International Journal of Network Security & Its Applications (IJNSA)

Volume 12

November 2020, Volume 12, Number 6

Hybrid Chaotic Method for Medical Images Ciphering
Seham Muawadh Ali Ebrahim, Modern Academy for Engineering and Information Technology, Egypt
The Brazilian Law on Personal Data Protection
Jonatas S. de Souza1, 2, Jair M. Abe1, Luiz A. de Lima1, 2 and Nilson A. de Souza2, 3, 1Paulista University, São Paulo, Brazil,
2National Association of Data Privacy Professionals, ANPPD, Brazil, 3São Paulo State Supplementary Pension Foundation,
PREVCOM, Brazil

September 2020, Volume 12, Number 5

Secured AODV to Protect WSN Against Malicious Intrusion
Saad Al-Ahmadi and Abdulrahman Alseqyani, King Saud University, Saudi Arabia

July 2020, Volume 12, Number 4

Enhanced Authentication for Web-Based Security using Keystroke Dynamics
Siti Rahayu Selamat1, Teh Teck Guan2 and Robiah Yusof1, 1Universiti Teknikal Malaysia Melaka, Malaysia,
2Infineon Technologies Melaka, Malaysia
A Proposed Model for Dimensionality Reduction to Improve the Classification Capability of Intrusion Protection Systems
Hajar Elkassabi, Mohammed Ashour and Fayez Zaki, Mansoura University, Egypt
Effective Method for Managing Automation and Monitoring in Multi-cloud Computing: Panacea for Multi-cloud Security Snags
Uchechukwu Emejeamara1, Udochukwu Nwoduh2 and Andrew Madu2, 1IEEE Computer Society, Connecticut Section, USA,
2Federal Polytechnic Nekede, Nigeria

May 2020, Volume 12, Number 3

Ontology-based Model for Security Assessment: Predicting Cyberattacks through Threat Activity Analysis
Pavel Yermalovich and Mohamed Mejri, Université Laval, Canada
Advanced Multimedia Platform based on Big Data and Artificial Intelligence Improving Cybersecurity
Alessandro Massaro1*, Gaetano Panarosa1, Nicola Savino1, Simone Buonopane2 and Angelo Galiano1,
1Dyrecta Lab, IT Research Laboratory, Italy, 2Spacertron srl, Italy
An Empirical Analysis of Email Forensics Tools
Ahmad Ghafarian, Ash Mady and Kyung Park, University of North Georgia, USA
PDMLP: Phishing Detection using Multilayer Perceptron
Saad Al-Ahmadi and Tariq Lasloum, King Saud University, Saudi Arabia

March 2020, Volume 12, Number 2

Security Consideration in Peer-to-peer Networks with A Case Study Application
Nick Rahimi, Southern Illinois University, USA
Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dynamic Billing System
in Smart Grid Using Permissioned Blockchain

Ozgur Oksuz, Adiyaman University, Turkey
A Survey on Malware Detection and Analysis Tools
Sajedul Talukder1 and Zahidur Talukder2, 1Edinboro University, USA and 2University of Texas at Arlington, USA
An Enhanced User Authentication Framework in Cloud Computing
Hasan Al-Refai, Khaldoun Batiha, Ahmad M. Al-Refai, Philadelphia University, Jordan

January 2020, Volume 12, Number 1

A Survey on the Use of Data Clustering for Intrusion Detection System in Cybersecurity
Binita Bohara1, Jay Bhuyan1, Fan Wu1 and Junhua Ding2, 1Tuskegee University, USA and 2University of North Texas, USA
Self-organization and Autonomous Network Survey
Houneida SAKLY, Campus University of Mannouba, Tunisia