SlideShare a Scribd company logo
1 of 1
Download to read offline
International Journal of Network Security & Its
Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)
http://airccse.org/journal/ijnsa.html
Current Issue: July 2021, Volume 13, Number 4
Use of MARKOV Chain for Early Detecting DDoS Attacks
Chin-Ling Chen1
and Jian-Ming Chen2
, 1
National Pingtung University, Taiwan, 2
Genesis
Technology, Inc., Taiwan
Constructing the 2-Element AGDS Protocol based on the Discrete Logarithm
Problem
Tuan Nguyen Kim1
, Duy Ho Ngoc2
and Nikolay A. Moldovyan3
, 1
Duy Tan University, Vietnam,
2
Ha Noi, Vietnam, 3
St. Petersburg Institute for Informatics and Automation of Russian Academy
of Sciences, Russia
Proof-of-Reputation: An Alternative Consensus Mechanism for Blockchain Systems
Oladotun Aluko1
and Anton Kolonin2
, 1
Novosibirsk State University, Russia, 2
Aigents Group,
Russia
Critical Infrastructure Cybersecurity Challenges: IoT in Perspective
Akwetey Henry Matey1
, Paul Danquah2
, Godfred Yaw Koi-Akrofi1
and Isaac Asampana1
,
1
University of Professional Studies Accra, 2
Heritage Christian University
Collective Signature Protocols for Signing Groups based on Problem of Finding
Roots Modulo Large Prime Number
Tuan Nguyen Kim1
, Duy Ho Ngoc2
and Nikolay A. Moldovyan3
, 1
Duy Tan University, Vietnam,
2
Ha Noi, Vietnam, 3
St. Petersburg Institute for Informatics and Automation of Russian Academy
of Sciences, Russia
http://airccse.org/journal/jnsa21_current.html

More Related Content

What's hot

Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
Maha Saad
 

What's hot (16)

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Modern Metrics on Computer Networking
Modern Metrics on Computer NetworkingModern Metrics on Computer Networking
Modern Metrics on Computer Networking
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
A05510105
A05510105A05510105
A05510105
 
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORKCROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
iRise Software Modeling (CIS512)
iRise Software Modeling (CIS512)iRise Software Modeling (CIS512)
iRise Software Modeling (CIS512)
 
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONNETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
 
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
An anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computingAn anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computing
 
APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...
APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...
APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...
 
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
 
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKSA SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
 

Similar to International Journal of Network Security & Its Applications (IJNSA) - Current Issue: July 2021, Volume 13, Number 4

International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)
CSCJournals
 

Similar to International Journal of Network Security & Its Applications (IJNSA) - Current Issue: July 2021, Volume 13, Number 4 (20)

International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...
 
Current Issue - May 2022, Volume 14, Number 3 - International Journal of Comp...
Current Issue - May 2022, Volume 14, Number 3 - International Journal of Comp...Current Issue - May 2022, Volume 14, Number 3 - International Journal of Comp...
Current Issue - May 2022, Volume 14, Number 3 - International Journal of Comp...
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
 
Current Issue - January 2022, Volume 14, Number 1 - International Journal of ...
Current Issue - January 2022, Volume 14, Number 1 - International Journal of ...Current Issue - January 2022, Volume 14, Number 1 - International Journal of ...
Current Issue - January 2022, Volume 14, Number 1 - International Journal of ...
 
Top 10 Cited Network Security Research Articles 2021 - 2022
Top 10 Cited Network Security Research Articles 2021 - 2022Top 10 Cited Network Security Research Articles 2021 - 2022
Top 10 Cited Network Security Research Articles 2021 - 2022
 
International Journal of Computer Science & Information Technology (IJCSIT)-...
 International Journal of Computer Science & Information Technology (IJCSIT)-... International Journal of Computer Science & Information Technology (IJCSIT)-...
International Journal of Computer Science & Information Technology (IJCSIT)-...
 
Current Issue - November 2022, Volume 14, Number 6 - The International Journa...
Current Issue - November 2022, Volume 14, Number 6 - The International Journa...Current Issue - November 2022, Volume 14, Number 6 - The International Journa...
Current Issue - November 2022, Volume 14, Number 6 - The International Journa...
 
International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its Applications
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its Applications
 
The International Journal of Network Security & Its Applications (IJNSA)
The International Journal of Network Security & Its Applications (IJNSA)The International Journal of Network Security & Its Applications (IJNSA)
The International Journal of Network Security & Its Applications (IJNSA)
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
November 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its Applications
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 

Recently uploaded

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 

Recently uploaded (20)

Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 

International Journal of Network Security & Its Applications (IJNSA) - Current Issue: July 2021, Volume 13, Number 4

  • 1. International Journal of Network Security & Its Applications (IJNSA) ISSN 0974 - 9330 (Online); 0975 - 2307 (Print) http://airccse.org/journal/ijnsa.html Current Issue: July 2021, Volume 13, Number 4 Use of MARKOV Chain for Early Detecting DDoS Attacks Chin-Ling Chen1 and Jian-Ming Chen2 , 1 National Pingtung University, Taiwan, 2 Genesis Technology, Inc., Taiwan Constructing the 2-Element AGDS Protocol based on the Discrete Logarithm Problem Tuan Nguyen Kim1 , Duy Ho Ngoc2 and Nikolay A. Moldovyan3 , 1 Duy Tan University, Vietnam, 2 Ha Noi, Vietnam, 3 St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia Proof-of-Reputation: An Alternative Consensus Mechanism for Blockchain Systems Oladotun Aluko1 and Anton Kolonin2 , 1 Novosibirsk State University, Russia, 2 Aigents Group, Russia Critical Infrastructure Cybersecurity Challenges: IoT in Perspective Akwetey Henry Matey1 , Paul Danquah2 , Godfred Yaw Koi-Akrofi1 and Isaac Asampana1 , 1 University of Professional Studies Accra, 2 Heritage Christian University Collective Signature Protocols for Signing Groups based on Problem of Finding Roots Modulo Large Prime Number Tuan Nguyen Kim1 , Duy Ho Ngoc2 and Nikolay A. Moldovyan3 , 1 Duy Tan University, Vietnam, 2 Ha Noi, Vietnam, 3 St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia http://airccse.org/journal/jnsa21_current.html