International Journal of Network Security & Its Applications (IJNSA)

Most Cited Articles

Most Cited Articles - 2014

CLOUD COMPUTING AND SECURITY ISSUES IN THE CLOUD
Monjur Ahmed and Mohammad Ashraf Hossain, Vol.6, No.1, January 2014, PP. 25-36
DOI : 10.5121/ijnsa.2014.6103
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
Venkata Narasimha Inukollu , Sailaja Arsi and Srinivasa Rao Ravuri, Vol.6, No.3, May 2014, PP. 45-56
DOI : 10.5121/ijnsa.2014.6304

Most Cited Articles - 2013

SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
Ram Shringar Raw , Manish Kumar , Nanhay Singh, Vol.5, No.5, September 2013,PP. 95-105
DOI : 10.5121/ijnsa.2013.5508
TEXT STEGANOGRAPHIC APPROACHES: A COMPARISON
Monika Agarwal, Vol.5, No.1, January 2013, PP. 91-106
DOI : 10.5121/ijnsa.2013.5107
A NEW STEMMER TO IMPROVE INFORMATION RETRIEVAL
Wahiba Ben Abdessalem Karaa, Vol.5, No.4, July 2013, PP. 143-154
DOI : 10.5121/ijnsa.2013.5411
CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC
Mostaque Md. Morshedur Hassan, Vol.4, No.2, March 2013, PP. 35-47
DOI : 10.5121/ijdps.2013.4204
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
Arijit Ukil , Debasish Jana and Ajanta De Sarkar, Vol.5, No.5, September 2013, PP. 11 to 24
DOI : 10.5121/ijnsa.2013.5502

Most Cited Articles - 2012

An Implementation of Intrusion Detection System Using Genetic Algorithm
Mohammad Sazzadul Hoque, Md. Abdul Mukit and Md. Abu Naser Bikas, IJNSA Journal, Vol.4, No.2, March 2012, PP. 109-120
DOI : 10.5121/ijnsa.2012.4208
Provable Secure Identity Based Signcryption Schemes Without Random Oracles
Prashant Kushwah and Sunder Lal, IJNSA Journal, Vol.4, No.3, May 2012, PP. 97-110
DOI : 10.5121/ijnsa.2012.4306
Non-Profit Organizations' Need to Address Security for Effective Government Contracting
Lee E. Rice and Syed (Shawon) M. Rahman, IJNSA Journal, Vol.4, No.4, July 2012, PP. 53-71
DOI : 10.5121/ijnsa.2012.4404

