Personal Information
Sitio web
airccse.org/journal/ijnsa.html
Acerca de
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Etiquetas
phishing
peer-to-peer network security
worms
database and system security
spam
cryptographic protocols
mobile
virus
web 2.0 security
e-mail fraud
ubiquitous computing security
security
ad hoc and sensor network security
network and wireless network security
security & network management
network security
e-mail security
trojan protection
intrusion detection and prevention
internet security & applications
session hijacking
mim
artificial intelligence
hardware-based attacks
machine learning
ddos
web based applications
security of virtual machines
services security
intrusion detection
blockchain technology
crowd sourcing
performance evaluations of protocols & security ap
social networking
machine learning for security
replay attack
authentication
body-area networks
cyber security
replay attack etc
home networks
network management
sensor network security
blockchain
privacy
industrial control systems
system security
sdn
autonomous vehicles
cryptography
vanets
data mining
trojan protectio
deep learning
wireless network security
cryptocurrencies
security and optimization
internet of things (iot) secur
electronic voting security
cognitive security
cloud computing
security application
neural networks
big data
encryption
internet security & applicatio
intrusion detection and preven
trust
internet of things
e-mail fraud virus
ad hoc and sensor network security peer-to-peer ne
bioinformatics
natural language processing
wireless sensor networks
trojan protection security threats & countermeasur
network and wireless network security mobile
information security
manet
network and wireless network s
privacy challenges
database
fuzzy logic
) ubiquitous computing security web 2.0 security c
security threats
ad hoc and sensor netw
cloud
information retrieval
computer vision
steganography
routing
intrusion detection system
security and privacy for iot
connectivity and networking
malware
performance evaluations
security threats & countermeasures
detection
security threats & countermeasures (ddos
)
ontology
iot applications and services
aodv
pattern recognition
android
• mobile
• peer-to-peer network security
key management
• intrusion detection and prevention
• e-mail security
• virus
• cryptographic protocols
• ubiquitous computing security
peer-to-peer
text mining
knowledge processing
information extraction
robotics
cyber physical system (cps)
attack
aes
internet security
image encryption
• performance evaluations of protocols & security
image segmentation
block cipher
• web 2.0 security
• security & network management
• internet security & applications
game theory
• network and wireless network security
internet of things (iot)
cyber physical system
network
decryption
iot
cybersecurity
classification
attacks
• database and system security
wireless network
ad hoc
nlp
substitution
information hiding
e-commerce
hybrid intelligent systems
dos
resource provisioning
fog
performance evaluations of pro
cloud security
vanet
ubiquitous computing
cloud and grid computing for big data
soft computing
semantic processing
data security
web security
morphology
phonology
security.
permutation
malicious node
usability
predictive learning
data science
electronics and signal processing for iot
steganalysis
ssl
hash function
qos
random forest
rsa
malware detection
denial of service
smart grid
password
bayesian network
iot-enabled innovation
phishin
entrepreneurship
deployment scenarios
parallel processing
virtualization
business intelligence
electronics
network protocols
fuzzy systems
mobile ad hoc networks
wireless sensor network (wsn)
signal processing for iot
fog computing
cryptosystem
mobile ad-hoc networks
ethereum
optimization
genetic algorithm
biometrics
udp flood
grid
icmp flood
quantum cryptography
machine learning and ai for big data
malware analysis
smart city
anonymity
trojon protection
security techniques
visualization
hacking
scanning
array signal processing
experimental results
dynamic analysis
wireless sensor network
intrusion detection system (ids)
machine learning algorithms
data protection
wimax
kyoto2006+ dataset
discrete fourier transform
protocol
chaotic system
wsn
generalized arnold map
distributed denial of service
watermarking
symmetric key
machine translation
secret sharing
threats
data center network control
access control
lexical semantics
chunking/shallow parsing
biometric security
elliptic curve cryptography
key distribution
iot-enabled innovation and entrepreneurship
big data mining
cooperation
e-voting
user identity
blockchain scalability
vpn
block chain issues and trends
secure routing
firewall
framework
trust and privacy ch
wireless networks and mobile computing
question answering
grid computing
3d and stereo imaging
http flood attack
syn flood
manets
digital image processing
programming languages
dns reflection or amplification attack
information technology
risk management
• network and wireless network security • mobile
mobile security
ad hoc and sensor network security • peer-to-peer
knowledge representation
ai algorithms
wireless ad hoc networks
cyberattack
visual cryptography
group testing
ddos attack
chaos
intrusion
text steganography
ns2
dsr
mobile network
intrusion detection systems
verification
forecasting
mobile banking
service oriented architecture
mobile agent
reputation-based
confidentiality
it security
intrusion prevention
mobile payment
wlan
secure cloud computing
edge
computer & network security
social engineering
spectral analysis
denial of service attack
data mining techniques
vehicular forensics
data
blowfish
authorization
security properties
benchmarks
integrity
risk mitigation
tdes
kleptography
network forensics
vulnerability assessment
challenges
internet signal processing
color and texture
penetration testing
unfettered rules
learning problems
mapreduce
collaborative environments
trojan protection • security threats & countermeas
multimedia & cognitive informa
private key
e-mail fraud • virus
public key
data visualization
user authentication
rsa algorithm
denial-of-service attack
rotor cipher
quantum key distribution
wormhole
brute force attack
honeypots
trust management
vanet attacks
bro ids
inventory
device fingerprinting
endpoint security
twitter
feature selection
network protocols & wireless networks
image processing
natural language computing
multimedia
anomaly-based detection
feature
wearable technology
wearable devices
smartwatch
wormhole routing
broadcasting communication
deadlock-free
hamiltonian model
3-d mesh
support vector machine
blockchain authentication and authorization
blockchain based security for the iot
5g and networks for big data
multimedia etc
big data applications
consensus
biometric authentication
mobile authentication
information centric network
web authentication
email spam
m/g/r processor sharing queue
trust determination
trust-based routing protocols
nwtd
text-based captcha
benchmark
fuzzy logic.
svm
economics
security management
ecc
cloud storage and file systems
voip
cybercrime
reinforcement learning
protocols
intruders
classifier
methodology
bluetooth
performance evaluation
device authentication
initial trust
social media
device deployment
unsw-nb15
experimental results and deployment scenarios
text stenography
python programming language
critical infrastructures
man-in-the-middle attack
multi-layer encoding
window function
natural language prepossessing
color space
the mapping study
intelligent system architectur
entropy
api calls
carry select adder
least significant bit (lsb)
databases
xor
quantitative trait loci
symmetric cryptography
trusted third party
cipher text
ascii code
psnr
networking and architectures
pox
integrity.
digital forensics
topology discovery
software defined network
password handling
smart card
nlp and ai
optical computing
big data techniques
packet flow
ldap
network performance
edge & cognitive s
kerberos v5
pervasive computation trust
dual-port read-only memory
computer science
brute force attacks
models and algorithms
computer networks & communications
bb84 protocol
zigzag scanning
security engineering
network security.
subliminal channel
abnormal.
ipsec
trapdoors
algorithms and applications
nlp and machine learning
frequent sequence mining
covert channel
network intrusion detection
internal controls
management
secret key
behavioural pattern
sha-1
wireless
theory of parallel / distributed computing
decentralized trust management
cpu
ad hoc network
cad design and testing
software security
cyber trust and security
denial-of-service
trust and privacy challenges
anomaly
mobile devices
virtual machines
wireshark
spoken language processing
software systems and technologies
assessment survey
covid-19 pandemic
a digital certificate
cryptocurrency exchange
decision tree
detection rate
distributed denial-of-service (ddos)
• theoretical computer science and algebra
false alarm
administrator
appliance
end-to-end security model
els
secure communication
network defenses
firewalls
web server handlers
sybil attack
digital signature
zero trust architecture
connectivity
• database
mutual authentication
mse
• security threats & countermeasures
bloom filter
nsl-kdd
sgd
lea
congestion control
automation
performance
computing
networks
password.
image classification
mnist benchmark.
shortest path
smart cities
python
scapy
kali linux
de-authentication attack
session key establishment
security policy
pairwise comparisons.
logistic regression
analytic hierarchy process
k-nn
naive bayes
data hiding
traceback
manet(mobile adhoc network).
access security controls
markov-model
cybersecurity culture
crypto stream ciphers
mitm attack
rc4
blockchain attacks on existing systems
fault tolerant
key spoofing
internet of thing
big data search and mining
i-voting
electronic voting system
plain text
medical system
metric
availability
dependency
application-layer ddos attack
browsing model
error detection
notification
beacon
security for grid computing
seed
model checking
smartphone
disaster
random number generator
tls
henon map
vulnerability
shuffle
vanet security and privacy approaches
tools
vanet adversaries and attackers
security and privacy requirements in vanet
exploit.
information security.
confusion
diffusion.
mix zone
pseudonyms
content management
click spam
web advertising
google ads
pay-per-click advertising
apache spark
wordpress
attribute-base-access-control
security analytics
role-base-access-control
network architectures
feature extraction
mobile networks & wireless lan
bfmawddl
bfcdnba
usable security
blockchain privacy
) • ubiquitous computing security • web 2.0 securi
public-key cryptography
training
arithmetic coding
cryptanalysis
location privacy
data description
temporal sequence
anomaly-based network intrusion detection system
attacks & performance
surveillance
sniffing
iot security
okhttpclient
healthcare cybersecurity
httprequests
mobile ip
iot connectivity and networking
incident response
encryptions
unavailability
false alarms
kdd cup 99
standard
simulation
device association
decrypting
risk principles management
manage security programs
encrypting
mobile ad-hoc network
smart vehicles
dispute settlement
elliptic curve
interworking
social networks & web 2.0 trust management
public key cryptography
lte
umts
imsi
identity
kvefs
encrypt file system
face
fingerprint
key-value store
file system in user space (fuse)
protocols.
