首页 > 最新文献

International Journal of Security and Its Applications最新文献

英文 中文
KAMIES: Security Optimization of KASUMI Algorithm by Increasing Diffusion Level KAMIES:KASUMI算法的安全优化
Pub Date : 2018-05-31 DOI: 10.14257/IJSIA.2018.12.3.04
Muhammad Salman, Rizki Yugitama, Amiruddin, R. F. Sari
{"title":"KAMIES: Security Optimization of KASUMI Algorithm by Increasing Diffusion Level","authors":"Muhammad Salman, Rizki Yugitama, Amiruddin, R. F. Sari","doi":"10.14257/IJSIA.2018.12.3.04","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.3.04","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49176052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Practical Guidelines for Securing Wireless Local Area Networks (WLANs) 确保无线局域网(WLAN)安全的实用指南
Pub Date : 2018-05-31 DOI: 10.14257/IJSIA.2018.12.3.03
Ahmed Khan, Aaliya Sarfaraz
The publication generally focuses on the security configuration and monitoring of wireless local area networks (WLANs) which are extensively being used by various organizations. Wireless Local Area Networks (WLANs) presents an exceptional challenge for the different organizations that are using Wireless Local Area Networks [1]. Over the years, the percentage of attacks on Wireless Local Area Networks has been increased, which as a result has compelled the organizations and users of WLAN to rethink about their WLAN security. The publication is a way forward for improving the standards of security and monitoring of the wireless local area networks (WLANs) and the devices which connect to those networks by giving pertinent recommendations. The article is really helpful for all those who are associated with the planning, implementation, maintenance and monitoring of the security of the wireless local area networks of a particular organization and all the devices that are connected to these WLAN like network professionals, security professionals, system administrators and all other entities related with the security of an organization’s network. The scope of the publication is restricted to wireless networks that are unclassified and also the unclassified facilities that fall within range of such wireless networks.
该出版物一般侧重于各种组织广泛使用的无线局域网(wlan)的安全配置和监控。无线局域网(wlan)对使用无线局域网[1]的不同组织提出了一个特殊的挑战。多年来,针对无线局域网的攻击比例一直在增加,这迫使WLAN的组织和用户重新考虑其WLAN的安全性。该出版物通过提出相关建议,为改进无线局域网(wlan)和连接到这些网络的设备的安全和监测标准提供了一条前进的道路。本文对所有与规划、实施、维护和监控特定组织的无线局域网的安全性以及连接到这些WLAN的所有设备相关的人员(如网络专业人员、安全专业人员、系统管理员以及与组织网络安全相关的所有其他实体)非常有帮助。该出版物的范围限于非机密的无线网络以及属于此类无线网络范围内的非机密设施。
{"title":"Practical Guidelines for Securing Wireless Local Area Networks (WLANs)","authors":"Ahmed Khan, Aaliya Sarfaraz","doi":"10.14257/IJSIA.2018.12.3.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.3.03","url":null,"abstract":"The publication generally focuses on the security configuration and monitoring of wireless local area networks (WLANs) which are extensively being used by various organizations. Wireless Local Area Networks (WLANs) presents an exceptional challenge for the different organizations that are using Wireless Local Area Networks [1]. Over the years, the percentage of attacks on Wireless Local Area Networks has been increased, which as a result has compelled the organizations and users of WLAN to rethink about their WLAN security. The publication is a way forward for improving the standards of security and monitoring of the wireless local area networks (WLANs) and the devices which connect to those networks by giving pertinent recommendations. The article is really helpful for all those who are associated with the planning, implementation, maintenance and monitoring of the security of the wireless local area networks of a particular organization and all the devices that are connected to these WLAN like network professionals, security professionals, system administrators and all other entities related with the security of an organization’s network. The scope of the publication is restricted to wireless networks that are unclassified and also the unclassified facilities that fall within range of such wireless networks.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41751992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Privacy and Disclosure: Customer Attitudes Towards the Use of Big Data by Retail Companies 隐私和披露:客户对零售公司使用大数据的态度
