International Journal of Advanced Studies in Computer Science and Engineering (IJASCSE)

                                                                                                                                                                                                   ISSN : 2278 7917 

Call For Papers

May 2019

  Submission         May 10

  Acceptance         May 20

  Publication          May 31

Bookmark and Share

International Journal of advanced studies in Computer Science and Engineering (IJASCSE) is here to provide a timely and broad coverage of research in ever-challenging field of Computer Science and Computer Science Engineering. IJASCSE is an interdisciplinary, peer reviewed, fully refereed, monthly, Open Access journal for research scholars with a mix of regular and theme based issues to share their new and advanced research in Computer Science and Engineering. 

The papers published at IJASCSE are currently Abstracted & Indexed by some world famous databases.

 Call For Papers

April  2019

     Submission                     April 10

      Notification                     April 20

      Publication                     April 30

Bookmark and Share

Open Access Database

IJASCSE is an online peer reviewed quality publication, which publishes research papers from diverse fields in computers, sciences, engineering and technologies that emphasizes new research, development and their applications. It provides an open access database for all who are interested to exchange their research work, technical notes & surveying results among professionals through out the world.


 IJASCSE volume 5 issue 2                            


Alert correlation and aggregation techniques for reduction of security alerts and detection of multistage attack

Faiez M. Alserhani

AbstractMalicious attacks by intruders and hackers exploit flaws and weakness points in deployed systems through several sophisticated techniques. Consequently, automated detection and timely response systems such as Network Intrusion Detection Systems (NIDS) are urgently needed to detect abnormal activities by monitoring network traffic and system events. The current implementation of NIDS generates huge volumes of alerts overwhelming the security analyst which makes event observation tedious.


Cyber Security’s Significance in Health Information Technology (HIT)

Pushpendra Kumar, Rachna Kumar

Abstract This paper explores the growing cyber securityissues in the healthcare industry in USA. The consequences of cyber attacks are also explored. Finally the paper explains the Health Insurance Portability and Accountability Act (HIPAA) to discuss the federal privacy standards to protect patients’ medical records and other health information.


On Board Data Handling (OBDH) based on PC104


AbstractDeveloping OBDH for satellite should consider the condition of the existing research facilities and resources in an institution. Many OBDH developments have been failed because not considering the capabilities of the institution. Considering to the capabilities of the institution is important, because it is major factor whether building OBDH can be realized successfully or not.


Randomized passcode generation for Scan based hybrid symmetric cryptosystem

Shivanand S. Gornale, Nuthan A.C

AbstractSecuring sensitive information has huge prominence and its of greatest challenge for any organization. This work proposes one such attempt of network security. In this proposed technique sensitive data is encrypted using multiple data encryption techniques. Here data in text form is handled as an image and hence exclusive image encryption techniques are also applied to strengthen the architecture.


Swarm Intelligence in Map Reduce

Penuparty Srikant, Ananta Chandra Das,  Santwana Sagnika

Abstract - Present big data needs cannot be suitably handled with conventional relational databases, desktop analysis and statistical packages. There is need of immense parallel processing of software running on hundreds and thousands of machines concurrently. 

Social networking website users: A Gender-based Analysis of behavior Pattern

Nishtha Kesswani

Abstract: In the recent years, there has been increase in the number of users of social networking sites. In this paper I have done the gender based analysis of the social networking website users on the basis of parameters like number of social networking sites they are member of and the visibility of their profile.

Keywords – Intrusion detection systems; Alert correlation; Alert aggregation; Multi-stage attack

Keywords— Health Information Technology; health insurance; Cyber Security.

Keywords—On Board Data Handling, PC 104, Multitasking, Close loop Testing

Keywords - Hybrid crypto-system, AES, DES, Random Number Generator (RNG), LFSR.

Keywords - Fourier- Two-Dimensional Fractional Fourier-Mellin Transform, Testing Function Space, Generalized function, Algorithm.

Keywords - Social Networking websites, Gender based analysis, Behaviour Pattern.

To download Click on PDF logo
To download Click on PDF logo
To download Click on PDF logo
To download Click on PDF logo
To download Click on PDF logo
analysis of behavior pattern of social networking website users.pdf
To download Click on PDF logo