Volume 5, Number 1, January 2013

  Citation Count

Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study
Natarajan Meghanathan, Jackson State University, USA

0

A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
Kuo-Tsang Huang1, Jung-Hui Chiu1 and Sung-Shiou Shen2, 1Chang Gung University, Taiwan and 2DE LIN Institute of Technology, Taiwan

09

An Integrated Solution for both Monitoring and Controlling for Automization Using Wireless Sensor Networks: A Case Study
M Gnana Seelan and Ch AS Murty, Centre for Development of Advanced Computing - Hyderabad, India

0

How to Find a Fixed Point in Shuffle Efficiently
Mikako Kageshima and ManabuOkamoto, Kanagawa Institute of Technology, Japan

0

Ontology-Driven Information Retrieval for Healthcare Information System : A Case Study
Aidarus M. Ibrahim, Hussein A. Hashi and Abdullalem A. Mohamed, University Technology Malaysia (UTM), Malaysia

09

Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and Support Vector Machines
A. M. Chandrashekhar1 and K. Raghuveer2, 1Sri Jayachamarajendra College of Engineering (SJCE), India and 2National Institute of Engineering (NIE) Mysore, India

12

Text Steganographic Approaches: A Comparison
Monika Agarwal, PDPM-IIITDM Jabalpur, India

42

Volume 5, Number 2, March 2013

  Citation Count

Incident Response Plan for a Small to Medium Sized Hospital
Charles DeVoe and Syed (Shawon) M. Rahman, Capella University, USA

0

Privacy Preserving Data Mining by using Implicit Function Theorem
Pasupuleti Rajesh1 and Gugulothu Narsimha2, 1VVIT College, India and 2JNTUH University, India.

02

Tulungan: A Slandering-Resistant Reputation System for Collaborative Web Filtering Systems
Alexis V. Pantola1, Susan Pancho-Festin2 and Florante Salvador1, 1De La Salle University, Philippines and 2University of the Philippines, Philippines

0

Design Issues on Software Aspects and Simulation Tools for Wireless Sensor Networks
Leelavathi G1, Shaila K2, Venugopal K R3 and L M Patnaik4, 1Govt.S.K.S.J.Technological Institute, India, 2Vivekananda Institute of Technology, India, 3University Visvesvaraya College of Engineering, India and 4Indian Institute of Science, India

03

Using Bias Optimiazation for Reversible Data Hiding using Image Interpolation
Andrew Rudder, Wayne Goodridge and Shareeda Mohammed, The University of the West Indies, Trinidad and Tobago.

0

A 64 Bits Rotor Enhanced Block Cipher (Rebc3)
Ahmed ElShafee, Ahram Canadian University, Egypt.

0

A Robust Background Removal Algortihms Using Fuzzy C-Means Clustering
S.Lakshmi1 and V.Sankaranarayanan2, 1Jeppiaar Engineering College, India and 2Crescent Engineering College, India.

02

Efficacy of Attack Detection Capability of IDPS Based on its Deployment in Wired and Wireless Environment
Shalvi Dave1, Bhushan Trivedi2 and Jimit Mahadevia3, 1Indus University, India, 2GLSICT,India and 3Elitecore Technologies Pvt. Ltd., India

02

Code Aware Dynamic Source Routing for Distributed Sensor Network
M Abdul Rahiman1, Nishanth Jain1, Arun K. Dubey2 and G Manoj Kumar3, 1AICTE, Ministry of HRD,Govt of India, India, 2Bharati Vidyapeeth College of Engineering, India and 3LBS Inst of Tech for Women, India.

01

Resonance Based Micromechanical Cantilever for Gas Sensing
Subhashini. S1 and Vimala Juliet. A2, 1Sathyabama University, India and 2SRM University, India

0

Traceback of DOS Over Autonomous Systems
Mohammed Alenezi and Martin J Reed, School of Computer Science and Electronic Engineering, University of Essex, UK

04

Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicular Ad-hoc Network Environment
Vaishali D. Khairnar and Ketan Kotecha, Institute of Technology Nirma University, India

26

A Novel Secure Cosine Similarity Computation Scheme with Malicious Adversaries
Dexin Yang1, Chunjing Lin2 and Bo Yang2, 1Guangzhou City Polytechnic, China and 2Shaanxi Normal University, China

01

Improved Ids using Layered CRFS with Logon Restrictions and Mobile Alerts Based on Deviant System Behaviour
Arpitha M1, Geetha V1,Gowranga K H2 and Bhakthavathsalam R2, 1Alpha College Of Engineering, India and 2Indian Institute of Science, India

0

E-Commerce Systems Security for Small Businesses
Syed (Shawon) M. Rahman and Robert Lackey, Capella University, Minneapolis, USA.

