IJNSA Citation Details (2009-2016)
IJNSA Citation Details (2009-2016)
IJNSA Citation Details (2009-2016)
(IJNSA)
ISSN : 0974 - 9330 (Online); 0975 2307 (Print)
http://airccse.org/journal/ijnsa.html
SCOPE OF THE JOURNAL
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open
access peer-reviewed journal that publishes articles which contribute new results in all areas of the
computer Network Security & its applications. The journal focuses on all technical and practical
aspects of security and its applications for wired and wireless networks. The goal of this journal is
to bring together researchers and practitioners from academia and industry to focus on
understanding Modern security threats and countermeasures, and establishing new collaborations in
these areas.
Topics of Interest
http://airccse.org/journal/ijnsa.html
Members of the Editorial Board
Editor In Chief:
Jae-Kwang Lee, Hannam University, South Korea
Associate Editor
Editorial Board
Manuscript Template
Review Process
Submissions are accepted for review with the understanding that the same work has been
neither submitted to, nor published in, another publication. Simultaneous submission to other
publications will result in immediate rejection of the paper. Papers are not within the journal
scope will be rejected immediately after the pre review process.
All manuscripts will be subject to a well established, fair, unbiased peer review and refereeing
procedure, and are considered on the basis of their significance, novelty and usefulness to the
Journals readership. The reviewing structure will always ensure the anonymity of the referees
& it will be reviewed by 3 experts in the field. The review output will be one of the following
decisions:
1. Accept
2. Accept with minor changes
3. Weak Accept with major changes
4. Reject
The review process may take approximately two to three months to be completed. The Editor
reserves the right to reject a paper if it does not meet the aims and scope of the journal and if
it is not revised as per instructions.
Contact Us
Here's where you can reach us : ijnsa@airccse.org
http://airccse.org/journal/ijnsa.html
Volume 1, Number 1, April 2009
Using Rough Set and Support Vector Machine for Network Intrusion Detection
1 Rung-Ching Chen, Kai-Fan Cheng and Chia-Fen Hsieh, Chaoyang University of 97
Technology,Taiwan, R.O.C
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its
Modified Version using Digital Images
3 19
Krishnamurthy G N, Dr. V Ramaswamy,Bapuji Institute of Engineering &
Technology, India
A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of
4 Simplified Data Encryption Standard Algorithm 73
Poonam Garg,Institute of Management Technology, India
A New Cluster - Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc
Networks
5 Debdutta Barman Roy,Rituparna Chaki,Nabendu Chaki,Calcutta Institute of 84
Engineering and Management, India, West Bengal University of Technology,India,
University of Calcutta,India
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and
Integration
14 27
Alan Mink, Sheila Frankel and Ray Perlner, National Institute of Standards and
Technology (NIST), USA
Agent Based Trust Management Model Based on Weight Value Model for Online Auctions
16 E.Sathiyamoorthy, N.Ch.Sriman Narayana Iyenger & V.Ramachandran, VIT 09
University,INDIA.
Cryptanalysis of a more efficient and secure Dynamic ID-Based Remote User Authentication
Scheme
17 17
Mohammed Aijaz Ahmed1, D. Rajya Lakshmi2 and Sayed Abdul Sattar3, GITAM
University, India
Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video
28 Cover Media 61
Natarajan Meghanathan and Lopamudra Nayak, Jackson State University, USA
Combining Private and Public Key Encryption Techniques for Providing Extreme Secure
Environment for an Academic Institution Application
31 1 07
Syed S. Rizvi, 2Aasia Riasat and 3Khaled M. Elleithy, 1,3University of Bridgeport, USA
and 2Institute of Business Management, Pakistan.
Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection
34 Dewan Md. Farid1, Nouria Harbi1, and Mohammad Zahidur Rahman2, 1University 96
2
Lumiere Lyon 2 - France and Jahangirnagar University, Bangladesh
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
35 Eslam Gamal Ahmed, Eman Shaaban and Mohamed Hashem, Ain Shams University, 24
EGYPT
Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2)
44 24
Ulrich Herberg and Thomas Clausen,Ecole Polytechnique, France
A Novel Web-based Approach for Balancing Usability and Security Requirements of Text
45 Passwords 02
Dhananjay Kulkarni, Boston University, USA.
Hierarchical Design Based Intrusion Detection System For Wireless Ad Hoc Sensor Network
51 Mohammad Saiful Islam Mamun1 and A.F.M. Sultanul Kabir2, 1Stamford University, 43
Bangladesh and 2American International University, Bangladesh.
Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security
Applications in Constrained Network Environment
54 08
K R Chandrasekhara Pillai1 and M P Sebastian2,1N S S College of Engineering,India
and Indian Institute of Management, India
An Efficient M-ARY QIM Data Hiding Algorithm For The Application To Image Error
Concealment
56 0
Amit Phadikar and Santi P. Maity , MCKV Institute of Engineering,India
and Bengal Engineering and Science University, India
Pattern Analysis and Signature Extraction For Intrusion Attacks On Web Services
Urjita Thakar, Nirmal Dagdee and Sudarshan Varma, Shri G.S. Institute of
57 15
Technology and Science,India, S.D. Bansal College of Technology,India and Ideavate
Solutions, USA.
Evaluating Galois Counter Mode in Link Layer Security Architecture for Wireless Sensor
Networks
62 03
Vivaksha Jariwala and D. C. Jinwala, C. K. Pithawalla College of Engineering and
Technology, India and S. V. National Institute of Technology, India
Effect of Hash Function on Performance of Low Power Wake up Receiver for Wireless
64 Sensor Network 00
Vikas Kumar and Rajender Kumar, NIT- kurukshetra, India
Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme with Session
Key Agreement for Multi-Server Environment
66 Rafael Martinez-Pelaez,, Francisco Rico-Novella, Cristina Satizabal2 and Jacek 05
Pomykala, Technical University of Catalonia, Spain, Universidad de la Sierra Sur,
Mexico and Warsaw University, Poland
Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents
68 Mueen Uddin, Kamran Khowaja and Azizah Abdul Rehman, UTM, Malaysia 24
and 2Isra University, Pakistan
Effective Voice Calls Admission for Authorized User in Inter VOIP Network
73 Subashri T and Vaidehi V, Anna University - Chennai, India 0
ADRISYA: A Flow Based Anomaly Detection System for Slow and Fast Scan
74 Muraleedharan N and Arun Parmar, Centre for Development of Advanced Computing 04
(C-DAC), India
Comparison Process Long Execution Between PQ Algorthm And New Fuzzy Logic
Algorithm For VOIP
79 Suardinata, Kamalrulnizam bin Abu Bakar and Nimitr Suanmali, University 01
Teknologi Malaysia, Malaysia
A Light Weight Protocol To Provide Location Privacy In Wireless Body Area Networks
85 Mohammed Mana, Mohammed Feham and Boucif Amar Bensaber, University of 11
Tlemcen, Algeria andUniversite du Quebec a Trois-Rivieres, Canada
The Key Exchange Cryptosystem Used With Higher Order Diophantine Equations
88 08
Harry Yosh, HECO Ltd - Canberra, Australia
Design And Efficient Deployment Of Honeypot And Dynamic Rule Based Live Network
Intrusion Collaborative System
89 Renuka Prasad.B, Annamma Abraham, Abhas Abhinav, Sunil.V.Gurlahosur and 01
Srinivasa Y, R.V.College of Engineering, India, BMSIT - Bengaluru,
India, DeepRootLinux Pvt Ltd, India, SIT - Tumkur, India
Investigating the Combination of Text and Graphical Passwords for a more secure and usable
91 experience 09
C Singh, L Singh and E Marks, University of Guyana
A Novel Data Encryption Technique By Genetic Crossover Of Robust Biometric Key And
Session Based Password
Tanmay Bhattacharya, Sirshendu Hore, Ayan Mukherjee and S. R. Bhadra
93 02
Chaudhuri, JIS College Engineering, India, Hooghly Engineering & Technology
College, India, Institute of Science & Technology, India and Bengal Engineering
& Science University, India
Replication Attack Mitigations for Static And Mobile WSN
94 19
V.Manjula and C.Chellappan, Anna University - Chennai, India
A Robust Mechanism For Defending Distributed Denial Of Service Attacks On Web Servers
97 12
Jaydip Sen, Innovation Lab, Tata Consultancy Services Ltd.,- Kolkata, India
Credential Based Mediator Architecture for Access Control and Data Integration in Multiple
103 Data Sources Environment 05
Nirmal Dagdee and Ruchi Vijaywargiya, S.D. Bansal College Of Technology, India
Data Security Using Private Key Encryption System Based on Arithmetic Coding
104 28
Ajit Singh and Rimple Gilhotra, BPS Mahila Vishwavidyalaya, India
Maintaining Uniform Density and Minimizing the Chance of Error in a Large Scale WSN
106 Asis Kumar Tripathy, Shradhananda Beura, Muralidhar Behera and Gunanidhi 00
Pradhan, NM Institute of Engineering and Technology, India
Authentication Schemes for Session Passwords Using Color and Images
