Personal Information
Webseite
airccse.org/journal/ijnsa.html
Info
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Tags
phishing
worms
spam
peer-to-peer network security
mobile
database and system security
ad hoc and sensor network security
network and wireless network security
security & network management
virus
cryptographic protocols
e-mail fraud
intrusion detection and prevention
ubiquitous computing security
e-mail security
web 2.0 security
security
trojan protection
internet security & applications
network security
session hijacking
mim
performance evaluations of protocols & security ap
ddos
replay attack etc
intrusion detection
artificial intelligence
authentication
machine learning
privacy
blockchain
cryptography
services security
system security
web based applications
crowd sourcing
hardware-based attacks
network management
social networking
replay attack
wireless network security
blockchain technology
machine learning for security
trojan protectio
internet security & applicatio
encryption
cloud computing
intrusion detection and preven
trojan protection security threats & countermeasur
e-mail fraud virus
ad hoc and sensor network security peer-to-peer ne
data mining
sensor network security
network and wireless network security mobile
network and wireless network s
home networks
database
) ubiquitous computing security web 2.0 security c
trust
manet
body-area networks
ad hoc and sensor netw
security of virtual machines
information security
wireless sensor networks
sdn
security and privacy for iot
deep learning
cyber security
internet of things
big data
steganography
autonomous vehicles
industrial control systems
internet of things (iot) secur
cryptocurrencies
security application
connectivity and networking
bioinformatics
neural networks
security threats & countermeasures
routing
)
security threats & countermeasures (ddos
vanets
intrusion detection system
security and optimization
iot applications and services
• ubiquitous computing security
• cryptographic protocols
• virus
• e-mail security
• intrusion detection and prevention
• peer-to-peer network security
• mobile
security threats
peer-to-peer
detection
malware
cloud
electronic voting security
natural language processing
computer vision
• performance evaluations of protocols & security
• web 2.0 security
• security & network management
• internet security & applications
• network and wireless network security
image segmentation
key management
attack
aodv
block cipher
• database and system security
fuzzy logic
decryption
android
ad hoc
aes
attacks
game theory
information retrieval
ontology
cognitive security
robotics
performance evaluations
pattern recognition
performance evaluations of pro
cloud and grid computing for big data
internet security
network
image encryption
e-commerce
vanet
dos
cyber physical system (cps)
signal processing for iot
electronics
deployment scenarios
entrepreneurship
iot-enabled innovation
phishin
electronics and signal processing for iot
iot
qos
substitution
classification
wireless sensor network (wsn)
security.
cloud security
wireless network
data security
mobile ad hoc networks
denial of service
privacy challenges
data center network control
hybrid intelligent systems
fuzzy systems
knowledge processing
visualization
array signal processing
ubiquitous computing
experimental results
resource provisioning
parallel processing
watermarking
soft computing
cybersecurity
machine learning and ai for big data
wireless sensor network
trojon protection
usability
malicious node
mobile ad-hoc networks
data protection
hacking
access control
rsa
udp flood
icmp flood
malware analysis
anonymity
ssl
permutation
steganalysis
symmetric key
hash function
secret sharing
web security
intrusion detection system (ids)
wimax
information hiding
wsn
text mining
3d and stereo imaging
digital image processing
big data mining
internet of things (iot)
iot-enabled innovation and entrepreneurship
blockchain scalability
block chain issues and trends
smart grid
wireless networks and mobile computing
grid computing
secure cloud computing
ethereum
computer & network security
malware detection
intrusion prevention
fog computing
chaos
verification
biometrics
secure routing
elliptic curve cryptography
quantum cryptography
ad hoc and sensor network security • peer-to-peer
• network and wireless network security • mobile
cryptosystem
network protocols
key distribution
virtualization
cyberattack
machine learning algorithms
dynamic analysis
mobile security
scanning
threats
manets
wireless ad hoc networks
vpn
genetic algorithm
http flood attack
syn flood
dns reflection or amplification attack
business intelligence
framework
service oriented architecture
mobile banking
mobile payment
it security
mobile agent
reputation-based
confidentiality
password
dsr
ns2
visual cryptography
wlan
group testing
ddos attack
text steganography
protocol
smart city
optimization
trust and privacy ch
edge & cognitive s
fog
data science
biometric security
nlp
internet signal processing
color and texture
spectral analysis
data mining techniques
experimental results and deployment scenarios
blockchain authentication and authorization
blockchain based security for the iot
5g and networks for big data
multimedia etc
big data applications
consensus
man-in-the-middle attack
critical infrastructures
decentralized trust management
pervasive computation trust
software systems and technologies
cyber trust and security
theory of parallel / distributed computing
networking and architectures
computer networks & communications
optical computing
algorithms and applications
models and algorithms
big data techniques
internal controls
security engineering
software security
smart card
password handling
ldap
kerberos v5
private key
public key
network protocols & wireless networks
denial of service attack
protocols
performance evaluation
intrusion detection systems
intrusion
security management
image processing
anomaly
network performance
cipher text
grid
wireless
denial-of-service
ad hoc network
bb84 protocol
secret key
trojan protection • security threats & countermeas
e-mail fraud • virus
quantum key distribution
wormhole
honeypots
e-voting
user identity
m/g/r processor sharing queue
chaotic system
generalized arnold map
fuzzy logic.
firewall
random forest
cooperation
discrete fourier transform
kyoto2006+ dataset
device deployment
initial trust
device authentication
methodology
classifier
cybercrime
ecc
security properties
network forensics
kleptography
blowfish
trust management
rsa algorithm
user authentication
ipsec
abnormal.
packet flow
information technology
wireshark
integrity.
trusted third party
subliminal channel
trapdoors
covert channel
mobile devices
mobile network
network security.
sha-1
mapreduce
collaborative environments
denial-of-service attack
rotor cipher
brute force attack
security techniques
economics
social engineering
intruders
bluetooth
support vector machine
databases
forecasting
mechatronics
cyber physical system
alert correlation
data & system integrity
privacy and authentication
semantic processing & nlp
question answering (qa)
signal or image processing
télécommunications
data visualization
information extraction
linguistic resources
semantic processing
morphology
phonology
natural language computing
predictive learning
signal identification
peer-to-peer network
embedded systems
video signal processing
cloud storage and file systems
social media
blockchain in digital forensic
big data analytics and social media
distributed ledger technology
collective digital signature
smart cities
mnist benchmark.
image classification
key spoofing
mitm attack
cryptocurrency exchange
covid-19 pandemic
assessment survey
cybersecurity culture
unsw-nb15
sgd
mse
zero trust architecture
web server handlers
network defenses
els
end-to-end security model
appliance
risk management
clusters and grid computing : security and role of
p2p
authentication and identity management
authorization
agent based trust management
policy management
information security.
reputation system
blockchain privacy
iot connectivity and networking
tools
social networks & web 2.0 trust management
blockchain attacks on existing systems
big data search and mining
computer science
pairwise comparisons.
analytic hierarchy process
access security controls
performance
congestion control
security for grid computing
a digital certificate
nsl-kdd
administrator
fair exchange protcocol
insider threats and countermeasures
security information systems architecture and desi
security and privacy in mobile systems
access control and intrusion detection
diffusion.
confusion
shuffle
henon map
encryptions
healthcare cybersecurity
iot security
sniffing
surveillance
usable security
data description
temporal sequence
anomaly-based network intrusion detection system
attacks & performance
okhttpclient
httprequests
unavailability
false alarms
kdd cup 99
content management
wordpress
attribute-base-access-control
role-base-access-control
network architectures
mobile networks & wireless lan
integrity
interworking
lte
umts
imsi
identity
kvefs
encrypt file system
key-value store
file system in user space (fuse)
protocols.
least significant bit
matrix partition
spatial domain
image steganography
routing protocols
• theoretical computer science and algebra
sybil attack
digital signature
plain text
svm
traceback
manet(mobile adhoc network).
shortest path
biometric authentication
the mapping study
internet of thing
color space
natural language prepossessing
multi-layer encoding
python programming language
text stenography
• security threats & countermeasures
• database
firewalls
false alarm
distributed denial-of-service (ddos)
vehicular forensics
risk mitigation
unfettered rules
benchmarks
anomaly-based detection
distributed denial of service (ddos)
logistic map
training
public-key cryptography
arithmetic coding
cryptanalysis
location privacy
virtual machines
reliability
wireless mesh networks
api calls
behavioural pattern
frequent sequence mining
secure communication
mutual authentication
random number generator
data hiding
security policy
session key establishment
model checking
error detection
fault tolerant
rc4
crypto stream ciphers
network intrusion detection
detection rate
decision tree
public key cryptography
zigzag scanning
psnr
ascii code
least significant bit (lsb)
quantitative trait loci
carry select adder
dual-port read-only memory
xor
symmetric cryptography
pox
topology discovery
software defined network
) • ubiquitous computing security • web 2.0 securi
mobile ip
standard
simulation
device association
tls
vanet security and privacy approaches
vanet attacks
vanet adversaries and attackers
security and privacy requirements in vanet
exploit.
bro ids
inventory
device fingerprinting
endpoint security
tdes
vulnerability assessment
penetration testing
voip
feature
mobile authentication
web authentication
password.
entropy
distributed denial of service
benchmark
text-based captcha
nwtd
trust-based routing protocols
trust determination
mansim.