04

Volume 5, Number 3, May 2013

  Citation Count

Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and Energy Depletion Parameters
S.Prabhakara Rao1, E.Nagabhooshanam2 and S.Ramesh Babu1, 1Nigama Engineering College, India and 2Sridevi Womens Engineering College, India

0

An Efficient Group Authentication for Group Communications
Lein Harn1 and Changlu Lin2, 1University of Missouri, USA and 2Fujian Normal University, P. R. China

06

Password Based Scheme and Group Testing for Defending DDOS Attacks
G Dayanandam1, T V Rao2, S Pavan Kumar Reddy1 and Ravinuthala Sruthi1, 1QIS Institute of Technology (QISIT), India and 2KL University (KLU), India

03

Security Algorithms for WIMAX
M Alzaabi1, K D Ranjeeth1, T Alukaidey1 and K Salman2, 1University of Hertfordshire, UK and 2Middle Tennessee State University, USA

02

Hybrid Architecture for Distributed Intrusion Detection System in Wireless Network
Seyedeh Yasaman Rashida, Islamic Azad University Shirgah, Iran

04

HTTPI Based Web Service Security over SOAP
Pankaj Choudhary, Rajendra Aaseri and Nirmal Roberts, ABV - Indian Institute of Information Technology & Management, India

05

Implementation of a Security Protocol for Bluetooth and WI-FI
U. Pavan Kumar, Amity University, India

03

Bearings Prognostic Using Mixture of Gaussians Hidden Markov Model and Support Vector Machine
Fatima Ezzahra Sloukia1, Rajae Bouarfa1, Hicham Medromi2 and Mohammed Wahbi1, 1SIR2C2S/LASI-EHTP, Morocco and 2Hassan II University, Morocco

11

Trust Value Algorithm: A Secure Approach against Packet Drop Attack in Wireless Ad-Hoc Networks
Rajendra Aaseri, Pankaj Choudhary and Nirmal Roberts, ABV-Indian Institute of Information Technology, India

02

Volume 5, Number 4, July 2013

  Citation Count

Real Time Securing of All-Optical Networks Against Security Attacks at the Physical Level
Fahmida Rahman and Mohammed Arozullah, The Catholic University of America, USA

0

Phishing Techniques and Mitigating the Associated Security Risks
Marc A. Rader and Syed (Shawon) M. Rahman, Capella University, USA

*

Wireless Networks Security in Jordan: A Field Study
Ahmad S. Mashhour1 and Zakaria Saleh2, 1University of Bahrain, Bahrain and 2Yarmouk University, Jordan

03

Early Detection of SQL Injection Attacks
Hossain Shahriar, Sarah North and Wei-Chuen Chen, Kennesaw State University, USA

06

A Framework for Security Components Anomalies Severity Evaluation and Classification
Kamel Karoui, Fakher Ben Ftima and Henda Ben Ghezala, University of Manouba, Tunisia

0

Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authentication
Pavan Kumar K, P. E. S. N. Krishna Prasad, M. V. Ramakrishna and B.D.C.N. Prasad, Prasad V. Potluri Siddhartha Institute of Technology, India

04

Defence Schemes From Attacker's Own Reward Processes
L-F Pau, Copenhagen Business School, Denmark

01

Controlling IP Falsifying Using Realistic Simulation
Govindavaram Madhusri1 and Chakunta Venkata Guru Rao2, 1Kakatiya University, India and 2JNTU University, India

0

Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Aliyu Mohammed, Haitham A. Jamil, Sulaiman Mohd Nor and Muhammad NadzirMarsono, Universiti Teknologi Malaysia, Malaysia

01

Internal Security on an IDS Based on Agents
Rafael Paez, Mery Yolima Uribe and Miguel Torres, Pontificia Universidad Javeriana, Colombia

02

A New Stemmer to Improve Information Retrieval
Wahiba Ben Abdessalem Karaa, University of Tunis. Tunisia

16

Performance Evaluation of Enhancedgreedy-Two-Phase Deployment Algorithm
Kartit Ali, University Mohammed V-Agdal, Morocco

0

Steganography and Random Grids
Pratarshi Saha1, Sandeep Gurung1 and Kunal Krishanu Ghose2, 1Sikkim Manipal Institute of Technology, India and 2QualComm, USA

0

An Improved MULTI-SOM Algorithm
Imen Khanchouch, Khaddouja Boujenfa and Mohamed Limam, University of Tunis, Tunisia and Dhofar University, Oman

