Search Word(s) in Title, Keywords, Authors, and Abstract: Attacks

Black Hole along with Other Attacks in MANETs: A Survey
Fan-Hsun Tseng, Hua-Pei Chiang and Han-Chieh Chao
Page: 56~78, Vol. 14, No.1, 2018
Keywords: Collaborative Black Hole Attack, Flooding Attack, Mobile Ad Hoc Network, Non-cooperative Black Hole Attack, Wormhole Attack
Show / Hide Abstract

Study of Danger-Theory-Based Intrusion Detection Technology in Virtual Machines of Cloud Computing Environment
Ruirui Zhang and Xin Xiao
Page: 239~251, Vol. 14, No.1, 2018
Keywords: Artificial Immune, Cloud Computing, Danger Theory, Intrusion Detection, Virtual Machine
Show / Hide Abstract

Verifying Code toward Trustworthy Software
Hyong-Soon Kim and Eunyoung Lee
Page: 309~321, Vol. 14, No.2, 2018
Keywords: Certified Compiler, Formal Verification, Language Semantics, Program Verification
Show / Hide Abstract

GOPES: Group Order-Preserving Encryption Scheme Supporting Query Processing over Encrypted Data
Hyunjo Lee, Youngho Song and Jae-Woo Chang
Page: 1087~1101, Vol. 14, No.5, 2018
Keywords: Cloud Computing, Data Encryption, Query Processing over Encrypted Data
Show / Hide Abstract

A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions
Nam Yong Kim, Shailendra Rathore, Jung Hyun Ryu, Jin Ho Park and Jong Hyuk Park
Page: 1361~1384, Vol. 14, No.6, 2018
Keywords: Cyber Physical System, Internet of Things, Security Analysis, Security Threats
Show / Hide Abstract

Two-Phase Security Protection for the Internet of Things Object
Vera Suryani, Selo Sulistyo and Widyawan Widyawan
Page: 1431~1437, Vol. 14, No.6, 2018
Keywords: Attacks, Authentication, Internet of Things, Security, Statistic
Show / Hide Abstract

LBP and DWT Based Fragile Watermarking for Image Authentication
Chengyou Wang, Heng Zhang and Xiao Zhou
Page: 666~679, Vol. 14, No.3, 2018
Keywords: Discrete Wavelet Transform (DWT), Fragile Watermarking, Image Authentication, Local Binary Pattern (LBP), Semi-blind Detection
Show / Hide Abstract

A Survey on the Detection of SQL Injection Attacks and Their Countermeasures
Bharti Nagpal, Naresh Chauhan and Nanhay Singh
Page: 689~702, Vol. 13, No.4, 2017
Keywords: Dynamic Analysis, Detection, Prevention, SQL Injection Attack, Static Analysis, Vulnerabilities
Show / Hide Abstract

CLB-ECC: Certificateless Blind Signature Using ECC
Sanjeet Kumar Nayak, Sujata Mohanty and Banshidhar Majhi
Page: 970~986, Vol. 13, No.4, 2017
Keywords: Authentication, Blind Signature, Certificateless Cryptography, Elliptic Curve Cryptography, E-cash
Show / Hide Abstract

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication
Ghazli Abdelkader, Hadj Said Naima and Ali Pacha Adda
Page: 152~173, Vol. 13, No.1, 2017
Keywords: Authentication, GSM, Location Update, Mobility Management, Paging, Security
Show / Hide Abstract

Discrete Wavelet Transform and a Singular Value Decomposition Technique for Watermarking Based on an Adaptive Fuzzy Inference System
Salima Lalani and D. D. Doye
Page: 340~347, Vol. 13, No.2, 2017
Keywords: DWT, Fuzzy, SVD, Watermarking
Show / Hide Abstract

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images
Heng Zhang, Chengyou Wang and Xiao Zhou
Page: 385~399, Vol. 13, No.2, 2017
Keywords: Fragile Watermarking, Local Binary Pattern (LBP), Least Significant Bit (LSB), Tamper Detection and Localization
Show / Hide Abstract

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform
Geeta Kasana, Kulbir Singh and Satvinder Singh Bhatia
Page: 1331~1344, Vol. 13, No.5, 2017
Keywords: Arnold Transform, DWT, JPEG, JPEG2000, PSNR, SIM
Show / Hide Abstract

Copyright Protection for Digital Image by Watermarking Technique
Suhad A. Ali, Majid Jabbar Jawad and Mohammed Abdullah Naser
Page: 599~617, Vol. 13, No.3, 2017
Keywords: Digital Watermarking, Discrete Cosine Transform (DCT), Normalized Correlation (NC), PSNR
Show / Hide Abstract