radial basis function neural networks
email spam
particles swarm optimization.
distributed denial-of-service attack
bloom filter.
information centric network
3-d mesh
hamiltonian model
deadlock-free
broadcasting communication
wormhole routing
googleglass
smartwatch
wearable devices
wearable technology
management & interoperability
inspection game.
window function
tcp/ip communications
real-time networking
network steganography
industrial communication security
avispa.
practical testing system
anomaly detection
k-nearest neighbour
lightweight
comprehensive evaluation
aco
adaptive neural network
static analysis
security and privacy
email fraud
mobile communication
gsm security
necessary information
pre-hacking
security solutions
challenges
covert schemes
artificial neural network
attribute reduction
des
markov random walk model
text clustering
extractive text summarization
probability model
rhetorical relations
security architecture
4g
3gpp
certificate less cryptography
key escrow
empirical evaluation
visualization and animation
scenario-based approach
shared secret session key
strong authentication
secure communication channel
virtual password
version control
service-oriented approach
application whitelisting
updater identification
online social network
multi-faceted model
bilinear pairing
dynamic matching
secret handshakes
pairing based cryptography
coefficient correlation
shiftrows
dna
nist
priority scheduling
watch dog
packet dropping attack
information flow tracking
functional call monitoring
mobile adhoc network
selfishness
alert aggregation
cognitive load
hamming distance
attribute-based encryption
multiparty micropayment
payment certificate
ccmp
radius
tkip
quality of service
coefficient of variance
cpu
cuda
gpu
data density and encryption time
cipher algorithms
data size
data type
image coding
quadratic residues
secret image sharing
protection m echanism
hadoop
map reduce
study material
virtual system
video upload
file upload
xacml
role-based access control
privacy protection
quality
management
mis
opportunistic large array
packet broadcast
cooperative transmission
tcp sequence number attack
syn flooding
brute force attacks
decision making
frequent itemset
recommender system
k-means clustering
rdf.
owl
n-triples
sparql
tcpview
digital forensics
autopsy
the sleuth kit (tsk)
netstat
denial of service (dos)
key share.
greying effect
shares
distributed computing
cloud service
computer network
profile cloning
online social networks
swifi
hmac
pgp
encryption\decryption
service discovery
multi-channel mac
crahn
common control channel challenge
dft
dmt
finger print authentication
mobile cloud computing
local authentication protocols
knowledge base
internet attacks
parsing
risk planning
small business
security plan
black hole attack
agent based intrusion detection system (aids)
lsb steganography
bmp image file
hashing.
bgp protocol
resonant
polarization
input impedance
fractal
vswr
current distribution
gain
wire antennas
mom
credits.
flash crowds
interweaving
dabechies4
iqim
and pso.
computerbased information system
sead
ariadne
vanet architecture
smt
ndm
aran
man-in-the-browser
critical infrastructures.
zero cross
prewitt
iris
sobel
canny
daugman
non-adaptive group testing
ddisjunct matrix.
ditributed denial-of-service attack
8 bits microcontroller
iaas& authentication
paas
twitter
knowledge-based authentication
vn
clustering
multi-som
som
dct based steganography
random grids
hybrid
policy deployment
firewall policy
stemming
porter stemmer
intrusion detection system.
mobile agents
multi-agent systems
mobile code
network-level security and protection
idpf
ip falsifying
network simulation tool
bgp
botnets
cyber defense
internet casinos
quantitative evaluation
anomaly severity evaluation
multi-anomalies evaluation.
semantic evaluation
anomaly severity classification
sql injection
conditional entropy
wardriving
wireless local area network (wlan)
wired equivalent privacy (wep).
cross site scripting
security risks
emerging attack vectors
all-optical network security
optical switch crosstalk
erbium-doped fiber amplifier (edfa) gain adjustmen
false positive rate (fpr)
aodv.
rul
mog-hmm
svm.
prognostic
wi-fi
wireless networks
ns2[1]
security protocol
caesar cipher[2]
encryption/decryption[2]
physical layer
media access control
dll. llc
legitimate traffic.
graphical password
application resource
qos routing
multipath routing
energy-aware routing
utm clinic
resource description framework(rdf)
mix
blue-tooth
temperature control
temperature monitoring
hvac
ir circuit
distributed ac
resource injection
software vulnerabilities
path manipulation
unreleased resource
source code analysis
low-resource
mode of operation
ubiquitous
data analytics
correlation
log loss
hot log
live log
insufficient logging
soc
siem
neural languages
countermeasures
avispa
industrial communication secu
data management
software engineering
mobile networks
semi-trusted third party
fairness
verifiability
secret-sharing
optimistic multi-party computa
trustworthiness
autoencoder
invertible
mobile device
data center
intellect learning
finite elements
information retrieval and ai
neural languages and nlp
gitlab
jenkins
cve-2021-44228
ci/cd
continuous delivery
continuous integration
dimensionality reduction
infrastructures for big data
educational data mining
computer security
secured watermark system (sws)
embedded system
signal processing
cad design and testing
data storage
nosql data stores
public safety
crowd monitoring
cctv
cyberattack impact
cyberattack types
personal privacy
economic stability
cyberattacks
saudi arabia
parameters
sensor node
leach
energy efficiency
cluster head selection algorit
cluster head
big data analytics
big data management
big data and iot
application security
awareness
security behavior
self-efficacy
pre-processing
alert prioritization
alert clustering
merging
trellis coded genetic algorith
session key matrix
pseudo random key generator
finite automata
xperimental results
ultrasonic audio
digital signal processing
voice activation
threshold cryptography
byte characteristic
zss signature
cyberdefense
double spending
cybercrime awareness
cybercrime on social media
healthcare
education
self-sovereign identity
digital transformation
software configuration managem
public cloud severs
data outsourcing
pervasive/ubiquitous computing
regulation and trust mechanism
software-defined networks
rerouting
devices authentication
security metrics
packet analyzer
tcp
network traffic
data integrity
data center network
trust and privacy challenges
dos attack
secure division
secure sum
naive bayesian
privacy preservation
authentication scheme
cryptography primitives
password replacement
sequence number
monitoring agent
side channel monitoring
hooks
system call
hybrid analysis
android banking trojans
security threats & countermeas
web and internet computing
ontology and semantic web
machine learning & application
grid and scalable computing
information technology trends
bitwise-based hash
split sketch
principle component analysis
victim identification
ddos detection
claims processing
process improvement
insurance
security logs
hypergraphs
cloud data security
fine grained access
group key management
electronic payment
hash chain
ai algorithms
knowledge representation
multimedia & cognitive informa
symbolic machine learning
security posture
open-source erp software
factors
attributes
measurement framework
lexical semantics
parsing/grammatical formalisms
chunking/shallow parsing
monetary policy
socioeconomic impact
peer-to-peer transactions
fintech
central bank digital currency
digital rupee
smart contracts
smart banking
survey
domain analysis
scoring benchmark
http strict transport security
shape representation
text processing
document recognition
signal noise control
victimization
information
emotion
signal
ciphers identification
encryption modes
feature engineering
block ciphers
encryption time
cryptographic algorithm
wormholes
spread spectrum
selective jamming
detection models
ensemble machine learning
ddos attacks
bayesian network
r360
web intelligence
evolutionary computing
ai in cyber security
nids
software defined networking
network intrusion detection sy
protection mechanism
machine translation
question answering
interactive education
face recognition
hdfs (hadoop distributed file
file systems
cloud storage
mobile computing
context-aware computing
smartwatches
assessment
fuzzy set theory
accounting
random forest algorithm
pe header
pe file
higher education
mobile education
face and gesture
constraint processing
filter design and structures
signal reconstruction
network layer security
radar signal processing
medical image analysis
medical image processing
ad hoc and sensor network
multi input multi output (mimo
smurf attacks
electronics and signal process
services
salting techniques
hash analysis
security breaches
threats and attacks
lan
passphrase
mixture words
nouns
recall
recognition
user behavior
reinforcement learning
optimal path
big data tools and systems
virtualization on platforms in the cloud
data storage and management in cloud computing
security techniques for the cloud
virtual compute clusters
system integration
cloud based
reference dna
multilayer security
indexing cipher
dna cryptography
nb.
knn
cnn
offline signature recognition
smart contracts.
decentralized application
added value applications
enablers
arxiv
reddit
stackexchange
text classification
topic modeling
dst.
internet of things (iot) security
blockchain technology and cyber security
we introduce new detection engine for hybrid cover
a variant of covert channelworks similarly as netw
the privacy. most of such attacksare devised using
computer network is unpredictable due to informati
iot devices.
technical and security issues
comparison.
review
mare
sama
software architecture
microservices
trojan.
human factors
end-user errors
information systems
cisco packet tracer
cyber-attack
security issue
smart devices
incentive schemes.
rewards
federated learning
incentive schemes
high port application
sinet
port filtering
data flow pipeline
traffic patterns
covid-19 related ioc
prediction support parameter.
k-means clustering algorithm
detection model
malicious javascript
firmware
resource management
ngns
finding roots modulo.
signing group
group digital signature
implementation
technology
sensors
power distribution
social computing
consensus mechanism
signing group.
difficult computational problems
groupdigital signature
land
http flood
tcp syn flood
markov chain
attack detection
structural similarity index measurement (ssim).
