{"title":"Recent Cyber Security Breaches and Preventive Measures","authors":"N. Thirupathi Rao, D. Bhattacharyya","doi":"10.33832/ijsia.2019.13.4.11","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.11","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"117-126"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44320299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EACO: An Enhanced Ant Colony Optimization Algorithm for Task Scheduling in Cloud Computing","authors":"Surabhi Sharma, R. Jain","doi":"10.33832/ijsia.2019.13.4.09","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.09","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"91-100"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45356853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LTA: A Linked Timestamp based Authentication Protocol for Sensor Network","authors":"A. Gautam, Rakesh Kumar","doi":"10.33832/ijsia.2019.13.4.10","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.10","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"101-116"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41899638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Local Pattern Transformation Technique for Brain Signal EEG","authors":"S AravinthRaj, V. Venkatesh","doi":"10.33832/ijsia.2019.13.4.07","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.07","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"67-74"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49166488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing Block Chain Security to Prevent DDOS Attacks in Networks","authors":"Ashu, R. Mahajan, S. Zafar","doi":"10.33832/ijsia.2019.13.4.03","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"27-40"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44104274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"K- Nearest Neighbors based Automatic Modulation Classifier for Next Generation Adaptive Radio Systems","authors":"M. Subbarao, P. Samundiswary","doi":"10.33832/ijsia.2019.13.4.04","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.04","url":null,"abstract":"— This paper presents a verity of K-Nearest Neighbors (KNN) classifiers along with different statistical features in order to classify MPSK and MQAM signals. Further, the performance of proposed KNN classifiers with different values of ‘K’ and distance functions are analyzed under non-ideal channel conditions. Finally, to prove the superiority of the proposed KNN classifiers the performance is compared with that of the literature approaches at various SNR values.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"41-50"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43525932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Raj, Divya Midhunchakkaravarthy, D. Bhattacharyya
{"title":"Security Issues and Various Attacks in Wireless Sensor Network: A Survey","authors":"S. Raj, Divya Midhunchakkaravarthy, D. Bhattacharyya","doi":"10.33832/ijsia.2019.13.3.02","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.3.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49390674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensemble Technique for Intruder Detection in Network Traffic","authors":"Amar Agrawal, Sabah Mohammed, J. Fiaidhi","doi":"10.33832/ijsia.2019.13.3.01","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.3.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41731657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the Physical Security of Microchip","authors":"Dominik Malcik, M. Drahanský","doi":"10.33832/ijsia.2019.13.3.03","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.3.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69499491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}