least significant bit
matrix partition
spatial domain
pki
image steganography
ivote
routing protocols
reputation system
bfma
logistic map
policy management
distributed denial of service (ddos)
reliability
insider threat
agent based trust management
access control and intrusion detection
authentication and identity management
p2p
dpa
clusters and grid computing : security and role of
security and privacy in mobile systems
wddl
security information systems architecture and desi
esrm
bf
insider threats and countermeasures
fair exchange protcocol
wireless mesh networks
securing windows
maturation of a profession
microsoft domain environment
spectrum analysis
matlab
risk mechanism
automated ids
enterprise risk management
local authentication protocols
mobile cloud computing
finger print authentication
mitigation
data analytics
dmt
dft
neural languages
common control channel challenge
crahn
multi-channel mac
software engineering
service discovery
encryption\decryption
pgp
hmac
data center
swifi
online social networks
profile cloning
computer network
cloud service
distributed computing
shares
greying effect
key share.
infrastructures for big data
iqim
dabechies4
interweaving
flash crowds
credits.
mom
wire antennas
gain
current distribution
vswr
fractal
input impedance
polarization
resonant
bgp protocol
hashing.
bmp image file
lsb steganography
agent based intrusion detection system (aids)
black hole attack
security plan
small business
risk planning
parsing
internet attacks
knowledge base
interoperability
risk assessment
healthcare
privacy protection
role-based access control
xacml
file upload
video upload
virtual system
study material
map reduce
hadoop
alert correlation
data integrity
data center network
protection m echanism
secret image sharing
quadratic residues
image coding
data type
data size
cipher algorithms
data density and encryption time
gpu
data & system integrity
privacy and authentication
cuda
coefficient of variance
denial of service (dos)
netstat
signal processing
data storage
the sleuth kit (tsk)
mechatronics
autopsy
tcpview
sparql
n-triples
owl
rdf.
k-means clustering
recommender system
frequent itemset
energy efficiency
decision making
big data management
syn flooding
tcp sequence number attack
cooperative transmission
packet broadcast
opportunistic large array
mis
quality
digital signal processing
physical layer
encryption/decryption[2]
caesar cipher[2]
security protocol
ns2[1]
wireless networks
wi-fi
prognostic
svm.
mog-hmm
rul
aodv.
false positive rate (fpr)
erbium-doped fiber amplifier (edfa) gain adjustmen
optical switch crosstalk
all-optical network security
emerging attack vectors
security risks
cross site scripting
wired equivalent privacy (wep).
wireless local area network (wlan)
wardriving
conditional entropy
sql injection
anomaly severity classification
semantic evaluation
multi-anomalies evaluation.
ubiquitous
mode of operation
low-resource
source code analysis
unreleased resource
path manipulation
software vulnerabilities
resource injection
distributed ac
ir circuit
hvac
temperature monitoring
temperature control
blue-tooth
mix
resource description framework(rdf)
utm clinic
energy-aware routing
reasoning and evolution
multipath routing
qos routing
application resource
graphical password
legitimate traffic.
learning methods and analysis
dll. llc
media access control
vn
lstm
knowledge-based authentication
paas
iaas& authentication
8 bits microcontroller
ditributed denial-of-service attack
ddisjunct matrix.
non-adaptive group testing
daugman
canny
sobel
iris
prewitt
zero cross
critical infrastructures.
man-in-the-browser
aran
ndm
smt
vanet architecture
pos tagging
ariadne
sead
computerbased information system
and pso.
threshold cryptography
anomaly severity evaluation
quantitative evaluation
internet casinos
cyber defense
botnets
bgp
network simulation tool
ip falsifying
idpf
network-level security and protection
visual information processing
mobile code
evolutionary computation
multi-agent systems
mobile agents
intrusion detection system.
porter stemmer
stemming
firewall policy
exploring data analysis
policy deployment
hybrid
random grids
dct based steganography
som
multi-som
certificate less cryptography
3gpp
4g
security architecture
linguistic resources
rhetorical relations
probability model
extractive text summarization
file systems
text clustering
markov random walk model
des
attribute reduction
artificial neural network
covert schemes
security solutions
pre-hacking
signal identification
peer-to-peer network
embedded systems
necessary information
video signal processing
gsm security
nist
dna
shiftrows
coefficient correlation
smart contracts
pairing based cryptography
secret handshakes
dynamic matching
bilinear pairing
multi-faceted model
online social network
updater identification
application whitelisting
service-oriented approach
version control
virtual password
secure communication channel
strong authentication
shared secret session key
scenario-based approach
visualization and animation
empirical evaluation
key escrow
management & interoperability
method engineering
threat modeling
cloud software development
security event management
data correlation
network dependency analysis
googleglass
blockchain in digital forensic
big data analytics and social media
historical
response
bloom filter.
distributed denial-of-service attack
particles swarm optimization.
sensors
radial basis function neural networks
distributed ledger technology
mansim.
collective digital signature
attack detection
email classification
brute-force attack
mobile communication
email fraud
security and privacy
static analysis
adaptive neural network
aco
comprehensive evaluation
lightweight
k-nearest neighbour
anomaly detection
practical testing system
avispa.
industrial communication security
network steganography
real-time networking
tcp/ip communications
inspection game.
agile programming
waterfall methodology
owasp
braiding/entanglement
multiple encryption
rotation of the bits
rfid
payment certificate
ccmp
packet dropping attack
hamming distance
information flow tracking
attribute-based encryption
multiparty micropayment
question answering (qa)
functional call monitoring
radius
mobile adhoc network
tkip
semantic processing & nlp
signal or image processing
quality of service
priority scheduling
selfishness
watch dog
cognitive load
clustering
alert aggregation
télécommunications
credential
software
intellect learning.
mediator
oauth
oix
data integration
openid
digital identity
shoulder surfing
session passwords
floating point number
one time pad
compression-crypto
network density
priori probability
life time
trust-based routing
shared bitmap
distributed rate control.
bandwidth reservation
medium accesscontrol
rate limitation
lan attack
host based ids
arp spoofing
active detection
connection failure behavior
self-propagating malware
dns poising
shared register array
mechanism
message digest
information theory
routing protocol
malware detection and mobile device.
attack graph
soa
finite elements.
biometrics; biometric fusion; face; fingerprint; c
and services.
networking
naive bayesian classifier
quadratic map
tent map
statistical hypothesis testing
kolmogorov-smirnov test
statistical test of significance
queuing model
poisson arrival
buffer
traffic flow
secured watermark system (sws) and computer securi
diffusion
stage staffing
2-d arnold cat map
db index.
encryption and decryption algorithm for watermarki
digital multimedia
stage staffing watermarking
http intrusion detection.
copyright protection
etc.
event classification
static and mobile wsn.
node replication attack
sybil
physical cryptography
physical unclonable functions
computer
enterprises security risk managemen
network security; malware propagation modelling; b
multi input multi output (mimo)
protocol safety.
anomaly-based intrusion detection system
adhoc network
smurf attacks.
enterprises security risk management
performance evaluation.
wireless.
ip spoofing
modeling
system dynamics
delay.
cdma throughput
semantic intrusion detection
application layer misuse detector
fuzzy intrusion detection
diffusion process and stream cipher.
fuzzy cognitive mapping
mobile ad hoc networking
fuzzy neural network
fuzzy c-means clustering
workload characterization
knowledge discovery in databases and privacy prese
integrated verification.
user authentication; group communication; secret s
one-class support vector machine
software implementation
hdfs (hadoop distributed file system)
content-addressable storage security
non-invertible transformation
cancellable biometrics
fingerprint biometrics
biohashing
best practice
it governance
mapping
pdca
information security management systems (isms)
iso 27001
information system.
policy-driven security
cobit
nsgaii.
objective functions
symmetric cryptosystems
non linearity
s box
memorability of passwords
snakes & ladders game
graphical passwords
attackers .
cryptographic algorithm.
mac-layer
threshold level
j48.
network security management
complexity.
ldpc codes
chained codes
system information leak
data and grid room
image
video
real time application
cover media
authentication & q-learning
anti-spam
email filtering
rtos
mobile ad hoc networks security
conficker
gpcode.ak
password (information) snatching
evasive/ deniable/ untraceable attacks
little dragon cryptosystem
electronic espionage threats
big-dragon cryptosystem.
electronic warfare threats
cryptotrojan
cryptovirus
cryptovirology
firewall systems design
computer networks
identity based firewalls
malicious
proposed method.
noise categories
wavelet thresholding
image denoising
false positive
classification accuracy
support vector machine (svm)
hybrid intrusion detection system
interactive education.
secure routing protocol
and bernoulli map
attack tree
in order to the rapid growth of the network applic
it is necessary that this security concern must be
new kinds of network attacks are emerging endlessl
we propose a novel distributed intrusion detection
usage control
• security
• internet security
hash function [2].
encryption and decryption.
customizable security.
and matlab.
and exemption.
and public-key.
system access control
deviation detection
distributed resource allocation
asynchronous distributed pricing
packet detection and packet header matching (phm)
snort
network intrusion detection system (nids)
multivariate cryptography
ad hoc and sensor
secure network
secure servers
heterogeneous wireless network
wake up receiver
vlsi
low power
multigeneration keys.
random kd (key distribution)
sec-leach (secure leach)
ieee 802.15.4
ieee 802.11b
inter packet delay
hybrid covert channel
sensor networks
leach (low energy adaptive clustering hierarchy)
galois counter mode.
link layer security
no key-exchange
dst
quantum superposition state
perl
sub
html
regexpr
fair exchange
circular queue.
file handler
quantum networks
md5
wave files.
feedback
lu matrix composition
signature based detection
behaviour based detection
flow based detection
c&c
irc
botnet
key establishment
intrusion detection / prevention systems
signature formulation
signature processing
share
n) visual cryptography
(2
selfish nodes
smart-card
dfa
coexistence
multi-server
low-cost cryptography
node misbehaviour.
malicious packet dropping
controlled flooding
reputation
remote user
masquerade attack
password strength
data value
network security & identity privacy
pareto-efficiency
attack graph.
efficient probabilistic packet marking algorithm
probabilistic packet marking algorithm
and crypt ography.
online auction network
byzantine behavior
multicast communication
ad-hoc networks
hierarchical design
ids
tls protocol
timers
typing rhythms
keystroke
rangoli
passwords
implementation cost
transposition cipher
service differentiation.
mb-ofdm
interference limitation
mobile ad hoc network (manet)
sha-256
ip
ao
udt
high speed bandwidth
next generation network protocol
desirability functions
best practice frameworks
baseline manuals
risk analysis and management
olsrv2
network security protocols
information security controls
signatures
web services
vulnerability analysis
ip multimedia subsystem (ims)
interpolation.
