International Journal of Network Security & Its Applications (IJNSA)

Volume 5

November 2013, Volume 5, Number 6

Complete Network Security Protection for SME's within Limited Resources
Margie S. Todd1 and Syed (Shawon) M. Rahman1,2, 1Capella University, USA and 2University of Hawaii-Hilo, USA
Multi-Level Parsing Based Approach Against Phishing Attacks With the Help of Knowledge Bases
Gaurav Kumar Tak1 and Gaurav Ojha2, 1Lovely Professional University, India and 2Indian Institute of Information
Technology and Management, India
A Need for Peer-To-Peer Strong Local Authentication Protocol (P2PSLAP) in Mobile Banking
Bossi Masamila, Dublin Institute of Technology, Ireland
Securing Mobile Cloud Using Finger Print Authentication
IehabALRassan and HananAlShaher, King Saud University, Saudi Arabia
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection Engine
Anjan K1, Srinath N K1 and Jibi Abraham2, 1R V College of Engineering,India and 2College of Engineering, India
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive Channel Shortening in Multi-carrier Systems
Samir Abd Elghafar1,2, Salaheldin M. Diab1, Bassiouny M. Sallam1, Moawad I. Dessouky1, El-Sayed M. El-Rabaie1 and
Fathi E. Abd El-Samie1, 1Menoufia University, Egypt and 2Jazan University, Saudi Arabia
Investigating the Effects of the Common Control Channel Challenge in Multichannel Cognitive Networks With Hypothetical
Spectrum Hole
Mthulisi Velempini1 and Mqhele E. Dlodlo2, 1North-West University, South Africa and 2University of Cape Town, South Africa

September 2013, Volume 5, Number 5

Knowledge-Based Authentication using Twitter Can We Use Lunch Menus As Passwords?
ManabuOkamoto, Kanagawa Institute of Technology, Japan
A Security Framework in Cloud Computing Infrastructure
Arijit Ukil1, Debasish Jana2 and Ajanta De Sarkar2, 1Tata Consultancy Services, India and 2Birla Institute of Technology, India
Micro Rotor Enhanced Block Cipher Designed For Eight Bits Micro-Controllers (MREBC)
Ahmed ElShafee, Ahram Canadian University, Egypt
Image Authentication Through ZTransform with Low Energy And Bandwidth (IAZT
Madhumita Sengupta and J. K. Mandal, University of Kalyani, India
Fast Detection of Ddos Attacks Using Non-Adaptive Group Testing
Huynh Nguyen Chinh, Tan Hanh and Nguyen Dinh Thuc, HCMC,Vietnam
Effectiveness of Feature Detectionoperators on the Performance of Iris Biometric Recognition System
Binsu C. Kovoor, Supriya M.H. and K. Poulose Jacob, Cochin University of Science and Technology, India
Secure Collaborative Processing Architecture for MITB Attack Detection
Hani Qusa and Shadi Abudalfa, University College of Applied Science, Palestine
Security Challenges, Issues and Their Solutions For Vanet
Ram Shringar Raw, Manish Kumar and Nanhay Singh, Ambedkar Institute of Advanced communication Technologies
& Research, India
Defense Mechanisms for Computer-Based Information Systems
Majid Alshammari and Christian Bach, University of Bridgeport, USA
Optimized Hybrid Security Mechanism for Image Authentication and Secrecy using PSO
K.Kuppusamy and K.Thamodaran, Alagappa University, India
Credit Based Methodology to Detect and Discriminate DDOS Attack From Flash Crowd in A Cloud Computing Environment
N.Jeyanthi, Hena Shabeeb and Mogankumar P.C, VIT University, India
Z-Shaped Dipole Antenna and its Fractal Iterations
Mustafa H. Abu Nasr, Al- Azhar University, Palestine
A Novel Approach for Secure Routing Through BGP Using Symmetric Key
Divan Raimagia, Shraddha Singh and Sameena Zafar, PIES College, India
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm
Adnan M. Shihab, Raghad K. Mohammed and Woud M. Abed, University of Baghdad, Iraq
A Novel Technique to Detect Intrusion in Manet
J. K. Mandal1 and Khondekar Lutful Hassan2, 1University of Kalyani, India and 2University of Calcutta,India

