International Journal of Network Security & Its Applications (IJNSA)

Current Issue

November 2019, Volume 11, Number 6

Quality Assessment of Access Security Controls over Financial Information
Angel R. Otero, Christian Sonnenberg and LuAnn Bean, Florida Institute of Technology, USA

September 2019, Volume 11, Number 5

Machine Learning in Network Security Using KNIME Analytics
Munther Abualkibash, Eastern Michigan University, USA
EUNICERT: Ethereum Based Digital Certificate Verification System
Trong Thua Huynh1, Dang-Khoa Pham2, 1Posts and Telecommunications Institute of Technology, Vietnam and 2FPT Telecom, Vietnam
Map Reduce Implementation for Malicious Websites Classification
Md Maminur Islam1, Subash Poudyal1 and Kishor Datta Gupta2, 1University of Memphis, USA and 2Lamar University, USA

July 2019, Volume 11, Number 4

Authentication Mechanism Enhancement Utilising Secure Repository for Passwordless Handshake
Ioannis A. Pikrammenos, Panagiotis Tolis and Panagiotis Perakis, University of Derby, Greece
A Chaotic Confusion-Diffusion Image Encryption Based on Henon Map
Ashraf Afifi, Taif University, Kingdom of Saudi Arabia
System Call Dependence Graph Based Behavior Decomposition of Android Applications
Bin Zhao, JD.com Silicon Valley R&D Center, USA
A Novel Image Encryption Scheme with Huffman Encoding and Steganography Technique
Manju Kumari1, Vipin Pawar2 and Pawan Kumar3, 1YMCA University of Science and Technology, India, 2Deenbandhu
Chotu Ram University of Science and Technology, India and 3University of Delhi, India
Exploring Challenges and Opportunities in Cybersecurity Risk and Threat Communications Related to the Medical
Internet of Things (MIOT)

George W. Jackson, Jr.1 and Shawon S. M. Rahman2, 1Capella University, USA and 2University of Hawaii-Hilo, USA
Generalized Legendre Polynomials for Support Vector Machines (SVMS) Classification
Ashraf Afifi1 and E.A.Zanaty2, 1Taif University, Kingdom of Saudi Arabia and 2Sohag University, Egypt

May 2019, Volume 11, Number 3

Enhancing the Wordpress System: from Role to Attribute-Based Access Control
Lifeng Cao, Jia Ying Ou and Amirhossein Chinaei, York University, Canada
Classification Procedures for Intrusion Detection Based on KDD CUP 99 Data Set
Shaker El-Sappagh, Ahmed Saad Mohammed and Tarek Ahmed AlSheshtawy, Benha University, Egypt
Xdoser, A Benchmarking Tool for System Load Measurement Using Denial of Service Features
AKM Bahalul Haque, Rabeya Sultana, Mohammad Sajid Fahad , MD Nasif Latif and Md. Amdadul Bari,
North South University, Bangladesh
Multi-Layer Classifier for Minimizing False Intrusion
Shaker El-Sappagh, Ahmed saad Mohammed and Tarek Ahmed AlSheshtawy, Benha University, Egypt
Methods Toward Enhancing RSA Algorithm : A Survey
Shaheen Saad Al-Kaabi and Samir Brahim Belhaouari, Hamad Bin Khalifa University (HBKU), Qatar
Survey on Secure Routing in Vanets
Afef Slama1 and Ilhem Lengliz2, 1University of Manouba, Tunisia and 2Military Academy, Tunisia
A Combination of Temporal Sequence Learning and Data Description for Anomaly - based NIDS
Nguyen Thanh Van1,2, Tran Ngoc Thinh1 and Le Thanh Sach1, 1Ho Chi Minh City University of Technology, VietNam and
2Ho Chi Minh City University of Technology and Education, VietNam

March 2019, Volume 11, Number 2

Performance Analysis of Routing Protocols in MANET Under Malicious Attacks
Gorine1 and Rabia Saleh, 1Gloucestershire University, England
Dual Security Using Image Steganography Based Matrix Partition
Huda H.Al.Ghuraify, Ali A.Al-Bakry, Ahmad T. Al-Jayashi, al-furat al-awsat university, Iraq
A Review of Selected Proposals for Improving Identity Privacy in UMTS
Hiten Choudhury, Cotton University, India
KVEFS: Encrypted File System Based on Distributed Key-Value Stores and FUSE
Giau Ho Kim, Son Hai Le, Trung Manh Nguyen, Vu Thi Ly, Thanh Nguyen Kim, Nguyen Van Cuong, Thanh Nguyen Trung,
and Ta Minh Thanh, Le Quy Don Technical University, Vietnam
Security& Privacy Threats, Attacks and Countermeasures in Internet of Things
Faheem Masoodi1, Shadab Alam2 and Shams Tabrez Siddiqui2, 1University of Kashmir, India and 2Jazan University, KSA

January 2019, Volume 11, Number 1

Malware Detection Using Machine Learning Algorithms and Reverse Engineering of Android Java Code
Michal Kedziora, Paulina Gawin, Michal Szczepanik and Ireneusz Jozwiak, University of Science and Technology Wroclaw, Poland
A Light Weight Solution for Detecting De-Authentication Attack
Rajinder Singh and Satish Kumar, PUSSGRC Hoshiarpur, Punjab, India
A Multi-Layer Arabic Text Steganographic Method Based on Letter Shaping
A.F. Al Azzawi, Philadelphia University, Jordan
Performance Evaluation of Parallel International Data Encryption Algorithm on IMAN1 Super Computer
Ahmad Bany Doumi and Mohammad Qatawneh, University of Jordan, Amman-Jordan
A Survey on Optimization Based Spectrum Sensing Techniques to Reduce ISI and PAPR In OFDM Based Cognitive Radio System
1B.Maheswara Rao, 2S.Baskar, 1Research scholar and 2Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science
and Technology