首页 > 最新文献

International Journal of Security and Its Applications最新文献

英文 中文
Capturing Security Mechanisms Applied to Ecommerce: An Analysis of Transaction Security 捕获安全机制在电子商务中的应用——交易安全分析
Pub Date : 2021-03-31 DOI: 10.33832/ijsia.2021.15.1.01
Ranie B. Canlas
{"title":"Capturing Security Mechanisms Applied to Ecommerce: An Analysis of Transaction Security","authors":"Ranie B. Canlas","doi":"10.33832/ijsia.2021.15.1.01","DOIUrl":"https://doi.org/10.33832/ijsia.2021.15.1.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42678781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain Approach to Cyber Security Vulnerabilities Attacks and Potential Countermeasures 区块链方法应对网络安全漏洞攻击及潜在对策
Pub Date : 2020-03-31 DOI: 10.33832/ijsia.2020.14.1.01
Bosubabu Samban, Y. Ramesh, M. .. Rao, T. C. Rao
{"title":"Blockchain Approach to Cyber Security Vulnerabilities Attacks and Potential Countermeasures","authors":"Bosubabu Samban, Y. Ramesh, M. .. Rao, T. C. Rao","doi":"10.33832/ijsia.2020.14.1.01","DOIUrl":"https://doi.org/10.33832/ijsia.2020.14.1.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41400409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Mitigation of Wireless Body Area Networks Challenges using Cooperation 利用协作缓解无线身体区域网络的挑战
Pub Date : 2020-03-31 DOI: 10.33832/ijsia.2020.14.1.02
Zeeshan Haider, Tauseef Jamal, M. Asam, S. A. Butt, A. Ajaz
— The degradation of an adequate medical facilities for safety and healthy human atmosphere motivated researchers to think more generously to provide a smart solution in medical applications. Wireless body area network (WBAN) is one of the potential platform to cope up to the needs of prevailing medical demands and challenges. In the literature, WBAN is a femto-network (ranges up to few meters) formation around a human body for sensing, transmission and reception functionality. These functionalities are executed using various modes by placement of sensors node on human posture or by injecting inside of the human body. This mode of communication have various challenges when deployed in medical applications. Due to the critical nature of human physiological sensed data which demands a reliable and secure transmission, reception between sensors, intermediate and master node. This article outcomes are two fold, first is the state of art challenges of WBAN and the need of the ultimate smart solution for safe and reliable communication in Wireless body area Networks. Secondly, using Cooperation techniques for mitigation of WBAN issues, proposed cooperative model is presented for reliable data transmission using an efficient network resource utilization mechanism.
-为安全和健康的人类环境提供足够的医疗设施的退化促使研究人员更慷慨地考虑在医疗应用中提供智能解决方案。无线体域网络(WBAN)是应对当前医疗需求和挑战的潜在平台之一。在文献中,WBAN是一种围绕人体的飞向网络(范围可达几米),用于传感、传输和接收功能。这些功能通过在人体姿势上放置传感器节点或在人体内部注射的各种模式来执行。这种通信模式在医疗应用中部署时面临各种挑战。由于人体生理传感数据的关键性质,要求传感器、中间节点和主节点之间可靠、安全的传输、接收。本文的研究结果有两个方面,一是WBAN目前面临的挑战,二是对无线体域网络安全可靠通信的终极智能解决方案的需求。其次,利用协作技术缓解WBAN问题,提出了利用高效的网络资源利用机制实现可靠数据传输的协作模型。
{"title":"Mitigation of Wireless Body Area Networks Challenges using Cooperation","authors":"Zeeshan Haider, Tauseef Jamal, M. Asam, S. A. Butt, A. Ajaz","doi":"10.33832/ijsia.2020.14.1.02","DOIUrl":"https://doi.org/10.33832/ijsia.2020.14.1.02","url":null,"abstract":"— The degradation of an adequate medical facilities for safety and healthy human atmosphere motivated researchers to think more generously to provide a smart solution in medical applications. Wireless body area network (WBAN) is one of the potential platform to cope up to the needs of prevailing medical demands and challenges. In the literature, WBAN is a femto-network (ranges up to few meters) formation around a human body for sensing, transmission and reception functionality. These functionalities are executed using various modes by placement of sensors node on human posture or by injecting inside of the human body. This mode of communication have various challenges when deployed in medical applications. Due to the critical nature of human physiological sensed data which demands a reliable and secure transmission, reception between sensors, intermediate and master node. This article outcomes are two fold, first is the state of art challenges of WBAN and the need of the ultimate smart solution for safe and reliable communication in Wireless body area Networks. Secondly, using Cooperation techniques for mitigation of WBAN issues, proposed cooperative model is presented for reliable data transmission using an efficient network resource utilization mechanism.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47204281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Improving the Security Quality of Use Case Models through the Application of Software Refactoring Using Genetic Algorithm 应用遗传算法进行软件重构提高用例模型的安全性
Pub Date : 2020-03-31 DOI: 10.33832/ijsia.2020.14.1.03
Haris Mumtaz, M. Alshayeb, S. Mahmood, M. Niazi
— Use case modelling is an industrial de-facto standard technique to express functional requirements. Security bad smells are design flaws that can potentially degrade the quality of software by affecting a system’s ability to prevent malicious activities. The presence of security bad smells in a use case model is likely to propagate security vulnerabilities to other software artefacts. Therefore, the detection and refactoring of security bad smells in use case models is important for ensuring the overall quality of software systems. In this paper, we propose a genetic algorithm-based detection approach to detect security bad smells. A refactoring process is then applied to correct the security bad smells. Finally, the improvement to security is assessed through the statistical analysis of quality metrics. The practicality of the approach is demonstrated by applying it to a set of use case models. The results show that the proposed security bad smell detection and correction technique can significantly improve the quality of use case models.