qim
identity based cryptography (ibc)
m-ary modulation
service authentication
error concealment
batch verification
smartcard
authentication.
covert channel.
diffie-hellman algorithm
arithmetic encoding
biometric information
honeypot and nics.
iptables
network intrusion prevention
np-complete
quotient ring
diophantine equation
one-way function
steganography; image segmentation; byte characteri
cyber-defense.
nonlinear function.
handoff delay
invisible digital watermarking
pixel
smart cards
triangle routing
remote user authentication
attack games.
eavesdroppers
route optimization
wireless body area networks
niger-delta
clustering routing
cryptoviral extortion.
clone
audit system
log analysis.
selinux
sensor network
z-transform; frequency domain; watermarking; mean
registration time.
cellular automata
crossover
sha-512
hdl.
threshold cryptography.
finite fields & montgomery algorithm.
ecc-3peke protocol
undetectable online password guessing attack
authorization and password.
impersonation attack.
packet loss
sessionbased
minutiae
ann
probabilistic encryption
deniable encryption
receipt-free
rigging
ip traceback
content
packet sniffers
legal aspects
zss signature.
phonology and morphology addressing & location man
data shredding
avalanche
confidence level
lsb replacement steganography
key sensitivity
location coordinates
ipfix
flow
scan detection
cluster
guard node
iterations
soft input
mac addresses hash value.
lu-cac
caca
bandwidth link utilization
reliability.
convolutional coding
emergency response communication
text passwords
coercing
judy array
blom
location-dependent social networks
tunneling
community consensus
replica
pragmatic web
agent-based systems
spatial reasoning
computing with words
uncertainty
language-action perspective
overlay
and delay
software configuration management
clusters
password replace ment
vmware
performance measurement
network virtualization
switching and addressing techniques self-organizin
& privacy next generation internet & web architect
longitudes
usable security.
latitudes
central bank digital currency
digital rupee
smart banking
survey
domain analysis
scoring benchmark
http strict transport security
shape representation
text processing
document recognition
signal noise control
victimization
information
emotion
signal
ciphers identification
encryption modes
hypergraphs
cloud data security
fine grained access
group key management
electronic payment
hash chain
symbolic machine learning
security posture
open-source erp software
factors
attributes
measurement framework
parsing/grammatical formalisms
monetary policy
socioeconomic impact
peer-to-peer transactions
fintech
protection mechanism
interactive education
face recognition
hdfs (hadoop distributed file
cloud storage
mobile computing
context-aware computing
smartwatches
assessment
fuzzy set theory
accounting
random forest algorithm
pe header
pe file
higher education
mobile education
face and gesture
feature engineering
block ciphers
encryption time
cryptographic algorithm
wormholes
spread spectrum
selective jamming
detection models
ensemble machine learning
ddos attacks
r360
web intelligence
evolutionary computing
ai in cyber security
nids
software defined networking
network intrusion detection sy
byte characteristic
zss signature
cyberdefense
double spending
cybercrime awareness
cybercrime on social media
education
self-sovereign identity
digital transformation
software configuration managem
public cloud severs
data outsourcing
pervasive/ubiquitous computing
regulation and trust mechanism
software-defined networks
rerouting
devices authentication
big data analytics
big data and iot
application security
awareness
security behavior
self-efficacy
pre-processing
alert prioritization
alert clustering
merging
trellis coded genetic algorith
session key matrix
pseudo random key generator
finite automata
xperimental results
ultrasonic audio
voice activation
hybrid analysis
android banking trojans
security threats & countermeas
web and internet computing
ontology and semantic web
machine learning & application
grid and scalable computing
information technology trends
bitwise-based hash
split sketch
principle component analysis
victim identification
ddos detection
claims processing
process improvement
insurance
security logs
security metrics
packet analyzer
tcp
network traffic
dos attack
secure division
secure sum
naive bayesian
privacy preservation
authentication scheme
cryptography primitives
password replacement
sequence number
monitoring agent
side channel monitoring
hooks
system call
constraint processing
resource management
ngns
finding roots modulo.
signing group
group digital signature
implementation
technology
power distribution
social computing
consensus mechanism
signing group.
difficult computational problems
groupdigital signature
land
http flood
tcp syn flood
markov chain
security issue
smart devices
incentive schemes.
rewards
federated learning
incentive schemes
high port application
sinet
port filtering
data flow pipeline
traffic patterns
covid-19 related ioc
prediction support parameter.
k-means clustering algorithm
detection model
malicious javascript
firmware
db index
cyber human behaviour
stylometric analysis
phishing email attack
cyber-security
security policies
defense mechanisms
employee awareness
wimd cybersecurity
wimd
wireless implanted medical devices
cardiac implanted device
health belief model
windows api calls.
term frequency-inverse document frequency vectors
n-gram analysis
malware classification
structural similarity index measurement (ssim).
universal quality image (uqi)
image fidelity (if)
peak signal to noise ratio (psnr)
mean square error (mse)
frequency domain
z-transform
identity federation.
limitations
identity management
federated identity management
distributed system.
information-centric
internet-of-things.
intelligent transportation system
sensor network.
etc
mixture words
nouns
recall
recognition
user behavior
optimal path
big data tools and systems
virtualization on platforms in the cloud
data storage and management in cloud computing
security techniques for the cloud
virtual compute clusters
system integration
cloud based
reference dna
multilayer security
indexing cipher
dna cryptography
filter design and structures
signal reconstruction
network layer security
radar signal processing
medical image analysis
medical image processing
ad hoc and sensor network
multi input multi output (mimo
smurf attacks
electronics and signal process
services
salting techniques
hash analysis
security breaches
threats and attacks
lan
passphrase
a variant of covert channelworks similarly as netw
the privacy. most of such attacksare devised using
computer network is unpredictable due to informati
iot devices.
technical and security issues
comparison.
review
mare
sama
software architecture
microservices
trojan.
human factors
end-user errors
information systems
cisco packet tracer
cyber-attack
nb.
knn
cnn
offline signature recognition
smart contracts.
decentralized application
added value applications
enablers
arxiv
reddit
stackexchange
text classification
topic modeling
dst.
internet of things (iot) security
blockchain technology and cyber security
we introduce new detection engine for hybrid cover
convolutional neural network
storage and retrieval
coding and transmission
anomaly-based intrusion detect
protocol safety
big data in cloud
cloud management
cloud storage for iot
sensitive data
insider attacks
data leakage prevention (dlp)
data access & protection
micro medical processors
knowledge instruction
medical sensor network
micro knowledge processors
knowledge processors
image analysis
exploit
packet delivery ratio
throughput
hdl
network mapping
nmap
social clouds
consolidation
software defined networking (s
patient empowerment
ehr management
blockchain in healthcare
actuators
neural network
url
phishing detection
network cybersecurity
techniques
ipv4
exemption
information system
digital investigations
digital forensics readiness
digital evidence
wireless medical networks
ad-hoc on-demand distance vect
mobile ad-hoc network (manet)
one-class support vector machi
sharing queue
m/g/r processor
operating systems
computer architecture
fake profiles
xg boost
multimedia data mining
multimodal skew tent map
interchange permutation
eap-ttls
inductive learning
nlp and information retrieval
and text mining
web
machine learning techniques
bls signature
secret sharing technique
bi-variate polynomial
security for emerging networks
modelling
cyber attacks
tree
bayes
secure smart meter
ambient intelligence
social network analysis
host-based intrusion detection
network-based intrusion detect
small-to-medium enterprises
rough and fuzzy rough set
hybrid and nonlinear system
data and web mining
automated machine learning
programming models
static testing tools
openmp
software testing
exascale systems
preferential attachment topolo
model simulation
data as a product (daap)
privacy preserving pipelines
dataprovenance
memory safety
verifiable observability
capability-based security
cheri
webassembly
security and optimization data
cyber fraud
fraud detection
intrusion detection system (id
gravitational search algorithm
fuzzy
physical hardware attacks
network attacks
attacks on data
information fusion
enterprises security
pervasive computing
wave files
password complexity
password length
password security
ht detection
hardware trojans (ht)
path selection
test generation
path delay fault (pdf) testing
model interpretability
explainable ai
vanet security and privacy app
vanet adversaries and attacker
security and privacy requireme
netlogo
horizontal scalability
direct acyclic distributed led
gpt-4
graphcodebert
codebert
source code vulnerability
powershell
microphone security
webcam security
unauthorized access detection
cybersecurity awareness
ai-based security
phishing prevention
browser extensions
malicious url detection
media computing
nft
email users
correlation
log loss
hot log
live log
insufficient logging
soc
siem
countermeasures
avispa
industrial communication secu
data management
mobile networks
semi-trusted third party
fairness
verifiability
secret-sharing
relieff algorithm
email forensic dataset
cybercrimes
aquila optimization
likability
traceability
software maintenance
separation of concerns
context-aware traffic light co
traffic light control (tlc)
requirements engineering (re)
networks for big data
encryption and decryption
inspection game
confusion matrix
impersonation
phishing attack
computer security
secured watermark system (sws)
embedded system
nosql data stores
public safety
crowd monitoring
cctv
cyberattack impact
cyberattack types
personal privacy
economic stability
cyberattacks
saudi arabia
parameters
sensor node
leach
cluster head selection algorit
optimistic multi-party computa
trustworthiness
autoencoder
invertible
mobile device
intellect learning
finite elements
information retrieval and ai
neural languages and nlp
gitlab
jenkins
cve-2021-44228
ci/cd
continuous delivery
continuous integration
dimensionality reduction
educational data mining
advanced persistent threats (a
multi-vector attacks
mesa security model
stealth data exfiltration (sde
sustainable agriculture
water management
dc water pump
water & humidity sensors
soil sensor
vulnerability identification
smart irrigation system
semantic web
conceptual modeling
unsupervised machine learning
j48
network control
mansim
crypto
agreements
blockchains
smart grids
real-time systems
maintenance engineering
production
worms &trojan
mobile clouds
sla management
machine learning and ai
network traffic analysis
asset inventory
data classification
cybersecurity frameworks
threat intelligence
zero-day vulnerabilities
massive parallel sequencing
forensic examinations
bio-examinations
deoxyribonucleic acid (dna) da
particles swarm
radial basis function
computational linguistics
distributed denial-of-service
machine learning problems
morphic computing
q-learning
mobile ad hoc networks securit
big data and the cloud
cloud computing architecture
cloud business
google glass
stacked auto encoder
explainable artificial intelli
shapley additive explanation
recurrent neural networks (rnn
deep learning (dl)
empirical studies
vulnerabilities
access control mechanisms
anonymization techniques
authentication mechanisms
encryption techniques
diffusion of innovation theory
national security
data privacy
low carbon blockchain
security key
public cryptography
argumentation mining
subset sum
coppersmith
lattice reduction
lattices
snmp
mib
multi- agent
distributed query processing
location cloaking
location based services
windows registry
forensics
kdd cup 1999 dataset.
