International Journal of Network Security & Its Applications (IJNSA)

Volume 9

November 2017, Volume 9, Number 6

Effectiveness and Weakness of Quantified/Automated Anomaly Based IDs
HidemaTanaka, National Defense Academy of Japan, Japan
Practical Approach for Securing Windows Environment : Attack Vectors and Countermeasures
Abdurrahman Pektas and Ertugrul Basaranoglu, Galatasaray University, Turkey
Predominance of Blowfish Over Triple Data Encryption Standard Symmetric Key Algorithm for Secure Integrated Circuits
Using Verilog HDL
V. Kumara Swamy1 Prabhu Benakop2, 1Sreenidhi Institute of Science and Technology, India and 2Indur Institute of
Engineering and Technology, India
Feature Extraction and Feature Selection : Reducing Data Complexity with Apache Spark
Dimitrios Sisiaridis and Olivier Markowitch, Universite Libre de Bruxelles, Belgium
An Efficient Identity Based Authentication Protocol by Using Password
Sanjeev Kumar Mandal and A R Deepti, Acharya Institute of Technology, India

September 2017, Volume 9, Number 5

Architecture and Design of Micro Knowledge and Micro Medical Processing Units
Shawon S. M. Rahman1 and Syed V. Ahamed2, 1University of Hawaii-Hilo, USA and 2City University of New York, USA
A Comparative Study of the Approach Provided for Preventing the Data Leakage
Kamaljeet Kaur1, Ishu Gupta2 and Ashutosh Kumar Singh2, 1Govt. Sr. Sec. School - Ambala, India and 2National Institute of
Technology - Kurukshetra, India
Protocol Safety of VOIP Using the Cryptosystems Based on Elliptic Curve
Layie Paul and Vivient Corneille Kamla, University of Ngaoundere, Cameroon

July 2017, Volume 9, Number 4

Performance Evaluation of J48 and Bayes Algorithms for Intrusion Detection System
Uzair Bashir1 and Manzoor Chachoo2, 1Mewar University, India and 2University of Kashmir, India
Modelling Cyber Attacks
Farida Chowdhury1 and Md Sadek Ferdous2, 1Shahjalal University of Science and Technology, Bangladesh and
2University of Southampton, UK
Node Authentication Using BLS Signature in Distributed PKI Based MANETs
N Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, V. Ch. Venkaiah, and Y. V. Subba Rao, University of Hyderabad, India
Enhance Efficiency of EAP-TTLS Protocol Through the Simultaneous Use of Encryption and Digital Signature Algorithms
Seyed Milad Dejamfar and Sara Najafzadeh, Islamic Azad University, Iran
A Plain Image Dependent Image Encryption Scheme Using Half Pixel Level Interchange Permutation Operation
Li Liu, Yucheng Chen and Ruisong Ye, Shantou University, China

May 2017, Volume 9, Number 3

A Conceptual Secure Blockchain Based Electronic Voting System
Ahmed Ben Ayed, Colorado Technical University, USA
Enhancing Cyber Security of Online Accounts via A Novel Protocol and New Techniques
Mehrdad Nourai and Haim Levkowitz, University of Massachusetts Lowell, USA

March 2017, Volume 9, Number 2

Metric for Evaluating Availability of an Information System : A Quantitative Approach Based on Component Dependency
Suhail Qadir Mir1 and S.M.K. Quadri2, 1University of Kashmir, India and 2Jamia Millia Islamia, India
A Secure E-Medical Exemption System (E-MES): Jordan Case
Heba N. Kamel, Mohammad A. Alia, Bara'aha. Al Saeq and Eman Abu Maria, Al Zaytoonah University of Jordan, Jordan

January 2017, Volume 9, Number 1

A Study on LEA and Seed Algorithms for Data Protection of Smartphone Based Disaster Notification System
Jae Pil Lee, Jae Gwang Lee, Jun hyeon Lee, Ki-su Yoon and Jae Kwang Lee, Han Nam University, Korea
Application-Layer DDOS Detection Based on a One-Class Support Vector Machine
Chuyu She1, 2, 3 , Wushao Wen1,2, Zaihua Lin1 and Kesong Zheng1, 1Sun Yat-Sen University, China, 2SYSU-CMU Shunde
International Joint Research Institute, China and 3Guangdong University of Finance & Economics, China
A Survey on Security in Wireless Sensor Networks
Waleed Al Shehri, King Abdul-Aziz University, Saudi Arabia