July 2013, Volume 5, Number 4

Real Time Securing of All-Optical Networks Against Security Attacks at the Physical Level
Fahmida Rahman and Mohammed Arozullah, The Catholic University of America, USA
Phishing Techniques and Mitigating the Associated Security Risks
Marc A. Rader and Syed (Shawon) M. Rahman, Capella University, USA
Wireless Networks Security in Jordan: A Field Study
Ahmad S. Mashhour1 and Zakaria Saleh2, 1University of Bahrain, Bahrain and 2Yarmouk University, Jordan
Early Detection of SQL Injection Attacks
Hossain Shahriar, Sarah North and Wei-Chuen Chen, Kennesaw State University, USA
A Framework for Security Components Anomalies Severity Evaluation and Classification
Kamel Karoui, Fakher Ben Ftima and Henda Ben Ghezala, University of Manouba, Tunisia
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authentication
Pavan Kumar K, P. E. S. N. Krishna Prasad, M. V. Ramakrishna and B.D.C.N. Prasad, Prasad V. Potluri Siddhartha Institute
of Technology, India
Defence Schemes From Attacker's Own Reward Processes
L-F Pau, Copenhagen Business School, Denmark
Controlling IP Falsifying Using Realistic Simulation
Govindavaram Madhusri1 and Chakunta Venkata Guru Rao2, 1Kakatiya University, India and 2JNTU University, India
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Aliyu Mohammed, Haitham A. Jamil, Sulaiman Mohd Nor and Muhammad NadzirMarsono, Universiti Teknologi Malaysia,
Malaysia
Internal Security on an IDS Based on Agents
Rafael Paez, Mery Yolima Uribe and Miguel Torres, Pontificia Universidad Javeriana, Colombia
A New Stemmer to Improve Information Retrieval
Wahiba Ben Abdessalem Karaa, University of Tunis. Tunisia
Performance Evaluation of Enhancedgreedy-Two-Phase Deployment Algorithm
Kartit Ali, University Mohammed V-Agdal, Morocco
Steganography and Random Grids
Pratarshi Saha1, Sandeep Gurung1 and Kunal Krishanu Ghose2, 1Sikkim Manipal Institute of Technology, India and
2QualComm, USA
An Improved MULTI-SOM Algorithm
Imen Khanchouch, Khaddouja Boujenfa and Mohamed Limam, University of Tunis, Tunisia and Dhofar University, Oman
Experimental Analysis of AODV and DSR with Varying Vehicle Mobility and Density in Vanet Scenario
Arzoo Dahiya and R.K.Chauhan, Kurukshetra University, India

May 2013, Volume 5, Number 3

Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and Energy Depletion Parameters
S.Prabhakara Rao1, E.Nagabhooshanam2 and S.Ramesh Babu1, 1Nigama Engineering College, India and 2Sridevi Womens
Engineering College, India
An Efficient Group Authentication for Group Communications
Lein Harn1 and Changlu Lin2, 1University of Missouri, USA and 2Fujian Normal University, P. R. China
Password Based Scheme and Group Testing for Defending DDOS Attacks
G Dayanandam1, T V Rao2, S Pavan Kumar Reddy1 and Ravinuthala Sruthi1, 1QIS Institute of Technology (QISIT), India and
2KL University (KLU), India
Security Algorithms for WIMAX
M Alzaabi1, K D Ranjeeth1, T Alukaidey1 and K Salman2, 1University of Hertfordshire, UK and 2Middle Tennessee State
University, USA
Hybrid Architecture for Distributed Intrusion Detection System in Wireless Network
Seyedeh Yasaman Rashida, Islamic Azad University Shirgah, Iran
HTTPI Based Web Service Security over SOAP
Pankaj Choudhary, Rajendra Aaseri and Nirmal Roberts, ABV - Indian Institute of Information Technology & Management,
India
Implementation of a Security Protocol for Bluetooth and WI-FI
U. Pavan Kumar, Amity University, India
Bearings Prognostic Using Mixture of Gaussians Hidden Markov Model and Support Vector Machine
Fatima Ezzahra Sloukia1, Rajae Bouarfa1, Hicham Medromi2 and Mohammed Wahbi1, 1SIR2C2S/LASI-EHTP, Morocco
and 2Hassan II University, Morocco
Trust Value Algorithm: A Secure Approach against Packet Drop Attack in Wireless Ad-Hoc Networks
Rajendra Aaseri, Pankaj Choudhary and Nirmal Roberts, ABV-Indian Institute of Information Technology, India

