International Journal of Network Security & Its Applications (IJNSA)

Volume 7

November 2015, Volume 7, Number 6

A Novel Evaluation Approach to Finding Lightweight Machine Learning Algorithms for Intrusion Detection in Computer
Network
Yuchen Wang1, Shuxiang Xu2 and Qiongfang Huang1, 1Zhejiang University of Technology, China and 2University of Tasmania,
Australia
A Machine Learning Approach to Anomaly-Based Detection on Android Platforms
Joshua Abah, Waziri O.V, Abdullahi M.B, Arthur U.M and Adewale O.S, Federal University of Technology Minna, Nigeria
A System for Validating and Comparing Host-Based Ddos Detection Mechanisms
Nguyen Hong Son, Post and Telecommunication Institute of Technology, Vietnam

September 2015, Volume 7, Number 5

ANDROINSPECTOR: A System for Comprehensive Analysis of Android Applications
Babu Rajesh V, Phaninder Reddy, Himanshu P and Mahesh U Patil, Centre for Development of Advanced Computing, India
Improved Steganographic Security by Applying an Irregular Image Segmentation and Hybrid Adaptive Neural Networks
with Modified Ant Colony Optimization
Nameer N. El. Emam1 and Kefaya S. Qaddoum2, 1Philadelphia University, Jordan and 2Warwick University, UK
An Intellect Learning on E-Mail Security and Fraud, Spam and Phishing
P.S.Jagadeesh Kumar, S.Meenakshi Sundaram and Ranjeet Kumar, Don Bosco Institute of Technology, India

July 2015, Volume 7, Number 4

Deterring Hacking Strategies via Targeting Scanning Properties
Saad Alsunbul1,2, Phu Dung Le1, Jefferson Tan1, 1Monash University, Australia and 2King Abdullaziz for Science and
Technology, Saudi Arabia
Providing End-To-End Secure Communications in GSM Networks
Heshem A.El Zouka, Arab Academy for Science & Technology and Maritime Transport, Egypt

May 2015, Volume 7, Number 3

Security Challenges as a Factor Affecting the Security of Manet: Attacks and Security Solutions
Nabeel Zanoon1, Nashat Albdour2, Hatem S. A. Hamatta1 and Rasha Moh'd Al-Tarawneh1, 1Al-Balqa Applied University,
Jordan and 2Tafila Technical University, Jordan
An ANN Approach for Network Intrusion Detection using Entropy based Feature Selection
AshalataPanigrahi and ManasRanjanPatra, Berhampur University, India
A Performance Evaluation Of Common Encryption Techniques With Secure Watermark System (Sws)
Ashraf Odeh1, Shadi R.Masadeh1 and Ahmad Azzazi2, 1Isra University, Jordan and 2Applied Science University, Jordan
Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channel In Secured Communication
Anjan K1, Srinath N K1 and Jibi Abraham2, 1R V College of Engineering, India and 2College of Engineering Pune, India

March 2015, Volume 7, Number 2

Exploiting Rhetorical Relations to Multiple Documents Text Summarization
N.Adilah Hanin Zahri1, Fumiyo Fukumoto2, Matsyoshi Suguru2 and Ong Bi Lynn1, 1University of Malaysia Perlis, Malaysia
and 2University of Yamanashi, Japan
An Interactive Visualization Tool for Animating Behavior of Cryptographic Protocols
Mabroka Maeref1, Fatma Algali1, Ahmed Patel2 and Zarina Shukur2, 1Sebha University Libya and 2The National University
of Malaysia, Malaysia
A New Image Steganography Algorithm Based on MLSB Method with Random Pixels Selection
Odai M.Al-Shatanawi and Nameer N.El.Emam, Philadelphia University, Jordan
Certificate Less Key Management Scheme in Manet Using Threshold Cryptography
Shaheena Khatoonand Balwant Singh Thakur, Pt.Ravishankar Shukla University, India
Comprehensive Survey of Possible Security Issues on 4G Networks
Sumant Ku Mohapatra, Biswa Ranjan Swain and Pravanjan Das, Trident Academy of Technology, India

January 2015, Volume 7, Number 1

Multi-Facet Trust Model for Online Social Network Environment
Liu Ban Chieng1, Manmeet Mahinderjit Singh1, Zarul Fitri Zaaba1 and Rohail Hassan2, 1University Sains Malaysia,
Malaysia and 2Universiti Teknologi Petronas, Malaysia
Accessing Secured Data in Cloud Computing Environment
Hasan Omar Al-Sakran, King Saud University, Saudi Arabia
Service Oriented Configuration Management of ‎Software ‎Architecture
Razie Alidoosti, Shahrouz Moaven and Jafar Habibi, Sharif University of Technology, Iran
Runtime Potential Updater File(S) Identification: Does Your Software Updates Automatically With Application Whitelisting?
Janardhan Reddy, Amit Kumar Jha and Sandeep Romana, Centre for Development of Advanced Computing, India
Strong Zero-Knowledge Authentication Based on the Session Keys (SASK)
Younes ASIMI, Abdellah AMGHAR, Ahmed ASIMI and Yassine SADQI, Laboratoire des Systemes informatiques et Vision
(LabSiV), Morocco
A New Secret Handshakes Scheme with Dynamic Matching Based on ZSS
Preeti Kulshrestha and Arun Kumar Pal, G.B. Pant University of Agriculture and Technology, India
A New DNA Based Approach of Generating Key-Dependent Shift Rows Transformation
Auday H. Al-Wattar, Ramlan Mahmod, Zuriati Ahmad Zukarnain and Nur Izura Udzir, Universiti Putra Malaysia, Malaysia