layers
arabic text
python
scapy
kali linux
de-authentication attack
(ddos
logistic regression
k-nn
naive bayes
wireless mesh network
wireless ad-hoc networks
web application penetration testing
security testing
) * ubiquitous computing security *
trojon protection * security threats & cou
e-mail fraud * virus
ad hoc and sensor network security * peer-
information theoretic security
rational secret sharing
fault tolerance
topology.
authenticated symmetric key establishment
biometric key
wireless body sensor network (wbsn)
ofdm
non linearity
s box
memorability of passwords
snakes & ladders game
graphical passwords
attackers .
mac-layer
threshold level
real time application
rtos
mobile ad hoc networking
non-invertible transformation
cancellable biometrics
fingerprint biometrics
biohashing
best practice
software implementation
spectrum sensing
response & tracking.
base station
sensor nodes
attack path reconstruction
ddos-attacks
icap
client honeypot
browser vulnerability
adhoc on demand distance vector protocol(aodv)
translation.
elecronic voting
user lifecycle
workflows
provisioning
security synthesis
• natural language processing
• cryptography
• computational science and applications
• machine learning
• information theory
• computational physics & biology
geometry
• computational complexity
• automata theory
• algorithms and data structures
e-mail architecture
header analysis
e-mail headers
e-mail forensics
feature coding
pca
ca
low level feature
• measurement & performance analysis
• internet and web applications
• high speed networks
• adhoc and sensor networks
• next generation internet
• heterogeneous wireless networks
fair exchange protocols
fair document exchange
dempster–shafer belief theory
hashcode
hacker
websites
• quantum computation
• program semantics and verification
• probabilistic computation
communication
and quality control
network system
control charts
anomalies
ieee 802.11g
multiple encryption.
secure electronic transaction
f8
a5/3
stream cipher
unauthorized access
network design
real estate
infrastructure security
wireless sensor network.
symmetric cryptosystems
• parallel and distributed computing
certification authority
&security
chebyshev polynomials
blind signature
friendly-cooperative framework
system hardening
anti malicious objects
star topology
black scholes equations
malicious object
native language password
textual password
shape based authentication
multicode encryption
transversal designs
reed-muller codes
blockchain consensus algorithms
blockchain foundations
blockchain-based security for the iot
iot experimental results and deployment scenarios
security & network management e-mail security
multimedia etc big data tools and systems big data
privacy and trust big data applications
models and algorithmsbig data infrastructure and p
big data big data techniques
peer-to-peer network security database and system
data and grid room
system information leak
peer to peer and overlay networks
qos and resource management
dos attacks
ndp
fragment header
communication network architectures and design
features.
mlp
filtering.
enron
keyword search
report generation
digital forensic
email forensic
cassandra big data.
attacks prediction
threat activity.
cyberattack ontology
cyberattack prediction
network and wireless network securitymobile
iot security and privacy
trust management system for wireless
certificateless public key encryption
certificateless signature scheme
digital certificate
certificateless public key cryptography
set protocol
fuzzy logic & perspective of intrusions
association mining
temporal sequence patterns
ubiquitous computing security web 2.0 security
olsr
willingness function
smrr
blockchainbased security for the iot
blockchainauthentication and authorization
analyze formal
timestamps
blockchain new design
flow-label
ipv6 security vulnerability
remote authentication
man in the middle attack
user authentication framework
analysis
dynamic billing system
data aggregation
distributed hash tables & linear diophantine
decentralized network
multimedia content management
trust management for virtual organizations
policy of trust in e-leaning systems
trust and reputation management
mobile and sensor networks
packet marking
autonomous system
sensing layer
resonant frequency
micro cantilever
dynamic source routing.
network coding
hybrid idps
perimeter-based idps
network-based idps
host-based idps
idps sensors/agents
tcp re-assembly
cyber-crime & bdi.
vendor lock-in
csp
multi-cloud
finite elements
strong t -consistency
group communication
server security
small business security
e-commerce systems security
mobile phones
conditional random fields
layered approach
secure two-party computation
zero-knowledge proof
distributed eigamal encryption
similarity coefficients
vanet etc.
v2v
stdma
collaborative web systems
vector valued functions
privacy preserving
implicit function theorem
hitech act
hipaa
incident response team
cyber incidents
ecurity threats & countermeasures (ddos
network applications
emerging technologies for next generation network
discrete algorithms and discrete modeling
network operation and management
mobile and wireless networks
network security and privacy
communication network protocols
trust/risk based security frameworks
csma
feature selection.
keystroke dynamics.
biometric
web-based
fuzzy-c means clustering
background subtraction
foreground detection
background removal
x64 systems
neighbour mean interpolation
image interpolation
programming languages
operation system
simulator
emulator
improved watchdog
watchdog
security area control
regulation and trust mechanisms
biological and evolutionary computation
reinforcement and unsupervised learning
) • ubiquitous computing security
engineering
search engine optimization
malicious websites
intrusion detection and prevention internet securi
counterfeit.
and machine learning
knime
aes.
session based key
sbskct
artificial immune systems
computational intelligence in security
multiple flows
tcp protocols
high-speed
heterogeneous networks.
next generation networks
casper/fdr
authentication and key agreement protocols
heart rate device
gps
emergency
arduino microcontroller
accelerometer
accidents
hierarchical model
data loss
security breach
authentication and key agreement.
umts security
telecommunications system
gsm system
false alarm rate
naive bayes classification
multi stage filter
enhanced adaboost
compression.
transformation
threshold secret sharing
public verifiable signcryption
standard model
provable security
identity based cryptography
low-power
embedded devices.
modular exponentiation
n-1 attack
simple power analysis
dominant feature set.
outlier analysis
behavioral profile
terrorism
social network analysis (sna)
backtracking bit
watch nodes
traversed administrator field
associative node
ubiquitous computing security web 2.0 security cry
corporate infrastructure
mimo-ofdm
peerto-peer network.
intrusion attacks
taxonomy of attack
intruder
maximum power transfer
electronic circuit
control system
touch sensor
communication technologies
networks
mobile & wireless networks
lowest id clustering algorithm
sybil node
mobile ad hoc network
spammers
web spam
web filtering
nonce
pkm
informtaion technology
safety
response time
self-configuration
self-cure
self-protection
self-optimization
autonomic network
clustering technique
awgn and raleigh fading channels.
bit error rate(ber)
ecb and cfb cryptographic algorithm
pre-zf
cross-certification
certificate practice statement(cps)
certificate policy(cp)
certification authority(ca)
public key infrastructure(pki)
ngn
ec-aka
aka
eps
lte security
• intelligent agents and systems
• trust management
• privacy and authentication
• cryptography and coding
security and privacy policies
security in distributed systems
disaster recovery
pre-mmse
redirection
manipulating search engine
search engine
hiding techniques
cloaking detection
database and system security intrusion detection a
lucas
digital signatures
fair-exchange
contract signing
andit security
protected health information
personal identification information
information assurance
network security & its applications
pki interoperability
See more
Users being followed by IJNSA Journal