Filters








14 Hits in 7.0 sec

Security configuration management in intrusion detection and prevention systems

K. Alsubhi, Y. Alhazmi, N. Bouabdallah, R. Boutaba
2012 International Journal of Security and Networks (IJSN)  
In particular, we analyze the impact of an IDPS configuration on the resulting security of the network, and on the network performance.  ...  IDPSs can be network or host-based and can collaborate in order to provide better detection of malicious traffic.  ...  Threat evaluation sources can be of different kinds, internal and external. Honeypots [225] represent an effective means to detect and learn about security threats.  ... 
doi:10.1504/ijsn.2012.048493 fatcat:so6cctr3cval5kccmzh2ghlepa

Defence against packet injection in ad hoc networks

Qijun Gu, Peng Liu, Chao Hsien Chu, Sencun Zhu
2007 International Journal of Security and Networks (IJSN)  
These attacks cause serious denial-of-service via wireless channel contention and network congestion.  ...  Although ad hoc network security has been extensively studied, most previous work focuses on secure routing, but cannot prevent attackers from injecting a large number of junk data packets into a route  ...  Framework of SAF Every node in an ad hoc network enforces the proposed protocol as shown in Figure 4 , where the left module represents a regular or secure routing protocol, and the right module is our  ... 
doi:10.1504/ijsn.2007.012832 fatcat:lcvwbryftbdzpiy6gs6hfmsk4u

On the security of RFID devices against implementation attacks

Michael Hutter, Thomas Plos, Martin Feldhofer
2010 International Journal of Security and Networks (IJSN)  
Information technology is on its move from using autonomous applications like mobile communication and networked computers towards the 'internet of things'.  ...  Martin Feldhofer is Scientific Member of the research group VLSI and security at the Institute for Applied Information Processing and Communications (IAIK) which is part of the Graz University of Technology  ...  Internal transistors get switched by the light and cause faults during the processing of data (Tan et al., 1997) .  ... 
doi:10.1504/ijsn.2010.032209 fatcat:wrr52g3ywnfjfdeheslrjl6nfm

Steganographic information hiding that exploits a novel file system vulnerability

Avinash Srinivasan, Satish Kolli, Jie Wu
2013 International Journal of Security and Networks (IJSN)  
Nonetheless, the vulnerability exists in numerous file systems, including NTFS, HFS+, and HFS+ Journaled.  ...  In this paper, we present DupeFile, a simple yet critical security vulnerability in numerous file systems.  ...  It also exists on other Microsoft NTFS and Apple's HFS+, HFS+ Journaled, to name a few.  ... 
doi:10.1504/ijsn.2013.055942 fatcat:3oxkdmujzvf4pirwa7htqqvwuu

A collaborative botnets suppression system based on overlay network

Fuye Han, Zhen Chen, HongFeng Xu, Haopei Wang, Yong Liang
2012 International Journal of Security and Networks (IJSN)  
Abstract: Botnets are extremely versatile and are used in many network attacks, like sending huge volumes of spam or launching Distributed Denial-of-Service (DDoS) attacks.  ...  The suppression nodes can automatically collect network traffic and deploy suppression rules, the control center node can gather all collected data, and process these traffic data by using botnet detection  ...  Aggressive behavior mostly have more significant feature, and it will cause network load suddenly change, such as DDOS attack and SPAM, most of network security systems can alarm such behavior accurately  ... 
doi:10.1504/ijsn.2012.053459 fatcat:ktzolflksrbszmxt4t5zznqyna

Vulnerabilities in distance-indexed IP traceback schemes

Jianping Pan, Lin Cai, Xuemin Sherman Shen
2007 International Journal of Security and Networks (IJSN)  
Further, we discuss these vulnerabilities in a general context relevant to network protocols and examine a few possible alternatives.  ...  Substantiated by efficacy analysis and numerical results, several exploits are designed to take advantage of these vulnerabilities in an efficient manner when compared with the traceback effort attempted  ...  volume.  ... 
doi:10.1504/ijsn.2007.012827 fatcat:is4chiqexrfuvkqoj7ycbhcaia

Anomaly-based network IDS false alarm filter using cluster-based alarm classification approach

Qais Saif Qassim, Abdullah Mohd Zin, Mohd Juzaiddin Ab Aziz
2017 International Journal of Security and Networks (IJSN)  
Anomaly-based network intrusion detection systems (A-NIDS) are an important and essential defence mechanism against network attacks.  ...  Keywords: intrusion detection system; positive false alarm; alarm management; joint entropy; network security.  ...  Definition 4: For two random variables X and Y, the partial entropy of X and Y can be defined as 2 1 ( , ) ( , )log , ( , ) H X Y p x y p x y = (4) where p(x, y) is the joint probability of x and y.  ... 
doi:10.1504/ijsn.2017.081056 fatcat:gvgecypcyzcxzgifsad3ctc3bm