02

Experimental Analysis of AODV and DSR with Varying Vehicle Mobility and Density in Vanet Scenario
Arzoo Dahiya and R.K.Chauhan, Kurukshetra University, India

01

Volume 5, Number 5, September 2013

  Citation Count

Knowledge-Based Authentication using Twitter Can We Use Lunch Menus As Passwords?
ManabuOkamoto, Kanagawa Institute of Technology, Japan

03

A Security Framework in Cloud Computing Infrastructure
Arijit Ukil1, Debasish Jana2 and Ajanta De Sarkar2, 1Tata Consultancy Services, India and 2Birla Institute of Technology, India

13

Micro Rotor Enhanced Block Cipher Designed For Eight Bits Micro-Controllers (MREBC)
Ahmed ElShafee, Ahram Canadian University, Egypt

0

Image Authentication Through ZTransform with Low Energy And Bandwidth (IAZT)
Madhumita Sengupta and J. K. Mandal, University of Kalyani, India

0

Fast Detection of Ddos Attacks Using Non-Adaptive Group Testing
Huynh Nguyen Chinh, Tan Hanh and Nguyen Dinh Thuc, HCMC,Vietnam

07

Effectiveness of Feature Detectionoperators on the Performance of Iris Biometric Recognition System
Binsu C. Kovoor, Supriya M.H. and K. Poulose Jacob, Cochin University of Science and Technology, India

06

Secure Collaborative Processing Architecture for MITB Attack Detection
Hani Qusa and Shadi Abudalfa, University College of Applied Science, Palestine

02

Security Challenges, Issues and Their Solutions For Vanet
Ram Shringar Raw, Manish Kumar and Nanhay Singh, Ambedkar Institute of Advanced communication Technologies & Research, India

64

Defense Mechanisms for Computer-Based Information Systems
Majid Alshammari and Christian Bach, University of Bridgeport, USA

02

Optimized Hybrid Security Mechanism for Image Authentication and Secrecy using PSO
K.Kuppusamy and K.Thamodaran, Alagappa University, India

02

Credit Based Methodology to Detect and Discriminate DDOS Attack From Flash Crowd in A Cloud Computing Environment
N.Jeyanthi, Hena Shabeeb and Mogankumar P.C, VIT University, India

05

Z-Shaped Dipole Antenna and its Fractal Iterations
Mustafa H. Abu Nasr, Al- Azhar University, Palestine

04

A Novel Approach for Secure Routing Through BGP Using Symmetric Key
Divan Raimagia, Shraddha Singh and Sameena Zafar, PIES College, India

01

Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm
Adnan M. Shihab, Raghad K. Mohammed and Woud M. Abed, University of Baghdad, Iraq

0

A Novel Technique to Detect Intrusion in Manet
J. K. Mandal1 and Khondekar Lutful Hassan2, 1University of Kalyani, India and 2University of Calcutta,India

03

Volume 5, Number 6, November 2013

  Citation Count

Complete Network Security Protection for SME's within Limited Resources
Margie S. Todd1 and Syed (Shawon) M. Rahman1,2, 1Capella University, USA and 2University of Hawaii-Hilo, USA

02

Multi-Level Parsing Based Approach Against Phishing Attacks With the Help of Knowledge Bases
Gaurav Kumar Tak1 and Gaurav Ojha2, 1Lovely Professional University, India and 2Indian Institute of Information Technology and Management, India

02

A Need for Peer-To-Peer Strong Local Authentication Protocol (P2PSLAP) in Mobile Banking
Bossi Masamila, Dublin Institute of Technology, Ireland

01

Securing Mobile Cloud Using Finger Print Authentication
IehabALRassan and HananAlShaher, King Saud University, Saudi Arabia

13

Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection Engine
Anjan K1, Srinath N K1 and Jibi Abraham2, 1R V College of Engineering,India and 2College of Engineering, India

01

Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive Channel Shortening in Multi-carrier Systems
Samir Abd Elghafar1,2, Salaheldin M. Diab1, Bassiouny M. Sallam1, Moawad I. Dessouky1, El-Sayed M. El-Rabaie1 and Fathi E. Abd El-Samie1, 1Menoufia University, Egypt and 2Jazan University, Saudi Arabia

0

Investigating the Effects of the Common Control Channel Challenge in Multichannel Cognitive Networks With Hypothetical Spectrum Hole
Mthulisi Velempini1 and Mqhele E. Dlodlo2, 1North-West University, South Africa and 2University of Cape Town, South Africa

0