which motivates many researchers to discover metho
intrusion detection is one of the standard stages
image cipher.
scrambling
key management protocols
wireless attacks
wireless intrusion detection system
attack test cases
attack taxonomy
cueing.
interfaces
one-time passwords
chosen ciphertext security.
conditional proxy re-encryption
proxy re-cryptography
random oracle model
noise & entropy
anti obfuscation technique
low level feature
merkle-hellman.
simultaneous diophantine
sender mail server
receiver mail server
anti-spams
wsn security
cross layer architecture
packet latency.
benevolent node
base station (bs)
route trust (rt)
indirect trust
direct trust
geometric mean (gm)
device discovery
physical proximity
fidelity
coordinate ratios
equatorial cloning
multimedia networking
mobile & broadband wireless internet
network based applications
network operations & management
measurement & performance analysis
internet and web applications
high speed networks
adhoc and sensor networks
heterogeneous wireless networks
security standards
security assessment
business information security
false positives
true positives
it policy
common vulnerability exposure (cve)
spam email
security breach
authentication and key agreement.
umts security
telecommunications system
gsm system
false alarm rate
naive bayes classification
multi stage filter
enhanced adaboost
compression.
transformation
threshold secret sharing
public verifiable signcryption
standard model
provable security
identity based cryptography
signcryption
embedded devices.
modular exponentiation
n-1 attack
simple power analysis
dominant feature set.
outlier analysis
behavioral profile
terrorism
social network analysis (sna)
backtracking bit
watch nodes
traversed administrator field
associative node
ubiquitous computing security web 2.0 security cry
corporate infrastructure
disaster recovery
data loss
thematic analysis
medical internet of things
classification problem.
svms
functional analysis
kernel functions
legendre polynomials
man-in-the-middle.
obfuscation
server less
server based
escrow less
tree based
hierarchical
multicast
group
peer to peer
fairness.
ttp (trusted third party)
security and privacy in pervasive/ubiquitous compu
authentication and non-repudiation
intrusion detection and vulnerability assessment
untraceability
cryptography and coding
survivability
intrusion resilience
fault-tolerant networks
diversity
androidapis
privilege escalation
system call dependence graph
behavior representation
data compression.
huffman coding
isotropic cloning
secure electronic transaction
f8
a5/3
stream cipher
unauthorized access
network design
real estate
infrastructure security
wireless sensor network.
wireless mesh network
wireless ad-hoc networks
web application penetration testing
security testing
) * ubiquitous computing security *
trojon protection * security threats & cou
e-mail fraud * virus
ad hoc and sensor network security * peer-
anti malicious objects
star topology
black scholes equations
malicious object
native language password
textual password
shape based authentication
multicode encryption
transversal designs
reed-muller codes
communication
and quality control
network system
control charts
anomalies
ieee 802.11g
multiple encryption.
arabic text
(ddos
response & tracking.
base station
sensor nodes
attack path reconstruction
ddos-attacks
icap
client honeypot
browser vulnerability
adhoc on demand distance vector protocol(aodv)
translation.
elecronic voting
user lifecycle
workflows
provisioning
security synthesis
information theoretic security
rational secret sharing
fault tolerance
topology.
authenticated symmetric key establishment
biometric key
wireless body sensor network (wbsn)
ofdm
spectrum sensing
inter symbol interference (isi)
cognitive radio
mpi.
encrypted data
international data encryption algorithm (idea)
hiding information
unicode
multi-layers
e-risks
e-learning
secret reference matrix (srm)
peak-signal-to-noise-ratio (psnr)
discrete cosine transformed (dct)
botnet and honeypot.
iptrcing
flooding attack
internet threat monitors (itm)
• peer to peer and overlay networks
• optical networks and systems
• next generation web architectures
• measurement & performance analysis
• internet and web applications
• high speed networks
• adhoc and sensor networks
• next generation internet
quantum copying machines
eavesdropping
todv
cross layer detection
body area network security
body area networks
misbehaving node
tbraodv
ad-hoc
isakmp
dsss
• network
enterprise
machinelearning
information gain
e-learning security
e-remedies
geometry
• computational complexity
• automata theory
• algorithms and data structures
e-mail architecture
header analysis
e-mail headers
e-mail forensics
feature coding
pca
ca
certification authority
&security
chebyshev polynomials
blind signature
friendly-cooperative framework
system hardening
• heterogeneous wireless networks
fair exchange protocols
fair document exchange
dempster–shafer belief theory
hashcode
hacker
websites
• quantum computation
• program semantics and verification
• probabilistic computation
• parallel and distributed computing
• natural language processing
• cryptography
• computational science and applications
• machine learning
• information theory
• computational physics & biology
data outsourcing; privacy; public cloud severs; ac
background removal
x64 systems
neighbour mean interpolation
image interpolation
operation system
simulator
emulator
web filtering
collaborative web systems
vector valued functions
privacy preserving
implicit function theorem
hitech act
hipaa
incident response team
cyber incidents
ecurity threats & countermeasures (ddos
hybrid idps
perimeter-based idps
network-based idps
host-based idps
idps sensors/agents
tcp re-assembly
cyber-crime & bdi.
vendor lock-in
csp
multi-cloud
feature selection.
keystroke dynamics.
biometric
web-based
fuzzy-c means clustering
background subtraction
foreground detection
attacks prediction
threat activity.
cyberattack ontology
cyberattack prediction
network and wireless network securitymobile
iot security and privacy
blockchain new design
blockchain consensus algorithms
blockchain foundations
blockchain-based security for the iot
iot experimental results and deployment scenarios
security & network management e-mail security
multimedia etc big data tools and systems big data
privacy and trust big data applications
models and algorithmsbig data infrastructure and p
big data big data techniques
peer-to-peer network security database and system
network applications
emerging technologies for next generation network
discrete algorithms and discrete modeling
network operation and management
mobile and wireless networks
network security and privacy
communication network protocols
communication network architectures and design
features.
mlp
filtering.
enron
keyword search
report generation
digital forensic
email forensic
cassandra big data.
database & information retrieval
image signal processing
networks & fuzzy system
dns poising.
legal.
regulation
protection
personal
law general
trust in service-oriented architecture- open archi
and nist statistical tests
matlab simulation
chaotic algorithms
images security
hash function [2]
open application
xml-dsig
cluster head
risk and threats
bayesian belief network
malware propagation modelling
shifting
shifting.
sprase svd (ssvd)
singular value decomposition (svd)
multimodal authentication
exponential kronecker product (ekp)
kronecker product
context-sensitive exponent associative memory mode
biometric fusion
information theor
engineering cybernetics
decision support system
multimedia & telecommunications
conditional random fields
layered approach
secure two-party computation
zero-knowledge proof
distributed eigamal encryption
similarity coefficients
vanet etc.
v2v
stdma
csma
packet marking
autonomous system
sensing layer
resonant frequency
micro cantilever
dynamic source routing.
network coding
ws-security
soap
httpi
https
http
signature-based
misuse detection
architecture
agent
trojan protectionstem security
database and syvirus
strong t -consistency
group communication
server security
small business security
e-commerce systems security
mobile phones
data and grid room
network security & its applications
pki interoperability
cross-certification
certificate practice statement(cps)
certificate policy(cp)
certification authority(ca)
public key infrastructure(pki)
ngn
ec-aka
aka
eps
lte security
• intelligent agents and systems
• trust management
• privacy and authentication
• cryptography and coding
security and privacy policies
mobile ad hoc network
spammers
web spam
redirection
manipulating search engine
search engine
hiding techniques
cloaking detection
database and system security intrusion detection a
lucas
digital signatures
fair-exchange
contract signing
andit security
protected health information
personal identification information
information assurance
low-power
improved watchdog
watchdog
security area control
regulation and trust mechanisms
biological and evolutionary computation
reinforcement and unsupervised learning
) • ubiquitous computing security
engineering
search engine optimization
malicious websites
intrusion detection and prevention internet securi
counterfeit.
and machine learning
knime
aes.
session based key
security in distributed systems
artificial immune systems
computational intelligence in security
multiple flows
tcp protocols
high-speed
heterogeneous networks.
next generation networks
casper/fdr
authentication and key agreement protocols
heart rate device
gps
emergency
arduino microcontroller
accelerometer
accidents
hierarchical model
trust management for virtual organizations
policy of trust in e-leaning systems
trust and reputation management
mobile and sensor networks
trust/risk based security frameworks
trust management system for wireless
certificateless public key encryption
certificateless signature scheme
digital certificate
certificateless public key cryptography
set protocol
fuzzy logic & perspective of intrusions
association mining
temporal sequence patterns
ubiquitous computing security web 2.0 security
olsr
willingness function
system information leak
peer to peer and overlay networks
qos and resource management
dos attacks
ndp
fragment header
flow-label
ipv6 security vulnerability
remote authentication
man in the middle attack
user authentication framework
analysis
dynamic billing system
data aggregation
distributed hash tables & linear diophantine
decentralized network
multimedia content management
bit error rate(ber)
ecb and cfb cryptographic algorithm
pre-zf
pre-mmse
mimo-ofdm
peerto-peer network.
intrusion attacks
taxonomy of attack
intruder
maximum power transfer
electronic circuit
control system
touch sensor
communication technologies
mobile & wireless networks
lowest id clustering algorithm
sybil node
smrr
blockchainbased security for the iot
blockchainauthentication and authorization
analyze formal
timestamps
nonce
pkm
informtaion technology
safety
response time
self-configuration
self-cure
self-protection
self-optimization
autonomic network
clustering technique
awgn and raleigh fading channels.