Most Cited Articles - 2011

An Overview of the Security Concerns in Enterprise Cloud Computing
Anthony Bisong and Syed (Shawon) M. Rahman, IJNSA Journal, Vol.3, No.1, January 2011, PP. 30-45
DOI : 10.5121/ijnsa.2011.3103
Analysis of Web Logs and Web User in Web Mining
L.K. Joshila Grace,V.Maheswari and Dhinaharan Nagamalai, IJNSA Journal, Vol.3, No.1, January 2011, PP. 99-110
DOI : 10.5121/ijnsa.2011.3107
Authentication Schemes for Session Passwords using Color and Images
M Sreelatha,M Shashi,M Anirudh,Md Sultan Ahamer and V Manoj Kumar , IJNSA Journal, Vol.3, No.3, May 2011, PP. 111-119
DOI : 10.5121/ijnsa.2011.3308
Data Security using Private Key Encryption System Based on Arithmetic Coding
Ajit Singh and Rimple Gilhotra, IJNSA Journal, Vol.3, No.3, May 2011, PP. 58-67
DOI : 10.5121/ijnsa.2011.3305
Wavelet Thresholding Approach for Image Denoising
Pankaj Hedaoo and Swati S Godbole, IJNSA Journal, Vol.3, No.4, July 2011, PP. 16-21
DOI : 10.5121/ijnsa.2011.3402
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
S.A.Arunmozhi and Y.Venkataramani, IJNSA Journal, Vol.3, No.3, May 2011, PP. 182-187
DOI : 10.5121/ijnsa.2011.3312
Replication Attack Mitigations for Static and Mobile WSN
V.Manjula and C.Chellappan, IJNSA Journal, Vol.3, No.2, March 2011, PP. 122-133
DOI : 10.5121/ijnsa.2011.3210
Prevention of Wormhole Attack in Wireless Sensor network
Dhara Buch and Devesh Jinwala , IJNSA Journal, Vol.3, No.5, Sep 2011, PP. 85-98
DOI : 10.5121/ijnsa.2011.3507
Information Security Synthesis in Online Universities
Maria Schuett,Crisc and Syed(Shawon)M.Rahman, IJNSA Journal, Vol.3, No.5, Sep 2011, PP. 1-20
DOI : 10.5121/ijnsa.2011.3501
Enhancing Infrastructure Security in Real Estate
Kyle Dees,M.S and Syed(Shawon)Rahman, IJNSA Journal, Vol.3, No.6, November 2011, PP. 59-80
DOI : 10.5121/ijnsa.2011.3604
Cryptanalysis and Further Improvement of a Biometric-Based Remote User Authentication Scheme using Smart Cards
Ashok Kumar Das, IJNSA Journal, Vol.3, No.2, March 2011, PP. 13-28
DOI : 10.5121/ijnsa.2011.3202
A Human-Centric Approach to Group-Based Context-Awareness
Nasser Ghadiri,Ahmad Baraani-Dastjerdi,Nasser Ghasem-Aghaee and Mohammad A. Nematbakhsh, IJNSA Journal, Vol.3, No.1, January 201, PP. 47-66
DOI : 10.5121/ijnsa.2011.3104
A Light Weight Protocol to Provide Location Privacy in Wireless Body Area Networks
Mohammed Mana,Mohammed Feham and Boucif Amar Bensaber, IJNSA Journal, Vol.3, No.2, March 2011, PP. 1-11
DOI : 10.5121/ijnsa.2011.3201

Most Cited Articles - 2010

Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection
Dewan Md. Farid,Nouria Harbi and Mohammad Zahidur Rahman, IJNSA Journal, Volume 2, Number 2, April 2010, PP. 12-25
DOI:10.5121/ijnsa.2010.2202
Hierarchical Design Based Intrusion Detection System for Wireless Ad Hoc Sensor Network
Mohammad Saiful Islam Mamun and A.F.M. Sultanul Kabir, IJNSA Journal, Vol.2, No.3, July 2010, PP. 102-117
DOI : 10.5121/ijnsa.2010.2307
Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video Cover Media
Natarajan Meghanathan and Lopamudra Nayak, IJNSA Journal, Vol.2, No.1, January 2010, PP.
Design and Implementation of a Trust-Aware Routing Protocol for Large WSNS
Theodore Zahariadis,Helen Leligou,Panagiotis Karkazis,Panagiotis Trakadas,Ioannis Papaefstathiou,Charalambos Vangelatos and Lionel Besson, IJNSA Journal, Vol.2, No.3, July 2010, PP. 52-68
DOI:10.5121/ijnsa.2010.2304
A Multi-Criteria Evaluation of Information Security Controls Using Boolean Features
Angel R. Otero,Carlos E. Otero and Abrar Qureshi, IJNSA Journal, Vol.2, No.4, October 2010, PP. 1-11
DOI : 10.5121/ijnsa.2010.2401
Modeling yhe Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in Manet
T.V.P.Sundararajan and A.Shanmugam Volume 2, Number 2, April 2010, PP. 147-160
DOI:10.5121/ijnsa.2010.2212
Cryptanalysis of a More Efficient and Secure Dynamic Id-Based Remote User Authentication Scheme
Mueen Uddin,Kamran Khowaja and Azizah Abdul Rehman, IJNSA Journal, Vol.2, No.4, October 2010, PP. 129-141
DOI : 10.5121/ijnsa.2010.2411
Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2)
Ulrich Herberg and Thomas Clausen, IJNSA Journal, Volume 2, Number 2, April 2010, PP. 162-181
DOI:10.5121/ijnsa.2010.2213
Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor
Mohsen Machhout,Zied Guitouni,Kholdoun Torki,Lazhar Khriji and Rached Tourki, IJNSA Journal, Volume 2, Number 2, April 2010, PP. 100-112
DOI:10.5121/ijnsa.2010.2208
Dynamic Multi Layer Signature Based Intrusion Detection System Using Mobile Agents
Mueen Uddin,Kamran Khowaja and Azizah Abdul Rehman, IJNSA Journal, Vol.2, No.4, October 2010, PP. 129-141
DOI : 10.5121/ijnsa.2010.2411
Analysis of the Security of BB84 by Model Checking Mohamed
Elboukhari,Mostafa Azizi and Abdelmalek Azizi, IJNSA Journal, Volume 2, Number 2, April 2010, PP. 87-98
DOI:10.5121/ijnsa.2010.2207
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
Jaydip Sen, IJNSA Journal, Vol.2, No.4, October 2010, PP. 92-104
DOI : 10.5121/ijnsa.2010.2408
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Eslam Gamal Ahmed,Eman Shaaban and Mohamed Hashem, IJNSA Journal, Volume 2, Number 2, April 2010, PP. 27-37
DOI:10.5121/ijnsa.2010.2203
Workload Characterization of Spam Email Filtering Systems
Yan Luo, IJNSA Journal, Vol.2, No.1, January 2010, PP. 22-41
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Urjita Thakar,Nirmal Dagdee and Sudarshan Varma, IJNSA Journal, Vol.2, No.3, July 2010, PP. 190-205
DOI : 10.5121/ijnsa.2010.2313
An Efficient IP Traceback through Packet Marking Algorithm
Y.Bhavani and P.Niranjan Reddy , IJNSA Journal, Vol.2, No.3, July 2010, PP. 132-142
DOI : 10.5121/ijnsa.2010.2309
A Testbed Implementation for Securing OLSR In Mobile Ad Hoc Networks
Emmanouil A. Panaousis, George Drew, Grant P. Millar, Tipu A. Ramrekha and Christos Politis, IJNSA Journal, Vol.2, No.4, October 2010, PP. 140-161
DOI : 10.5121/ijnsa.2010.2412

