International journal of network security & its applications最新文献

筛选
英文 中文
Reducing risk with end-to-end application security automation 通过端到端应用程序安全自动化降低风险
International journal of network security & its applications Pub Date : 2020-02-01 DOI: 10.1016/s1353-4858(20)30019-2
Cindy Blake
{"title":"Reducing risk with end-to-end application security automation","authors":"Cindy Blake","doi":"10.1016/s1353-4858(20)30019-2","DOIUrl":"https://doi.org/10.1016/s1353-4858(20)30019-2","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"88 1","pages":"6-8"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85594145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Signs of things to come? 预示着即将发生的事情?
International journal of network security & its applications Pub Date : 2020-02-01 DOI: 10.1016/s1353-4858(20)30022-2
K. MacMillan
{"title":"Signs of things to come?","authors":"K. MacMillan","doi":"10.1016/s1353-4858(20)30022-2","DOIUrl":"https://doi.org/10.1016/s1353-4858(20)30022-2","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"15 1","pages":"20"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73012471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dissecting .NET ransomware: key generation, encryption and operation 解析。net勒索软件:密钥生成、加密和操作
International journal of network security & its applications Pub Date : 2020-02-01 DOI: 10.1016/s1353-4858(20)30020-9
Pranshu Bajpai, R. Enbody
{"title":"Dissecting .NET ransomware: key generation, encryption and operation","authors":"Pranshu Bajpai, R. Enbody","doi":"10.1016/s1353-4858(20)30020-9","DOIUrl":"https://doi.org/10.1016/s1353-4858(20)30020-9","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"1 1","pages":"8-14"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77171370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Self-organization and Autonomous Network Survey 自组织和自治网络调查
International journal of network security & its applications Pub Date : 2020-01-31 DOI: 10.5121/ijnsa.2020.12102
Houneida Sakly
{"title":"Self-organization and Autonomous Network Survey","authors":"Houneida Sakly","doi":"10.5121/ijnsa.2020.12102","DOIUrl":"https://doi.org/10.5121/ijnsa.2020.12102","url":null,"abstract":"The autonomic network gathers several aspects of Self-organization, which is depicted, into different autonomous function such as the Self- configuration, the Self-optimization, the Self-repair, the Selfprotection, and the Self-cure. The latter is considered as one of the autonomous functions wished of a system network, which could be described by autonomous behavior is realized by structures of the control loops and loop of control.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"12 1","pages":"19-29"},"PeriodicalIF":0.0,"publicationDate":"2020-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86901579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dynamic Billing System in Smart Grid Using Permissioned Blockchain 利用许可区块链在智能电网中提供匿名通信、保密数据聚合和动态计费系统
International journal of network security & its applications Pub Date : 2020-01-25 DOI: 10.5121/CSIT.2020.100106
Ozgur Oksuz
{"title":"Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dynamic Billing System in Smart Grid Using Permissioned Blockchain","authors":"Ozgur Oksuz","doi":"10.5121/CSIT.2020.100106","DOIUrl":"https://doi.org/10.5121/CSIT.2020.100106","url":null,"abstract":"This paper proposes an efficient data aggregation and dynamic billing system that it consists of a permissioned blockchain. This blockchain contains a ledger that keeps users’ anonimized identities and electricity consumption for predefined time ranges. Using consumption data of users, a billing mechanism is able to bill the users accordingly. In the construction, since all the parties in the system have the ledger, every party has the aggregated usage of the electricity without using very heavy cryptographic operations such as homomorphic encryption, bilinear pairing, etc. Using the ledgers in our model, the aggregation of the users’ electricity consumption can be computed by anyone in the system. Moreover, users are able to verify their bills and check any data using a signature scheme. This results that integrity of all data is going to be preserved. The proposed approach mainly uses hash functions to provide the same functionality (aggregation of the users’ data consumption, data integrity check and dynamic pricing and billing) with preserving data privacy of the users.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"108 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76370101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBERSECURITY. 数据聚类技术在网络安全入侵检测系统中的应用综述。
International journal of network security & its applications Pub Date : 2020-01-01 DOI: 10.5121/ijnsa.2020.12101
Binita Bohara, Jay Bhuyan, Fan Wu, Junhua Ding