March 2013, Volume 5, Number 2

Incident Response Plan for a Small to Medium Sized Hospital
Charles DeVoe and Syed (Shawon) M. Rahman, Capella University, USA
Privacy Preserving Data Mining by using Implicit Function Theorem
Pasupuleti Rajesh1 and Gugulothu Narsimha2, 1VVIT College, India and 2JNTUH University, India.
Tulungan: A Slandering-Resistant Reputation System for Collaborative Web Filtering Systems
Alexis V. Pantola1, Susan Pancho-Festin2 and Florante Salvador1, 1De La Salle University, Philippines and 2University of
the Philippines, Philippines
Design Issues on Software Aspects and Simulation Tools for Wireless Sensor Networks
Leelavathi G1, Shaila K2, Venugopal K R3 and L M Patnaik4, 1Govt.S.K.S.J.Technological Institute, India, 2Vivekananda
Institute of Technology, India, 3University Visvesvaraya College of Engineering, India and 4Indian Institute of Science, India
Using Bias Optimiazation for Reversible Data Hiding using Image Interpolation
Andrew Rudder, Wayne Goodridge and Shareeda Mohammed, The University of the West Indies, Trinidad and Tobago.
A 64 Bits Rotor Enhanced Block Cipher (Rebc3)
Ahmed ElShafee, Ahram Canadian University, Egypt.
A Robust Background Removal Algortihms Using Fuzzy C-Means Clustering
S.Lakshmi1 and V.Sankaranarayanan2, 1Jeppiaar Engineering College, India and 2Crescent Engineering College, India.
Efficacy of Attack Detection Capability of IDPS Based on its Deployment in Wired and Wireless Environment
Shalvi Dave1, Bhushan Trivedi2 and Jimit Mahadevia3, 1Indus University, India, 2GLSICT,India and 3Elitecore Technologies
Pvt. Ltd., India
Code Aware Dynamic Source Routing for Distributed Sensor Network
M Abdul Rahiman1, Nishanth Jain1, Arun K. Dubey2 and G Manoj Kumar3, 1AICTE, Ministry of HRD,Govt of India, India,
2Bharati Vidyapeeth College of Engineering, India and 3LBS Inst of Tech for Women, India.
Resonance Based Micromechanical Cantilever for Gas Sensing
Subhashini. S1 and Vimala Juliet. A2, 1Sathyabama University, India and 2SRM University, India
Traceback of DOS Over Autonomous Systems
Mohammed Alenezi and Martin J Reed, School of Computer Science and Electronic Engineering, University of Essex, UK
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicular Ad-hoc Network Environment
Vaishali D. Khairnar and Ketan Kotecha, Institute of Technology Nirma University, India
A Novel Secure Cosine Similarity Computation Scheme with Malicious Adversaries
Dexin Yang1, Chunjing Lin2 and Bo Yang2, 1Guangzhou City Polytechnic, China and 2Shaanxi Normal University, China
Improved Ids using Layered CRFS with Logon Restrictions and Mobile Alerts Based on Deviant System Behaviour
Arpitha M1, Geetha V1,Gowranga K H2 and Bhakthavathsalam R2, 1Alpha College Of Engineering, India and
2Indian Institute of Science, India
E-Commerce Systems Security for Small Businesses
Syed (Shawon) M. Rahman and Robert Lackey, Capella University, Minneapolis, USA.

January 2013, Volume 5, Number 1

Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study
Natarajan Meghanathan, Jackson State University, USA
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
Kuo-Tsang Huang1, Jung-Hui Chiu1 and Sung-Shiou Shen2, 1Chang Gung University, Taiwan and 2DE LIN Institute of Technology,
Taiwan
An Integrated Solution for both Monitoring and Controlling for Automization Using Wireless Sensor Networks: A Case Study
M Gnana Seelan and Ch AS Murty, Centre for Development of Advanced Computing - Hyderabad, India
How to Find a Fixed Point in Shuffle Efficiently
Mikako Kageshima and ManabuOkamoto, Kanagawa Institute of Technology, Japan
Ontology-Driven Information Retrieval for Healthcare Information System : A Case Study
Aidarus M. Ibrahim, Hussein A. Hashi and Abdullalem A. Mohamed, University Technology Malaysia (UTM), Malaysia
Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and Support Vector Machines
A. M. Chandrashekhar1 and K. Raghuveer2, 1Sri Jayachamarajendra College of Engineering (SJCE), India and 2National
Institute of Engineering (NIE) Mysore, India
Text Steganographic Approaches: A Comparison
Monika Agarwal, PDPM-IIITDM Jabalpur, India