International Journal of Security and Its Applications最新文献

筛选
英文 中文
Recent Cyber Security Breaches and Preventive Measures 近期网络安全漏洞及防范措施
International Journal of Security and Its Applications Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.11
N. Thirupathi Rao, D. Bhattacharyya
{"title":"Recent Cyber Security Breaches and Preventive Measures","authors":"N. Thirupathi Rao, D. Bhattacharyya","doi":"10.33832/ijsia.2019.13.4.11","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.11","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"117-126"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44320299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EACO: An Enhanced Ant Colony Optimization Algorithm for Task Scheduling in Cloud Computing EACO:一种用于云计算任务调度的增强蚁群优化算法
International Journal of Security and Its Applications Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.09
Surabhi Sharma, R. Jain
{"title":"EACO: An Enhanced Ant Colony Optimization Algorithm for Task Scheduling in Cloud Computing","authors":"Surabhi Sharma, R. Jain","doi":"10.33832/ijsia.2019.13.4.09","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.09","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"91-100"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45356853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
LTA: A Linked Timestamp based Authentication Protocol for Sensor Network LTA:一种用于传感器网络的基于链接时间戳的认证协议
International Journal of Security and Its Applications Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.10
A. Gautam, Rakesh Kumar
{"title":"LTA: A Linked Timestamp based Authentication Protocol for Sensor Network","authors":"A. Gautam, Rakesh Kumar","doi":"10.33832/ijsia.2019.13.4.10","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.10","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"101-116"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41899638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Local Pattern Transformation Technique for Brain Signal EEG 脑信号脑电图的局部模式变换技术
International Journal of Security and Its Applications Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.07
S AravinthRaj, V. Venkatesh
{"title":"Local Pattern Transformation Technique for Brain Signal EEG","authors":"S AravinthRaj, V. Venkatesh","doi":"10.33832/ijsia.2019.13.4.07","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.07","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"67-74"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49166488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing Block Chain Security to Prevent DDOS Attacks in Networks 实施区块链安全防范网络DDOS攻击
International Journal of Security and Its Applications Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.03
Ashu, R. Mahajan, S. Zafar
{"title":"Implementing Block Chain Security to Prevent DDOS Attacks in Networks","authors":"Ashu, R. Mahajan, S. Zafar","doi":"10.33832/ijsia.2019.13.4.03","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"27-40"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44104274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
K- Nearest Neighbors based Automatic Modulation Classifier for Next Generation Adaptive Radio Systems 下一代自适应无线电系统中基于K近邻的自动调制分类器
International Journal of Security and Its Applications Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.04
M. Subbarao, P. Samundiswary
{"title":"K- Nearest Neighbors based Automatic Modulation Classifier for Next Generation Adaptive Radio Systems","authors":"M. Subbarao, P. Samundiswary","doi":"10.33832/ijsia.2019.13.4.04","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.04","url":null,"abstract":"— This paper presents a verity of K-Nearest Neighbors (KNN) classifiers along with different statistical features in order to classify MPSK and MQAM signals. Further, the performance of proposed KNN classifiers with different values of ‘K’ and distance functions are analyzed under non-ideal channel conditions. Finally, to prove the superiority of the proposed KNN classifiers the performance is compared with that of the literature approaches at various SNR values.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"41-50"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43525932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CAR-DSDV: Context Aware Routing In Delay Tolerant Network (DTN) CAR-DSDV:容延迟网络(DTN)中的上下文感知路由
International Journal of Security and Its Applications Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.02
P. Gautam, Pranshu Mittal, Sapna Chaudhary, R. Johari, Arsala Saleem
{"title":"CAR-DSDV: Context Aware Routing In Delay Tolerant Network (DTN)","authors":"P. Gautam, Pranshu Mittal, Sapna Chaudhary, R. Johari, Arsala Saleem","doi":"10.33832/ijsia.2019.13.4.02","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"13-26"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42110360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Molecular Mechanisms and Therapeutics for Spinocerebellar Ataxia Type 2. 脊髓小脑共济失调 2 型的分子机制和治疗方法。
International Journal of Security and Its Applications Pub Date : 2019-10-01 DOI: 10.1007/s13311-019-00777-6
Polina A Egorova, Ilya B Bezprozvanny
{"title":"Molecular Mechanisms and Therapeutics for Spinocerebellar Ataxia Type 2.","authors":"Polina A Egorova, Ilya B Bezprozvanny","doi":"10.1007/s13311-019-00777-6","DOIUrl":"10.1007/s13311-019-00777-6","url":null,"abstract":"<p><p>The effective therapeutic treatment and the disease-modifying therapy for spinocerebellar ataxia type 2 (SCA2) (a progressive hereditary disease caused by an expansion of polyglutamine in the ataxin-2 protein) is not available yet. At present, only symptomatic treatment and methods of palliative care are prescribed to the patients. Many attempts were made to study the physiological, molecular, and biochemical changes in SCA2 patients and in a variety of the model systems to find new therapeutic targets for SCA2 treatment. A better understanding of the uncovered molecular mechanisms of the disease allowed the scientific community to develop strategies of potential therapy and helped to create some promising therapeutic approaches for SCA2 treatment. Recent progress in this field will be discussed in this review article.</p>","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"10 1","pages":"1050-1073"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6985344/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89152241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Issues and Various Attacks in Wireless Sensor Network: A Survey 无线传感器网络中的安全问题和各种攻击:综述
International Journal of Security and Its Applications Pub Date : 2019-09-30 DOI: 10.33832/ijsia.2019.13.3.02
S. Raj, Divya Midhunchakkaravarthy, D. Bhattacharyya
{"title":"Security Issues and Various Attacks in Wireless Sensor Network: A Survey","authors":"S. Raj, Divya Midhunchakkaravarthy, D. Bhattacharyya","doi":"10.33832/ijsia.2019.13.3.02","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.3.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49390674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensemble Technique for Intruder Detection in Network Traffic 网络流量中入侵者检测的集成技术
International Journal of Security and Its Applications Pub Date : 2019-09-30 DOI: 10.33832/ijsia.2019.13.3.01
Amar Agrawal, Sabah Mohammed, J. Fiaidhi
{"title":"Ensemble Technique for Intruder Detection in Network Traffic","authors":"Amar Agrawal, Sabah Mohammed, J. Fiaidhi","doi":"10.33832/ijsia.2019.13.3.01","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.3.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41731657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信