Journal of Computer Networks and Communications最新文献

筛选
英文 中文
Tampering Reveal Technique for Iris Images 虹膜图像的篡改显示技术
IF 2
Journal of Computer Networks and Communications Pub Date : 2020-06-30 DOI: 10.47277/ijcncs/8(6)1
Rasha Thabit, J. Ali, Doaa Subhi
{"title":"Tampering Reveal Technique for Iris Images","authors":"Rasha Thabit, J. Ali, Doaa Subhi","doi":"10.47277/ijcncs/8(6)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(6)1","url":null,"abstract":"Nowadays, many biometric based security systems depend on the iris images for authentication because of their features and ease of use. However, storing and sharing these sensitive images through open access networks will expose them to tampering. In order to ensure the safety of the iris images, this paper presents a new tampering reveal technique based on watermarking in the transform domain. In the proposed technique, the iris region is selected and isolated using interactive segmentation process (ISA). The authentication bits have been generated from the iris region (IR) and embedded in the Slantlet transform coefficients of the remaining part of the iris image which has been named as non-iris region (NIR). The use of ISA ensures the intactness of IR because it has been excluded from the embedding process. Several experiments have been conducted to test the visual quality, capacity, payload, and the tampering reveal performance. The experiments proved the ability of the proposed technique to reveal and localize any tampering in IR, in addition, the difference between the original iris image and the watermarked iris image is imperceptible","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"8 1","pages":"46-51"},"PeriodicalIF":2.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43096220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Community Development Training with Eco-print Training Wukirsari Village, Sleman District, Indonesia 印尼Sleman地区Wukirsari村的社区发展培训
IF 2
Journal of Computer Networks and Communications Pub Date : 2020-04-30 DOI: 10.47277/ijcncs/8(4)1
T. Mardiana, A. Warsiki, Sucahyo Heriningsih
{"title":"Community Development Training with Eco-print Training Wukirsari Village,\u0000 Sleman District, Indonesia","authors":"T. Mardiana, A. Warsiki, Sucahyo Heriningsih","doi":"10.47277/ijcncs/8(4)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(4)1","url":null,"abstract":"This community empowerment aims to explore the natural potential of the\u0000 village of Wukirsari, Sleman Regency, as well as develop the villages\u0000 creative economy through ecoprint training, as a vehicle for the villages\u0000 creative economy based on leaf potential. The training method using various\u0000 references and empowering the community to make ecoprints was followed by 15\u0000 mothers who were representatives of the joint business group. The results of\u0000 this community empowerment produce village potential namely leaves, and\u0000 training approaches by studying the conditions and rural life of, with, and\u0000 by village communities. The concept of the ecoprint training approach\u0000 emphasizes community involvement in all activities. The community is\u0000 involved in the planners and implementers of the ecoprint training program\u0000 and not just as an audience in ecoprint making training. The results of the\u0000 ecoprint training are expected to increase the creative economy that has the\u0000 potential to be developed by villagers, as a form of participation in\u0000 building village businesses, and to be able to provide welfare for the\u0000 residents of their village","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"8 1","pages":"32-36"},"PeriodicalIF":2.0,"publicationDate":"2020-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47374924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cyber-attacks on Saudi Arabia Environment 对沙特阿拉伯环境的网络攻击
IF 2
Journal of Computer Networks and Communications Pub Date : 2020-03-31 DOI: 10.47277/ijcncs/8(3)1
Rawan Abdulaziz Al-Mulhim, Lama Alzamil, Fay Mohammed Al-Dossary
{"title":"Cyber-attacks on Saudi Arabia Environment","authors":"Rawan Abdulaziz Al-Mulhim, Lama Alzamil, Fay Mohammed Al-Dossary","doi":"10.47277/ijcncs/8(3)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(3)1","url":null,"abstract":"Even though cyber-attacks can’t be compared to a nuclear attack but they both pose a serious threat to national and international security. As we witness today cyberwarfare is increasing and Saudi Arabia has become a major target of Cyber-attacks as a result of its economic and digital revolution, high technology adoption and the growth of the gas and oil industry. This paper presents, a case study of the cyber-attacks on the Saudi environment. We focused on two specific malwares Shamoon and Mamba Ransomware. It also explores their methodologies and structure for future defense.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"8 1","pages":"26-31"},"PeriodicalIF":2.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47217888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Hybrid Dragonfly Algorithm with Modified Conjugate Gradient Method 一种改进共轭梯度法的混合蜻蜓算法
IF 2
Journal of Computer Networks and Communications Pub Date : 2020-02-29 DOI: 10.47277/ijcncs/8(2)2
Layth Riyadh Khaleel, Ban Ahmed Mitras Prof.