Pub Date : 2018-05-31 DOI: 10.14257/IJSIA.2018.12.3.02
M. Sayegh, Karine Aoun Barakat
{"title":"Privacy and Disclosure: Customer Attitudes Towards the Use of Big Data by Retail Companies","authors":"M. Sayegh, Karine Aoun Barakat","doi":"10.14257/IJSIA.2018.12.3.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.3.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48346153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Some Studies on the Security and Space Issues and Challenges in Cloud Computing based Data Centers 基于云计算的数据中心安全与空间问题与挑战研究
Pub Date : 2018-05-31 DOI: 10.14257/ijsia.2018.12.3.01
N. Thirupathi Rao, C. Sekhar, D. Bhattacharyya, Tai-hoon Kim
{"title":"Some Studies on the Security and Space Issues and Challenges in Cloud Computing based Data Centers","authors":"N. Thirupathi Rao, C. Sekhar, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/ijsia.2018.12.3.01","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.3.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42691192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Invisible Image Watermarking Based On Modified Particle Swarm Optimization (PSO) Algorithm 基于改进粒子群算法的图像不可见水印
Pub Date : 2018-03-31 DOI: 10.14257/IJSIA.2018.12.2.01
Atheer Bassel, J. Nordin, Mohammed B. Abdulkareem
{"title":"An Invisible Image Watermarking Based On Modified Particle Swarm Optimization (PSO) Algorithm","authors":"Atheer Bassel, J. Nordin, Mohammed B. Abdulkareem","doi":"10.14257/IJSIA.2018.12.2.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2018.12.2.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41313745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Classification of Malware Analytics Techniques: A Systematic Literature Review 恶意软件分析技术分类:系统文献综述
Pub Date : 2018-03-31 DOI: 10.14257/IJSIA.2018.12.2.02
Nur Farhana Hordri, Noor Azurati Ahmad, S. Yuhaniz, S. Sahibuddin, A. Ariffin, Nur Afifah Mohd Saupi, N. Zamani, Yasmin Jeffry, Mohamad Firham Efendy Md. Senan
Context: Malware is a variety of forms of hostile or intrusive software that being thrown around online. Data analytics is the process of examining data sets in order to draw conclusions about information they contain, increasingly with the aid of specialized systems and software. Objectives: The aims of the study are to identify the types of malware analytics and identify the purpose of malware analytics. Method: A Systematic Literature Review (SLR) was carried out and reported based on the preferred reporting items for systematic reviews. 1114 papers were retrieved by manual search in six databases which are IEEE, Science Direct, Taylor and Francis, ACM, Wiley and Springer Link. 53 primary studies were finally included. Results: From these studies, 70% were conference papers and 30% were journal articles. Five classification of malware analytics techniques were identified and analysed. The classifications are (1) descriptive analytics, (2) diagnostic analytics, (3) predictive analytics, (4) prescriptive analytics and (5) visual analytics. Conclusion: This review delivers the evidence that malware analytics is an active research area. The review provides researchers with some guidelines for future research on this topic. It also provides broad information on malware analytics techniques which could be useful for practitioners.