sbskct
Ver más
Presentaciones
(325)Documentos
(1052)Recomendaciones
(2)A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYBASED NIDS
IJNSA Journal
•
Hace 6 años
PhD and Post PhD Network Security Visualization Research
Kulsoom Abdullah
•
Hace 9 años
Personal Information
Sitio web
airccse.org/journal/ijnsa.html
Acerca de
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Etiquetas
phishing
peer-to-peer network security
worms
database and system security
spam
cryptographic protocols
mobile
virus
web 2.0 security
e-mail fraud
ubiquitous computing security
security
ad hoc and sensor network security
network and wireless network security
security & network management
network security
e-mail security
trojan protection
intrusion detection and prevention
internet security & applications
session hijacking
mim
artificial intelligence
hardware-based attacks
machine learning
ddos
web based applications
security of virtual machines
services security
intrusion detection
blockchain technology
crowd sourcing
performance evaluations of protocols & security ap
social networking
machine learning for security
replay attack
authentication
body-area networks
cyber security
replay attack etc
home networks
network management
sensor network security
blockchain
privacy
industrial control systems
system security
sdn
autonomous vehicles
cryptography
vanets
data mining
trojan protectio
deep learning
wireless network security
cryptocurrencies
security and optimization
internet of things (iot) secur
electronic voting security
cognitive security
cloud computing
security application
neural networks
big data
encryption
internet security & applicatio
intrusion detection and preven
trust
internet of things
e-mail fraud virus
ad hoc and sensor network security peer-to-peer ne
bioinformatics
natural language processing
wireless sensor networks
trojan protection security threats & countermeasur
network and wireless network security mobile
information security
manet
network and wireless network s
privacy challenges
database
fuzzy logic
) ubiquitous computing security web 2.0 security c
security threats
ad hoc and sensor netw
cloud
information retrieval
computer vision
steganography
routing
intrusion detection system
security and privacy for iot
connectivity and networking
malware
performance evaluations
security threats & countermeasures
detection
security threats & countermeasures (ddos
)
ontology
iot applications and services
aodv
pattern recognition
android
• mobile
• peer-to-peer network security
key management
• intrusion detection and prevention
• e-mail security
• virus
• cryptographic protocols
• ubiquitous computing security
peer-to-peer
text mining
knowledge processing
information extraction
robotics
cyber physical system (cps)
attack
aes
internet security
image encryption
• performance evaluations of protocols & security
image segmentation
block cipher
• web 2.0 security
• security & network management
• internet security & applications
game theory
• network and wireless network security
internet of things (iot)
cyber physical system
network
decryption
iot
cybersecurity
classification
attacks
• database and system security
wireless network
ad hoc
nlp
substitution
information hiding
e-commerce
hybrid intelligent systems
dos
resource provisioning
fog
performance evaluations of pro
cloud security
vanet
ubiquitous computing
cloud and grid computing for big data
soft computing
semantic processing
data security
web security
morphology
phonology
security.
permutation
malicious node
usability
predictive learning
data science
electronics and signal processing for iot
steganalysis
ssl
hash function
qos
random forest
rsa
malware detection
denial of service
smart grid
password
bayesian network
iot-enabled innovation
phishin
entrepreneurship
deployment scenarios
parallel processing
virtualization
business intelligence
electronics
network protocols
fuzzy systems
mobile ad hoc networks
wireless sensor network (wsn)
signal processing for iot
fog computing
cryptosystem
mobile ad-hoc networks
ethereum
optimization
genetic algorithm
biometrics
udp flood
grid
icmp flood
quantum cryptography
machine learning and ai for big data
malware analysis
smart city
anonymity
trojon protection
security techniques
visualization
hacking
scanning
array signal processing
experimental results
dynamic analysis
wireless sensor network
intrusion detection system (ids)
machine learning algorithms
data protection
wimax
kyoto2006+ dataset
discrete fourier transform
protocol
chaotic system
wsn
generalized arnold map
distributed denial of service
watermarking
symmetric key
machine translation
secret sharing
threats
data center network control
access control
lexical semantics
chunking/shallow parsing
biometric security
elliptic curve cryptography
key distribution
iot-enabled innovation and entrepreneurship
big data mining
cooperation
e-voting
user identity
blockchain scalability
vpn
block chain issues and trends
secure routing
firewall
framework
trust and privacy ch
wireless networks and mobile computing
question answering
grid computing
3d and stereo imaging
http flood attack
syn flood
manets
digital image processing
programming languages
dns reflection or amplification attack
information technology
risk management
• network and wireless network security • mobile
mobile security
ad hoc and sensor network security • peer-to-peer
knowledge representation
ai algorithms
wireless ad hoc networks
cyberattack
visual cryptography
group testing
ddos attack
chaos
intrusion
text steganography
ns2
dsr
mobile network
intrusion detection systems
verification
forecasting
mobile banking
service oriented architecture
mobile agent
reputation-based
confidentiality
it security
intrusion prevention
mobile payment
wlan
secure cloud computing
edge
computer & network security
social engineering
spectral analysis
denial of service attack
data mining techniques
vehicular forensics
data
blowfish
authorization
security properties
benchmarks
integrity
risk mitigation
tdes
kleptography
network forensics
vulnerability assessment
challenges
internet signal processing
color and texture
penetration testing
unfettered rules
learning problems
mapreduce
collaborative environments
trojan protection • security threats & countermeas
multimedia & cognitive informa
private key
e-mail fraud • virus
public key
data visualization
user authentication
rsa algorithm
denial-of-service attack
rotor cipher
quantum key distribution
wormhole
brute force attack
honeypots
trust management
vanet attacks
bro ids
inventory
device fingerprinting
endpoint security
twitter
feature selection
network protocols & wireless networks
image processing
natural language computing
multimedia
anomaly-based detection
feature
wearable technology
wearable devices
smartwatch
wormhole routing
broadcasting communication
deadlock-free
hamiltonian model
3-d mesh
support vector machine
blockchain authentication and authorization
blockchain based security for the iot
5g and networks for big data
multimedia etc
big data applications
consensus
biometric authentication
mobile authentication
information centric network
web authentication
email spam
m/g/r processor sharing queue
trust determination
trust-based routing protocols
nwtd
text-based captcha
benchmark
fuzzy logic.
svm
economics
security management
ecc
cloud storage and file systems
voip
cybercrime
reinforcement learning
protocols
intruders
classifier
methodology
bluetooth
performance evaluation
device authentication
initial trust
social media
device deployment
unsw-nb15
experimental results and deployment scenarios
text stenography
python programming language
critical infrastructures
man-in-the-middle attack
multi-layer encoding
window function
natural language prepossessing
color space
the mapping study
intelligent system architectur
entropy
api calls
carry select adder
least significant bit (lsb)
databases
xor
quantitative trait loci
symmetric cryptography
trusted third party
cipher text
ascii code
psnr
networking and architectures
pox
integrity.
digital forensics
topology discovery
software defined network
password handling
smart card
nlp and ai
optical computing
big data techniques
packet flow
ldap
network performance
edge & cognitive s
kerberos v5
pervasive computation trust
dual-port read-only memory
computer science
brute force attacks
models and algorithms
computer networks & communications
bb84 protocol
zigzag scanning
security engineering
network security.
subliminal channel
abnormal.
ipsec
trapdoors
algorithms and applications
nlp and machine learning
frequent sequence mining
covert channel
network intrusion detection
internal controls
management
secret key
behavioural pattern
sha-1
wireless
theory of parallel / distributed computing
decentralized trust management
cpu
ad hoc network
cad design and testing
software security
cyber trust and security
denial-of-service
trust and privacy challenges
anomaly
mobile devices
virtual machines
wireshark
spoken language processing
software systems and technologies
assessment survey
covid-19 pandemic
a digital certificate
cryptocurrency exchange
decision tree
detection rate
distributed denial-of-service (ddos)
• theoretical computer science and algebra
false alarm
administrator
appliance
end-to-end security model
els
secure communication
network defenses
firewalls
web server handlers
sybil attack
digital signature
zero trust architecture
connectivity
• database
mutual authentication
mse
• security threats & countermeasures
bloom filter
nsl-kdd
sgd
lea
congestion control
automation
performance
computing
networks
password.
image classification
mnist benchmark.
shortest path
smart cities
python
scapy
kali linux
de-authentication attack
session key establishment
security policy
pairwise comparisons.
logistic regression
analytic hierarchy process
k-nn
naive bayes
data hiding
traceback
manet(mobile adhoc network).
access security controls
markov-model
cybersecurity culture
crypto stream ciphers
mitm attack
rc4
blockchain attacks on existing systems
fault tolerant
key spoofing
internet of thing
big data search and mining
i-voting
electronic voting system
plain text
medical system
metric
availability
dependency
application-layer ddos attack
browsing model
error detection
notification
beacon
security for grid computing
seed
model checking
smartphone
disaster
random number generator
tls
henon map
vulnerability
shuffle
vanet security and privacy approaches
tools
vanet adversaries and attackers
security and privacy requirements in vanet
exploit.
information security.
confusion
diffusion.
mix zone
pseudonyms
content management
click spam
web advertising
google ads
pay-per-click advertising
apache spark
wordpress
attribute-base-access-control
security analytics
role-base-access-control
network architectures
feature extraction
mobile networks & wireless lan
bfmawddl
bfcdnba
usable security
blockchain privacy
) • ubiquitous computing security • web 2.0 securi
public-key cryptography
training
arithmetic coding
cryptanalysis
location privacy
data description
temporal sequence
anomaly-based network intrusion detection system
attacks & performance
surveillance
sniffing
iot security
okhttpclient
healthcare cybersecurity
httprequests
mobile ip
iot connectivity and networking
incident response
encryptions
unavailability
false alarms
kdd cup 99
standard
simulation
device association
decrypting
risk principles management
manage security programs
encrypting
mobile ad-hoc network
smart vehicles
dispute settlement
elliptic curve
interworking
social networks & web 2.0 trust management
public key cryptography
lte
umts
imsi
identity
kvefs
encrypt file system
face
fingerprint
key-value store
file system in user space (fuse)
protocols.