universal quality image (uqi)
image fidelity (if)
peak signal to noise ratio (psnr)
mean square error (mse)
frequency domain
z-transform
identity federation.
limitations
identity management
federated identity management
distributed system.
information-centric
internet-of-things.
intelligent transportation system
sensor network.
etc
db index
cyber human behaviour
stylometric analysis
phishing email attack
cyber-security
security policies
defense mechanisms
employee awareness
wimd cybersecurity
wimd
wireless implanted medical devices
cardiac implanted device
health belief model
windows api calls.
term frequency-inverse document frequency vectors
n-gram analysis
malware classification
convolutional neural network
risk and threats
bayesian belief network
malware propagation modelling
shifting
shifting.
sprase svd (ssvd)
singular value decomposition (svd)
multimodal authentication
exponential kronecker product (ekp)
kronecker product
context-sensitive exponent associative memory mode
fingerprint
face
biometric fusion
information theor
engineering cybernetics
decision support system
multimedia & telecommunications
database & information retrieval
image signal processing
networks & fuzzy system
dns poising.
legal.
regulation
protection
personal
law general
data
trust in service-oriented architecture- open archi
and nist statistical tests
matlab simulation
chaotic algorithms
images security
hash function [2]
open application
xml-dsig
ws-security
soap
httpi
https
http
signature-based
misuse detection
architecture
agent
trojan protectionstem security
database and syvirus
strong t -consistency
group communication
server security
small business security
e-commerce systems security
mobile phones
conditional random fields
layered approach
secure two-party computation
zero-knowledge proof
distributed eigamal encryption
similarity coefficients
vanet etc.
v2v
stdma
csma
packet marking
autonomous system
sensing layer
resonant frequency
micro cantilever
dynamic source routing.
network coding
hybrid idps
perimeter-based idps
network-based idps
host-based idps
idps sensors/agents
tcp re-assembly
cyber-crime & bdi.
vendor lock-in
csp
multi-cloud
feature selection.
keystroke dynamics.
biometric
web-based
fuzzy-c means clustering
background subtraction
foreground detection
background removal
x64 systems
neighbour mean interpolation
image interpolation
programming languages
operation system
simulator
emulator
web filtering
collaborative web systems
vector valued functions
privacy preserving
implicit function theorem
hitech act
hipaa
incident response team
cyber incidents
incident response
ecurity threats & countermeasures (ddos
network applications
emerging technologies for next generation network
discrete algorithms and discrete modeling
network operation and management
mobile and wireless networks
network security and privacy
communication network protocols
communication network architectures and design
features.
mlp
filtering.
enron
keyword search
report generation
digital forensic
email forensic
cassandra big data.
attacks prediction
threat activity.
cyberattack ontology
cyberattack prediction
network and wireless network securitymobile
iot security and privacy
blockchain new design
blockchain consensus algorithms
blockchain foundations
blockchain-based security for the iot
iot experimental results and deployment scenarios
security & network management e-mail security
multimedia etc big data tools and systems big data
privacy and trust big data applications
models and algorithmsbig data infrastructure and p
big data big data techniques
peer-to-peer network security database and system
data and grid room
system information leak
peer to peer and overlay networks
qos and resource management
dos attacks
ndp
fragment header
flow-label
ipv6 security vulnerability
remote authentication
man in the middle attack
user authentication framework
analysis
dynamic billing system
data aggregation
distributed hash tables & linear diophantine
decentralized network
multimedia content management
trust management for virtual organizations
policy of trust in e-leaning systems
trust and reputation management
mobile and sensor networks
trust/risk based security frameworks
trust management system for wireless
certificateless public key encryption
certificateless signature scheme
digital certificate
certificateless public key cryptography
set protocol
fuzzy logic & perspective of intrusions
association mining
temporal sequence patterns
ubiquitous computing security web 2.0 security
olsr
willingness function
smrr
blockchainbased security for the iot
blockchainauthentication and authorization
analyze formal
timestamps
nonce
pkm
informtaion technology
safety
response time
self-configuration
self-cure
self-protection
self-optimization
autonomic network
clustering technique
awgn and raleigh fading channels.
bit error rate(ber)
ecb and cfb cryptographic algorithm
pre-zf
pre-mmse
mimo-ofdm
peerto-peer network.
intrusion attacks
taxonomy of attack
intruder
maximum power transfer
electronic circuit
control system
automation
touch sensor
computing
communication technologies
networks
mobile & wireless networks
lowest id clustering algorithm
sybil node
mobile ad hoc network
spammers
web spam
redirection
manipulating search engine
search engine
hiding techniques
cloaking detection
database and system security intrusion detection a
lucas
digital signatures
fair-exchange
contract signing
andit security
protected health information
personal identification information
information assurance
network security & its applications
pki interoperability
cross-certification
certificate practice statement(cps)
certificate policy(cp)
certification authority(ca)
public key infrastructure(pki)
ngn
ec-aka
aka
eps
lte security
• intelligent agents and systems
• trust management
• privacy and authentication
• cryptography and coding
security and privacy policies
security in distributed systems
artificial immune systems
computational intelligence in security
multiple flows
tcp protocols
high-speed
heterogeneous networks.
next generation networks
casper/fdr
authentication and key agreement protocols
heart rate device
gps
emergency
arduino microcontroller
accelerometer
accidents
hierarchical model
low-power
improved watchdog
watchdog
security area control
regulation and trust mechanisms
biological and evolutionary computation
reinforcement and unsupervised learning
) • ubiquitous computing security
engineering
search engine optimization
malicious websites
intrusion detection and prevention internet securi
counterfeit.
and machine learning
knime
aes.
session based key
sbskct
embedded devices.
modular exponentiation
n-1 attack
simple power analysis
dominant feature set.
outlier analysis
behavioral profile
terrorism
social network analysis (sna)
backtracking bit
watch nodes
traversed administrator field
associative node
ubiquitous computing security web 2.0 security cry
corporate infrastructure
disaster recovery
data loss
security breach
authentication and key agreement.
umts security
telecommunications system
gsm system
false alarm rate
naive bayes classification
multi stage filter
enhanced adaboost
compression.
transformation
threshold secret sharing
public verifiable signcryption
standard model
provable security
identity based cryptography
signcryption
fairness.
ttp (trusted third party)
security and privacy in pervasive/ubiquitous compu
authentication and non-repudiation
intrusion detection and vulnerability assessment
untraceability
cryptography and coding
survivability
intrusion resilience
fault-tolerant networks
diversity
androidapis
privilege escalation
system call dependence graph
behavior representation
data compression.
huffman coding
thematic analysis
medical internet of things
classification problem.
svms
functional analysis
kernel functions
legendre polynomials
man-in-the-middle.
obfuscation
server less
server based
escrow less
tree based
hierarchical
multicast
group
peer to peer
key management protocols
wireless attacks
wireless intrusion detection system
attack test cases
attack taxonomy
cueing.
interfaces
one-time passwords
chosen ciphertext security.
conditional proxy re-encryption
proxy re-cryptography
random oracle model
noise & entropy
anti obfuscation technique
low level feature
merkle-hellman.
simultaneous diophantine
subset sum
coppersmith
lattice reduction
lattices
snmp
mib
multi- agent
distributed query processing
location cloaking
location based services
windows registry
forensics
kdd cup 1999 dataset.
which motivates many researchers to discover metho
intrusion detection is one of the standard stages
image cipher.
scrambling
multimedia networking
mobile & broadband wireless internet
network based applications
network operations & management
measurement & performance analysis
internet and web applications
high speed networks
adhoc and sensor networks
heterogeneous wireless networks
security standards
security assessment
business information security
false positives
true positives
it policy
common vulnerability exposure (cve)
spam email
sender mail server
receiver mail server
anti-spams
wsn security
cross layer architecture
packet latency.
benevolent node
base station (bs)
route trust (rt)
indirect trust
direct trust
geometric mean (gm)
device discovery
physical proximity
fidelity
coordinate ratios
equatorial cloning
isotropic cloning
quantum copying machines
eavesdropping
todv
cross layer detection
body area network security
body area networks
misbehaving node
tbraodv
ad-hoc
isakmp
dsss
• network
enterprise
machinelearning
information gain
e-learning security
e-remedies
e-risks
e-learning
secret reference matrix (srm)
peak-signal-to-noise-ratio (psnr)
discrete cosine transformed (dct)
botnet and honeypot.
iptrcing
flooding attack
internet threat monitors (itm)
• peer to peer and overlay networks
• optical networks and systems
• next generation web architectures
• measurement & performance analysis
• internet and web applications
• high speed networks
• adhoc and sensor networks
• next generation internet
• heterogeneous wireless networks
fair exchange protocols
fair document exchange
dempster–shafer belief theory
hashcode
hacker
websites
• quantum computation
• program semantics and verification
• probabilistic computation
• parallel and distributed computing
• natural language processing
• cryptography
• computational science and applications
• machine learning
• information theory
• computational physics & biology
geometry
• computational complexity
• automata theory
• algorithms and data structures
e-mail architecture
header analysis
e-mail headers
e-mail forensics
feature coding
pca
ca
certification authority
&security
chebyshev polynomials
blind signature
friendly-cooperative framework
system hardening
anti malicious objects
star topology
black scholes equations
malicious object
native language password
textual password
shape based authentication
multicode encryption
transversal designs
reed-muller codes
communication
connectivity
and quality control
network system
control charts
anomalies
ieee 802.11g
multiple encryption.