An Improved Secure Semi-fragile Watermarking Based on LBP and Arnold Transform
Heng Zhang, Chengyou Wang and Xiao Zhou
Page: 1382~1396, Vol. 13, No.5, 2017
Keywords: Digital Image Watermarking, Semi-fragile Watermarking, False Detection, Local Binary Pattern (LBP), Arnold Transform
Show / Hide Abstract

A Detailed Analysis of Classifier Ensembles for Intrusion Detection in Wireless Network
Bayu Adhi Tama and Kyung-Hyune Rhee
Page: 1203~1212, Vol. 13, No.5, 2017
Keywords: Classifier Ensembles, Classifier’s Significance, Intrusion Detection Systems (IDSs), Wireless Network
Show / Hide Abstract

Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes
Samaneh Mashhadi
Page: 249~262, Vol. 12, No.2, 2016
Keywords: Non-repudiation, Proxy Signature Scheme, Signature Scheme, Threshold Proxy Signature, Unforgeability
Show / Hide Abstract

Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions
Gautham Sekar and Soumyadeep Bhattacharya
Page: 310~312, Vol. 12, No.2, 2016
Keywords: Cryptanalysis, Hash Function, (Second) Preimage Attack
Show / Hide Abstract

ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks
Sang-Yong Choi, Daehyeok Kim and Yong-Min Kim
Page: 422~435, Vol. 12, No.3, 2016
Keywords: Drive-by Download, Malware Distribution Network, Webpage Link Analysis, Web Security
Show / Hide Abstract

A Novel DWT-SVD Canny-Based Watermarking Using a Modified Torus Technique
Salima Lalani and D. D. Doye
Page: 681~687, Vol. 12, No.4, 2016
Keywords: DWT, Image Watermarking, Torus
Show / Hide Abstract

Blind Color Image Watermarking Based on DWT and LU Decomposition
Dongyan Wang, Fanfan Yang and Heng Zhang
Page: 765~778, Vol. 12, No.4, 2016
Keywords: Digital Color Image Watermark, Discrete Wavelet Transformation (DWT), LU Decomposition, Normalized Correlation (NC), Structural Similarity (SSIM)
Show / Hide Abstract

Penetration Testing and Network Auditing: Linux
Deris Stiawan, Mohd. Yazid Idris and Abdul Hanan Abdullah
Page: 104~115, Vol. 11, No.1, 2015
Keywords: Network attack, network auditing, network forensic
Show / Hide Abstract

A Virtual Laboratory to Practice Mobile Wireless Sensor Networks: A Case Study on Energy Efficient and Safe Weighted Clustering Algorithm
Amine Dahane, Nasr-Eddine Berrached and Abdelhamid Loukil
Page: 205~228, Vol. 11, No.2, 2015
Keywords: Clustering, Energy Efficiency, Practical Work, Security Attacks, Virtual labs, Wireless Sensor Networks
Show / Hide Abstract

WebSHArk 1.0: A Benchmark Collection for Malicious Web Shell Detection
Jinsuk Kim, Dong-Hoon Yoo, Heejin Jang and Kimoon Jeong
Page: 229~238, Vol. 11, No.2, 2015
Keywords: Benchmark Test Collection, Malicious Web Application, Webshell, Web Shell Collection, Web Shell Detection
Show / Hide Abstract

Genetic Symmetric Key Generation for IDEA
Nandini Malhotra and Geeta Nagpal
Page: 239~247, Vol. 11, No.2, 2015
Keywords: Crossover, IDEA, Genetic Algorithm, Mutation, Symmetric Key Generation
Show / Hide Abstract

Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map
Mishal Almazrooie, Azman Samsudin and Manmeet Mahinderjit Singh
Page: 310~324, Vol. 11, No.2, 2015
Keywords: Chaos Theory, Cryptography, Differential Attacks, Hash Function, Logistic Map, Salsa20, Stream Cipher
Show / Hide Abstract

Robust and Reversible Image Watermarking Scheme Using Combined DCT-DWT-SVD Transforms
Souad Bekkouch and Kamel Mohamed Faraoun
Page: 406~420, Vol. 11, No.3, 2015
Keywords: Image Security, Image Watermarking, Reversible DWT-DCT-SVD Transform
Show / Hide Abstract