背景:恶意软件是各种形式的恶意或侵入性软件,被扔在网上。数据分析是检查数据集的过程,目的是得出关于其中包含的信息的结论,越来越多地借助专门的系统和软件。目的:本研究的目的是确定恶意软件分析的类型和确定恶意软件分析的目的。方法:进行系统文献综述(SLR),并根据系统评价的首选报告项目进行报告。在IEEE、Science Direct、Taylor and Francis、ACM、Wiley和施普林格Link 6个数据库中人工检索论文1114篇,最终纳入53篇主要研究。结果:这些研究中,70%为会议论文,30%为期刊论文。识别并分析了五种类型的恶意软件分析技术。分类是(1)描述性分析,(2)诊断性分析,(3)预测性分析,(4)规定性分析和(5)可视化分析。结论:这篇综述提供了恶意软件分析是一个活跃的研究领域的证据。该综述为今后的研究提供了一些指导。它还提供了关于恶意软件分析技术的广泛信息,这可能对从业者有用。
{"title":"Classification of Malware Analytics Techniques: A Systematic Literature Review","authors":"Nur Farhana Hordri, Noor Azurati Ahmad, S. Yuhaniz, S. Sahibuddin, A. Ariffin, Nur Afifah Mohd Saupi, N. Zamani, Yasmin Jeffry, Mohamad Firham Efendy Md. Senan","doi":"10.14257/IJSIA.2018.12.2.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.02","url":null,"abstract":"Context: Malware is a variety of forms of hostile or intrusive software that being thrown around online. Data analytics is the process of examining data sets in order to draw conclusions about information they contain, increasingly with the aid of specialized systems and software. Objectives: The aims of the study are to identify the types of malware analytics and identify the purpose of malware analytics. Method: A Systematic Literature Review (SLR) was carried out and reported based on the preferred reporting items for systematic reviews. 1114 papers were retrieved by manual search in six databases which are IEEE, Science Direct, Taylor and Francis, ACM, Wiley and Springer Link. 53 primary studies were finally included. Results: From these studies, 70% were conference papers and 30% were journal articles. Five classification of malware analytics techniques were identified and analysed. The classifications are (1) descriptive analytics, (2) diagnostic analytics, (3) predictive analytics, (4) prescriptive analytics and (5) visual analytics. Conclusion: This review delivers the evidence that malware analytics is an active research area. The review provides researchers with some guidelines for future research on this topic. It also provides broad information on malware analytics techniques which could be useful for practitioners.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"9-18"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42472902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Rabin-Karp Elaboration in Comparing Pattern Based on Hash Data 基于Hash数据的比较模式Rabin-Karp精化
Pub Date : 2018-03-31 DOI: 10.14257/IJSIA.2018.12.2.06
A. Siahaan
{"title":"Rabin-Karp Elaboration in Comparing Pattern Based on Hash Data","authors":"A. Siahaan","doi":"10.14257/IJSIA.2018.12.2.06","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.06","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"59-66"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2018.12.2.06","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47273205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Towards a More Secured Solution in RDP: On-Demand Desktop Local Admin Rights 在RDP中实现更安全的解决方案:按需桌面本地管理员权限
Pub Date : 2018-03-31 DOI: 10.14257/IJSIA.2018.12.2.05
Manal Al-Sharrah, Mohammad A. Alkandari
{"title":"Towards a More Secured Solution in RDP: On-Demand Desktop Local Admin Rights","authors":"Manal Al-Sharrah, Mohammad A. Alkandari","doi":"10.14257/IJSIA.2018.12.2.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.05","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"45-58"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43790756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Detailed Review on Mobile Ad Hoc Networks: Protocols, Security Issues and Challenges 移动Ad Hoc网络:协议、安全问题和挑战
Pub Date : 2018-03-31 DOI: 10.14257/IJSIA.2018.12.2.07
N. Thirupathi Rao, P. Srinivas, D. Bhattacharyya, Tai-hoon Kim
{"title":"A Detailed Review on Mobile Ad Hoc Networks: Protocols, Security Issues and Challenges","authors":"N. Thirupathi Rao, P. Srinivas, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/IJSIA.2018.12.2.07","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.07","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"67-78"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47793399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Novel Approach for E-passport Authentication using Elgamal Cryptosystem 基于Elgamal密码系统的电子护照认证新方法
Pub Date : 2018-03-31 DOI: 10.14257/IJSIA.2018.12.2.03
Anurag Singh Tomar, Sumit Kumar, S. K. Chaurasiya, Vanshika Shrivastava
{"title":"Novel Approach for E-passport Authentication using Elgamal Cryptosystem","authors":"Anurag Singh Tomar, Sumit Kumar, S. K. Chaurasiya, Vanshika Shrivastava","doi":"10.14257/IJSIA.2018.12.2.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"19-28"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43828571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Security and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1