107 M Sreelatha, M Shashi, M Anirudh, Md Sultan Ahamer and V Manoj 50
Kumar, RVR & JC College of Engineering, India
and Andhra University College of Engineering, India
109 Coimbatore Chandersekaran and William R. Simpson, The Secretary of the Air 0
Force, USA and The Institute for Defense Analyses, USA
An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its
Verification
110 04
Ferdous A Barbhuiya, Santosh Biswas and Sukumar Nandi, Indian Institute of
Technology - Guwahati, India
TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for
MANET
112 Ahmed M. Abd El-Haleem and Ihab A. Ali, Helwan University, Egypt 04
Novel Hybrid Intrusion Detection System For Clustered Wireless Sensor Network
113 Hichem Sedjelmaci and Mohamed Feham, Abou Bakr Belkaid University - Tlemcen, 32
Algeria
122 Tolga Mataracioglu and Sevgi Ozkan, TUBITAK National Research Institute of 17
Electronics and Cryptology (UEKAE), Turkey and Middle East Technical University,
Turkey
RTOS Based Secure Shortest Path Routing Algorithm In Mobile Ad- Hoc Networks
124 02
R. Ramesh and S. Gayathri, Anna University, India
Ensemble of Blowfish With Chaos Based S Box Design For Text And Image Encryption
127 Jeyamala Chandrasekaran Subramanyan B and Raman G.S, Thiagarajar College of 09
Engineering, Madurai and KLN College of Information Technology, Madurai
Design & Implementation of Secure AODV in Multicast Routing to Detect DDOS Attack
131 0
Vikram Singh and Vatika, Chaudhary Devi Lal University, India
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent
140 Chintan Bhatt, Asha Koshti, Hemant Agrawal, Zakiya Malek and Bhushan Trivedi, 04
GLS Institute of Computer Technology, India
CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN
142 spoofing attack 06
L.Kavisankar and C.Chellappan, Anna University, India
Adaptive Association Rule Mining Based Cross Layer Intrusion Detection System for
MANET
146 03
V. Anjana Devi and R. S. Bhuvaneswaran, St. Joseph's College of Engineering, India
and Anna University, India
Error Detection and Correction for Distributed Group Key Agreement Protocol
147 0
P.Vijayakumar, S.Bose and A.Kannan, Anna University - Chennai, India
The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks
150 Novarun Deb, Manali Chakraborty and Nabendu Chaki, University of Calcutta, 0
India
Securing IEEE 802.11g WLAN Using Open VPN and its Impact Analysis
154 Praveen Likhar, Ravi Shankar Yadav and Keshava Rao M, Defence Research and 12
Development Organisation (DRDO) - Bangalore, India
Statistical Quality Control Approaches to Network Intrusion Detection
155 Rohitha Goonatilake, Rafic Bachnak and Susantha Herath, Texas A&M 02
International University, USA and St. Cloud State University, USA
Security Enhanced Key Predistribution Scheme Using Transversal Designs and Reed Muller
Codes for Wireless Sensor Networks
156 01
Pinaki Sarkar, Amrita Saha and Samiran Bag, Jadavpur University, India, IIT
Bombay, India and Indian Statistical Institute, India
Scheme of Encryption for Block Ciphers and Multi Code Generation Based on Secret Key
157 P. Anuradha Kameswari, R. Chaya Kumari and L. Praveen Kumar, Andhra 00
University, India
163 Shraddha Dulera, Devesh Jinwala1 and Aroop Dasgupta, S V National Institute of 10
Technology, India and Bhaskaracharya Institute for Space Applications and Geo-
Informatics, India
Enhanced OneTime Pad Cipher with MoreArithmetic and Logical Operations with Flexible
Key Generation Algorithm
165 05
S.G.Srikantaswamy and H.D.Phaneendra, National Institute of Engineering -
Mysore, India and CSE NIE - Mysore, India
IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots
169 K.Munivara Prasad, A.Rama Mohan Reddy and V Jyothsna, Rayalaseema 10
University, India, SV University, India and Sree vidyanikethan Engg.College, India
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc
Network
174 03
G.Padmavathi, P.Subashini and D.Devi Aruna, Avinashiligam University for Women,
India
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Security
176 01
Minal Moharir and A V Suresh, R V College of Engineering Bangalore, India
A Defensive Mechanism Cross Layer Architecture for Manets to Identify and Correct
178 Misbehaviour in Routing 02
G.S. Mamatha, R.V. College of Engineering Bangalore, India