{"title":"A Novel Hybrid Dragonfly Algorithm with Modified Conjugate Gradient Method","authors":"Layth Riyadh Khaleel, Ban Ahmed Mitras Prof.","doi":"10.47277/ijcncs/8(2)2","DOIUrl":"https://doi.org/10.47277/ijcncs/8(2)2","url":null,"abstract":"Dragonfly Algorithm (DA) is a meta-heuristic algorithm, It is a new algorithm proposed by Mirjalili in (2015) and it simulate the behavior of dragonflies in their search for food and migration. In this paper, a modified conjugate gradient algorithm is proposed by deriving new conjugate coefficient. The sufficient descent and the global convergence properties for the proposed algorithm are proved. Novel hybrid algorithm of the dragonfly (DA) was proposed with modified conjugate gradient Algorithm which develops the elementary society that is randomly generated as the primary society for the dragonfly optimization algorithm using the characteristics of the modified conjugate gradient algorithm. The efficiency of the hybrid algorithm was measured by applying it to (10) of the optimization functions of high measurement with different dimensions and the results of the hybrid algorithm were very good in comparison with the original algorithm.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"8 1","pages":"17-25"},"PeriodicalIF":2.0,"publicationDate":"2020-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45212044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Development of Trend Analysis of Scoring for Good Corporate Governance based on the Decree of the Ministry of State Owned Enterprises Number SK-16/S.MBU/2012 in State Owned Banks that Went Public in the Period 2013-2018 基于国有企业部令SK-16/S的良好公司治理评分趋势分析的发展2013-2018年上市国有银行MBU/2012
IF 2
Journal of Computer Networks and Communications Pub Date : 2020-02-29 DOI: 10.47277/IJCNCS/8(2)1
Hks Negara Di Purnamasari, B. Khaleel
{"title":"The Development of Trend Analysis of Scoring for Good Corporate Governance based on the Decree of the Ministry of State Owned Enterprises Number SK-16/S.MBU/2012 in State Owned Banks that Went Public in the Period 2013-2018","authors":"Hks Negara Di Purnamasari, B. Khaleel","doi":"10.47277/IJCNCS/8(2)1","DOIUrl":"https://doi.org/10.47277/IJCNCS/8(2)1","url":null,"abstract":"The aims of this research is to evaluate the development of Trend Analysis of Good Corporate Governance Scoring based on the Decree of the Ministry of State Owned Enterprises Number SK-16/S.MBU/2012 in SOEs that went public in the next period of the earlier study in 2012, i.e. 2013-2018 (the latest financial statement at the moment). In this study we employed a population sample of SOEs in banking sector that are listed in BEI for the period 2012-2018. Therefore, this period of study is expected to reflect the actual condition on a more consistent basis from year to year. Publicly traded SOEs are selected because every company that has made public offering is required to publish its annual report in order to make its Annual Report more accessible. We can conclude that the development of scoring for Good Corporate Governance—based on the Decree of the Ministry of State Owned Enterprises Number SK16/S.MBU/2012 in State Owned Banks that went public in the period 2013-2018—follows an upward trend that put them into the Excellent category.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"8 1","pages":"10-16"},"PeriodicalIF":2.0,"publicationDate":"2020-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42767531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study to Validate the Performance of Flooding Based Distributed Denial of Service Attacks 基于洪水的分布式拒绝服务攻击性能验证研究
IF 2
Journal of Computer Networks and Communications Pub Date : 2020-01-31 DOI: 10.47277/ijcncs/8(1)1
S. Singh, Ea Bhandari, Kk Saluja, A. L. Sangal
{"title":"Study to Validate the Performance of Flooding Based Distributed Denial of Service Attacks","authors":"S. Singh, Ea Bhandari, Kk Saluja, A. L. Sangal","doi":"10.47277/ijcncs/8(1)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(1)1","url":null,"abstract":"Network technology has experienced explosive growth in the past decades. The generally accepted viewpoint in the security world is that no system or network is totally protected which makes network security an important concern. The work done in this paper focuses on Distributed Denial of Service Attacks (DDoS) where legitimate users are prevented from accessing network services. Distributed Denial of Service (DDoS) Attacks has been increasingly found to be disturbing the normal working of organizations causing billions of rupees of losses. Organizations are trying their best to reduce their losses from these systems. The focus of this paper is to providing our results of experiments in this regard for flooding based DDoS attacking in the simulation environment with NS2.35. This paper point out that the bandwidth may be more easily flooded by UDP-type attacking than by TCP-type one at different attack strength. In this paper we done the validation of DropTail and RED queue under the flooding based DDoS attack, which is better for the legitimate user under the flooding attack.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"8 1","pages":"1-9"},"PeriodicalIF":2.0,"publicationDate":"2020-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41835560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Issues of 5th Generation Technology: A Review 第五代技术安全问题综述
IF 2
Journal of Computer Networks and Communications Pub Date : 2020-01-01 DOI: 10.47277/ijcncs/8(9)1
A. Younas
{"title":"Security Issues of 5th Generation Technology: A Review","authors":"A. Younas","doi":"10.47277/ijcncs/8(9)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(9)1","url":null,"abstract":"In the 20th century, communication placed an important role in our life, whereas 5G technology is known to be the central area for future networking infrastructure. However, with the high pace of gigantic assaults and protection issues, users and other organizations are not quite sure of the security parameters. In this article, we spotlight the elementary security doubts of 5G Technology. A large portion of the data based on literature and studies released by famous networking giants. Consequently, the paper can illuminate it peruses on what is required from 5G Technology and what are fundamental issues in accomplishing those objects","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"8 1","pages":"74-79"},"PeriodicalIF":2.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70809793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Replacement Algorithm of Virtual Service Resources with Dynamic Resource Allocation Based on Traffic Change in Virtual Networks 基于流量变化的虚拟网络动态资源分配的虚拟业务资源替换算法
