Pub Date : 2019-12-31DOI: 10.33832/ijsia.2019.13.4.11
N. Thirupathi Rao, D. Bhattacharyya
{"title":"Recent Cyber Security Breaches and Preventive Measures","authors":"N. Thirupathi Rao, D. Bhattacharyya","doi":"10.33832/ijsia.2019.13.4.11","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.11","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"117-126"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44320299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-31DOI: 10.33832/ijsia.2019.13.4.09
Surabhi Sharma, R. Jain
{"title":"EACO: An Enhanced Ant Colony Optimization Algorithm for Task Scheduling in Cloud Computing","authors":"Surabhi Sharma, R. Jain","doi":"10.33832/ijsia.2019.13.4.09","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.09","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"91-100"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45356853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-31DOI: 10.33832/ijsia.2019.13.4.10
A. Gautam, Rakesh Kumar
{"title":"LTA: A Linked Timestamp based Authentication Protocol for Sensor Network","authors":"A. Gautam, Rakesh Kumar","doi":"10.33832/ijsia.2019.13.4.10","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.10","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"101-116"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41899638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-31DOI: 10.33832/ijsia.2019.13.4.07
S AravinthRaj, V. Venkatesh
{"title":"Local Pattern Transformation Technique for Brain Signal EEG","authors":"S AravinthRaj, V. Venkatesh","doi":"10.33832/ijsia.2019.13.4.07","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.07","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"67-74"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49166488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-31DOI: 10.33832/ijsia.2019.13.4.03
Ashu, R. Mahajan, S. Zafar
{"title":"Implementing Block Chain Security to Prevent DDOS Attacks in Networks","authors":"Ashu, R. Mahajan, S. Zafar","doi":"10.33832/ijsia.2019.13.4.03","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"27-40"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44104274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-31DOI: 10.33832/ijsia.2019.13.4.04
M. Subbarao, P. Samundiswary
— This paper presents a verity of K-Nearest Neighbors (KNN) classifiers along with different statistical features in order to classify MPSK and MQAM signals. Further, the performance of proposed KNN classifiers with different values of ‘K’ and distance functions are analyzed under non-ideal channel conditions. Finally, to prove the superiority of the proposed KNN classifiers the performance is compared with that of the literature approaches at various SNR values.
{"title":"K- Nearest Neighbors based Automatic Modulation Classifier for Next Generation Adaptive Radio Systems","authors":"M. Subbarao, P. Samundiswary","doi":"10.33832/ijsia.2019.13.4.04","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.04","url":null,"abstract":"— This paper presents a verity of K-Nearest Neighbors (KNN) classifiers along with different statistical features in order to classify MPSK and MQAM signals. Further, the performance of proposed KNN classifiers with different values of ‘K’ and distance functions are analyzed under non-ideal channel conditions. Finally, to prove the superiority of the proposed KNN classifiers the performance is compared with that of the literature approaches at various SNR values.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"41-50"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43525932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-30DOI: 10.33832/ijsia.2019.13.3.02
S. Raj, Divya Midhunchakkaravarthy, D. Bhattacharyya
{"title":"Security Issues and Various Attacks in Wireless Sensor Network: A Survey","authors":"S. Raj, Divya Midhunchakkaravarthy, D. Bhattacharyya","doi":"10.33832/ijsia.2019.13.3.02","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.3.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49390674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-30DOI: 10.33832/ijsia.2019.13.3.01
Amar Agrawal, Sabah Mohammed, J. Fiaidhi
{"title":"Ensemble Technique for Intruder Detection in Network Traffic","authors":"Amar Agrawal, Sabah Mohammed, J. Fiaidhi","doi":"10.33832/ijsia.2019.13.3.01","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.3.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41731657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-30DOI: 10.33832/ijsia.2019.13.3.03
Dominik Malcik, M. Drahanský
{"title":"Improving the Physical Security of Microchip","authors":"Dominik Malcik, M. Drahanský","doi":"10.33832/ijsia.2019.13.3.03","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.3.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69499491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}