International Journal of Network Security & Its Applications (IJNSA)

Volume 10

November 2018, Volume 10, Number 6

A Multi-Layer Hybrid Text Steganography for Secret Communication Using Word Tagging and RGB Color Coding
Ali F. Al-Azzawi1, Philadelphia University, Jordan
Secure Third Party Auditor(TPA) for Ensuring Data Integrity in Fog Computing
KashifMunir and Lawan A. Mohammed, University of Hafr Al Batin, KSA
IOT and Security-Privacy Concerns: A Systematic Mapping Study
Moussa WITTI and Dimitri KONSTANTAS, Information Science Institute University of Geneva, Switzerland
Biometric Smartcard Authentication for Fog Computing
Kashif Munir and Lawan A. Mohammed, University of Hafr Al Batin, KSA

September 2018, Volume 10, Number 5

Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
Nicholas J. Miller and Mehrdad Aliasgari, California State University Long Beach, USA
The Effect of Information Technology Using Enterprise Security Risk Management
Michael O. Adekanye and Shawon S. M. Rahman, University of Hawaii-Hilo, USA
A Tiered Blockchain Framework for Vehicular Forensics
Marcel C. Ugwu1, Izunna U. Okpala2, Collins I. Oham3 and Cosmas I. Nwakanma3, 1Seamfix Nigeria Limited, Nigeria,
2National Institute for Nigerian Languages, Nigeria and 3Federal University of Technology, Nigeria

July 2018, Volume 10, Number 4

Mining Patterns of Sequential Malicious APIs to Detect Malware
Abdurrahman Pektas1, Elif Nurdan Pektas2 and Tankut Acarman1, 1Galatasaray University, Turkey and 2Siemens - Turkey, Turkey
A Method for Encrypting and Decrypting Wave Files
Mohamad M. Al-laham, Mohamad a. Mai'iteh, Hasan Rashaideh and Ziad Al-Qadi, Al-Balqa Applied University, Jordan

May 2018, Volume 10, Number 3

The (In)Security of Topology Discovery in Openflow-Based Software Defined Network
Talal Alharbi, Marius Portmann and Farzaneh Pakzad, The University of Queensland, Australia
Symmetric Key Management Scheme for Hierarchical Wireless Sensor Networks
Mohammed A. Al-taha and Ra'ad A. Muhajjar, Basrah University, Iraq
Low Area FPGA Implementation of DROM-CSLA-QTL Architecture for Cryptographic Applications
Shailaja A1 and Krishnamurthy G N2, 1VTU-RRC, India and 2BNM Institute of Technology, India
A Novel Approach of Image Steganography for Secret Communication Using Spacing Method
Wa'el Ibrahim A. Almazaydeh1, H.S.Sheshadri1 and S.K.Padma2, 1P.E.S. College of Engineering, India and
2Sri Jayachamarajendra College of Engineering, India

March 2018, Volume 10, Number 2

Unconstrained Endpoint Security System : UEPTSS
Fatema Bannat Wala and Chase Cotton, University of Delaware, USA
VANET Security and Privacy - An Overview
Marvy B. Mansour1, Cherif Salama2, Hoda K. Mohamed3 and Sherif A. Hammad4, 1British University in Egypt, Egypt,
2,3Ain Shams University, Egypt and 4Avelabs, Germany

January 2018, Volume 10, Number 1

Click Spam Prevention Model for Online Advertisement
Nicola Zingirian and Michele Benini, University of Padova, Italy
Protecting Privacy in VANETs Using Mix Zones with Virtual Pseudonym Change
Belal Amro, Hebron University, Palestine