International Journal of Security and Its Applications最新文献

筛选
英文 中文
A New Fault-Tolerant Clustering Protocol for Wireless Sensor Networks 一种新的无线传感器网络容错聚类协议
International Journal of Security and Its Applications Pub Date : 2018-07-31 DOI: 10.14257/IJSIA.2018.12.4.03
Mehdi Nazari Cheraghlou, A. K. Zadeh, M. Haghparast
{"title":"A New Fault-Tolerant Clustering Protocol for Wireless Sensor Networks","authors":"Mehdi Nazari Cheraghlou, A. K. Zadeh, M. Haghparast","doi":"10.14257/IJSIA.2018.12.4.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.4.03","url":null,"abstract":"The major restriction of wireless sensor networks is represented by the energy requirements of the nodes. Also, the main challenge of these networks is their faulttolerance feature since the nodes are scattered in remote, inaccessible areas. Therefore, these issues must be the main concern of the management of the network nodes and all the proposed protocols must be evaluated based on a fault-tolerance capacity and handling basic network restrictions. In this article, we introduce a new fault-tolerant clustering network consisting of two sections: in the first phase, the clustering configuration takes place, and in the second phase, we create a fault-tolerant management architecture that employs fault detection and recovery mechanisms. In the proposed protocol, besides improving the network faulttolerance capacity, the impossibility of recharging nodes was a design factor. Thus, energy conservation and an increased network lifetime are two consequences related to the implementation of our proposed algorithm. The evaluations and comparisons prove that the proposed model in addition to increasing the network nodes' fault-tolerance capacity reduces the overall network energy consumption and lays the foundation for extending the network lifetime.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2018.12.4.03","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47467602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
KAMIES: Security Optimization of KASUMI Algorithm by Increasing Diffusion Level KAMIES:KASUMI算法的安全优化
International Journal of Security and Its Applications Pub Date : 2018-05-31 DOI: 10.14257/IJSIA.2018.12.3.04
Muhammad Salman, Rizki Yugitama, Amiruddin, R. F. Sari
{"title":"KAMIES: Security Optimization of KASUMI Algorithm by Increasing Diffusion Level","authors":"Muhammad Salman, Rizki Yugitama, Amiruddin, R. F. Sari","doi":"10.14257/IJSIA.2018.12.3.04","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.3.04","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49176052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Practical Guidelines for Securing Wireless Local Area Networks (WLANs) 确保无线局域网(WLAN)安全的实用指南
International Journal of Security and Its Applications Pub Date : 2018-05-31 DOI: 10.14257/IJSIA.2018.12.3.03
Ahmed Khan, Aaliya Sarfaraz
{"title":"Practical Guidelines for Securing Wireless Local Area Networks (WLANs)","authors":"Ahmed Khan, Aaliya Sarfaraz","doi":"10.14257/IJSIA.2018.12.3.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.3.03","url":null,"abstract":"The publication generally focuses on the security configuration and monitoring of wireless local area networks (WLANs) which are extensively being used by various organizations. Wireless Local Area Networks (WLANs) presents an exceptional challenge for the different organizations that are using Wireless Local Area Networks [1]. Over the years, the percentage of attacks on Wireless Local Area Networks has been increased, which as a result has compelled the organizations and users of WLAN to rethink about their WLAN security. The publication is a way forward for improving the standards of security and monitoring of the wireless local area networks (WLANs) and the devices which connect to those networks by giving pertinent recommendations. The article is really helpful for all those who are associated with the planning, implementation, maintenance and monitoring of the security of the wireless local area networks of a particular organization and all the devices that are connected to these WLAN like network professionals, security professionals, system administrators and all other entities related with the security of an organization’s network. The scope of the publication is restricted to wireless networks that are unclassified and also the unclassified facilities that fall within range of such wireless networks.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41751992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Privacy and Disclosure: Customer Attitudes Towards the Use of Big Data by Retail Companies 隐私和披露:客户对零售公司使用大数据的态度
International Journal of Security and Its Applications Pub Date : 2018-05-31 DOI: 10.14257/IJSIA.2018.12.3.02
M. Sayegh, Karine Aoun Barakat
{"title":"Privacy and Disclosure: Customer Attitudes Towards the Use of Big Data by Retail Companies","authors":"M. Sayegh, Karine Aoun Barakat","doi":"10.14257/IJSIA.2018.12.3.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.3.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48346153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Some Studies on the Security and Space Issues and Challenges in Cloud Computing based Data Centers 基于云计算的数据中心安全与空间问题与挑战研究
International Journal of Security and Its Applications Pub Date : 2018-05-31 DOI: 10.14257/ijsia.2018.12.3.01