least significant bit
matrix partition
spatial domain
pki
image steganography
ivote
routing protocols
reputation system
bfma
logistic map
policy management
distributed denial of service (ddos)
reliability
insider threat
agent based trust management
access control and intrusion detection
authentication and identity management
p2p
dpa
clusters and grid computing : security and role of
security and privacy in mobile systems
wddl
security information systems architecture and desi
esrm
bf
insider threats and countermeasures
fair exchange protcocol
wireless mesh networks
securing windows
maturation of a profession
microsoft domain environment
spectrum analysis
matlab
risk mechanism
automated ids
enterprise risk management
local authentication protocols
mobile cloud computing
finger print authentication
mitigation
data analytics
dmt
dft
neural languages
common control channel challenge
crahn
multi-channel mac
software engineering
service discovery
encryption\decryption
pgp
hmac
data center
swifi
online social networks
profile cloning
computer network
cloud service
distributed computing
shares
greying effect
key share.
infrastructures for big data
iqim
dabechies4
interweaving
flash crowds
credits.
mom
wire antennas
gain
current distribution
vswr
fractal
input impedance
polarization
resonant
bgp protocol
hashing.
bmp image file
lsb steganography
agent based intrusion detection system (aids)
black hole attack
security plan
small business
risk planning
parsing
internet attacks
knowledge base
interoperability
risk assessment
healthcare
privacy protection
role-based access control
xacml
file upload
video upload
virtual system
study material
map reduce
hadoop
alert correlation
data integrity
data center network
protection m echanism
secret image sharing
quadratic residues
image coding
data type
data size
cipher algorithms
data density and encryption time
gpu
data & system integrity
privacy and authentication
cuda
coefficient of variance
denial of service (dos)
netstat
signal processing
data storage
the sleuth kit (tsk)
mechatronics
autopsy
tcpview
sparql
n-triples
owl
rdf.
k-means clustering
recommender system
frequent itemset
energy efficiency
decision making
big data management
syn flooding
tcp sequence number attack
cooperative transmission
packet broadcast
opportunistic large array
mis
quality
digital signal processing
physical layer
encryption/decryption[2]
caesar cipher[2]
security protocol
ns2[1]
wireless networks
wi-fi
prognostic
svm.
mog-hmm
rul
aodv.
false positive rate (fpr)
erbium-doped fiber amplifier (edfa) gain adjustmen
optical switch crosstalk
all-optical network security
emerging attack vectors
security risks
cross site scripting
wired equivalent privacy (wep).
wireless local area network (wlan)
wardriving
conditional entropy
sql injection
anomaly severity classification
semantic evaluation
multi-anomalies evaluation.
ubiquitous
mode of operation
low-resource
source code analysis
unreleased resource
path manipulation
software vulnerabilities
resource injection
distributed ac
ir circuit
hvac
temperature monitoring
temperature control
blue-tooth
mix
resource description framework(rdf)
utm clinic
energy-aware routing
reasoning and evolution
multipath routing
qos routing
application resource
graphical password
legitimate traffic.
learning methods and analysis
dll. llc
media access control
vn
lstm
knowledge-based authentication
paas
iaas& authentication
8 bits microcontroller
ditributed denial-of-service attack
ddisjunct matrix.
non-adaptive group testing
daugman
canny
sobel
iris
prewitt
zero cross
critical infrastructures.
man-in-the-browser
aran
ndm
smt
vanet architecture
pos tagging
ariadne
sead
computerbased information system
and pso.
threshold cryptography
anomaly severity evaluation
quantitative evaluation
internet casinos
cyber defense
botnets
bgp
network simulation tool
ip falsifying
idpf
network-level security and protection
visual information processing
mobile code
evolutionary computation
multi-agent systems
mobile agents
intrusion detection system.
porter stemmer
stemming
firewall policy
exploring data analysis
policy deployment
hybrid
random grids
dct based steganography
som
multi-som
certificate less cryptography
3gpp
4g
security architecture
linguistic resources
rhetorical relations
probability model
extractive text summarization
file systems
text clustering
markov random walk model
des
attribute reduction
artificial neural network
covert schemes
security solutions
pre-hacking
signal identification
peer-to-peer network
embedded systems
necessary information
video signal processing
gsm security
nist
dna
shiftrows
coefficient correlation
smart contracts
pairing based cryptography
secret handshakes
dynamic matching
bilinear pairing
multi-faceted model
online social network
updater identification
application whitelisting
service-oriented approach
version control
virtual password
secure communication channel
strong authentication
shared secret session key
scenario-based approach
visualization and animation
empirical evaluation
key escrow
management & interoperability
method engineering
threat modeling
cloud software development
security event management
data correlation
network dependency analysis
googleglass
blockchain in digital forensic
big data analytics and social media
historical
response
bloom filter.
distributed denial-of-service attack
particles swarm optimization.
sensors
radial basis function neural networks
distributed ledger technology
mansim.
collective digital signature
attack detection
email classification
brute-force attack
mobile communication
email fraud
security and privacy
static analysis
adaptive neural network
aco
comprehensive evaluation
lightweight
k-nearest neighbour
anomaly detection
practical testing system
avispa.
industrial communication security
network steganography
real-time networking
tcp/ip communications
inspection game.
agile programming
waterfall methodology
owasp
braiding/entanglement
multiple encryption
rotation of the bits
rfid
payment certificate
ccmp
packet dropping attack
hamming distance
information flow tracking
attribute-based encryption
multiparty micropayment
question answering (qa)
functional call monitoring
radius
mobile adhoc network
tkip
semantic processing & nlp
signal or image processing
quality of service
priority scheduling
selfishness
watch dog
cognitive load
clustering
alert aggregation
télécommunications
credential
software
intellect learning.
mediator
oauth
oix
data integration
openid
digital identity
shoulder surfing
session passwords
floating point number
one time pad
compression-crypto
network density
priori probability
life time
trust-based routing
shared bitmap
distributed rate control.
bandwidth reservation
medium accesscontrol
rate limitation
lan attack
host based ids
arp spoofing
active detection
connection failure behavior
self-propagating malware
dns poising
shared register array
mechanism
message digest
information theory
routing protocol
malware detection and mobile device.
attack graph
soa
finite elements.
biometrics; biometric fusion; face; fingerprint; c
and services.
networking
naive bayesian classifier
quadratic map
tent map
statistical hypothesis testing
kolmogorov-smirnov test
statistical test of significance
queuing model
poisson arrival
buffer
traffic flow
secured watermark system (sws) and computer securi
diffusion
stage staffing
2-d arnold cat map
db index.
encryption and decryption algorithm for watermarki
digital multimedia
stage staffing watermarking
http intrusion detection.
copyright protection
etc.
event classification
static and mobile wsn.
node replication attack
sybil
physical cryptography
physical unclonable functions
computer
enterprises security risk managemen
network security; malware propagation modelling; b
multi input multi output (mimo)
protocol safety.
anomaly-based intrusion detection system
adhoc network
smurf attacks.
enterprises security risk management
performance evaluation.
wireless.
ip spoofing
modeling
system dynamics
delay.
cdma throughput
semantic intrusion detection
application layer misuse detector
fuzzy intrusion detection
diffusion process and stream cipher.
fuzzy cognitive mapping
mobile ad hoc networking
fuzzy neural network
fuzzy c-means clustering
workload characterization
knowledge discovery in databases and privacy prese
integrated verification.
user authentication; group communication; secret s
one-class support vector machine
software implementation
hdfs (hadoop distributed file system)
content-addressable storage security
non-invertible transformation
cancellable biometrics
fingerprint biometrics
biohashing
best practice
it governance
mapping
pdca
information security management systems (isms)
iso 27001
information system.
policy-driven security
cobit
nsgaii.
objective functions
symmetric cryptosystems
non linearity
s box
memorability of passwords
snakes & ladders game
graphical passwords
attackers .
cryptographic algorithm.
mac-layer
threshold level
j48.
network security management
complexity.
ldpc codes
chained codes
system information leak
data and grid room
image
video
real time application
cover media
authentication & q-learning
anti-spam
email filtering
rtos
mobile ad hoc networks security
conficker
gpcode.ak
password (information) snatching
evasive/ deniable/ untraceable attacks
little dragon cryptosystem
electronic espionage threats
big-dragon cryptosystem.
electronic warfare threats
cryptotrojan
cryptovirus
cryptovirology
firewall systems design
computer networks
identity based firewalls
malicious
proposed method.
noise categories
wavelet thresholding
image denoising
false positive
classification accuracy
support vector machine (svm)
hybrid intrusion detection system
interactive education.
secure routing protocol
and bernoulli map
attack tree
in order to the rapid growth of the network applic
it is necessary that this security concern must be
new kinds of network attacks are emerging endlessl
we propose a novel distributed intrusion detection
usage control
• security
• internet security
hash function [2].
encryption and decryption.
customizable security.
and matlab.
and exemption.
and public-key.
system access control
deviation detection
distributed resource allocation
asynchronous distributed pricing
packet detection and packet header matching (phm)
snort
network intrusion detection system (nids)
multivariate cryptography
ad hoc and sensor
secure network
secure servers
heterogeneous wireless network
wake up receiver
vlsi
low power
multigeneration keys.
random kd (key distribution)
sec-leach (secure leach)
ieee 802.15.4
ieee 802.11b
inter packet delay
hybrid covert channel
sensor networks
leach (low energy adaptive clustering hierarchy)
galois counter mode.
link layer security
no key-exchange
dst
quantum superposition state
perl
sub
html
regexpr
fair exchange
circular queue.
file handler
quantum networks
md5
wave files.
feedback
lu matrix composition
signature based detection
behaviour based detection
flow based detection
c&c
irc
botnet
key establishment
intrusion detection / prevention systems
signature formulation
signature processing
share
n) visual cryptography
(2
selfish nodes
smart-card
dfa
coexistence
multi-server
low-cost cryptography
node misbehaviour.
malicious packet dropping
controlled flooding
reputation
remote user
masquerade attack
password strength
data value
network security & identity privacy
pareto-efficiency
attack graph.
efficient probabilistic packet marking algorithm
probabilistic packet marking algorithm
and crypt ography.
online auction network
byzantine behavior
multicast communication
ad-hoc networks
hierarchical design
ids
tls protocol
timers
typing rhythms
keystroke
rangoli
passwords
implementation cost
transposition cipher
service differentiation.
mb-ofdm
interference limitation
mobile ad hoc network (manet)
sha-256
ip
ao
udt
high speed bandwidth
next generation network protocol
desirability functions
best practice frameworks
baseline manuals
risk analysis and management
olsrv2
network security protocols
information security controls
signatures
web services
vulnerability analysis
ip multimedia subsystem (ims)
interpolation.