secure electronic transaction
f8
a5/3
stream cipher
unauthorized access
network design
real estate
infrastructure security
wireless sensor network.
wireless mesh network
wireless ad-hoc networks
web application penetration testing
security testing
) * ubiquitous computing security *
trojon protection * security threats & cou
e-mail fraud * virus
ad hoc and sensor network security * peer-
information theoretic security
rational secret sharing
fault tolerance
topology.
authenticated symmetric key establishment
biometric key
wireless body sensor network (wbsn)
ofdm
spectrum sensing
inter symbol interference (isi)
cognitive radio
mpi.
encrypted data
international data encryption algorithm (idea)
hiding information
unicode
multi-layers
arabic text
python
scapy
kali linux
de-authentication attack
(ddos
logistic regression
k-nn
naive bayes
response & tracking.
base station
sensor nodes
attack path reconstruction
ddos-attacks
icap
client honeypot
browser vulnerability
adhoc on demand distance vector protocol(aodv)
translation.
elecronic voting
user lifecycle
workflows
provisioning
security synthesis
symmetric cryptosystems
non linearity
s box
memorability of passwords
snakes & ladders game
graphical passwords
attackers .
mac-layer
threshold level
real time application
rtos
mobile ad hoc networking
non-invertible transformation
cancellable biometrics
fingerprint biometrics
biohashing
best practice
it governance
mapping
pdca
information security management systems (isms)
iso 27001
cobit
nsgaii.
objective functions
attack tree
• security
• internet security
and public-key.
system access control
deviation detection
distributed resource allocation
asynchronous distributed pricing
packet detection and packet header matching (phm)
snort
network intrusion detection system (nids)
ad hoc and sensor
secure network
secure servers
cryptoviral extortion.
conficker
gpcode.ak
password (information) snatching
evasive/ deniable/ untraceable attacks
electronic espionage threats
electronic warfare threats
cryptotrojan
cryptovirus
cryptovirology
firewall systems design
computer networks
identity based firewalls
proposed method.
noise categories
wavelet thresholding
image denoising
classification accuracy
support vector machine (svm)
hybrid intrusion detection system
secure routing protocol
trust-based routing
distributed rate control.
bandwidth reservation
medium accesscontrol
lan attack
host based ids
arp spoofing
active detection
oauth
oix
openid
digital identity
shoulder surfing
session passwords
priori probability
life time
network density
compression-crypto
one time pad
floating point number
data integration
mediator
credential
physical cryptography
physical unclonable functions
dispute settlement
smart vehicles
enterprises security risk managemen
manage security programs
risk principles management
enterprise risk management
risk mechanism
maturation of a profession
esrm
enterprises security risk management
ip spoofing
modeling
insider threat
system dynamics
delay.
cdma throughput
multimedia
diffusion process and stream cipher.
and bernoulli map
quadratic map
tent map
statistical hypothesis testing
kolmogorov-smirnov test
statistical test of significance
queuing model
poisson arrival
buffer
traffic flow
diffusion
stage staffing
2-d arnold cat map
encryption and decryption algorithm for watermarki
digital multimedia
stage staffing watermarking
copyright protection
static and mobile wsn.
node replication attack
sybil
clone
crossover
sha-512
sessionbased
minutiae
ann
probabilistic encryption
deniable encryption
receipt-free
rigging
coercing
authentication.
covert channel.
diffie-hellman algorithm
arithmetic encoding
biometric information
honeypot and nics.
iptables
network intrusion prevention
np-complete
quotient ring
diophantine equation
one-way function
nonlinear function.
invisible digital watermarking
pixel
smart cards
remote user authentication
attack games.
eavesdroppers
wireless body area networks
niger-delta
clustering routing
judy array
blom
location-dependent social networks
community consensus
pragmatic web
agent-based systems
spatial reasoning
computing with words
uncertainty
language-action perspective
and delay
vmware
performance measurement
network virtualization
switching and addressing techniques self-organizin
& privacy next generation internet & web architect
phonology and morphology addressing & location man
data shredding
confidence level
lsb replacement steganography
ipfix
flow
scan detection
mac addresses hash value.
lu-cac
caca
bandwidth link utilization
reliability.
emergency response communication
wave files.
decrypting
encrypting
signature based detection
behaviour based detection
flow based detection
c&c
irc
botnet
mobile ad-hoc network
share
n) visual cryptography
(2
smart-card
multi-server
low-cost cryptography
node misbehaviour.
malicious packet dropping
controlled flooding
reputation
mobile ad hoc network (manet)
bloom filter
wake up receiver
vlsi
low power
multigeneration keys.
random kd (key distribution)
sec-leach (secure leach)
sensor networks
leach (low energy adaptive clustering hierarchy)
galois counter mode.
link layer security
circular queue.
md5
sha-256
ip
ao
udt
high speed bandwidth
next generation network protocol
desirability functions
best practice frameworks
baseline manuals
risk analysis and management
information security controls
signatures
web services
interpolation.
qim
m-ary modulation
error concealment
data value
network security & identity privacy
attack graph.
efficient probabilistic packet marking algorithm
probabilistic packet marking algorithm
online auction network
byzantine behavior
multicast communication
ad-hoc networks
hierarchical design
ids
tls protocol
timers
typing rhythms
keystroke
passwords
implementation cost
service differentiation.
mb-ofdm
interference limitation
pareto-efficiency
password strength
text passwords
vulnerability analysis
olsrv2
selfish nodes
content
clusters
overlay
replica
impersonation attack.
undetectable online password guessing attack
ecc-3peke protocol
finite fields & montgomery algorithm.
cellular automata
log analysis.
audit system
event classification
http intrusion detection.
fuzzy cognitive mapping
fuzzy intrusion detection
application layer misuse detector
semantic intrusion detection
naive bayesian classifier
false positive
big-dragon cryptosystem.
little dragon cryptosystem
multivariate cryptography
and matlab.
customizable security.
policy-driven security
content-addressable storage security
matlab
network security management
complexity.
ldpc codes
chained codes
image
video
cover media
anti-spam
email filtering
workload characterization
knowledge discovery in databases and privacy prese
integrated verification.
software implementation
usage control
malicious
mechanism
message digest
routing protocol
soa
selinux
registration time.
packet loss
handoff delay
triangle routing
route optimization
tunneling
longitudes
latitudes
location coordinates
transposition cipher
rangoli
masquerade attack
remote user
smartcard
batch verification
service authentication
identity based cryptography (ibc)
ip multimedia subsystem (ims)
network security protocols
quantum networks
file handler
regexpr
html
sub
perl
quantum superposition state
no key-exchange
inter packet delay
ieee 802.11b
ieee 802.15.4
heterogeneous wireless network
coexistence
dfa
vulnerability
signature processing
signature formulation
intrusion detection / prevention systems
key establishment
lu matrix composition
feedback
convolutional coding
soft input
iterations
guard node
cluster
key sensitivity
avalanche
legal aspects
packet sniffers
ip traceback
mix zone
pseudonyms
click spam
web advertising
google ads
pay-per-click advertising
authorization and password.
apache spark
security analytics
feature selection
feature extraction
hdl.
bfmawddl
bfcdnba
bfma
dpa
wddl
bf
securing windows
microsoft domain environment
spectrum analysis
automated ids
anomaly-based intrusion detection system
protocol safety.
elliptic curve
software
networking
pki
ivote
i-voting
electronic voting system
and exemption.
medical system
metric
availability
dependency
information system.
application-layer ddos attack
browsing model
one-class support vector machine
notification
beacon
seed
smartphone
disaster
lea
markov-model
rfid
brute-force attack
j48.
email classification
authentication & q-learning
response
historical
mobile ad hoc networks security
network dependency analysis
data correlation
security event management
cloud software development
threat modeling
method engineering
encryption and decryption.
rotation of the bits
multiple encryption
braiding/entanglement
owasp
waterfall methodology
agile programming
shared bitmap
rate limitation
connection failure behavior
self-propagating malware
shared register array
malware detection and mobile device.
finite elements.
intellect learning.
wireless.
secured watermark system (sws) and computer securi
threshold cryptography.
steganography; image segmentation; byte characteri
cyber-defense.
software configuration management
usable security.
data outsourcing; privacy; public cloud severs; ac
zss signature.
and crypt ography.
password replace ment
cryptographic algorithm.
hdfs (hadoop distributed file system)
interactive education.
risk assessment
attack graph
and services.
computer
multi input multi output (mimo)
adhoc network
smurf attacks.
fair exchange
dst
hybrid covert channel
z-transform; frequency domain; watermarking; mean
sensor network
etc.
db index.
performance evaluation.
network security; malware propagation modelling; b
biometrics; biometric fusion; face; fingerprint; c
information theory
dns poising
hash function [2].