{"title":"A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBERSECURITY.","authors":"Binita Bohara,&nbsp;Jay Bhuyan,&nbsp;Fan Wu,&nbsp;Junhua Ding","doi":"10.5121/ijnsa.2020.12101","DOIUrl":"https://doi.org/10.5121/ijnsa.2020.12101","url":null,"abstract":"<p><p>In the present world, it is difficult to realize any computing application working on a standalone computing device without connecting it to the network. A large amount of data is transferred over the network from one device to another. As networking is expanding, security is becoming a major concern. Therefore, it has become important to maintain a high level of security to ensure that a safe and secure connection is established among the devices. An intrusion detection system (IDS) is therefore used to differentiate between the legitimate and illegitimate activities on the system. There are different techniques are used for detecting intrusions in the intrusion detection system. This paper presents the different clustering techniques that have been implemented by different researchers in their relevant articles. This survey was carried out on 30 papers and it presents what different datasets were used by different researchers and what evaluation metrics were used to evaluate the performance of IDS. This paper also highlights the pros and cons of each clustering technique used for IDS, which can be used as a basis for future work.</p>","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"12 1","pages":"1-18"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.5121/ijnsa.2020.12101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39206844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Goodbye SIEM, hello SOARX 再见SIEM,你好SOARX
International journal of network security & its applications Pub Date : 2019-10-01 DOI: 10.1016/s1353-4858(19)30123-0
C. Tankard
{"title":"Goodbye SIEM, hello SOARX","authors":"C. Tankard","doi":"10.1016/s1353-4858(19)30123-0","DOIUrl":"https://doi.org/10.1016/s1353-4858(19)30123-0","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"1 1","pages":"20"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77747237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The state of operational technology security 运营技术安全状况
International journal of network security & its applications Pub Date : 2019-10-01 DOI: 10.1016/s1353-4858(19)30121-7
Steve Mansfield-Devine
{"title":"The state of operational technology security","authors":"Steve Mansfield-Devine","doi":"10.1016/s1353-4858(19)30121-7","DOIUrl":"https://doi.org/10.1016/s1353-4858(19)30121-7","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"20 1","pages":"9-13"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81800135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Map Reduce Implementation for Malicious Websites Classification 恶意网站分类的Map Reduce实现
International journal of network security & its applications Pub Date : 2019-09-30 DOI: 10.5121/ijnsa.2019.11503
Maminur Islam, Subash Poudyal, Kishor Datta Gupta
{"title":"Map Reduce Implementation for Malicious Websites Classification","authors":"Maminur Islam, Subash Poudyal, Kishor Datta Gupta","doi":"10.5121/ijnsa.2019.11503","DOIUrl":"https://doi.org/10.5121/ijnsa.2019.11503","url":null,"abstract":"Due to the rapid growth of the internet, malicious websites [1] have become the cornerstone for internet crime activities. There are lots of existing approaches to detect benign and malicious websites — some of them giving near 99% accuracy. However, effective and efficient detection of malicious websites has now seemed reasonable enough in terms of accuracy, but in terms of processing speed, it is still considered an enormous and costly task because of their qualities and complexities. In this project, We wanted to implement a classifier that would detect benign and malicious websites using network and application features that are available in a data-set from Kaggle, and we will do that using MapReduce to make the classification speeds faster than the traditional approaches.[2].","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"449 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86662608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
EUNICERT: Ethereum Based Digital Certificate Verification System EUNICERT:基于以太坊的数字证书验证系统
International journal of network security & its applications Pub Date : 2019-09-30 DOI: 10.5121/ijnsa.2019.11502
T. Huynh, Dang Khoa Pham
{"title":"EUNICERT: Ethereum Based Digital Certificate Verification System","authors":"T. Huynh, Dang Khoa Pham","doi":"10.5121/ijnsa.2019.11502","DOIUrl":"https://doi.org/10.5121/ijnsa.2019.11502","url":null,"abstract":"The fake certificate is a special global problem in today's digital age. Thousands of universities and educational institutions around the world do not exist but can release hundreds of millions of fake degrees. Verifying the integrity of qualifications is a real challenge for today's employers. Applying the anti-data modifying properties of blockchain technology, this study proposes a solution issuing and verifying digital certificates called EUniCert to solve this problem. By changing the design and integrating new consensus algorithm used in Ethereum platform into the Unicoin network that was used to verify and store the information related to the issued digital certificate, the EUniCert improves the latency to validate transactions as well as the number of verified blocks in the blockchain network compared to the previous solution that we have proposed. We implement a simple blockchain system to illustrate the management operation of the digital certificates on the ethereum platform. Besides, we conduct a simulation to evaluate the performance of our proposal compared with the previous system. The result is that the average latency decreases by 3.27 times as well as the number of verified blocks increases by 11% compared with the previous system.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"55 7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90050896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信