--用例建模是一种表达功能需求的工业事实上的标准技术。安全臭味是指设计缺陷,可能会影响系统防止恶意活动的能力,从而降低软件质量。用例模型中存在的安全臭味可能会将安全漏洞传播到其他软件制品中。因此,检测和重构用例模型中的安全不良气味对于确保软件系统的整体质量非常重要。本文提出了一种基于遗传算法的安全气味检测方法。然后应用重构过程来纠正安全方面的不良气味。最后,通过质量指标的统计分析来评估安全性的改进。通过将该方法应用于一组用例模型,证明了该方法的实用性。结果表明,所提出的安全臭味检测和校正技术可以显著提高用例模型的质量。
{"title":"Improving the Security Quality of Use Case Models through the Application of Software Refactoring Using Genetic Algorithm","authors":"Haris Mumtaz, M. Alshayeb, S. Mahmood, M. Niazi","doi":"10.33832/ijsia.2020.14.1.03","DOIUrl":"https://doi.org/10.33832/ijsia.2020.14.1.03","url":null,"abstract":"— Use case modelling is an industrial de-facto standard technique to express functional requirements. Security bad smells are design flaws that can potentially degrade the quality of software by affecting a system’s ability to prevent malicious activities. The presence of security bad smells in a use case model is likely to propagate security vulnerabilities to other software artefacts. Therefore, the detection and refactoring of security bad smells in use case models is important for ensuring the overall quality of software systems. In this paper, we propose a genetic algorithm-based detection approach to detect security bad smells. A refactoring process is then applied to correct the security bad smells. Finally, the improvement to security is assessed through the statistical analysis of quality metrics. The practicality of the approach is demonstrated by applying it to a set of use case models. The results show that the proposed security bad smell detection and correction technique can significantly improve the quality of use case models.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48130277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Ensemble Classification Approach with Selective Under and Over Sampling of Imbalance Intrusion Detection Dataset 不平衡入侵检测数据集的选择性欠采样和过采样集成分类方法
Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.05
Priyanka Tripathi, R. Makwana
{"title":"An Ensemble Classification Approach with Selective Under and Over Sampling of Imbalance Intrusion Detection Dataset","authors":"Priyanka Tripathi, R. Makwana","doi":"10.33832/ijsia.2019.13.4.05","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.05","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45087269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Communication of Two Controller Area Network Segments through Wireless Sensor Network 无线传感器网络中两个控制器区域网段的通信
Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.01
S. Makka, B. B. Sagar
{"title":"Communication of Two Controller Area Network Segments through Wireless Sensor Network","authors":"S. Makka, B. B. Sagar","doi":"10.33832/ijsia.2019.13.4.01","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69499543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Financial Fraud Detection using Bio-Inspired Key Optimization and Machine Learning Technique 基于仿生密钥优化和机器学习技术的金融欺诈检测
Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.08
A. Singh, Anurag Jain
{"title":"Financial Fraud Detection using Bio-Inspired Key Optimization and Machine Learning Technique","authors":"A. Singh, Anurag Jain","doi":"10.33832/ijsia.2019.13.4.08","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.08","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46967711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
BLAST: Blockchain Algorithm for Secure Transaction BLAST:区块链安全交易算法
Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.06
R. Johari, A. Parihar
{"title":"BLAST: Blockchain Algorithm for Secure Transaction","authors":"R. Johari, A. Parihar","doi":"10.33832/ijsia.2019.13.4.06","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.06","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49173077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Recent Cyber Security Breaches and Preventive Measures 近期网络安全漏洞及防范措施
Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.11
N. Thirupathi Rao, D. Bhattacharyya
{"title":"Recent Cyber Security Breaches and Preventive Measures","authors":"N. Thirupathi Rao, D. Bhattacharyya","doi":"10.33832/ijsia.2019.13.4.11","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.11","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44320299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EACO: An Enhanced Ant Colony Optimization Algorithm for Task Scheduling in Cloud Computing EACO:一种用于云计算任务调度的增强蚁群优化算法
Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.09
Surabhi Sharma, R. Jain
{"title":"EACO: An Enhanced Ant Colony Optimization Algorithm for Task Scheduling in Cloud Computing","authors":"Surabhi Sharma, R. Jain","doi":"10.33832/ijsia.2019.13.4.09","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.09","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45356853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
International Journal of Security and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1