{"title":"Recent Cyber Security Breaches and Preventive Measures","authors":"N. Thirupathi Rao, D. Bhattacharyya","doi":"10.33832/ijsia.2019.13.4.11","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.11","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"117-126"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44320299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EACO: An Enhanced Ant Colony Optimization Algorithm for Task Scheduling in Cloud Computing","authors":"Surabhi Sharma, R. Jain","doi":"10.33832/ijsia.2019.13.4.09","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.09","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"91-100"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45356853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LTA: A Linked Timestamp based Authentication Protocol for Sensor Network","authors":"A. Gautam, Rakesh Kumar","doi":"10.33832/ijsia.2019.13.4.10","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.10","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"101-116"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41899638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Local Pattern Transformation Technique for Brain Signal EEG","authors":"S AravinthRaj, V. Venkatesh","doi":"10.33832/ijsia.2019.13.4.07","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.07","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"67-74"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49166488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing Block Chain Security to Prevent DDOS Attacks in Networks","authors":"Ashu, R. Mahajan, S. Zafar","doi":"10.33832/ijsia.2019.13.4.03","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"27-40"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44104274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"K- Nearest Neighbors based Automatic Modulation Classifier for Next Generation Adaptive Radio Systems","authors":"M. Subbarao, P. Samundiswary","doi":"10.33832/ijsia.2019.13.4.04","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.04","url":null,"abstract":"— This paper presents a verity of K-Nearest Neighbors (KNN) classifiers along with different statistical features in order to classify MPSK and MQAM signals. Further, the performance of proposed KNN classifiers with different values of ‘K’ and distance functions are analyzed under non-ideal channel conditions. Finally, to prove the superiority of the proposed KNN classifiers the performance is compared with that of the literature approaches at various SNR values.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"41-50"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43525932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Molecular Mechanisms and Therapeutics for Spinocerebellar Ataxia Type 2.","authors":"Polina A Egorova, Ilya B Bezprozvanny","doi":"10.1007/s13311-019-00777-6","DOIUrl":"10.1007/s13311-019-00777-6","url":null,"abstract":"<p><p>The effective therapeutic treatment and the disease-modifying therapy for spinocerebellar ataxia type 2 (SCA2) (a progressive hereditary disease caused by an expansion of polyglutamine in the ataxin-2 protein) is not available yet. At present, only symptomatic treatment and methods of palliative care are prescribed to the patients. Many attempts were made to study the physiological, molecular, and biochemical changes in SCA2 patients and in a variety of the model systems to find new therapeutic targets for SCA2 treatment. A better understanding of the uncovered molecular mechanisms of the disease allowed the scientific community to develop strategies of potential therapy and helped to create some promising therapeutic approaches for SCA2 treatment. Recent progress in this field will be discussed in this review article.</p>","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"10 1","pages":"1050-1073"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6985344/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89152241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Raj, Divya Midhunchakkaravarthy, D. Bhattacharyya
{"title":"Security Issues and Various Attacks in Wireless Sensor Network: A Survey","authors":"S. Raj, Divya Midhunchakkaravarthy, D. Bhattacharyya","doi":"10.33832/ijsia.2019.13.3.02","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.3.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49390674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensemble Technique for Intruder Detection in Network Traffic","authors":"Amar Agrawal, Sabah Mohammed, J. Fiaidhi","doi":"10.33832/ijsia.2019.13.3.01","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.3.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41731657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}