we propose a novel distributed intrusion detection
new kinds of network attacks are emerging endlessl
it is necessary that this security concern must be
in order to the rapid growth of the network applic
user authentication; group communication; secret s
fuzzy c-means clustering
fuzzy neural network
data and grid room
system information leak
Mehr anzeigen
Präsentationen
(238)Dokumente
(841)Gefällt mir
(2)A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYBASED NIDS
IJNSA Journal
•
Vor 4 Jahren
PhD and Post PhD Network Security Visualization Research
Kulsoom Abdullah
•
Vor 7 Jahren
Personal Information
Webseite
airccse.org/journal/ijnsa.html
Info
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Tags
phishing
worms
spam
peer-to-peer network security
mobile
database and system security
ad hoc and sensor network security
network and wireless network security
security & network management
virus
cryptographic protocols
e-mail fraud
intrusion detection and prevention
ubiquitous computing security
e-mail security
web 2.0 security
security
trojan protection
internet security & applications
network security
session hijacking
mim
performance evaluations of protocols & security ap
ddos
replay attack etc
intrusion detection
artificial intelligence
authentication
machine learning
privacy
blockchain
cryptography
services security
system security
web based applications
crowd sourcing
hardware-based attacks
network management
social networking
replay attack
wireless network security
blockchain technology
machine learning for security
trojan protectio
internet security & applicatio
encryption
cloud computing
intrusion detection and preven
trojan protection security threats & countermeasur
e-mail fraud virus
ad hoc and sensor network security peer-to-peer ne
data mining
sensor network security
network and wireless network security mobile
network and wireless network s
home networks
database
) ubiquitous computing security web 2.0 security c
trust
manet
body-area networks
ad hoc and sensor netw
security of virtual machines
information security
wireless sensor networks
sdn
security and privacy for iot
deep learning
cyber security
internet of things
big data
steganography
autonomous vehicles
industrial control systems
internet of things (iot) secur
cryptocurrencies
security application
connectivity and networking
bioinformatics
neural networks
security threats & countermeasures
routing
)
security threats & countermeasures (ddos
vanets
intrusion detection system
security and optimization
iot applications and services
• ubiquitous computing security
• cryptographic protocols
• virus
• e-mail security
• intrusion detection and prevention
• peer-to-peer network security
• mobile
security threats
peer-to-peer
detection
malware
cloud
electronic voting security
natural language processing
computer vision
• performance evaluations of protocols & security
• web 2.0 security
• security & network management
• internet security & applications
• network and wireless network security
image segmentation
key management
attack
aodv
block cipher
• database and system security
fuzzy logic
decryption
android
ad hoc
aes
attacks
game theory
information retrieval
ontology
cognitive security
robotics
performance evaluations
pattern recognition
performance evaluations of pro
cloud and grid computing for big data
internet security
network
image encryption
e-commerce
vanet
dos
cyber physical system (cps)
signal processing for iot
electronics
deployment scenarios
entrepreneurship
iot-enabled innovation
phishin
electronics and signal processing for iot
iot
qos
substitution
classification
wireless sensor network (wsn)
security.
cloud security
wireless network
data security
mobile ad hoc networks
denial of service
privacy challenges
data center network control
hybrid intelligent systems
fuzzy systems
knowledge processing
visualization
array signal processing
ubiquitous computing
experimental results
resource provisioning
parallel processing
watermarking
soft computing
cybersecurity
machine learning and ai for big data
wireless sensor network
trojon protection
usability
malicious node
mobile ad-hoc networks
data protection
hacking
access control
rsa
udp flood
icmp flood
malware analysis
anonymity
ssl
permutation
steganalysis
symmetric key
hash function
secret sharing
web security
intrusion detection system (ids)
wimax
information hiding
wsn
text mining
3d and stereo imaging
digital image processing
big data mining
internet of things (iot)
iot-enabled innovation and entrepreneurship
blockchain scalability
block chain issues and trends
smart grid
wireless networks and mobile computing
grid computing
secure cloud computing
ethereum
computer & network security
malware detection
intrusion prevention
fog computing
chaos
verification
biometrics
secure routing
elliptic curve cryptography
quantum cryptography
ad hoc and sensor network security • peer-to-peer
• network and wireless network security • mobile
cryptosystem
network protocols
key distribution
virtualization
cyberattack
machine learning algorithms
dynamic analysis
mobile security
scanning
threats
manets
wireless ad hoc networks
vpn
genetic algorithm
http flood attack
syn flood
dns reflection or amplification attack
business intelligence
framework
service oriented architecture
mobile banking
mobile payment
it security
mobile agent
reputation-based
confidentiality
password
dsr
ns2
visual cryptography
wlan
group testing
ddos attack
text steganography
protocol
smart city
optimization
trust and privacy ch
edge & cognitive s
fog
data science
biometric security
nlp
internet signal processing
color and texture
spectral analysis
data mining techniques
experimental results and deployment scenarios
blockchain authentication and authorization
blockchain based security for the iot
5g and networks for big data
multimedia etc
big data applications
consensus
man-in-the-middle attack
critical infrastructures
decentralized trust management
pervasive computation trust
software systems and technologies
cyber trust and security
theory of parallel / distributed computing
networking and architectures
computer networks & communications
optical computing
algorithms and applications
models and algorithms
big data techniques
internal controls
security engineering
software security
smart card
password handling
ldap
kerberos v5
private key
public key
network protocols & wireless networks
denial of service attack
protocols
performance evaluation
intrusion detection systems
intrusion
security management
image processing
anomaly
network performance
cipher text
grid
wireless
denial-of-service
ad hoc network
bb84 protocol
secret key
trojan protection • security threats & countermeas
e-mail fraud • virus
quantum key distribution
wormhole
honeypots
e-voting
user identity
m/g/r processor sharing queue
chaotic system
generalized arnold map
fuzzy logic.
firewall
random forest
cooperation
discrete fourier transform
kyoto2006+ dataset
device deployment
initial trust
device authentication
methodology
classifier
cybercrime
ecc
security properties
network forensics
kleptography
blowfish
trust management
rsa algorithm
user authentication
ipsec
abnormal.
packet flow
information technology
wireshark
integrity.
trusted third party
subliminal channel
trapdoors
covert channel
mobile devices
mobile network
network security.
sha-1
mapreduce
collaborative environments
denial-of-service attack
rotor cipher
brute force attack
security techniques
economics
social engineering
intruders
bluetooth
support vector machine
databases
forecasting
mechatronics
cyber physical system
alert correlation
data & system integrity
privacy and authentication
semantic processing & nlp
question answering (qa)
signal or image processing
télécommunications
data visualization
information extraction
linguistic resources
semantic processing
morphology
phonology
natural language computing
predictive learning
signal identification
peer-to-peer network
embedded systems
video signal processing
cloud storage and file systems
social media
blockchain in digital forensic
big data analytics and social media
distributed ledger technology
collective digital signature
smart cities
mnist benchmark.
image classification
key spoofing
mitm attack
cryptocurrency exchange
covid-19 pandemic
assessment survey
cybersecurity culture
unsw-nb15
sgd
mse
zero trust architecture
web server handlers
network defenses
els
end-to-end security model
appliance
risk management
clusters and grid computing : security and role of
p2p
authentication and identity management
authorization
agent based trust management
policy management
information security.
reputation system
blockchain privacy
iot connectivity and networking
tools
social networks & web 2.0 trust management
blockchain attacks on existing systems
big data search and mining
computer science
pairwise comparisons.
analytic hierarchy process
access security controls
performance
congestion control
security for grid computing
a digital certificate
nsl-kdd
administrator
fair exchange protcocol
insider threats and countermeasures
security information systems architecture and desi
security and privacy in mobile systems
access control and intrusion detection
diffusion.
confusion
shuffle
henon map
encryptions
healthcare cybersecurity
iot security
sniffing
surveillance
usable security
data description
temporal sequence
anomaly-based network intrusion detection system
attacks & performance
okhttpclient
httprequests
unavailability
false alarms
kdd cup 99
content management
wordpress
attribute-base-access-control
role-base-access-control
network architectures
mobile networks & wireless lan
integrity
interworking
lte
umts
imsi
identity
kvefs
encrypt file system
key-value store
file system in user space (fuse)
protocols.
least significant bit
matrix partition
spatial domain
image steganography
routing protocols
• theoretical computer science and algebra
sybil attack
digital signature
plain text
svm
traceback
manet(mobile adhoc network).
shortest path
biometric authentication
the mapping study
internet of thing
color space
natural language prepossessing
multi-layer encoding
python programming language
text stenography
• security threats & countermeasures
• database
firewalls
false alarm
distributed denial-of-service (ddos)
vehicular forensics
risk mitigation
unfettered rules
benchmarks
anomaly-based detection
distributed denial of service (ddos)
logistic map
training
public-key cryptography
arithmetic coding
cryptanalysis
location privacy
virtual machines
reliability
wireless mesh networks
api calls
behavioural pattern
frequent sequence mining
secure communication
mutual authentication
random number generator
data hiding
security policy
session key establishment
model checking
error detection
fault tolerant
rc4
crypto stream ciphers
network intrusion detection
detection rate
decision tree
public key cryptography
zigzag scanning
psnr
ascii code
least significant bit (lsb)
quantitative trait loci
carry select adder
dual-port read-only memory
xor
symmetric cryptography
pox
topology discovery
software defined network
) • ubiquitous computing security • web 2.0 securi
mobile ip
standard
simulation
device association
tls
vanet security and privacy approaches
vanet attacks
vanet adversaries and attackers
security and privacy requirements in vanet
exploit.
bro ids
inventory
device fingerprinting
endpoint security
tdes
vulnerability assessment
penetration testing
voip
feature
mobile authentication
web authentication
password.