The Coordinate Ratios as a Tool to Analyze the Intrusion based on Buzek-Hillery Quantum
Copying Machine
Besma Othmani, Mohsen Machhout, Houcine Mejri,, Hafedh Belmabrouk and Rached
179 0
Tourki, Laboratoire d'Electronique et Micro Electronique Faculte des Sciences de Monastir,
Tunisia and Ecole Preparatoire aux Academies Melitaires, Tunisia
Volume 4, Number 2, March 2012
LSR Protocol Based on Nodes Potentiality in Trust and Residual Energy for WSNs
181 01
Shaik Sahil Babu, Arnab Raha and M.K.Naskar, Jadavpur University, India
Minimizing the Time of Spam Mail Detection by Relocating Filtering System to the Sender
Mail Server
183 03
Alireza Nemaney Pour, Raheleh Kholghi and Soheil Behnam Roudsari,Islamic Azad
University of Abhar, Iran and Sharif University of Technology, Iran
A Bayesian Classification on Asset Vulnerability for Real Time Reduction of False Positives
in Ids
184 03
G.Jacob Victor, M Sreenivasa Rao and V.CH. Venkaiah, SERP - RD Department,
India, JNTU - Hyderabad, India and CRRao AIMS & CS - Hyderabad, India
Generating Representative Attack Test Cases for Evaluating and Testing Wireless Intrusion
Detection Systems
195 05
Khalid Nasr, Anas Abou El Kalam and Christian Fraboul, Universite de Toulouse
Toulouse, France
Survey and Taxonomy of Key Management Protocols for Wired and Wireless Networks
196 Adarsh Kumar, Alok Aggarwal and Charu, Jaypee Institute of Information and 13
Technology Noida, India
Energy Constrained Reliable Routing Optimized Cluster Head Protocol for Multihop under
Water Acoustic Sensor Networks
198 03
Padmavathy.T.V, Gayathri.V, Indhumathi.V and Karthiga.G, R.M.K Collge of
Engineering Chennai, India
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
202 09
P.Natesan and P.Balasubramanie, Kongu Engineering College, India
Dominant Features Identification for Covert Nodes in 9/11 Attack Using their Profile
208 02
S.Karthika, A.Kiruthiga And S.Bose, Anna University, India
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance
the Information Security
210 06
Manas Paul and Jyotsna Kumar Mandal, JIS College of Engineering, India
and Kalyani University, India
Comprehensive Comparison of VoIP SIP Protocol Problems and Cisco VoIP System
211 TALAL AL-KHAROBI and Mohmmed Abduallah Al-Mehdhar, King Fahd University 0
of Petroleum & Minerals(KFUPM), Saudi Arabia
Simple Post Quantum Scheme for Higher Key Rate Multiparty Quantum Key Distribution
Abudhahir Buhari, Zuriati Ahmad Zukarnain, Shamala K. Subramaniam, Hisham
217 0
Zainuddin and Suhairi Saharudin, University Putra Malaysia, Malaysia
and Technology Park Malaysia, Malaysia
Handoff Based Secure Checkpointing and Log Based Rollback Recovery for Mobile Hosts
219 01
Priyanka Dey and Suparna Biswas, West Bengal University, India
Design And Validation Of Specification Based Ids For Power Enhancement Related
221 Vulnerabilities In AODV 0
Chaitali Biswas Dutta and Utpal Biswas, University of Kalyani, India
Security V/S Qos for LTE Authentication and Key Agreement Protocol
222 Jacques Bou Abdo, Jacques Demerjian and Hakima Chaouchi, Nokia Siemens 09
Networks, Lebanon, Antonine University, Lebanon and Telecom Sud Paris, France
RSAED: Robust and Secure Aggregation of Encrypted Data in Wireless Sensor Networks
232 07
Merad Boudia Omar Rafik and Feham Mohamed, University of Tlemcen, Algeria
Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case
255 Study 0
Natarajan Meghanathan, Jackson State University, USA
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
256 Kuo-Tsang Huang, Jung-Hui Chiu and Sung-Shiou Shen, Chang Gung University, 08
Taiwan and DE LIN Institute of Technology, Taiwan
An Integrated Solution for both Monitoring and Controlling for Automization Using
Wireless Sensor Networks: A Case Study
257 0
M Gnana Seelan and Ch AS Murty, Centre for Development of Advanced Computing -
Hyderabad, India
Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and
Support Vector Machines
260 12
A. M. Chandrashekhar and K. Raghuveer, Sri Jayachamarajendra College of
Engineering (SJCE), India and National Institute of Engineering (NIE) Mysore, India
Using Bias Optimiazation for Reversible Data Hiding using Image Interpolation
Andrew Rudder, Wayne Goodridge and Shareeda Mohammed, The University of the 0
267
West Indies, Trinidad and Tobago.