Most Cited Articles - 2009

A New Cluster-Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc Networks
Debdutta Barman Roy,Rituparna Chaki and Nabendu Chaki, IJNSA Journal, Vol.1,No.1,April2009, PP. 44-52
A Comparison Between Memetic algorithm and Genetic Algorithm for the Cryptanalysis of Simplified Data Encryption Standard Algorithm
Poonam Garg, IJNSA Journal, Vol.1, No 1, April 2009, PP. 34-42
Using Rough Set and Support Vector Machine for Network Intrusion Detection
Rung-Ching Chen,Kai-Fan Cheng and Chia-Fen Hsieh, IJNSA Journal, Vol 1, No 1, April 2009, PP. 1-13
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration
Alan Mink, Sheila Frankel and Ray Perlner, IJNSA Journal, Vol 1, No 2, July 2009, PP. 101-112
Tools and Techniques for Network Forensics
Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore, IJNSA Journal, Vol .1, No.1,April 2009, PP. 14-25
Cryptanalysis of a More Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme
Mohammed Aijaz Ahmed,D. Rajya Lakshmi and Sayed Abdul Sattar, IJNSA Journal, Vol.1, No.3, October 2009, PP. 32-37
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images
Krishnamurthy G N and Dr. V Ramaswamy , IJNSA Journal, Vol.1, No 1, April 2009, PP. 28-33
Intelligent Detection System Framework Using Mobile Agents
N.Jaisankar,R.Saravanan and K. Durai Swamy, IJNSA Journal, Vol 1, No 2, July 2009, PP. 72-88
Integrating Identity-Based Cryptography in IMS Service Authentication
Mohamed Abid,Songbo Song,Hassnaa Moustafa and Hossam Afifi , IJNSA Journal, Vol.1, No.3, October 2009, PP. 1-13
Agent Based Trust Management Model Based on Weight Value Model for Online Auctions
E.Sathiyamoorthy, N.Ch.Sriman Narayana Iyenger and V.Ramachandran , IJNSA Journal, Vol.1, No.3, October 2009, PP. 15-31