International Journal of Network Security & Its Applications (IJNSA)

Current Issue

July 2021, Volume 13, Number 4

Use of MARKOV Chain for Early Detecting DDoS Attacks
Chin-Ling Chen1 and Jian-Ming Chen2, 1National Pingtung University, Taiwan, 2Genesis Technology, Inc., Taiwan
Constructing the 2-Element AGDS Protocol based on the Discrete Logarithm Problem
Tuan Nguyen Kim1, Duy Ho Ngoc2 and Nikolay A. Moldovyan3, 1Duy Tan University, Vietnam, 2Ha Noi, Vietnam,
3St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia
Proof-of-Reputation: An Alternative Consensus Mechanism for Blockchain Systems
Oladotun Aluko1 and Anton Kolonin2, 1Novosibirsk State University, Russia, 2Aigents Group, Russia
Critical Infrastructure Cybersecurity Challenges: IoT in Perspective
Akwetey Henry Matey1, Paul Danquah2, Godfred Yaw Koi-Akrofi1 and Isaac Asampana1, 1University of
Professional Studies Accra, 2Heritage Christian University
Collective Signature Protocols for Signing Groups based on Problem of Finding Roots Modulo Large Prime Number
Tuan Nguyen Kim1, Duy Ho Ngoc2 and Nikolay A. Moldovyan3, 1Duy Tan University, Vietnam, 2Ha Noi, Vietnam,
3St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia

May 2021, Volume 13, Number 3

Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks
David A. Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA
Effect Man-In the Middle on the Network Performance in Various Attack Strategies
Iyas Alodat, Jerash University, Jordan
Information-Centric Blockchain Technology for the Smart Grid
Lanqin Sang and Henry Hexmoor, Southern Illinois University, USA
A Survey on Federated Identity Management Systems Limitation and Solutions
Maha Aldosary and Norah Alqahtani, Imam Mohammad Ibn Saud Islamic University, KSA

March 2021, Volume 13, Number 2

Comparison of Malware Classification Methods using Convolutional Neural Network based on API Call Stream
Matthew Schofield, Gulsum Alicioglu, Bo Sun, Russell Binaco, Paul Turner, Cameron Thatcher, Alex Lam and
Anthony Breitzman, Rowan University, USA
Performance Evaluation of Machine Learning Techniques for DOS Detection in Wireless Sensor Network
Lama Alsulaiman and Saad Al-Ahmadi, King Saud University, Saudi Arabia
Applying the Health Belief Model to Cardiac Implanted Medical Device Patients
George W. Jackson1 and Shawon Rahman2, 1Capella University, USA, 2University of HawaiiHilo, USA
A Literature Survey and Analysis on Social Engineering Defense Mechanisms and Infosec Policies
Dalal Alharthi and Amelia Regan, University of California Irvine, USA
Phishing Mitigation Techniques: A Literature Survey
Wosah Peace Nmachi and Thomas Win, School of Computing & Engineering University of Gloucestershire, United Kingdom

January 2021, Volume 13, Number 1

Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms
William R. Simpson and Kevin E. Foltz, The Institute for Defense Analyses (IDA), USA
Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset
Geeta Kocher1 and Gulshan Kumar2, 1MRSPTU, India, 2SBSSTC, India
Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis
Anna Georgiadou, Spiros Mouzakitis and Dimitris Askounis, National Technical University of Athens, Greece
Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys
Cheman Shaik, VISH Consulting Services Inc, USA
Game Theory Application Resources Management and Distribution in Blockchain Network
Cong Hung Tran1, Dien Tam Le1, 2, Thanh Hieu Huynh3, 1Posts and Telecommunications Institute of Technology, Vietnam,
2Thu Duc Technology College, Vietnam, 3Saigon University, Vietnam