entropy
distributed denial of service
benchmark
text-based captcha
nwtd
trust-based routing protocols
trust determination
mansim.
radial basis function neural networks
email spam
particles swarm optimization.
distributed denial-of-service attack
bloom filter.
information centric network
3-d mesh
hamiltonian model
deadlock-free
broadcasting communication
wormhole routing
googleglass
smartwatch
wearable devices
wearable technology
management & interoperability
inspection game.
window function
tcp/ip communications
real-time networking
network steganography
industrial communication security
avispa.
practical testing system
anomaly detection
k-nearest neighbour
lightweight
comprehensive evaluation
aco
adaptive neural network
static analysis
security and privacy
email fraud
mobile communication
gsm security
necessary information
pre-hacking
security solutions
challenges
covert schemes
artificial neural network
attribute reduction
des
markov random walk model
text clustering
extractive text summarization
probability model
rhetorical relations
security architecture
4g
3gpp
certificate less cryptography
key escrow
empirical evaluation
visualization and animation
scenario-based approach
shared secret session key
strong authentication
secure communication channel
virtual password
version control
service-oriented approach
application whitelisting
updater identification
online social network
multi-faceted model
bilinear pairing
dynamic matching
secret handshakes
pairing based cryptography
coefficient correlation
shiftrows
dna
nist
priority scheduling
watch dog
packet dropping attack
information flow tracking
functional call monitoring
mobile adhoc network
selfishness
alert aggregation
cognitive load
hamming distance
attribute-based encryption
multiparty micropayment
payment certificate
ccmp
radius
tkip
quality of service
coefficient of variance
cpu
cuda
gpu
data density and encryption time
cipher algorithms
data size
data type
image coding
quadratic residues
secret image sharing
protection m echanism
hadoop
map reduce
study material
virtual system
video upload
file upload
xacml
role-based access control
privacy protection
quality
management
mis
opportunistic large array
packet broadcast
cooperative transmission
tcp sequence number attack
syn flooding
brute force attacks
decision making
frequent itemset
recommender system
k-means clustering
rdf.
owl
n-triples
sparql
tcpview
digital forensics
autopsy
the sleuth kit (tsk)
netstat
denial of service (dos)
key share.
greying effect
shares
distributed computing
cloud service
computer network
profile cloning
online social networks
swifi
hmac
pgp
encryption\decryption
service discovery
multi-channel mac
crahn
common control channel challenge
dft
dmt
finger print authentication
mobile cloud computing
local authentication protocols
knowledge base
internet attacks
parsing
risk planning
small business
security plan
black hole attack
agent based intrusion detection system (aids)
lsb steganography
bmp image file
hashing.
bgp protocol
resonant
polarization
input impedance
fractal
vswr
current distribution
gain
wire antennas
mom
credits.
flash crowds
interweaving
dabechies4
iqim
and pso.
computerbased information system
sead
ariadne
vanet architecture
smt
ndm
aran
man-in-the-browser
critical infrastructures.
zero cross
prewitt
iris
sobel
canny
daugman
non-adaptive group testing
ddisjunct matrix.
ditributed denial-of-service attack
8 bits microcontroller
iaas& authentication
paas
twitter
knowledge-based authentication
vn
clustering
multi-som
som
dct based steganography
random grids
hybrid
policy deployment
firewall policy
stemming
porter stemmer
intrusion detection system.
mobile agents
multi-agent systems
mobile code
network-level security and protection
idpf
ip falsifying
network simulation tool
bgp
botnets
cyber defense
internet casinos
quantitative evaluation
anomaly severity evaluation
multi-anomalies evaluation.
semantic evaluation
anomaly severity classification
sql injection
conditional entropy
wardriving
wireless local area network (wlan)
wired equivalent privacy (wep).
cross site scripting
security risks
emerging attack vectors
all-optical network security
optical switch crosstalk
erbium-doped fiber amplifier (edfa) gain adjustmen
false positive rate (fpr)
aodv.
rul
mog-hmm
svm.
prognostic
wi-fi
wireless networks
ns2[1]
security protocol
caesar cipher[2]
encryption/decryption[2]
physical layer
media access control
dll. llc
legitimate traffic.
graphical password
application resource
qos routing
multipath routing
energy-aware routing
utm clinic
resource description framework(rdf)
mix
blue-tooth
temperature control
temperature monitoring
hvac
ir circuit
distributed ac
resource injection
software vulnerabilities
path manipulation
unreleased resource
source code analysis
low-resource
mode of operation
ubiquitous
data analytics
correlation
log loss
hot log
live log
insufficient logging
soc
siem
neural languages
countermeasures
avispa
industrial communication secu
data management
software engineering
mobile networks
semi-trusted third party
fairness
verifiability
secret-sharing
optimistic multi-party computa
trustworthiness
autoencoder
invertible
mobile device
data center
intellect learning
finite elements
information retrieval and ai
neural languages and nlp
gitlab
jenkins
cve-2021-44228
ci/cd
continuous delivery
continuous integration
dimensionality reduction
infrastructures for big data
educational data mining
computer security
secured watermark system (sws)
embedded system
signal processing
cad design and testing
data storage
nosql data stores
public safety
crowd monitoring
cctv
cyberattack impact
cyberattack types
personal privacy
economic stability
cyberattacks
saudi arabia
parameters
sensor node
leach
energy efficiency
cluster head selection algorit
cluster head
big data analytics
big data management
big data and iot
application security
awareness
security behavior
self-efficacy
pre-processing
alert prioritization
alert clustering
merging
trellis coded genetic algorith
session key matrix
pseudo random key generator
finite automata
xperimental results
ultrasonic audio
digital signal processing
voice activation
threshold cryptography
byte characteristic
zss signature
cyberdefense
double spending
cybercrime awareness
cybercrime on social media
healthcare
education
self-sovereign identity
digital transformation
software configuration managem
public cloud severs
data outsourcing
pervasive/ubiquitous computing
regulation and trust mechanism
software-defined networks
rerouting
devices authentication
security metrics
packet analyzer
tcp
network traffic
data integrity
data center network
trust and privacy challenges
dos attack
secure division
secure sum
naive bayesian
privacy preservation
authentication scheme
cryptography primitives
password replacement
sequence number
monitoring agent
side channel monitoring
hooks
system call
hybrid analysis
android banking trojans
security threats & countermeas
web and internet computing
ontology and semantic web
machine learning & application
grid and scalable computing
information technology trends
bitwise-based hash
split sketch
principle component analysis
victim identification
ddos detection
claims processing
process improvement
insurance
security logs
hypergraphs
cloud data security
fine grained access
group key management
electronic payment
hash chain
ai algorithms
knowledge representation
multimedia & cognitive informa
symbolic machine learning
security posture
open-source erp software
factors
attributes
measurement framework
lexical semantics
parsing/grammatical formalisms
chunking/shallow parsing
monetary policy
socioeconomic impact
peer-to-peer transactions
fintech
central bank digital currency
digital rupee
smart contracts
smart banking
survey
domain analysis
scoring benchmark
http strict transport security
shape representation
text processing
document recognition
signal noise control
victimization
information
emotion
signal
ciphers identification
encryption modes
feature engineering
block ciphers
encryption time
cryptographic algorithm
wormholes
spread spectrum
selective jamming
detection models
ensemble machine learning
ddos attacks
bayesian network
r360
web intelligence
evolutionary computing
ai in cyber security
nids
software defined networking
network intrusion detection sy
protection mechanism
machine translation
question answering
interactive education
face recognition
hdfs (hadoop distributed file
file systems
cloud storage
mobile computing
context-aware computing
smartwatches
assessment
fuzzy set theory
accounting
random forest algorithm
pe header
pe file
higher education
mobile education
face and gesture
constraint processing
filter design and structures
signal reconstruction
network layer security
radar signal processing
medical image analysis
medical image processing
ad hoc and sensor network
multi input multi output (mimo
smurf attacks
electronics and signal process
services
salting techniques
hash analysis
security breaches
threats and attacks
lan
passphrase
mixture words
nouns
recall
recognition
user behavior
reinforcement learning
optimal path
big data tools and systems
virtualization on platforms in the cloud
data storage and management in cloud computing
security techniques for the cloud
virtual compute clusters
system integration
cloud based
reference dna
multilayer security
indexing cipher
dna cryptography
nb.
knn
cnn
offline signature recognition
smart contracts.
decentralized application
added value applications
enablers
arxiv
reddit
stackexchange
text classification
topic modeling
dst.
internet of things (iot) security
blockchain technology and cyber security
we introduce new detection engine for hybrid cover
a variant of covert channelworks similarly as netw
the privacy. most of such attacksare devised using
computer network is unpredictable due to informati
iot devices.
technical and security issues
comparison.
review
mare
sama
software architecture
microservices
trojan.
human factors
end-user errors
information systems
cisco packet tracer
cyber-attack
security issue
smart devices
incentive schemes.
rewards
federated learning
incentive schemes
high port application
sinet
port filtering
data flow pipeline
traffic patterns
covid-19 related ioc
prediction support parameter.
k-means clustering algorithm
detection model
malicious javascript
firmware
resource management
ngns
finding roots modulo.
signing group
group digital signature
implementation
technology
sensors
power distribution
social computing
consensus mechanism
signing group.
