{"title":"Improving the Physical Security of Microchip","authors":"Dominik Malcik, M. Drahanský","doi":"10.33832/ijsia.2019.13.3.03","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.3.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69499491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on Space and Security Issues in Cloud Computing","authors":"N. Thirupathi Rao, D. Bhattacharyya","doi":"10.33832/ijsia.2019.13.2.01","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.2.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42193279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Electronic Stick for Blind People: An IOT Application","authors":"C. Sudhakar, N. Thirupathi Rao, D. Bhattacharyya","doi":"10.33832/ijsia.2019.13.1.01","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.1.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44734868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Anamika, K. Mayuri, B. K. K. Reddy, N. Iyengar, Ronnie D. Caytiles
{"title":"Analyzing the performance of Various Fraud Detection Techniques","authors":"G. Anamika, K. Mayuri, B. K. K. Reddy, N. Iyengar, Ronnie D. Caytiles","doi":"10.14257/ijsia.2018.12.5.03","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.5.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2018.12.5.03","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46343077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Issues and Attacks in Wireless Sensor Networks: Some Case Studies","authors":"N. Thirupathi Rao, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/ijsia.2018.12.5.01","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.5.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2018.12.5.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46837069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secured Data Partitioning through Sequence based Mapping and Random Order of Data Separation","authors":"Hazila Hasan, S. Chuprat, M. N. Mahrin","doi":"10.14257/IJSIA.2018.12.5.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.5.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46759601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ancillary Ultrasonic Rangefinder for Autonomous Vehicles","authors":"Y. Wiseman","doi":"10.14257/IJSIA.2018.12.5.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.5.05","url":null,"abstract":"The latest fatal accidents of autonomous vehicle happened because of undetected peer vehicles or persons. These fatal accidents call attention to the rangefinder devices which are a very significant component of every autonomous vehicle. The rangefinder is the starting point for the decision whether the vehicle should continue to go, to stop, or bypassing an object. In this paper an ultrasonic based rangefinder device for autonomous vehicles is presented. The device can be used as an ancillary system in addition to standard LIDAR system used by almost all the autonomous vehicles, with the aim of overcoming the obstructions of conventional LIDAR systems.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49550576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Prioritized Inter Cluster Channel Selection for Tracking User Attack in Cognitive Radio Networks","authors":"Chandra Sekhar Musinana, K. Chilukuri, P. Reddy","doi":"10.14257/ijsia.2018.12.5.04","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.5.04","url":null,"abstract":"Dynamic spectrum allocation evolved in order to allow the spectrum holes to be occupied by secondary users (SUs), but they have to handoff when primary users (PUs) come back, which brings new security problems like Tracking User Attack (TUA) into consideration. TUA might block the control information shared by a Cognitive Radio Network (CRN), if the attacker predicts the control channel frequency based on traffic analysis. This is a typical Denial of Service (DOS) attack preventing users from handoff to available channels. In cluster based channel selection, cluster heads will receive the channel information, about two users at a time and transmit the common preferred channel that was allocated to the base station. The base station selects a channel and returns it to the cluster head which returns them to the requesting CR users. For secure channel selection, the information could be encrypted by the base station and decrypted at the cluster heads to prevent DOS attacks. In this work, we propose selection of available channels based on the priority of the cluster which we term Prioritized Inter Cluster Channel Selection (PICCS). The priority is essentially the history based reputation of the cluster calculated from the attackers in the cluster. Thus, instead of a random choice of a cluster for the available channel, during inter-cluster channel selection, we select a channel from the best available cluster. We observe the effect of such selection on both the delay and the handoffs in the presence of attackers and compare it with the channel selection scheme based on the nearest available cluster.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46251164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Thirupathi Rao, A. Sravani, D. Bhattacharyya, Tai-hoon Kim
{"title":"Security and Assurance Aspects to be Observed in Cloud Computing Based Data Centers: A Study","authors":"N. Thirupathi Rao, A. Sravani, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/ijsia.2018.12.4.01","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.4.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2018.12.4.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49353899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Cyber Security Approaches for Attack Detection, Prediction, and Prevention","authors":"Ayei E. Ibor, F. Oladeji, O. Okunoye","doi":"10.14257/IJSIA.2018.12.4.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.4.02","url":null,"abstract":"The expanding threat landscape has come with a plethora of consequences for most organizations and individuals. This is witnessed in the high volume of cyber-attacks prevalent in the cyberspace. Though several approaches have been proposed and deployed in recent times, most of them are only theoretical masterpieces while others remain computationally infeasible due to the computational requirements for implementing them. Where implementation is possible, the issue of computational complexity becomes a significant overhead in which case a large amount of computing resources such as CPU cycle, memory, network bandwidth and data structures are consumed culminating in tedious, time consuming, and error prone processes. Similarly, most of these techniques are basically reactive and as such can only be triggered when an incident is reported while most depend on the administrator to apply the necessary mitigation processes after an attack has occurred. To this effect, this paper presents a survey of cyber security approaches that have been proposed in the Literature. The paper also reviews the methodologies, strengths and weaknesses of these approaches, and finally identifies areas where further research could focus.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67048212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}