International Journal of Network Security & Its Applications (IJNSA)

Current Issue

November 2021, Volume 13, Number 6

Detection Method for Classifying Malicious Firmware
David Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA
Malicious Javascript Detection based on Clustering Techniques
Nguyen Hong Son1 and Ha Thanh Dung2, 1Faculty of Information Technology Posts and Telecommunications Institute
of Technology, Vietnam, 2Saigon University, Vietnam
Understanding Traffic Patterns of Covid-19 IoC in Huge Academic Backbone Network SINET
Ruo Ando1, Youki Kadobayashi2, Hiroki Takakura1 and Hiroshi Itoh3, 1National Institute of Informatics, Japan,
2Nara Institute of Science and Technology, Japan, 3National Institute of Information and Communications Technology, Japan
Improving Security and Fairness in Federated Learning Systems
Andrew R. Short1, Τheofanis G. Orfanoudakis2 and Helen C. Leligou1, 1University of West Attica, Greece,
2Hellenic Open University, Greece
Improve Security in Smart Cities Based on IoT, Solve Cyber Electronic Attacks with Technology by using Packet Tracer
Raed Al-hamarneh, University of Almaarefa, Kingdom of Saudi Arabia
System End-User Actions as a Threat to Information System Security
Paulus Kautwima, Titus Haiduwa, Kundai Sai, Valerianus Hashiyana and Nalina Suresh, University of Namibia, Namibia
Information and Communication Security Mechanisms For Microservices-based Systems
Lenin Leines-Vite, Juan Carlos Pérez-Arriaga and Xavier Limón, Universidad Veracruzana, Mexico
Comparative Review of Malware Analysis Methodologies
Ioannis G. Kiachidis and Dimitrios A. Baltatzis, International Hellenic University, Greece
Can Blockchain be a Solution to IoT Technical and Security Issues
Adanma Cecilia Eberendu1, Titus Ifeanyi Chinebu2, 1Madonna University, Nigeria, 2Federal College of Dental
Technology and Therapy, Nigeria

September 2021, Volume 13, Number 5

Evaluation of a Blockchain-Enabled Resource Management Mechanism for NGNs
Michael Xevgenis, Dimitrios G. Kogias, Ioannis Christidis, Charalampos Patrikakis and Helen C. Leligou, University
of West Attica, Greece
Secure Blockchain Decentralized Voting for Verified Users
Piotr Pospiech, Aleksander Marianski and Michal Kedziora, Wroclaw University of Science and Technology, Poland

July 2021, Volume 13, Number 4

Use of MARKOV Chain for Early Detecting DDoS Attacks
Chin-Ling Chen1 and Jian-Ming Chen2, 1National Pingtung University, Taiwan, 2Genesis Technology, Inc., Taiwan
Constructing the 2-Element AGDS Protocol based on the Discrete Logarithm Problem
Tuan Nguyen Kim1, Duy Ho Ngoc2 and Nikolay A. Moldovyan3, 1Duy Tan University, Vietnam, 2Ha Noi, Vietnam,
3St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia
Proof-of-Reputation: An Alternative Consensus Mechanism for Blockchain Systems
Oladotun Aluko1 and Anton Kolonin2, 1Novosibirsk State University, Russia, 2Aigents Group, Russia
Critical Infrastructure Cybersecurity Challenges: IoT in Perspective
Akwetey Henry Matey1, Paul Danquah2, Godfred Yaw Koi-Akrofi1 and Isaac Asampana1, 1University of
Professional Studies Accra, 2Heritage Christian University
Collective Signature Protocols for Signing Groups based on Problem of Finding Roots Modulo Large Prime Number
Tuan Nguyen Kim1, Duy Ho Ngoc2 and Nikolay A. Moldovyan3, 1Duy Tan University, Vietnam, 2Ha Noi, Vietnam,
3St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia

May 2021, Volume 13, Number 3

Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks
David A. Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA
Effect Man-In the Middle on the Network Performance in Various Attack Strategies
Iyas Alodat, Jerash University, Jordan
Information-Centric Blockchain Technology for the Smart Grid
Lanqin Sang and Henry Hexmoor, Southern Illinois University, USA
A Survey on Federated Identity Management Systems Limitation and Solutions
Maha Aldosary and Norah Alqahtani, Imam Mohammad Ibn Saud Islamic University, KSA

March 2021, Volume 13, Number 2

Comparison of Malware Classification Methods using Convolutional Neural Network based on API Call Stream
Matthew Schofield, Gulsum Alicioglu, Bo Sun, Russell Binaco, Paul Turner, Cameron Thatcher, Alex Lam and
Anthony Breitzman, Rowan University, USA
Performance Evaluation of Machine Learning Techniques for DOS Detection in Wireless Sensor Network
Lama Alsulaiman and Saad Al-Ahmadi, King Saud University, Saudi Arabia
Applying the Health Belief Model to Cardiac Implanted Medical Device Patients
George W. Jackson1 and Shawon Rahman2, 1Capella University, USA, 2University of HawaiiHilo, USA
A Literature Survey and Analysis on Social Engineering Defense Mechanisms and Infosec Policies
Dalal Alharthi and Amelia Regan, University of California Irvine, USA
Phishing Mitigation Techniques: A Literature Survey
Wosah Peace Nmachi and Thomas Win, School of Computing & Engineering University of Gloucestershire, United Kingdom

January 2021, Volume 13, Number 1

Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms
William R. Simpson and Kevin E. Foltz, The Institute for Defense Analyses (IDA), USA
Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset
Geeta Kocher1 and Gulshan Kumar2, 1MRSPTU, India, 2SBSSTC, India
Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis
Anna Georgiadou, Spiros Mouzakitis and Dimitris Askounis, National Technical University of Athens, Greece
Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys
Cheman Shaik, VISH Consulting Services Inc, USA
Game Theory Application Resources Management and Distribution in Blockchain Network
Cong Hung Tran1, Dien Tam Le1, 2, Thanh Hieu Huynh3, 1Posts and Telecommunications Institute of Technology, Vietnam,
2Thu Duc Technology College, Vietnam, 3Saigon University, Vietnam