International journal of network security & its applications最新文献

筛选
英文 中文
Keeping a secure hold on data through modern electronic content management 通过现代电子内容管理确保数据的安全
International journal of network security & its applications Pub Date : 2020-06-01 DOI: 10.1016/s1353-4858(20)30066-0
Paul Hampton
{"title":"Keeping a secure hold on data through modern electronic content management","authors":"Paul Hampton","doi":"10.1016/s1353-4858(20)30066-0","DOIUrl":"https://doi.org/10.1016/s1353-4858(20)30066-0","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"30 1","pages":"8-11"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81231012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trusting the CISO 信任首席信息安全官
International journal of network security & its applications Pub Date : 2020-06-01 DOI: 10.1016/s1353-4858(20)30070-2
K. MacMillan
{"title":"Trusting the CISO","authors":"K. MacMillan","doi":"10.1016/s1353-4858(20)30070-2","DOIUrl":"https://doi.org/10.1016/s1353-4858(20)30070-2","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"9 1","pages":"20"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76364459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keeping critical assets safe when teleworking is the new norm 当远程办公时,保证关键资产的安全是新的规范
International journal of network security & its applications Pub Date : 2020-06-01 DOI: 10.1016/s1353-4858(20)30067-2
Gus Evangelakos
{"title":"Keeping critical assets safe when teleworking is the new norm","authors":"Gus Evangelakos","doi":"10.1016/s1353-4858(20)30067-2","DOIUrl":"https://doi.org/10.1016/s1353-4858(20)30067-2","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"30 1","pages":"11-14"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73803472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Keep security top of mind when moving into the cloud 在迁移到云端时,要把安全放在首位
International journal of network security & its applications Pub Date : 2020-06-01 DOI: 10.1016/s1353-4858(20)30069-6
Thomas Deighton, Mike Wakefield
{"title":"Keep security top of mind when moving into the cloud","authors":"Thomas Deighton, Mike Wakefield","doi":"10.1016/s1353-4858(20)30069-6","DOIUrl":"https://doi.org/10.1016/s1353-4858(20)30069-6","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"24 1","pages":"17-19"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73440213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PDMLP: Phishing Detection using Multilayer Perceptron PDMLP:基于多层感知器的网络钓鱼检测
International journal of network security & its applications Pub Date : 2020-05-31 DOI: 10.5121/ijnsa.2020.12304
Saad Al-Ahmadi, Tariq Lasloum
{"title":"PDMLP: Phishing Detection using Multilayer Perceptron","authors":"Saad Al-Ahmadi, Tariq Lasloum","doi":"10.5121/ijnsa.2020.12304","DOIUrl":"https://doi.org/10.5121/ijnsa.2020.12304","url":null,"abstract":"A phishing website is a significant problem on the internet. It’s one of the Cyber-attack types where attackers try to obtain sensitive information such as username and password or credit card information. The recent growth in deploying a Detection phishing URL system on many websites has resulted in a massive amount of available data to predict phishing websites. In this paper, we purpose a new method to develop a phishing detection system called phishing detection based on a multilayer perceptron (PDMLP), which used on two types of datasets. The performance of these mechanisms evaluated in terms of Accuracy, Precision, Recall, and F-measure. Results showed that PDMLP provides better performance in comparison to KNN, SVM, C4.5 Decision Tree, RF, and RoF to classifiers.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82445553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An Empirical Analysis of Email Forensics Tools 电子邮件取证工具的实证分析
International journal of network security & its applications Pub Date : 2020-05-27 DOI: 10.5121/ijnsa.2020.12303
A. Ghafarian, Ashraf Mady, Kyungwhan Park
{"title":"An Empirical Analysis of Email Forensics Tools","authors":"A. Ghafarian, Ashraf Mady, Kyungwhan Park","doi":"10.5121/ijnsa.2020.12303","DOIUrl":"https://doi.org/10.5121/ijnsa.2020.12303","url":null,"abstract":"Emails are the most common service on the Internet for communication and sending documents. Email is used not only from computers but also from many other electronic devices such as tablets; smartphones, etc. Emails can also be used for criminal activities. Email forensic refers to the study of email detail and content as evidence to identify the actual sender and recipient of a message, date/time of transmission, detailed record of email transaction, intent of the sender, etc. Email forensics involves investigation of metadata, keyword, searching, port scanning and generating report based on investigators need. Many tools are available for any investigation that involves email forensics. Investigators should be very careful of not violating user’s privacy. To this end, investigators should run keyword searches to reveal only the relevant emails. Therefore, knowledge of the features of the tool and the search features is necessary for the tool selection. In this research, we experimentally compare the performance of several email forensics tools. Our aim is to help the investigators with the tool selection task. We evaluate the tools in terms of their keyword search, report generation, and other features such as, email format, size of the file accepted, whether they work online or offline, format of the reports, etc. We use Enron email data set for our experiment.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"191 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85002736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Survey on Malware Detection and Analysis Tools 恶意软件检测与分析工具综述
International journal of network security & its applications Pub Date : 2020-03-31 DOI: 10.5121/ijnsa.2020.12203
Sajedul Talukder, Zahidur Talukder