Efficacy of Attack Detection Capability of IDPS Based on its Deployment in Wired and
Wireless Environment
270 02
Shalvi Dave, Bhushan Trivedi and Jimit Mahadevia, Indus University,
India, GLSICT,India and Elitecore Technologies Pvt. Ltd., India
271 M Abdul Rahiman, Nishanth Jain, Arun K. Dubey and G Manoj Kumar, AICTE, 01
Ministry of HRD,Govt of India, India, Bharati Vidyapeeth College of Engineering,
India and LBS Inst of Tech for Women, India.
Improved Ids using Layered CRFS with Logon Restrictions and Mobile Alerts Based on
Deviant System Behaviour
276 0
Arpitha M1, Geetha V,Gowranga K H and Bhakthavathsalam R, Alpha College Of
Engineering, India and Indian Institute of Science, India
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and Energy
Depletion Parameters
279 0
S.Prabhakara Rao, E.Nagabhooshanam and S.Ramesh Babu, Nigama Engineering
College, India and Sridevi Womens Engineering College, India
Password Based Scheme and Group Testing for Defending DDOS Attacks
281 G Dayanandam, T V Rao, S Pavan Kumar Reddy and Ravinuthala Sruthi, QIS 03
Institute of Technology (QISIT), India and KL University (KLU), India
Bearings Prognostic Using Mixture of Gaussians Hidden Markov Model and Support Vector
Machine
286 11
Fatima Ezzahra Sloukia, Rajae Bouarfa, Hicham Medromi and Mohammed
Wahbi, SIR2C2S/LASI-EHTP, Morocco and Hassan II University, Morocco
Trust Value Algorithm: A Secure Approach against Packet Drop Attack in Wireless Ad-Hoc
Networks
287 02
Rajendra Aaseri, Pankaj Choudhary and Nirmal Roberts, ABV-Indian Institute of
Information Technology, India
Real Time Securing of All-Optical Networks Against Security Attacks at the Physical Level
288 Fahmida Rahman and Mohammed Arozullah, The Catholic University of America, 0
USA
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authentication
293 Pavan Kumar K, P. E. S. N. Krishna Prasad, M. V. Ramakrishna and B.D.C.N. Prasad, 03
Prasad V. Potluri Siddhartha Institute of Technology, India
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
296 Aliyu Mohammed, Haitham A. Jamil, Sulaiman Mohd Nor and Muhammad 1
NadzirMarsono, Universiti Teknologi Malaysia, Malaysia
Experimental Analysis of AODV and DSR with Varying Vehicle Mobility and Density in
302 Vanet Scenario 01
Arzoo Dahiya and R.K.Chauhan, Kurukshetra University, India
Image Authentication Through ZTransform with Low Energy And Bandwidth (IAZT
306 0
Madhumita Sengupta and J. K. Mandal, University of Kalyani, India
Optimized Hybrid Security Mechanism for Image Authentication and Secrecy using PSO
312 02
K.Kuppusamy and K.Thamodaran, Alagappa University, India
Credit Based Methodology to Detect and Discriminate DDOS Attack From Flash Crowd in
313 A Cloud Computing Environment 05
N.Jeyanthi, Hena Shabeeb and Mogankumar P.C, VIT University, India
A Novel Approach for Secure Routing Through BGP Using Symmetric Key
315 01
Divan Raimagia, Shraddha Singh and Sameena Zafar, PIES College, India
326 Shadi R. Masadeh, Ahmad Azzazi, Bassam A. Y. Alqaralleh and Ali, Mousa.Al 01
Sbou, Isra University, Jordan, Applied Science University, Jordan and Al-Hussein
Bin Talal University, Jordan
Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes
344 01
Divya Ann Luke, Jayasudha. J.S, SCT College of Engineering, India
End to End Quality of Service Assurance for Multi-Service Provisioning in Mobile Ad Hoc
345 Networks. 01
Prabesh Dongol and Dhadesugoor R. Vaman, Prairie View A&M University, USA
A Novel (K,N) Secret Sharing Scheme from Quadratic Residues for Grayscale Images
350 El-Tigani B. Abdelsatir, Sahar Salahaldeen, Hyam Omar and Afra Hashim, University 03