Robust ROI Watermarking Scheme Based on Visual Cryptography: Application on Mammograms
Meryem Benyoussef, Samira Mabtoul, Mohamed El Marraki and Driss Aboutajdine
Page: 495~508, Vol. 11, No.4, 2015
Keywords: Copyright Protection, Mammograms, Medical Image, Robust Watermarking, Visual Cryptography
Show / Hide Abstract

Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption
Om Prakash Verma, Munazza Nizam and Musheer Ahmad
Page: 271~286, Vol. 9, No.2, 2013
Keywords: Chaotic Systems, Number of Pixel Change Rate, Unified Average Changed Intensity, Correlation Coefficient, Entropy
Show / Hide Abstract

A New Approach for Information Security using an Improved Steganography Technique
Mamta Juneja and Parvinder Singh Sandhu
Page: 405~424, Vol. 9, No.3, 2013
Keywords: Adaptive LSB Steganography, AES; Hybrid Feature Detection, Random Pixel Embeddin g, Steganography, Two Component based LSB Steganography
Show / Hide Abstract

Performance Study of genus 3 Hyperelliptic Curve Cryptosystem
Daya Gupta, Asok De and Kakali Chatterjee
Page: 145~158, Vol. 8, No.1, 2012
Keywords: Hyperelliptic Curve Cryptosystem(HECC), Secure Hyperelliptic Curve, Hyperelliptic Curve Deffie-Hellman(HECDH), Hyperelliptic Curve Digital Signature Algorithm (HECDSA)
Show / Hide Abstract

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud
Eun-Ha Song, Hyun-Woo Kim and Young-Sik Jeong
Page: 347~358, Vol. 8, No.2, 2012
Keywords: Hardware Hardening, TPM, TPB, Mobile Cloud, System Behavior Monitoring, BiT Profiling
Show / Hide Abstract

Face Recognition Based on PCA on Wavelet Subband of Average-Half-Face
M.P. Satone and Dr. G.K. Kharate
Page: 483~494, Vol. 8, No.3, 2012
Keywords: Face Recognition, Princ ipal Component Analysis, Subband, Wavelet Transform
Show / Hide Abstract

Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks
HyoJin Kim, Ramachandra Bhargav Chitti and JooSeok Song
Page: 137~150, Vol. 7, No.1, 2011
Keywords: Collaborative Attack, Malicious Flooding Attack, Wireless Ad Hoc Network
Show / Hide Abstract

Grobner Basis Attacks on Lightweight RFID Authentication Protocols
Daewan Han
Page: 691~706, Vol. 7, No.4, 2011
Keywords: RFID, Authentication Protocol, Algebraic Attack, Grobner Basis
Show / Hide Abstract

Cryptanalysis on a Three Party Key Exchange Protocol-STPKE`
Shirisha Tallapally and R Padmavathy
Page: 43~52, Vol. 6, No.1, 2010
Keywords: STPKE’ Protocol, The Proposed Protocol, Undetectable Online Password Guessing Attack
Show / Hide Abstract

The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Lukman Sharif and Munir Ahmed
Page: 177~184, Vol. 6, No.2, 2010
Keywords: Secure Routing, Routing Attacks, Routing Protocols, Wireless Sensor Networks (WSN), Wormhole Attack
Show / Hide Abstract

Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Aly M. El-Semary and Mostafa Gadal-Haqq M. Mostafa
Page: 481~500, Vol. 6, No.4, 2010
Keywords: Data-Mining, Fuzzy Logic, IDS, Intelligent Techniques, Network Security, Software Agents
Show / Hide Abstract

Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing
Guo Hao and Guo Tao
Page: 131~134, Vol. 5, No.3, 2009
Keywords: Man-in-the-middle attack, ARP Spoofing, Session Hijack
Show / Hide Abstract

An Efficient Audio Watermark Extraction in Time Domain
Heawon Kang and Sung-Hwan Jung
Page: 13~17, Vol. 2, No.1, 2006
Keywords: audio watermarking, blind detection Wavelet
Show / Hide Abstract

A Multiple Instance Learning Problem Approach Model to Anomaly Network Intrusion Detection
Ill-Young Weon, Doo-Heon Song, Sung-Bum Ko and Chang-Hoon Lee
Page: 14~21, Vol. 1, No.1, 2005
Keywords: Multiple Instance Learning Problem, Network Intrusion Detection, Anomaly Detection
Show / Hide Abstract

The Plan and Tools for Vulnerability Testing in Information Software-Based System
Injung Kim, Younggyo Lee and Dongho Won
Page: 75~78, Vol. 1, No.1, 2005
Keywords: Risk Analysis, Vulnerability, Asset, Threat
Show / Hide Abstract