Volume 8, Number 1, January 2016

  Citation Count

Limiting Self-Propagating Malware Based On Connection Failure Behavior Through Hyper-Compact Estimators
You Zhou1, Yian Zhou1, Shigang Chen1 and O. Patrick Kreidl2, 1University of Florida, USA and 2University of North Florida, USA

0

Employee Trust Based Industrial Device Deployment and Initial Key Establishment
Apala Ray1,2 and Johan Akerberg2,3and Mats Bjorkman3 and Mikael Gidlund4, 1ABB Corporate Research- Bangalore, India, 2Malardalen University, Sweden, 3ABB Corporate Research-Vasteras, Sweden and 4Mid Sweden University, Sundsvall, Sweden

03

A Security Strategy against STEAL-AND-PASS Credential Attacks
Juan Ceballos, Security Consulting & Engineering, T-Systems International, Germany

-

Big Data Security and Privacy Issues in the CLOUD
Ali Gholami and Erwin Laure, KTH- Royal Institute of Technology, Sweden

02

Volume 8, Number 2, March 2016

  Citation Count

Trends Toward Real-Time Network Data Steganography
James Collins, Sos Agaian, The University of Texas at San Antonio, USA

01

Intrusion Detection System Using Discrete Fourier Transform with Window Function
Yusuke Tsuge and HidemaTanaka, National Defense Academy of Japan, Japan

-

A Novel Charging and Accounting Scheme in Mobile Ad-Hoc Networks
Inna Kofman1 and Nurul Huda2, 1University of Duesseldorf, Germany and 2Ryerson University, Canada

-

A Security Evaluation Framework for U.K. E-Government Services Agile Software Development
Steve Harrison1,Antonis Tzounis2, Leandros Maglaras1, Francois Siewe1, Richard Smith1 and Helge Janicke1, 1De Montfort University, United Kingdom and 2University of Thessaly, Greece

01

Cascade Block Cipher Using Braiding/Entanglement of Spin Matrices and Bit Rotation
D.Sravana Kumar1, P.Sirisha2 and CH. Suneetha3, 1Dr. V.S. Krishna Government Degree College, India, 2Indian Maritime University, India and 3GITAM University, India

0

The Internet of Things : New Interoperability, Management and Security Challenges
Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung, Western Sydney University, Australia

07

Design and Implementation of the Advanced Cloud Privacy Threat Modeling
Ali Gholami1, Anna-Sara Lind2, Jane Reichel2, Jan-Eric Litton3, Ake Edlund1, Erwin Laure1, 1KTH Royal Institute of Technology, Sweden, 2Uppsala University, Sweden and 3Karolinska Institutet, Sweden

04

Volume 8, Number 3, May 2016

  Citation Count

Using a Deep Understanding of Network Activities for Security Event Management
Mona Lange1, Felix Kuhr2 and Ralf Moller1, 1Universitat zu Lubeck, Germany and 2Technical Universitat Hamburg-Harburg, Germany

0

Wearable Technology Devices Security and Privacy Vulnerability Analysis
Ke Wan Ching and Manmeet Mahinderjit Singh, University Sains Malaysia Penang, Malaysia

0

Y-Hamiltonian Layers Broadcast Algorithm
Amnah El-Obaid and Nagham_Al-Madi, Zaytoonah University of Jordan, Jordan

01

Authentication Using Trust to Detect Misbehaving Nodes in Mobile Ad hoc Networks Using Q-Learning
S.Sivagurunathan1, K.Prathapchandran1 and A.Thirumavalavan2, 1Gandhigram Rural Institute-Deemed University, India and 2Arignar Anna Government Arts College, India

0

Volume 8, Number 4, July 2016

  Citation Count

Proactive Detection of DDOS Attacks in Publish-Subscribe Networks
Bander Alzahrani1, Vassilios Vassilakis2, Mohammed Alreshoodi3, Fawaz Alarfaj4 and Ahmed Alhindi5, 1King Abdulaziz University, Saudi Arabia, 2University of Brighton, United Kingdom, 3Qassim University, Saudi Arabia, 4Al Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia and 5Umm Al-Qura University, Saudi Arabia

01

Email Spam Classification Using Hybrid Approach of RBF Neural Network and Particle Swarm Optimization
Mohammed Awad and Monir Foqaha, Arab American University, Palestine

-

Performance Analysis of the Neighbor Weight Trust Determination Algorithm in MANETs
Ali Abu Romman1 and Hussein Al-Bahadili2, 1Princess Sumaya University for Technology, Jordan and 2University of Petra, Jordan

0

A Benchmark for Designing Usable and Secure Text-Based Captchas
Suliman A. Alsuhibany, Qassim University, Saudi Arabia

03

An Intelligent Classification Model for Phishing Email Detection
Adwan Yasin and Abdelmunem Abuhasan, Arab American University, Palestine

0

Volume 8, Number 5, September 2016

  Citation Count

A Hybrid Approach Combining Rule-Based and Anomaly-Based Detection Against DDoS Attacks
A Hybrid Approach Combining Rule-Based and Anomaly-Based Detection Against DDoS Attacks

0

Enhance RFID Security Against Brute Force Attack Based on Password Strength and Markov Model
Adwan Yasin and Fadi AbuAlrub, Arab American University, Palestine

0

Color Image Encryption Based on Multiple Chaotic Systems
Yuting Xi, Xing Zhang and Ruisong Ye, Shantou University, P. R. China

0

Volume 8, Number 6, November 2016

  Citation Count

Steganalysis Algorithm for PNG Images Based on Fuzzy Logic Technique
Jawaher alqahtani1, Daniyal Alghazzawi1 and Li Cheng2, 1King Abdulaziz University, Saudi Arabia and 2Chinese Academy of Sciences, China

0

A Mechanism for Early Detecting DDOS Attacks Based on M/G/R PS Queue
Nguyen Hong Son, Post and Telecommunication Institute of Technology, Vietnam

0

A Bastion Mobile ID-Based Authentication Technique (BMBAT)
Abdelmunem Abuhasan and Adwan Yasin, Arab American University, Palestine

0