difficult computational problems
groupdigital signature
land
http flood
tcp syn flood
markov chain
attack detection
structural similarity index measurement (ssim).
universal quality image (uqi)
image fidelity (if)
peak signal to noise ratio (psnr)
mean square error (mse)
frequency domain
z-transform
identity federation.
limitations
identity management
federated identity management
distributed system.
information-centric
internet-of-things.
intelligent transportation system
sensor network.
etc
db index
cyber human behaviour
stylometric analysis
phishing email attack
cyber-security
security policies
defense mechanisms
employee awareness
wimd cybersecurity
wimd
wireless implanted medical devices
cardiac implanted device
health belief model
windows api calls.
term frequency-inverse document frequency vectors
n-gram analysis
malware classification
convolutional neural network
risk and threats
bayesian belief network
malware propagation modelling
shifting
shifting.
sprase svd (ssvd)
singular value decomposition (svd)
multimodal authentication
exponential kronecker product (ekp)
kronecker product
context-sensitive exponent associative memory mode
fingerprint
face
biometric fusion
information theor
engineering cybernetics
decision support system
multimedia & telecommunications
database & information retrieval
image signal processing
networks & fuzzy system
dns poising.
legal.
regulation
protection
personal
law general
data
trust in service-oriented architecture- open archi
and nist statistical tests
matlab simulation
chaotic algorithms
images security
hash function [2]
open application
xml-dsig
ws-security
soap
httpi
https
http
signature-based
misuse detection
architecture
agent
trojan protectionstem security
database and syvirus
strong t -consistency
group communication
server security
small business security
e-commerce systems security
mobile phones
conditional random fields
layered approach
secure two-party computation
zero-knowledge proof
distributed eigamal encryption
similarity coefficients
vanet etc.
v2v
stdma
csma
packet marking
autonomous system
sensing layer
resonant frequency
micro cantilever
dynamic source routing.
network coding
hybrid idps
perimeter-based idps
network-based idps
host-based idps
idps sensors/agents
tcp re-assembly
cyber-crime & bdi.
vendor lock-in
csp
multi-cloud
feature selection.
keystroke dynamics.
biometric
web-based
fuzzy-c means clustering
background subtraction
foreground detection
background removal
x64 systems
neighbour mean interpolation
image interpolation
programming languages
operation system
simulator
emulator
web filtering
collaborative web systems
vector valued functions
privacy preserving
implicit function theorem
hitech act
hipaa
incident response team
cyber incidents
incident response
ecurity threats & countermeasures (ddos
network applications
emerging technologies for next generation network
discrete algorithms and discrete modeling
network operation and management
mobile and wireless networks
network security and privacy
communication network protocols
communication network architectures and design
features.
mlp
filtering.
enron
keyword search
report generation
digital forensic
email forensic
cassandra big data.
attacks prediction
threat activity.
cyberattack ontology
cyberattack prediction
network and wireless network securitymobile
iot security and privacy
blockchain new design
blockchain consensus algorithms
blockchain foundations
blockchain-based security for the iot
iot experimental results and deployment scenarios
security & network management e-mail security
multimedia etc big data tools and systems big data
privacy and trust big data applications
models and algorithmsbig data infrastructure and p
big data big data techniques
peer-to-peer network security database and system
data and grid room
system information leak
peer to peer and overlay networks
qos and resource management
dos attacks
ndp
fragment header
flow-label
ipv6 security vulnerability
remote authentication
man in the middle attack
user authentication framework
analysis
dynamic billing system
data aggregation
distributed hash tables & linear diophantine
decentralized network
multimedia content management
trust management for virtual organizations
policy of trust in e-leaning systems
trust and reputation management
mobile and sensor networks
trust/risk based security frameworks
trust management system for wireless
certificateless public key encryption
certificateless signature scheme
digital certificate
certificateless public key cryptography
set protocol
fuzzy logic & perspective of intrusions
association mining
temporal sequence patterns
ubiquitous computing security web 2.0 security
olsr
willingness function
smrr
blockchainbased security for the iot
blockchainauthentication and authorization
analyze formal
timestamps
nonce
pkm
informtaion technology
safety
response time
self-configuration
self-cure
self-protection
self-optimization
autonomic network
clustering technique
awgn and raleigh fading channels.
bit error rate(ber)
ecb and cfb cryptographic algorithm
pre-zf
pre-mmse
mimo-ofdm
peerto-peer network.
intrusion attacks
taxonomy of attack
intruder
maximum power transfer
electronic circuit
control system
automation
touch sensor
computing
communication technologies
networks
mobile & wireless networks
lowest id clustering algorithm
sybil node
mobile ad hoc network
spammers
web spam
redirection
manipulating search engine
search engine
hiding techniques
cloaking detection
database and system security intrusion detection a
lucas
digital signatures
fair-exchange
contract signing
andit security
protected health information
personal identification information
information assurance
network security & its applications
pki interoperability
cross-certification
certificate practice statement(cps)
certificate policy(cp)
certification authority(ca)
public key infrastructure(pki)
ngn
ec-aka
aka
eps
lte security
• intelligent agents and systems
• trust management
• privacy and authentication
• cryptography and coding
security and privacy policies
security in distributed systems
artificial immune systems
computational intelligence in security
multiple flows
tcp protocols
high-speed
heterogeneous networks.
next generation networks
casper/fdr
authentication and key agreement protocols
heart rate device
gps
emergency
arduino microcontroller
accelerometer
accidents
hierarchical model
low-power
improved watchdog
watchdog
security area control
regulation and trust mechanisms
biological and evolutionary computation
reinforcement and unsupervised learning
) • ubiquitous computing security
engineering
search engine optimization
malicious websites
intrusion detection and prevention internet securi
counterfeit.
and machine learning
knime
aes.
session based key
sbskct
embedded devices.
modular exponentiation
n-1 attack
simple power analysis
dominant feature set.
outlier analysis
behavioral profile
terrorism
social network analysis (sna)
backtracking bit
watch nodes
traversed administrator field
associative node
ubiquitous computing security web 2.0 security cry
corporate infrastructure
disaster recovery
data loss
security breach
authentication and key agreement.
umts security
telecommunications system
gsm system
false alarm rate
naive bayes classification
multi stage filter
enhanced adaboost
compression.
transformation
threshold secret sharing
public verifiable signcryption
standard model
provable security
identity based cryptography
signcryption
fairness.
ttp (trusted third party)
security and privacy in pervasive/ubiquitous compu
authentication and non-repudiation
intrusion detection and vulnerability assessment
untraceability
cryptography and coding
survivability
intrusion resilience
fault-tolerant networks
diversity
androidapis
privilege escalation
system call dependence graph
behavior representation
data compression.
huffman coding
thematic analysis
medical internet of things
classification problem.
svms
functional analysis
kernel functions
legendre polynomials
man-in-the-middle.
obfuscation
server less
server based
escrow less
tree based
hierarchical
multicast
group
peer to peer
key management protocols
wireless attacks
wireless intrusion detection system
attack test cases
attack taxonomy
cueing.
interfaces
one-time passwords
chosen ciphertext security.
conditional proxy re-encryption
proxy re-cryptography
random oracle model
noise & entropy
anti obfuscation technique
low level feature
merkle-hellman.
simultaneous diophantine
subset sum
coppersmith
lattice reduction
lattices
snmp
mib
multi- agent
distributed query processing
location cloaking
location based services
windows registry
forensics
kdd cup 1999 dataset.
which motivates many researchers to discover metho
intrusion detection is one of the standard stages
image cipher.
scrambling
multimedia networking
mobile & broadband wireless internet
network based applications
network operations & management
measurement & performance analysis
internet and web applications
high speed networks
adhoc and sensor networks
heterogeneous wireless networks
security standards
security assessment
business information security
false positives
true positives
it policy
common vulnerability exposure (cve)
spam email
sender mail server
receiver mail server
anti-spams
wsn security
cross layer architecture
packet latency.
benevolent node
base station (bs)
route trust (rt)
indirect trust
direct trust
geometric mean (gm)
device discovery
physical proximity
fidelity
coordinate ratios
equatorial cloning
isotropic cloning
quantum copying machines
eavesdropping
todv
cross layer detection
body area network security
body area networks
misbehaving node
tbraodv
ad-hoc
isakmp
dsss
• network
enterprise
machinelearning
information gain
e-learning security
e-remedies
e-risks
e-learning
secret reference matrix (srm)
peak-signal-to-noise-ratio (psnr)
discrete cosine transformed (dct)
botnet and honeypot.
iptrcing
flooding attack
internet threat monitors (itm)
• peer to peer and overlay networks
• optical networks and systems
• next generation web architectures
• measurement & performance analysis
• internet and web applications
• high speed networks
• adhoc and sensor networks
• next generation internet
• heterogeneous wireless networks
fair exchange protocols
fair document exchange
dempster–shafer belief theory
hashcode
hacker
websites
• quantum computation
• program semantics and verification
• probabilistic computation
• parallel and distributed computing
• natural language processing
• cryptography
• computational science and applications
• machine learning
• information theory
• computational physics & biology
geometry
• computational complexity
• automata theory
• algorithms and data structures
e-mail architecture
header analysis
e-mail headers
e-mail forensics
feature coding
pca
ca
certification authority
&security
chebyshev polynomials
blind signature
friendly-cooperative framework
system hardening
anti malicious objects
star topology
black scholes equations
malicious object
native language password
textual password
shape based authentication
multicode encryption
transversal designs
reed-muller codes
communication
connectivity
and quality control
network system
control charts
anomalies
ieee 802.11g
multiple encryption.
