International Journal of Network Security & Its Applications (IJNSA)

Current Issue

May 2019, Volume 11, Number 3

Enhancing the Wordpress System: from Role to Attribute-Based Access Control
Lifeng Cao, Jia Ying Ou and Amirhossein Chinaei, York University, Canada
Classification Procedures for Intrusion Detection Based on KDD CUP 99 Data Set
Shaker El-Sappagh, Ahmed Saad Mohammed and Tarek Ahmed AlSheshtawy, Benha University, Egypt
Xdoser, A Benchmarking Tool for System Load Measurement Using Denial of Service Features
AKM Bahalul Haque, Rabeya Sultana, Mohammad Sajid Fahad , MD Nasif Latif and Md. Amdadul Bari,
North South University, Bangladesh
Multi-Layer Classifier for Minimizing False Intrusion
Shaker El-Sappagh, Ahmed saad Mohammed and Tarek Ahmed AlSheshtawy, Benha University, Egypt
Methods Toward Enhancing RSA Algorithm : A Survey
Shaheen Saad Al-Kaabi and Samir Brahim Belhaouari, Hamad Bin Khalifa University (HBKU), Qatar
Survey on Secure Routing in Vanets
Afef Slama1 and Ilhem Lengliz2, 1University of Manouba, Tunisia and 2Military Academy, Tunisia
A Combination of Temporal Sequence Learning and Data Description for Anomaly - based NIDS
Nguyen Thanh Van1,2, Tran Ngoc Thinh1 and Le Thanh Sach1, 1Ho Chi Minh City University of Technology, VietNam and
2Ho Chi Minh City University of Technology and Education, VietNam

March 2019, Volume 11, Number 2

Performance Analysis of Routing Protocols in MANET Under Malicious Attacks
Gorine1 and Rabia Saleh, 1Gloucestershire University, England
Dual Security Using Image Steganography Based Matrix Partition
Huda H.Al.Ghuraify, Ali A.Al-Bakry, Ahmad T. Al-Jayashi, al-furat al-awsat university, Iraq
A Review of Selected Proposals for Improving Identity Privacy in UMTS
Hiten Choudhury, Cotton University, India
KVEFS: Encrypted File System Based on Distributed Key-Value Stores and FUSE
Giau Ho Kim, Son Hai Le, Trung Manh Nguyen, Vu Thi Ly, Thanh Nguyen Kim, Nguyen Van Cuong, Thanh Nguyen Trung,
and Ta Minh Thanh, Le Quy Don Technical University, Vietnam
Security& Privacy Threats, Attacks and Countermeasures in Internet of Things
Faheem Masoodi1, Shadab Alam2 and Shams Tabrez Siddiqui2, 1University of Kashmir, India and 2Jazan University, KSA

January 2019, Volume 11, Number 1

Malware Detection Using Machine Learning Algorithms and Reverse Engineering of Android Java Code
Michal Kedziora, Paulina Gawin, Michal Szczepanik and Ireneusz Jozwiak, University of Science and Technology Wroclaw, Poland
A Light Weight Solution for Detecting De-Authentication Attack
Rajinder Singh and Satish Kumar, PUSSGRC Hoshiarpur, Punjab, India
A Multi-Layer Arabic Text Steganographic Method Based on Letter Shaping
A.F. Al Azzawi, Philadelphia University, Jordan
Performance Evaluation of Parallel International Data Encryption Algorithm on IMAN1 Super Computer
Ahmad Bany Doumi and Mohammad Qatawneh, University of Jordan, Amman-Jordan
A Survey on Optimization Based Spectrum Sensing Techniques to Reduce ISI and PAPR In OFDM Based Cognitive Radio System
1B.Maheswara Rao, 2S.Baskar, 1Research scholar and 2Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science
and Technology