of Khartoum, Sudan
Cloud Based Access Control Model for Selective Encryption of Documents with Traitor
352 Detection 02
Punya Peethambaran and. Jayasudha J. S, Sct College of Engineering, India
Reducing the Cognitive Load on Analysts through Hamming Distance Based Alert
Aggregation
353 0
Peter Mell and Richard Harang, National Institute of Standards and Technology,
USA and U.S. Army Research Laboratory, USA
Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data Using Secure
Division
358 02
Sumana M and Hareesha K S, M S Ramaiah Institute of Technology, India
and Manipal Institute of Technology, India
368 Auday H. Al-Wattar, Ramlan Mahmod, Zuriati Ahmad Zukarnain and Nur Izura 01
Udzir, Universiti Putra Malaysia, Malaysia
A New Image Steganography Algorithm Based on MLSB Method with Random Pixels
371 Selection 03
Odai M.Al-Shatanawi and Nameer N.El.Emam, Philadelphia University, Jordan
Security Challenges as a Factor Affecting the Security of Manet: Attacks and Security
Solutions
374 Nabeel Zanoon, Nashat Albdour, Hatem S. A. Hamatta and Rasha Moh'd Al- 04
Tarawneh, Al-Balqa Applied University, Jordan and Tafila Technical University,
Jordan
An ANN Approach for Network Intrusion Detection using Entropy based Feature Selection
375 02
AshalataPanigrahi and ManasRanjanPatra, Berhampur University, India
Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channel In Secured
Communication
377 0
Anjan K1, Srinath N K and Jibi Abraham, R V College of Engineering, India
and College of Engineering Pune, India
Volume 7, Number 4, July 2015
Employee Trust Based Industrial Device Deployment and Initial Key Establishment
Apala Ray, and Johan Akerberg,and Mats Bjorkman and Mikael Gidlund, ABB
387 Corporate Research- Bangalore, India, Malardalen University, Sweden, ABB 03
Corporate Research-Vasteras, Sweden and Mid Sweden University, Sundsvall,
Sweden
A Security Strategy against STEAL-AND-PASS Credential Attacks
388 0
Juan Ceballos, Security Consulting & Engineering, T-Systems International, Germany
Intrusion Detection System Using Discrete Fourier Transform with Window Function
391 0
Yusuke Tsuge and HidemaTanaka, National Defense Academy of Japan, Japan
Cascade Block Cipher Using Braiding/Entanglement of Spin Matrices and Bit Rotation
D.Sravana Kumar, P.Sirisha and CH. Suneetha, Dr. V.S. Krishna Government
394 0
Degree College, India, Indian Maritime University, India and GITAM University,
India
Email Spam Classification Using Hybrid Approach of RBF Neural Network and Particle
402 Swarm Optimization 0
Mohammed Awad and Monir Foqaha, Arab American University, Palestine
Enhance RFID Security Against Brute Force Attack Based on Password Strength and
407 Markov Model 0
Adwan Yasin and Fadi AbuAlrub, Arab American University, Palestine
A Study on LEA and Seed Algorithms for Data Protection of Smartphone Based Disaster
Notification System
412 0
Jae Pil Lee, Jae Gwang Lee, Jun hyeon Lee, Ki-su Yoon and Jae Kwang Lee, Han Nam
University, Korea
413 Chuyu She, , , Wushao Wen,, Zaihua Lin and Kesong Zheng, Sun Yat-Sen 0
University, China, SYSU-CMU Shunde International Joint Research Institute, China
and Guangdong University of Finance & Economics, China
416 Heba N. Kamel, Mohammad A. Alia, Bara'aha. Al Saeq and Eman Abu Maria, Al 0
Zaytoonah University of Jordan, Jordan
Enhancing Cyber Security of Online Accounts via A Novel Protocol and New Techniques
418 Mehrdad Nourai and Haim Levkowitz, University of Massachusetts Lowell, USA 0
Projected citation counts in 2020 for International Journal of Network
Security & Its Applications (IJNSA)