Receipt-freeness and coercion resistance in remote E-voting systems

Yefeng Ruan, Xukai Zou
2017 International Journal of Security and Networks (IJSN)  
Furthermore, we identify and summarize what mechanisms they use in order to satisfy these three security properties.  ...  In this paper, we mainly focus on three important security properties related to voters: receipt-freeness, voteselling resistance, and voter-coercion resistance.  ...  Definition and features of three voter related security properties are described in Section 3, as well as some protection measures that defend against corresponding attacks in Section 4.  ... 
doi:10.1504/ijsn.2017.083836 fatcat:e2zt7sqv3zavnn6osh5mv5irpm

Radio frequency identification: a case study of healthcare organisations

Susana Garrido Azevedo, Joao J. Ferreira
2010 International Journal of Security and Networks (IJSN)  
Also, the main characteristics of the infant security system, functionality and advantages are presented.  ...  Low-frequency RFID tags operate at 125 to 134 kHz, for US and international use. High-frequency systems use 13.56 MHz.  ...  Healthcare organizations are looking to RFID as a way to maximize their use of equipment, boost patient volume and plug gaps in patient safety.  ... 
doi:10.1504/ijsn.2010.032213 fatcat:cp677ciw7nc4vfzjy3v67bmn3e

Perceived barriers to the widespread commercial use of Radio Frequency Identification technology

Mark J. Rodrigues, Kieran James
2010 International Journal of Security and Networks (IJSN)  
This paper provides a unique insight into the perceptions of leading Australian Radio Frequency Identification (RFID) suppliers/integrators regarding the present state and future of their industry, and  ...  barriers to more widespread adoption of the technology.  ...  Another important issue is that the speeds of the networks for retrieving tag identifiers have not been tested for large volumes.  ... 
doi:10.1504/ijsn.2010.032215 fatcat:esbjkeqyb5elfgawpdn7ktuoka

Information Systems: A House Divided?

Alex Stewart, John L. Cotton, Monica Adya
2017 Communications of the Association for Information Systems  
We applied social network and cross-citation analyses to a sample of 98 IS journals to examine the cohesiveness of IS and to understand the extent to which boundary-spanning journals maintain scholarly  ...  , and run the risk of creating self-perpetuating journal groupings.  ...  0 0 IEEE Wireless Communications I3WC CN 0.000 0.028 0.014 0 1 International Journal of Information Security IJIS CN 0.200 0.250 0.225 1 1 International Journal of Sensor Networks IJSN  ... 
doi:10.17705/1cais.04124 fatcat:omxeqdxxrjdebcscfrrpotq4jq

Update-Based Cache Access and Replacement in Wireless Data Access

Hui Chen, Yang Xiao, Xuemin Shen
2006 IEEE Transactions on Mobile Computing  
Cache has been applied for wireless data access with different replacement policies in wireless networks.  ...  In addition, the proposed SB-PER mechanism is better than the original PER algorithm in terms of effective hit ratio and cost, and the update-based policies outperform access-based policies in most cases  ...  He currently serves as editor-in-chief for the International Journal of Security and Networks (IJSN) and for the International Journal of Sensor Networks (IJSNet).  ... 
doi:10.1109/tmc.2006.188 fatcat:ad3xb3c4m5b45lsy6hj4wmmlyu

AVALIAÇÃO INTEGRADA DOS RECURSOS HÍDRICOS EM UMA BACIA CONTRIBUINTE DO PANTANAL MATO-GROSSENSE [chapter]

Valdeci Antônio de Oliveira, Daniela Maimoni de Figueiredo, Simoni Maria Loverde Oliveira, Ibraim Fantin-Cruz
2019 Gestão de Recursos Hídricos e Sustentabilidade 3  
Morphometric Analysis of a Drainage Basin Using Geographical Information System: A Case study. International Journal of Multidisciplinary and Current Research.  ...  Comparison of enterococcal populations in animals, humans, and the environmental - a European study. International Journal of Food Microbiology, v. 88,n. 2-3, p. 133-145, 2003. LIMA, W.  ... 
doi:10.22533/at.ed.67619270926 fatcat:msldps6x2rgebd2vq4ssb7x5ba

Revista de Economia Vol. 37, N.º 1 (2011)

Revista de Economia *
2012 Revista de Economia  
Any remaining errors are the responsibility of the authors.  ...  Acknowledgments We would like to thank the DAAD (German Academic Exchange Service) for the financial support and an anonymous referee for much appreciated suggestions on the paper.  ...  are financially secure (RAGIN, 2000) 7 .  ... 
doi:10.5380/re.v37i1.27842 fatcat:nihinyjvw5g2xnj7x5stbgz2nu