secure electronic transaction
f8
a5/3
stream cipher
unauthorized access
network design
real estate
infrastructure security
wireless sensor network.
wireless mesh network
wireless ad-hoc networks
web application penetration testing
security testing
) * ubiquitous computing security *
trojon protection * security threats & cou
e-mail fraud * virus
ad hoc and sensor network security * peer-
information theoretic security
rational secret sharing
fault tolerance
topology.
authenticated symmetric key establishment
biometric key
wireless body sensor network (wbsn)
ofdm
spectrum sensing
inter symbol interference (isi)
cognitive radio
mpi.
encrypted data
international data encryption algorithm (idea)
hiding information
unicode
multi-layers
arabic text
python
scapy
kali linux
de-authentication attack
(ddos
logistic regression
k-nn
naive bayes
response & tracking.
base station
sensor nodes
attack path reconstruction
ddos-attacks
icap
client honeypot
browser vulnerability
adhoc on demand distance vector protocol(aodv)
translation.
elecronic voting
user lifecycle
workflows
provisioning
security synthesis
symmetric cryptosystems
non linearity
s box
memorability of passwords
snakes & ladders game
graphical passwords
attackers .
mac-layer
threshold level
real time application
rtos
mobile ad hoc networking
non-invertible transformation
cancellable biometrics
fingerprint biometrics
biohashing
best practice
it governance
mapping
pdca
information security management systems (isms)
iso 27001
cobit
nsgaii.
objective functions
attack tree
• security
• internet security
and public-key.
system access control
deviation detection
distributed resource allocation
asynchronous distributed pricing
packet detection and packet header matching (phm)
snort
network intrusion detection system (nids)
ad hoc and sensor
secure network
secure servers
cryptoviral extortion.
conficker
gpcode.ak
password (information) snatching
evasive/ deniable/ untraceable attacks
electronic espionage threats
electronic warfare threats
cryptotrojan
cryptovirus
cryptovirology
firewall systems design
computer networks
identity based firewalls
proposed method.
noise categories
wavelet thresholding
image denoising
classification accuracy
support vector machine (svm)
hybrid intrusion detection system
secure routing protocol
trust-based routing
distributed rate control.
bandwidth reservation
medium accesscontrol
lan attack
host based ids
arp spoofing
active detection
oauth
oix
openid
digital identity
shoulder surfing
session passwords
priori probability
life time
network density
compression-crypto
one time pad
floating point number
data integration
mediator
credential
physical cryptography
physical unclonable functions
dispute settlement
smart vehicles
enterprises security risk managemen
manage security programs
risk principles management
enterprise risk management
risk mechanism
maturation of a profession
esrm
enterprises security risk management
ip spoofing
modeling
insider threat
system dynamics
delay.
cdma throughput
multimedia
diffusion process and stream cipher.
and bernoulli map
quadratic map
tent map
statistical hypothesis testing
kolmogorov-smirnov test
statistical test of significance
queuing model
poisson arrival
buffer
traffic flow
diffusion
stage staffing
2-d arnold cat map
encryption and decryption algorithm for watermarki
digital multimedia
stage staffing watermarking
copyright protection
static and mobile wsn.
node replication attack
sybil
clone
crossover
sha-512
sessionbased
minutiae
ann
probabilistic encryption
deniable encryption
receipt-free
rigging
coercing
authentication.
covert channel.
diffie-hellman algorithm
arithmetic encoding
biometric information
honeypot and nics.
iptables
network intrusion prevention
np-complete
quotient ring
diophantine equation
one-way function
nonlinear function.
invisible digital watermarking
pixel
smart cards
remote user authentication
attack games.
eavesdroppers
wireless body area networks
niger-delta
clustering routing
judy array
blom
location-dependent social networks
community consensus
pragmatic web
agent-based systems
spatial reasoning
computing with words
uncertainty
language-action perspective
and delay
vmware
performance measurement
network virtualization
switching and addressing techniques self-organizin
& privacy next generation internet & web architect
phonology and morphology addressing & location man
data shredding
confidence level
lsb replacement steganography
ipfix
flow
scan detection
mac addresses hash value.
lu-cac
caca
bandwidth link utilization
reliability.
emergency response communication
wave files.
decrypting
encrypting
signature based detection
behaviour based detection
flow based detection
c&c
irc
botnet
mobile ad-hoc network
share
n) visual cryptography
(2
smart-card
multi-server
low-cost cryptography
node misbehaviour.
malicious packet dropping
controlled flooding
reputation
mobile ad hoc network (manet)
bloom filter
wake up receiver
vlsi
low power
multigeneration keys.
random kd (key distribution)
sec-leach (secure leach)
sensor networks
leach (low energy adaptive clustering hierarchy)
galois counter mode.
link layer security
circular queue.
md5
sha-256
ip
ao
udt
high speed bandwidth
next generation network protocol
desirability functions
best practice frameworks
baseline manuals
risk analysis and management
information security controls
signatures
web services
interpolation.
qim
m-ary modulation
error concealment
data value
network security & identity privacy
attack graph.
efficient probabilistic packet marking algorithm
probabilistic packet marking algorithm
online auction network
byzantine behavior
multicast communication
ad-hoc networks
hierarchical design
ids
tls protocol
timers
typing rhythms
keystroke
passwords
implementation cost
service differentiation.
mb-ofdm
interference limitation
pareto-efficiency
password strength
text passwords
vulnerability analysis
olsrv2
selfish nodes
content
clusters
overlay
replica
impersonation attack.
undetectable online password guessing attack
ecc-3peke protocol
finite fields & montgomery algorithm.
cellular automata
log analysis.
audit system
event classification
http intrusion detection.
fuzzy cognitive mapping
fuzzy intrusion detection
application layer misuse detector
semantic intrusion detection
naive bayesian classifier
false positive
big-dragon cryptosystem.
little dragon cryptosystem
multivariate cryptography
and matlab.
customizable security.
policy-driven security
content-addressable storage security
matlab
network security management
complexity.
ldpc codes
chained codes
image
video
cover media
anti-spam
email filtering
workload characterization
knowledge discovery in databases and privacy prese
integrated verification.
software implementation
usage control
malicious
mechanism
message digest
routing protocol
soa
selinux
registration time.
packet loss
handoff delay
triangle routing
route optimization
tunneling
longitudes
latitudes
location coordinates
transposition cipher
rangoli
masquerade attack
remote user
smartcard
batch verification
service authentication
identity based cryptography (ibc)
ip multimedia subsystem (ims)
network security protocols
quantum networks
file handler
regexpr
html
sub
perl
quantum superposition state
no key-exchange
inter packet delay
ieee 802.11b
ieee 802.15.4
heterogeneous wireless network
coexistence
dfa
vulnerability
signature processing
signature formulation
intrusion detection / prevention systems
key establishment
lu matrix composition
feedback
convolutional coding
soft input
iterations
guard node
cluster
key sensitivity
avalanche
legal aspects
packet sniffers
ip traceback
mix zone
pseudonyms
click spam
web advertising
google ads
pay-per-click advertising
authorization and password.
apache spark
security analytics
feature selection
feature extraction
hdl.
bfmawddl
bfcdnba
bfma
dpa
wddl
bf
securing windows
microsoft domain environment
spectrum analysis
automated ids
anomaly-based intrusion detection system
protocol safety.
elliptic curve
software
networking
pki
ivote
i-voting
electronic voting system
and exemption.
medical system
metric
availability
dependency
information system.
application-layer ddos attack
browsing model
one-class support vector machine
notification
beacon
seed
smartphone
disaster
lea
markov-model
rfid
brute-force attack
j48.
email classification
authentication & q-learning
response
historical
mobile ad hoc networks security
network dependency analysis
data correlation
security event management
cloud software development
threat modeling
method engineering
encryption and decryption.
rotation of the bits
multiple encryption
braiding/entanglement
owasp
waterfall methodology
agile programming
shared bitmap
rate limitation
connection failure behavior
self-propagating malware
shared register array
malware detection and mobile device.
finite elements.
intellect learning.
wireless.
secured watermark system (sws) and computer securi
threshold cryptography.
steganography; image segmentation; byte characteri
cyber-defense.
software configuration management
usable security.
data outsourcing; privacy; public cloud severs; ac
zss signature.
and crypt ography.
password replace ment
cryptographic algorithm.
hdfs (hadoop distributed file system)
interactive education.
risk assessment
attack graph
and services.
computer
multi input multi output (mimo)
adhoc network
smurf attacks.
fair exchange
dst
hybrid covert channel
z-transform; frequency domain; watermarking; mean
sensor network
etc.
db index.
performance evaluation.
network security; malware propagation modelling; b
biometrics; biometric fusion; face; fingerprint; c
information theory
dns poising
hash function [2].
we propose a novel distributed intrusion detection
new kinds of network attacks are emerging endlessl
it is necessary that this security concern must be
in order to the rapid growth of the network applic
user authentication; group communication; secret s
fuzzy c-means clustering
fuzzy neural network
data and grid room
system information leak
Mehr anzeigen