qim
identity based cryptography (ibc)
m-ary modulation
service authentication
error concealment
batch verification
smartcard
authentication.
covert channel.
diffie-hellman algorithm
arithmetic encoding
biometric information
honeypot and nics.
iptables
network intrusion prevention
np-complete
quotient ring
diophantine equation
one-way function
steganography; image segmentation; byte characteri
cyber-defense.
nonlinear function.
handoff delay
invisible digital watermarking
pixel
smart cards
triangle routing
remote user authentication
attack games.
eavesdroppers
route optimization
wireless body area networks
niger-delta
clustering routing
cryptoviral extortion.
clone
audit system
log analysis.
selinux
sensor network
z-transform; frequency domain; watermarking; mean
registration time.
cellular automata
crossover
sha-512
hdl.
threshold cryptography.
finite fields & montgomery algorithm.
ecc-3peke protocol
undetectable online password guessing attack
authorization and password.
impersonation attack.
packet loss
sessionbased
minutiae
ann
probabilistic encryption
deniable encryption
receipt-free
rigging
ip traceback
content
packet sniffers
legal aspects
zss signature.
phonology and morphology addressing & location man
data shredding
avalanche
confidence level
lsb replacement steganography
key sensitivity
location coordinates
ipfix
flow
scan detection
cluster
guard node
iterations
soft input
mac addresses hash value.
lu-cac
caca
bandwidth link utilization
reliability.
convolutional coding
emergency response communication
text passwords
coercing
judy array
blom
location-dependent social networks
tunneling
community consensus
replica
pragmatic web
agent-based systems
spatial reasoning
computing with words
uncertainty
language-action perspective
overlay
and delay
software configuration management
clusters
password replace ment
vmware
performance measurement
network virtualization
switching and addressing techniques self-organizin
& privacy next generation internet & web architect
longitudes
usable security.
latitudes
central bank digital currency
digital rupee
smart banking
survey
domain analysis
scoring benchmark
http strict transport security
shape representation
text processing
document recognition
signal noise control
victimization
information
emotion
signal
ciphers identification
encryption modes
hypergraphs
cloud data security
fine grained access
group key management
electronic payment
hash chain
symbolic machine learning
security posture
open-source erp software
factors
attributes
measurement framework
parsing/grammatical formalisms
monetary policy
socioeconomic impact
peer-to-peer transactions
fintech
protection mechanism
interactive education
face recognition
hdfs (hadoop distributed file
cloud storage
mobile computing
context-aware computing
smartwatches
assessment
fuzzy set theory
accounting
random forest algorithm
pe header
pe file
higher education
mobile education
face and gesture
feature engineering
block ciphers
encryption time
cryptographic algorithm
wormholes
spread spectrum
selective jamming
detection models
ensemble machine learning
ddos attacks
r360
web intelligence
evolutionary computing
ai in cyber security
nids
software defined networking
network intrusion detection sy
byte characteristic
zss signature
cyberdefense
double spending
cybercrime awareness
cybercrime on social media
education
self-sovereign identity
digital transformation
software configuration managem
public cloud severs
data outsourcing
pervasive/ubiquitous computing
regulation and trust mechanism
software-defined networks
rerouting
devices authentication
big data analytics
big data and iot
application security
awareness
security behavior
self-efficacy
pre-processing
alert prioritization
alert clustering
merging
trellis coded genetic algorith
session key matrix
pseudo random key generator
finite automata
xperimental results
ultrasonic audio
voice activation
hybrid analysis
android banking trojans
security threats & countermeas
web and internet computing
ontology and semantic web
machine learning & application
grid and scalable computing
information technology trends
bitwise-based hash
split sketch
principle component analysis
victim identification
ddos detection
claims processing
process improvement
insurance
security logs
security metrics
packet analyzer
tcp
network traffic
dos attack
secure division
secure sum
naive bayesian
privacy preservation
authentication scheme
cryptography primitives
password replacement
sequence number
monitoring agent
side channel monitoring
hooks
system call
constraint processing
resource management
ngns
finding roots modulo.
signing group
group digital signature
implementation
technology
power distribution
social computing
consensus mechanism
signing group.
difficult computational problems
groupdigital signature
land
http flood
tcp syn flood
markov chain
security issue
smart devices
incentive schemes.
rewards
federated learning
incentive schemes
high port application
sinet
port filtering
data flow pipeline
traffic patterns
covid-19 related ioc
prediction support parameter.
k-means clustering algorithm
detection model
malicious javascript
firmware
db index
cyber human behaviour
stylometric analysis
phishing email attack
cyber-security
security policies
defense mechanisms
employee awareness
wimd cybersecurity
wimd
wireless implanted medical devices
cardiac implanted device
health belief model
windows api calls.
term frequency-inverse document frequency vectors
n-gram analysis
malware classification
structural similarity index measurement (ssim).
universal quality image (uqi)
image fidelity (if)
peak signal to noise ratio (psnr)
mean square error (mse)
frequency domain
z-transform
identity federation.
limitations
identity management
federated identity management
distributed system.
information-centric
internet-of-things.
intelligent transportation system
sensor network.
etc
mixture words
nouns
recall
recognition
user behavior
optimal path
big data tools and systems
virtualization on platforms in the cloud
data storage and management in cloud computing
security techniques for the cloud
virtual compute clusters
system integration
cloud based
reference dna
multilayer security
indexing cipher
dna cryptography
filter design and structures
signal reconstruction
network layer security
radar signal processing
medical image analysis
medical image processing
ad hoc and sensor network
multi input multi output (mimo
smurf attacks
electronics and signal process
services
salting techniques
hash analysis
security breaches
threats and attacks
lan
passphrase
a variant of covert channelworks similarly as netw
the privacy. most of such attacksare devised using
computer network is unpredictable due to informati
iot devices.
technical and security issues
comparison.
review
mare
sama
software architecture
microservices
trojan.
human factors
end-user errors
information systems
cisco packet tracer
cyber-attack
nb.
knn
cnn
offline signature recognition
smart contracts.
decentralized application
added value applications
enablers
arxiv
reddit
stackexchange
text classification
topic modeling
dst.
internet of things (iot) security
blockchain technology and cyber security
we introduce new detection engine for hybrid cover
convolutional neural network
storage and retrieval
coding and transmission
anomaly-based intrusion detect
protocol safety
big data in cloud
cloud management
cloud storage for iot
sensitive data
insider attacks
data leakage prevention (dlp)
data access & protection
micro medical processors
knowledge instruction
medical sensor network
micro knowledge processors
knowledge processors
image analysis
exploit
packet delivery ratio
throughput
hdl
network mapping
nmap
social clouds
consolidation
software defined networking (s
patient empowerment
ehr management
blockchain in healthcare
actuators
neural network
url
phishing detection
network cybersecurity
techniques
ipv4
exemption
information system
digital investigations
digital forensics readiness
digital evidence
wireless medical networks
ad-hoc on-demand distance vect
mobile ad-hoc network (manet)
one-class support vector machi
sharing queue
m/g/r processor
operating systems
computer architecture
fake profiles
xg boost
multimedia data mining
multimodal skew tent map
interchange permutation
eap-ttls
inductive learning
nlp and information retrieval
and text mining
web
machine learning techniques
bls signature
secret sharing technique
bi-variate polynomial
security for emerging networks
modelling
cyber attacks
tree
bayes
secure smart meter
ambient intelligence
social network analysis
host-based intrusion detection
network-based intrusion detect
small-to-medium enterprises
rough and fuzzy rough set
hybrid and nonlinear system
data and web mining
automated machine learning
programming models
static testing tools
openmp
software testing
exascale systems
preferential attachment topolo
model simulation
data as a product (daap)
privacy preserving pipelines
dataprovenance
memory safety
verifiable observability
capability-based security
cheri
webassembly
security and optimization data
cyber fraud
fraud detection
intrusion detection system (id
gravitational search algorithm
fuzzy
physical hardware attacks
network attacks
attacks on data
information fusion
enterprises security
pervasive computing
wave files
password complexity
password length
password security
ht detection
hardware trojans (ht)
path selection
test generation
path delay fault (pdf) testing
model interpretability
explainable ai
vanet security and privacy app
vanet adversaries and attacker
security and privacy requireme
netlogo
horizontal scalability
direct acyclic distributed led
gpt-4
graphcodebert
codebert
source code vulnerability
powershell
microphone security
webcam security
unauthorized access detection
cybersecurity awareness
ai-based security
phishing prevention
browser extensions
malicious url detection
media computing
nft
email users
correlation
log loss
hot log
live log
insufficient logging
soc
siem
countermeasures
avispa
industrial communication secu
data management
mobile networks
semi-trusted third party
fairness
verifiability
secret-sharing
relieff algorithm
email forensic dataset
cybercrimes
aquila optimization
likability
traceability
software maintenance
separation of concerns
context-aware traffic light co
traffic light control (tlc)
requirements engineering (re)
networks for big data
encryption and decryption
inspection game
confusion matrix
impersonation
phishing attack
computer security
secured watermark system (sws)
embedded system
nosql data stores
public safety
crowd monitoring
cctv
cyberattack impact
cyberattack types
personal privacy
economic stability
cyberattacks
saudi arabia
parameters
sensor node
leach
cluster head selection algorit
optimistic multi-party computa
trustworthiness
autoencoder
invertible
mobile device
intellect learning
finite elements
information retrieval and ai
neural languages and nlp
gitlab
jenkins
cve-2021-44228
ci/cd
continuous delivery
continuous integration
dimensionality reduction
educational data mining
advanced persistent threats (a
multi-vector attacks
mesa security model
stealth data exfiltration (sde
sustainable agriculture
water management
dc water pump
water & humidity sensors
soil sensor
vulnerability identification
smart irrigation system
semantic web
conceptual modeling
unsupervised machine learning
j48
network control
mansim
crypto
agreements
blockchains
smart grids
real-time systems
maintenance engineering
production
worms &trojan
mobile clouds
sla management
machine learning and ai
network traffic analysis
asset inventory
data classification
cybersecurity frameworks
threat intelligence
zero-day vulnerabilities
massive parallel sequencing
forensic examinations
bio-examinations
deoxyribonucleic acid (dna) da
particles swarm
radial basis function
computational linguistics
distributed denial-of-service
machine learning problems
morphic computing
q-learning
mobile ad hoc networks securit
big data and the cloud
cloud computing architecture
cloud business
google glass
stacked auto encoder
explainable artificial intelli
shapley additive explanation
recurrent neural networks (rnn
deep learning (dl)
empirical studies
vulnerabilities
access control mechanisms
anonymization techniques
authentication mechanisms
encryption techniques
diffusion of innovation theory
national security
data privacy
low carbon blockchain
security key
public cryptography
argumentation mining
subset sum
coppersmith
lattice reduction
lattices
snmp
mib
multi- agent
distributed query processing
location cloaking
location based services
windows registry
forensics
kdd cup 1999 dataset.