IF 2
Journal of Computer Networks and Communications Pub Date : 2018-09-26 DOI: 10.12691/jcn-5-1-2
Sakie Horiuchi, T. Tachibana
{"title":"Replacement Algorithm of Virtual Service Resources with Dynamic Resource Allocation Based on Traffic Change in Virtual Networks","authors":"Sakie Horiuchi, T. Tachibana","doi":"10.12691/jcn-5-1-2","DOIUrl":"https://doi.org/10.12691/jcn-5-1-2","url":null,"abstract":"Multiple virtual networks are constructed by using network virtualization technology on a substrate network with network resources. By using virtual service resources, a particular service can be provided with users over each virtual network. Moreover, network virtualization for mobile users has been expected in the future network service. In mobile virtual networks, mobile user moves from a node to other nodes and connects to other access points frequently. Therefore, the traffic on each link and each node in the virtual network changes. Because the quality of the service depends on the amount of traffic on links and nodes, the quality of services changes according to the user’s movement. This paper proposes replacement algorithm of virtual service resources with dynamic resource allocation based on traffic change for mobile applications in virtual networks. In our proposed method, the amount of resources for each node and that for each link are changed based on the traffic change. Moreover, the virtual service resource moves to the adjacent node from a node, and this replacement is repeated until the quality of service satisfies the requested quality. With our proposed method, it is expected that the quality of service can be maintained for mobile users even if the amount of traffic changes. We evaluate the performance of our proposed method with simulation. In numerical examples, it is shown that our proposed method is effective when a larger number users move and the amount of traffic changes.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"9 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2018-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77672586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System 利用模糊推理系统检测Web应用程序中的跨站脚本
IF 2
Journal of Computer Networks and Communications Pub Date : 2018-08-01 DOI: 10.1155/2018/8159548
Bakare K. Ayeni, Junaidu B. Sahalu, Kolawole R. Adeyanju
{"title":"Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System","authors":"Bakare K. Ayeni, Junaidu B. Sahalu, Kolawole R. Adeyanju","doi":"10.1155/2018/8159548","DOIUrl":"https://doi.org/10.1155/2018/8159548","url":null,"abstract":"With improvement in computing and technological advancements, web-based applications are now ubiquitous on the Internet. However, these web applications are becoming prone to vulnerabilities which have led to theft of confidential information, data loss, and denial of data access in the course of information transmission. Cross-site scripting (XSS) is a form of web security attack which involves the injection of malicious codes into web applications from untrusted sources. Interestingly, recent research studies on the web application security centre focus on attack prevention and mechanisms for secure coding; recent methods for those attacks do not only generate high false positives but also have little considerations for the users who oftentimes are the victims of malicious attacks. Motivated by this problem, this paper describes an “intelligent” tool for detecting cross-site scripting flaws in web applications. This paper describes the method implemented based on fuzzy logic to detect classic XSS weaknesses and to provide some results on experimentations. Our detection framework recorded 15% improvement in accuracy and 0.01% reduction in the false-positive rate which is considerably lower than that found in the existing work by Koli et al. Our approach also serves as a decision-making tool for the users.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"23 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1155/2018/8159548","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64737545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance evaluation of routing protocol on AODV and DSR under wormhole attack 虫洞攻击下AODV和DSR路由协议性能评价
IF 2
Journal of Computer Networks and Communications Pub Date : 2013-01-01 DOI: 10.47277/ijcncs/1(1)1
M. G. Sanaei, I. Isnin, M. Bakhtiari
{"title":"Performance evaluation of routing protocol on AODV and DSR under wormhole attack","authors":"M. G. Sanaei, I. Isnin, M. Bakhtiari","doi":"10.47277/ijcncs/1(1)1","DOIUrl":"https://doi.org/10.47277/ijcncs/1(1)1","url":null,"abstract":"Today’s Mobile Ad hoc Networks (MANETs) became a popular issue for scientists, and diverse studies have been made to increase the performance of ad hoc networks. In MANET nodes compromise to forward packets for each other communicate beyond their transmission range. The mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they are exposed to a lot of attacks [1]. One of these attacks called Wormhole Attack that two adversary node collaborate together to transmit the packets in out of band channel. In this paper, performance of Ad hoc on-Demand Distance Vector (AODV) Protocol and Dynamic Source Routing (DSR) protocol are evaluated in presence of wormhole attack and without wormhole attack with Constant Bit Rate (CBR) traffic under dissimilar scalable network mobility. Also we evaluate effect and compare it with standard protocol in term of Packet Delivery Ratio, throughput and End to End Delay via simulation, using Network Simulation2 (NS2) for our research.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"1 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2013-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70809534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信