{"title":"A Survey on Malware Detection and Analysis Tools","authors":"Sajedul Talukder, Zahidur Talukder","doi":"10.5121/ijnsa.2020.12203","DOIUrl":"https://doi.org/10.5121/ijnsa.2020.12203","url":null,"abstract":"The huge amounts of data and information that need to be analyzed for possible malicious intent are one of the big and significant challenges that the Web faces today. Malicious software, also referred to as malware developed by attackers, is polymorphic and metamorphic in nature which can modify the code as it spreads. In addition, the diversity and volume of their variants severely undermine the effectiveness of traditional defenses that typically use signature-based techniques and are unable to detect malicious executables previously unknown. Malware family variants share typical patterns of behavior that indicate their origin and purpose. The behavioral trends observed either statically or dynamically can be manipulated by using machine learning techniques to identify and classify unknown malware into their established families. This survey paper gives an overview of the malware detection and analysis techniques and tools. preventive measures to cope with the threats coming in the future. Features derived from analysis of malware can be used to group unknown malware and classify them into their existing families. This paper presents a review of techniques/approaches and tools for detecting and analyzing the malware executables. There has been some study performed on comparison of static, dynamic, and hybrid analysis for malware detection [8], whereas some researchers tried to bridge the static/dynamic gap [9]. Mobile technology in healthcare has also been a target of malware [10]. Few recent studies have been done on static and dynamic analysis of Android malware [11], detection using permission [12–14], based on system call sequences and LSTM [15]. studies wavelet and of disassemblers for opcode The studies that use dynamic analysis perform synthesis the semantics of obfuscated code multi-hypothesis testing analyzing quantitative data flow graph metrics using simplified call access APIs","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"83 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80205487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
An Enhanced User Authentication Framework in Cloud Computing 云计算中增强的用户认证框架
International journal of network security & its applications Pub Date : 2020-03-31 DOI: 10.5121/ijnsa.2020.12204
Hasan Al Refai, K. Batiha, Ahmad M Al-Refai
{"title":"An Enhanced User Authentication Framework in Cloud Computing","authors":"Hasan Al Refai, K. Batiha, Ahmad M Al-Refai","doi":"10.5121/ijnsa.2020.12204","DOIUrl":"https://doi.org/10.5121/ijnsa.2020.12204","url":null,"abstract":"Recently, there are several studies have proposed user authentication frameworks to defend against different types of attacks such as phishing, replay attack, man in the middle attack and denial of service attack, etc. Most of these frameworks consist of three main phases, which are the registration phase, login phase, and authentication phase. Most of them have the changing password process as an additional activity.Many problemshave been noticed in the performance of these frameworks. For example, the registration phase is valunerable to internal attack such as SYN flood attack. In this work, we aim to propose a robust user authentication framework that overcomes the previous framework shortages. The proposed framework provides many security aspects such as remote authentication, mutual authentication, session key establishment,to mention a few. Besides, to ensure the security through all phases of this framework, we add a new phase called a Service Access Authentication Phase (SAAP).This phase is resposable of the internal verification .","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"13 1","pages":"59-75"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79483192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Consideration in Peer-to-peer Networks with A Case Study Application 点对点网络中的安全考虑与案例研究应用
International journal of network security & its applications Pub Date : 2020-03-31 DOI: 10.5121/ijnsa.2020.12201
Nick Rahimi
{"title":"Security Consideration in Peer-to-peer Networks with A Case Study Application","authors":"Nick Rahimi","doi":"10.5121/ijnsa.2020.12201","DOIUrl":"https://doi.org/10.5121/ijnsa.2020.12201","url":null,"abstract":"Peer-to-Peer (P2P) overlay networks wide adoption has also created vast dangers due to the millions of users who are not conversant with the potential security risks. Lack of centralized control creates great risks to the P2P systems. This is mainly due to the inability to implement proper authentication approaches for threat management. The best possible solutions, however, include encryption, utilization of administration, implementing cryptographic protocols, avoiding personal file sharing, and unauthorized downloads. Recently a new non-DHT based structured P2P system is very suitable for designing secured communication protocols. This approach is based on Linear Diophantine Equation (LDE) [1]. The P2P architectures based on this protocol offer simplified methods to integrate symmetric and asymmetric cryptographies’ solutions into the P2P architecture with no need of utilizing Transport Layer Security (TLS), and its predecessor, Secure Sockets Layer (SSL) protocols.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76012750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Keyloggers: silent cyber security weapons 键盘记录器:无声的网络安全武器
International journal of network security & its applications Pub Date : 2020-02-01 DOI: 10.1016/s1353-4858(20)30021-0
Akashdeep Bhardwaj, Sam Goundar
{"title":"Keyloggers: silent cyber security weapons","authors":"Akashdeep Bhardwaj, Sam Goundar","doi":"10.1016/s1353-4858(20)30021-0","DOIUrl":"https://doi.org/10.1016/s1353-4858(20)30021-0","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"40 1","pages":"14-19"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77380677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信