which motivates many researchers to discover metho
intrusion detection is one of the standard stages
image cipher.
scrambling
key management protocols
wireless attacks
wireless intrusion detection system
attack test cases
attack taxonomy
cueing.
interfaces
one-time passwords
chosen ciphertext security.
conditional proxy re-encryption
proxy re-cryptography
random oracle model
noise & entropy
anti obfuscation technique
low level feature
merkle-hellman.
simultaneous diophantine
sender mail server
receiver mail server
anti-spams
wsn security
cross layer architecture
packet latency.
benevolent node
base station (bs)
route trust (rt)
indirect trust
direct trust
geometric mean (gm)
device discovery
physical proximity
fidelity
coordinate ratios
equatorial cloning
multimedia networking
mobile & broadband wireless internet
network based applications
network operations & management
measurement & performance analysis
internet and web applications
high speed networks
adhoc and sensor networks
heterogeneous wireless networks
security standards
security assessment
business information security
false positives
true positives
it policy
common vulnerability exposure (cve)
spam email
security breach
authentication and key agreement.
umts security
telecommunications system
gsm system
false alarm rate
naive bayes classification
multi stage filter
enhanced adaboost
compression.
transformation
threshold secret sharing
public verifiable signcryption
standard model
provable security
identity based cryptography
signcryption
embedded devices.
modular exponentiation
n-1 attack
simple power analysis
dominant feature set.
outlier analysis
behavioral profile
terrorism
social network analysis (sna)
backtracking bit
watch nodes
traversed administrator field
associative node
ubiquitous computing security web 2.0 security cry
corporate infrastructure
disaster recovery
data loss
thematic analysis
medical internet of things
classification problem.
svms
functional analysis
kernel functions
legendre polynomials
man-in-the-middle.
obfuscation
server less
server based
escrow less
tree based
hierarchical
multicast
group
peer to peer
fairness.
ttp (trusted third party)
security and privacy in pervasive/ubiquitous compu
authentication and non-repudiation
intrusion detection and vulnerability assessment
untraceability
cryptography and coding
survivability
intrusion resilience
fault-tolerant networks
diversity
androidapis
privilege escalation
system call dependence graph
behavior representation
data compression.
huffman coding
isotropic cloning
secure electronic transaction
f8
a5/3
stream cipher
unauthorized access
network design
real estate
infrastructure security
wireless sensor network.
wireless mesh network
wireless ad-hoc networks
web application penetration testing
security testing
) * ubiquitous computing security *
trojon protection * security threats & cou
e-mail fraud * virus
ad hoc and sensor network security * peer-
anti malicious objects
star topology
black scholes equations
malicious object
native language password
textual password
shape based authentication
multicode encryption
transversal designs
reed-muller codes
communication
and quality control
network system
control charts
anomalies
ieee 802.11g
multiple encryption.
arabic text
(ddos
response & tracking.
base station
sensor nodes
attack path reconstruction
ddos-attacks
icap
client honeypot
browser vulnerability
adhoc on demand distance vector protocol(aodv)
translation.
elecronic voting
user lifecycle
workflows
provisioning
security synthesis
information theoretic security
rational secret sharing
fault tolerance
topology.
authenticated symmetric key establishment
biometric key
wireless body sensor network (wbsn)
ofdm
spectrum sensing
inter symbol interference (isi)
cognitive radio
mpi.
encrypted data
international data encryption algorithm (idea)
hiding information
unicode
multi-layers
e-risks
e-learning
secret reference matrix (srm)
peak-signal-to-noise-ratio (psnr)
discrete cosine transformed (dct)
botnet and honeypot.
iptrcing
flooding attack
internet threat monitors (itm)
• peer to peer and overlay networks
• optical networks and systems
• next generation web architectures
• measurement & performance analysis
• internet and web applications
• high speed networks
• adhoc and sensor networks
• next generation internet
quantum copying machines
eavesdropping
todv
cross layer detection
body area network security
body area networks
misbehaving node
tbraodv
ad-hoc
isakmp
dsss
• network
enterprise
machinelearning
information gain
e-learning security
e-remedies
geometry
• computational complexity
• automata theory
• algorithms and data structures
e-mail architecture
header analysis
e-mail headers
e-mail forensics
feature coding
pca
ca
certification authority
&security
chebyshev polynomials
blind signature
friendly-cooperative framework
system hardening
• heterogeneous wireless networks
fair exchange protocols
fair document exchange
dempster–shafer belief theory
hashcode
hacker
websites
• quantum computation
• program semantics and verification
• probabilistic computation
• parallel and distributed computing
• natural language processing
• cryptography
• computational science and applications
• machine learning
• information theory
• computational physics & biology
data outsourcing; privacy; public cloud severs; ac
background removal
x64 systems
neighbour mean interpolation
image interpolation
operation system
simulator
emulator
web filtering
collaborative web systems
vector valued functions
privacy preserving
implicit function theorem
hitech act
hipaa
incident response team
cyber incidents
ecurity threats & countermeasures (ddos
hybrid idps
perimeter-based idps
network-based idps
host-based idps
idps sensors/agents
tcp re-assembly
cyber-crime & bdi.
vendor lock-in
csp
multi-cloud
feature selection.
keystroke dynamics.
biometric
web-based
fuzzy-c means clustering
background subtraction
foreground detection
attacks prediction
threat activity.
cyberattack ontology
cyberattack prediction
network and wireless network securitymobile
iot security and privacy
blockchain new design
blockchain consensus algorithms
blockchain foundations
blockchain-based security for the iot
iot experimental results and deployment scenarios
security & network management e-mail security
multimedia etc big data tools and systems big data
privacy and trust big data applications
models and algorithmsbig data infrastructure and p
big data big data techniques
peer-to-peer network security database and system
network applications
emerging technologies for next generation network
discrete algorithms and discrete modeling
network operation and management
mobile and wireless networks
network security and privacy
communication network protocols
communication network architectures and design
features.
mlp
filtering.
enron
keyword search
report generation
digital forensic
email forensic
cassandra big data.
database & information retrieval
image signal processing
networks & fuzzy system
dns poising.
legal.
regulation
protection
personal
law general
trust in service-oriented architecture- open archi
and nist statistical tests
matlab simulation
chaotic algorithms
images security
hash function [2]
open application
xml-dsig
cluster head
risk and threats
bayesian belief network
malware propagation modelling
shifting
shifting.
sprase svd (ssvd)
singular value decomposition (svd)
multimodal authentication
exponential kronecker product (ekp)
kronecker product
context-sensitive exponent associative memory mode
biometric fusion
information theor
engineering cybernetics
decision support system
multimedia & telecommunications
conditional random fields
layered approach
secure two-party computation
zero-knowledge proof
distributed eigamal encryption
similarity coefficients
vanet etc.
v2v
stdma
csma
packet marking
autonomous system
sensing layer
resonant frequency
micro cantilever
dynamic source routing.
network coding
ws-security
soap
httpi
https
http
signature-based
misuse detection
architecture
agent
trojan protectionstem security
database and syvirus
strong t -consistency
group communication
server security
small business security
e-commerce systems security
mobile phones
data and grid room
network security & its applications
pki interoperability
cross-certification
certificate practice statement(cps)
certificate policy(cp)
certification authority(ca)
public key infrastructure(pki)
ngn
ec-aka
aka
eps
lte security
• intelligent agents and systems
• trust management
• privacy and authentication
• cryptography and coding
security and privacy policies
mobile ad hoc network
spammers
web spam
redirection
manipulating search engine
search engine
hiding techniques
cloaking detection
database and system security intrusion detection a
lucas
digital signatures
fair-exchange
contract signing
andit security
protected health information
personal identification information
information assurance
low-power
improved watchdog
watchdog
security area control
regulation and trust mechanisms
biological and evolutionary computation
reinforcement and unsupervised learning
) • ubiquitous computing security
engineering
search engine optimization
malicious websites
intrusion detection and prevention internet securi
counterfeit.
and machine learning
knime
aes.
session based key
security in distributed systems
artificial immune systems
computational intelligence in security
multiple flows
tcp protocols
high-speed
heterogeneous networks.
next generation networks
casper/fdr
authentication and key agreement protocols
heart rate device
gps
emergency
arduino microcontroller
accelerometer
accidents
hierarchical model
trust management for virtual organizations
policy of trust in e-leaning systems
trust and reputation management
mobile and sensor networks
trust/risk based security frameworks
trust management system for wireless
certificateless public key encryption
certificateless signature scheme
digital certificate
certificateless public key cryptography
set protocol
fuzzy logic & perspective of intrusions
association mining
temporal sequence patterns
ubiquitous computing security web 2.0 security
olsr
willingness function
system information leak
peer to peer and overlay networks
qos and resource management
dos attacks
ndp
fragment header
flow-label
ipv6 security vulnerability
remote authentication
man in the middle attack
user authentication framework
analysis
dynamic billing system
data aggregation
distributed hash tables & linear diophantine
decentralized network
multimedia content management
bit error rate(ber)
ecb and cfb cryptographic algorithm
pre-zf
pre-mmse
mimo-ofdm
peerto-peer network.
intrusion attacks
taxonomy of attack
intruder
maximum power transfer
electronic circuit
control system
touch sensor
communication technologies
mobile & wireless networks
lowest id clustering algorithm
sybil node
smrr
blockchainbased security for the iot
blockchainauthentication and authorization
analyze formal
timestamps
nonce
pkm
informtaion technology
safety
response time
self-configuration
self-cure
self-protection
self-optimization
autonomic network
clustering technique
awgn and raleigh fading channels.
sbskct
Ver más