N. Thirupathi Rao, C. Sekhar, D. Bhattacharyya, Tai-hoon Kim
{"title":"Some Studies on the Security and Space Issues and Challenges in Cloud Computing based Data Centers","authors":"N. Thirupathi Rao, C. Sekhar, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/ijsia.2018.12.3.01","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.3.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42691192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Invisible Image Watermarking Based On Modified Particle Swarm Optimization (PSO) Algorithm 基于改进粒子群算法的图像不可见水印
International Journal of Security and Its Applications Pub Date : 2018-03-31 DOI: 10.14257/IJSIA.2018.12.2.01
Atheer Bassel, J. Nordin, Mohammed B. Abdulkareem
{"title":"An Invisible Image Watermarking Based On Modified Particle Swarm Optimization (PSO) Algorithm","authors":"Atheer Bassel, J. Nordin, Mohammed B. Abdulkareem","doi":"10.14257/IJSIA.2018.12.2.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2018.12.2.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41313745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Classification of Malware Analytics Techniques: A Systematic Literature Review 恶意软件分析技术分类:系统文献综述
International Journal of Security and Its Applications Pub Date : 2018-03-31 DOI: 10.14257/IJSIA.2018.12.2.02
Nur Farhana Hordri, Noor Azurati Ahmad, S. Yuhaniz, S. Sahibuddin, A. Ariffin, Nur Afifah Mohd Saupi, N. Zamani, Yasmin Jeffry, Mohamad Firham Efendy Md. Senan
{"title":"Classification of Malware Analytics Techniques: A Systematic Literature Review","authors":"Nur Farhana Hordri, Noor Azurati Ahmad, S. Yuhaniz, S. Sahibuddin, A. Ariffin, Nur Afifah Mohd Saupi, N. Zamani, Yasmin Jeffry, Mohamad Firham Efendy Md. Senan","doi":"10.14257/IJSIA.2018.12.2.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.02","url":null,"abstract":"Context: Malware is a variety of forms of hostile or intrusive software that being thrown around online. Data analytics is the process of examining data sets in order to draw conclusions about information they contain, increasingly with the aid of specialized systems and software. Objectives: The aims of the study are to identify the types of malware analytics and identify the purpose of malware analytics. Method: A Systematic Literature Review (SLR) was carried out and reported based on the preferred reporting items for systematic reviews. 1114 papers were retrieved by manual search in six databases which are IEEE, Science Direct, Taylor and Francis, ACM, Wiley and Springer Link. 53 primary studies were finally included. Results: From these studies, 70% were conference papers and 30% were journal articles. Five classification of malware analytics techniques were identified and analysed. The classifications are (1) descriptive analytics, (2) diagnostic analytics, (3) predictive analytics, (4) prescriptive analytics and (5) visual analytics. Conclusion: This review delivers the evidence that malware analytics is an active research area. The review provides researchers with some guidelines for future research on this topic. It also provides broad information on malware analytics techniques which could be useful for practitioners.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"9-18"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42472902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Rabin-Karp Elaboration in Comparing Pattern Based on Hash Data 基于Hash数据的比较模式Rabin-Karp精化
International Journal of Security and Its Applications Pub Date : 2018-03-31 DOI: 10.14257/IJSIA.2018.12.2.06
A. Siahaan
{"title":"Rabin-Karp Elaboration in Comparing Pattern Based on Hash Data","authors":"A. Siahaan","doi":"10.14257/IJSIA.2018.12.2.06","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.06","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"59-66"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2018.12.2.06","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47273205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Towards a More Secured Solution in RDP: On-Demand Desktop Local Admin Rights 在RDP中实现更安全的解决方案:按需桌面本地管理员权限
International Journal of Security and Its Applications Pub Date : 2018-03-31 DOI: 10.14257/IJSIA.2018.12.2.05
Manal Al-Sharrah, Mohammad A. Alkandari
{"title":"Towards a More Secured Solution in RDP: On-Demand Desktop Local Admin Rights","authors":"Manal Al-Sharrah, Mohammad A. Alkandari","doi":"10.14257/IJSIA.2018.12.2.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.05","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"45-58"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43790756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Detailed Review on Mobile Ad Hoc Networks: Protocols, Security Issues and Challenges 移动Ad Hoc网络:协议、安全问题和挑战
International Journal of Security and Its Applications Pub Date : 2018-03-31 DOI: 10.14257/IJSIA.2018.12.2.07
N. Thirupathi Rao, P. Srinivas, D. Bhattacharyya, Tai-hoon Kim
{"title":"A Detailed Review on Mobile Ad Hoc Networks: Protocols, Security Issues and Challenges","authors":"N. Thirupathi Rao, P. Srinivas, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/IJSIA.2018.12.2.07","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.07","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"67-78"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47793399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信