International Journal of Network Security & Its Applications (IJNSA)

Current Issue

May 2021, Volume 13, Number 3

Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks
David A. Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA
Effect Man-In the Middle on the Network Performance in Various Attack Strategies
Iyas Alodat, Jerash University, Jordan
Information-Centric Blockchain Technology for the Smart Grid
Lanqin Sang and Henry Hexmoor, Southern Illinois University, USA
A Survey on Federated Identity Management Systems Limitation and Solutions
Maha Aldosary and Norah Alqahtani, Imam Mohammad Ibn Saud Islamic University, KSA

March 2021, Volume 13, Number 2

Comparison of Malware Classification Methods using Convolutional Neural Network based on API Call Stream
Matthew Schofield, Gulsum Alicioglu, Bo Sun, Russell Binaco, Paul Turner, Cameron Thatcher, Alex Lam and
Anthony Breitzman, Rowan University, USA
Performance Evaluation of Machine Learning Techniques for DOS Detection in Wireless Sensor Network
Lama Alsulaiman and Saad Al-Ahmadi, King Saud University, Saudi Arabia
Applying the Health Belief Model to Cardiac Implanted Medical Device Patients
George W. Jackson1 and Shawon Rahman2, 1Capella University, USA, 2University of HawaiiHilo, USA
A Literature Survey and Analysis on Social Engineering Defense Mechanisms and Infosec Policies
Dalal Alharthi and Amelia Regan, University of California Irvine, USA
Phishing Mitigation Techniques: A Literature Survey
Wosah Peace Nmachi and Thomas Win, School of Computing & Engineering University of Gloucestershire, United Kingdom

January 2021, Volume 13, Number 1

Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms
William R. Simpson and Kevin E. Foltz, The Institute for Defense Analyses (IDA), USA
Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset
Geeta Kocher1 and Gulshan Kumar2, 1MRSPTU, India, 2SBSSTC, India
Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis
Anna Georgiadou, Spiros Mouzakitis and Dimitris Askounis, National Technical University of Athens, Greece
Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys
Cheman Shaik, VISH Consulting Services Inc, USA
Game Theory Application Resources Management and Distribution in Blockchain Network
Cong Hung Tran1, Dien Tam Le1, 2, Thanh Hieu Huynh3, 1Posts and Telecommunications Institute of Technology, Vietnam,
2Thu Duc Technology College, Vietnam, 3Saigon University, Vietnam