International Journal of Security and Its Applications最新文献

筛选
英文 中文
Recent Cyber Security Breaches and Preventive Measures 近期网络安全漏洞及防范措施
International Journal of Security and Its Applications Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.11
N. Thirupathi Rao, D. Bhattacharyya
{"title":"Recent Cyber Security Breaches and Preventive Measures","authors":"N. Thirupathi Rao, D. Bhattacharyya","doi":"10.33832/ijsia.2019.13.4.11","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.11","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"117-126"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44320299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EACO: An Enhanced Ant Colony Optimization Algorithm for Task Scheduling in Cloud Computing EACO:一种用于云计算任务调度的增强蚁群优化算法
International Journal of Security and Its Applications Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.09
Surabhi Sharma, R. Jain
{"title":"EACO: An Enhanced Ant Colony Optimization Algorithm for Task Scheduling in Cloud Computing","authors":"Surabhi Sharma, R. Jain","doi":"10.33832/ijsia.2019.13.4.09","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.09","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"91-100"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45356853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
LTA: A Linked Timestamp based Authentication Protocol for Sensor Network LTA:一种用于传感器网络的基于链接时间戳的认证协议
International Journal of Security and Its Applications Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.10
A. Gautam, Rakesh Kumar
{"title":"LTA: A Linked Timestamp based Authentication Protocol for Sensor Network","authors":"A. Gautam, Rakesh Kumar","doi":"10.33832/ijsia.2019.13.4.10","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.10","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"101-116"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41899638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Local Pattern Transformation Technique for Brain Signal EEG 脑信号脑电图的局部模式变换技术
International Journal of Security and Its Applications Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.07
S AravinthRaj, V. Venkatesh
{"title":"Local Pattern Transformation Technique for Brain Signal EEG","authors":"S AravinthRaj, V. Venkatesh","doi":"10.33832/ijsia.2019.13.4.07","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.07","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"67-74"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49166488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing Block Chain Security to Prevent DDOS Attacks in Networks 实施区块链安全防范网络DDOS攻击
International Journal of Security and Its Applications Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.03
Ashu, R. Mahajan, S. Zafar
{"title":"Implementing Block Chain Security to Prevent DDOS Attacks in Networks","authors":"Ashu, R. Mahajan, S. Zafar","doi":"10.33832/ijsia.2019.13.4.03","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"27-40"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44104274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
K- Nearest Neighbors based Automatic Modulation Classifier for Next Generation Adaptive Radio Systems 下一代自适应无线电系统中基于K近邻的自动调制分类器
International Journal of Security and Its Applications Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.04
M. Subbarao, P. Samundiswary
{"title":"K- Nearest Neighbors based Automatic Modulation Classifier for Next Generation Adaptive Radio Systems","authors":"M. Subbarao, P. Samundiswary","doi":"10.33832/ijsia.2019.13.4.04","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.04","url":null,"abstract":"— This paper presents a verity of K-Nearest Neighbors (KNN) classifiers along with different statistical features in order to classify MPSK and MQAM signals. Further, the performance of proposed KNN classifiers with different values of ‘K’ and distance functions are analyzed under non-ideal channel conditions. Finally, to prove the superiority of the proposed KNN classifiers the performance is compared with that of the literature approaches at various SNR values.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"41-50"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43525932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CAR-DSDV: Context Aware Routing In Delay Tolerant Network (DTN) CAR-DSDV:容延迟网络(DTN)中的上下文感知路由
International Journal of Security and Its Applications Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.02
P. Gautam, Pranshu Mittal, Sapna Chaudhary, R. Johari, Arsala Saleem
{"title":"CAR-DSDV: Context Aware Routing In Delay Tolerant Network (DTN)","authors":"P. Gautam, Pranshu Mittal, Sapna Chaudhary, R. Johari, Arsala Saleem","doi":"10.33832/ijsia.2019.13.4.02","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"13-26"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42110360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Issues and Various Attacks in Wireless Sensor Network: A Survey 无线传感器网络中的安全问题和各种攻击:综述
International Journal of Security and Its Applications Pub Date : 2019-09-30 DOI: 10.33832/ijsia.2019.13.3.02
S. Raj, Divya Midhunchakkaravarthy, D. Bhattacharyya
{"title":"Security Issues and Various Attacks in Wireless Sensor Network: A Survey","authors":"S. Raj, Divya Midhunchakkaravarthy, D. Bhattacharyya","doi":"10.33832/ijsia.2019.13.3.02","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.3.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49390674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensemble Technique for Intruder Detection in Network Traffic 网络流量中入侵者检测的集成技术
International Journal of Security and Its Applications Pub Date : 2019-09-30 DOI: 10.33832/ijsia.2019.13.3.01
Amar Agrawal, Sabah Mohammed, J. Fiaidhi
{"title":"Ensemble Technique for Intruder Detection in Network Traffic","authors":"Amar Agrawal, Sabah Mohammed, J. Fiaidhi","doi":"10.33832/ijsia.2019.13.3.01","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.3.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41731657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving the Physical Security of Microchip 提高微芯片的物理安全性
International Journal of Security and Its Applications Pub Date : 2019-09-30 DOI: 10.33832/ijsia.2019.13.3.03
Dominik Malcik, M. Drahanský
{"title":"Improving the Physical Security of Microchip","authors":"Dominik Malcik, M. Drahanský","doi":"10.33832/ijsia.2019.13.3.03","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.3.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69499491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信