Forthcoming articles


International Journal of Security and Networks


These articles have been peer-reviewed and accepted for publication in IJSN, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.


Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.


Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.


Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.


Register for our alerting service, which notifies you by email when new issues of IJSN are published online.


We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.


International Journal of Security and Networks (6 papers in press)


Regular Issues


  • A Smart Urban Flood Control and Warning System Based on Big Data   Order a copy of this article
    by Guanlin Chen, Zhikang Zhou, Rongxin Zheng, Tongjun Qi 
    Abstract: With the great-leap-forward development of social economy in recent years, urban-scale has expanded rapidly and the problem of urban flood control has become more prominent. The normal flood control system has been unable to meet the requirement of rapid urban development. As the urban drainage facilities improve and the Internet of Things monitoring equipment increase, the big data era has come. Therefore, a smart urban flood control and warning system based on big data will be crucial. In this paper, a system named SUFCWS (Smart Urban Flood Control and Warning System) based on big data is proposed. The system is composed of user login, flood control basic data entry, water level and rainfall data search, real-time display, statistical analysis and flood warning, which integrates J2EE platform, SSH2 (Spring+Struts2+Hibernate) framework, the Bootstrap front-end development kit, Highcharts graphics library and Baidu Maps API. Using GM(1,1) algorithm of grey forecasting model and back propagation neural network algorithm, SUFCWS can give available early warning of potential urban flood.
    Keywords: Big Data; Flood Control and Warning System; J2EE; Neural Network; JavaScript.

  • A Novel Flood Defense Decision Support System for Smart Urban Management Based on Classification and Regression Tree   Order a copy of this article
    by Guanlin Chen 
    Abstract: With the development of the Internet of Things Technology and Awareness Technology, all kinds of big data in the city have started to emerge. Under the background in Internet Plus Era, using big data to effectively forecast urban flood disaster, formulating the flood control and disaster mitigation countermeasures in time, is an important subject of urban flood control and research. In this paper, a NFDDSS (Novel Flood Defense Decision Support System) is proposed. Using historical hydrology data in Hangzhou, this paper proposed a comprehensive consideration of time correlation and spatial correlation of water level prediction model based on classification and regression tree. This model can predict the water level in 1 to 6 hours effectively. With this system, supervisors can get timely and effective guidance of flood control and disaster mitigation when the flood season comes.
    Keywords: Flood Defense; Water Level Prediction; Classification and Regression Tree; Decision Support System; Big Data.

  • A security scheme of digital rights management based on agent encryption and key distribution in cloud computing   Order a copy of this article
    by Wengeng Ge 
    Abstract: Cloud computing is a convenient and flexible mode of data transmission and sharing. Data security is the biggest challenge today owing to the wide application of cloud computing in various fields. This study proposed a security scheme of digital rights management based on digital license and agent encryption in cloud computing. First, a secure and effective framework of digital rights management was presented, allowing the agent encryption provider (such as centralized data server) to encrypt the data content and the common users to use the data resource based on digital license generated by a license server. The novel scheme could accomplish the privacy protection by permitting anonymous users to request different services from the key server and service provider. The performance analysis showed that the proposed scheme could assure the security and efficiency of data resource, thereby establishing its significance and application value for promoting a widespread application of cloud computing.
    Keywords: digital rights management; cloud computing; digital license; agent encryption; key distribution.

  • Graphical Passwords for Older Computer Users   Order a copy of this article
    by Nancy Carter, Cheng Li, Qun Li, Jennifer Stevens, Ed Novak, Zhengrui Qin 
    Abstract: Traditional text password authentication is widely used to gain access to computing resources. Not all users possess the same cognitive and manual dexterity skills required to easily create, recall, and enter strong text passwords. We interviewed a group of older users, over the age of 60, and identified challenges with recall and typing of strong text passwords. We developed and evaluated our Graphical Password user password system based on familiar facial images embedded randomly among unfamiliar, yet similar images. It assists older users through use of culturally familiar, and age-relevant images forming personalized password image sequences. Our usability study with nineteen older volunteers measured recall, and timing with varying password image sequence lengths, increasing display complexity, and two input modalities, touchscreen and mouse. Our Graphical Password technique demonstrated a recall rate of 97%, password entropy superior to short PINs, and authentication time comparable to short text passwords.
    Keywords: authentication; security; graphical passwords; human computer interaction; older users.

  • Security mechanism of dynamic and differentiated protection for telecommunications services based on cloud computing   Order a copy of this article
    by Huijuan Xu, Xin Zheng 
    Abstract: Security threats in the processes of data migration has increased than ever before with the development of cloud computing. Traditionally, device-centric security systems are not efficient enough because a large number of data resources float in the cloud and are out of the owners control. The security requirements of telecommunications services based on cloud computing comprise three aspects: data storage, data processing, and data transmission. Therefore, this study aimed to design a novel data-centric security protection system. A security model based on the security domain division was proposed. That is to say, the security protection measures were carried out from three data domains: storage, processing, and transmission. The analyses indicated that the novel model could not only provide dynamic and differentiated protection but also be implemented at a lower cost for telecommunications services in cloud computing.
    Keywords: telecommunications services; cloud computing; security mechanism; security domain division.

  • The Case for HTTPS: Measuring Overhead and Impact of Certificate Authorities   Order a copy of this article
    by Eric Chan-Tin, Rakesh Ravishankar 
    Abstract: The popularity of the web is indisputable. With revelations about mass surveillance, the use of secure web through TLS connections is needed for privacy. However, the pushback against enabling secure web connections by default is due to increase in communication time. We quantify the communication time for HTTP and HTTPS download times for the most popular websites. The average download time over a HTTP connection is 2.604 seconds while the average download time over a HTTPS connection is 2.937 seconds. The overhead in using encryption is 333 milliseconds (about 3 roundtrip times on the Internet) or 333/2604 = 12.78%. We thus make the case that HTTPS should be enabled by default due to the low communications overhead. With the recent hacks at certificate authorities, we also quantify which certificate authorities are most popular on the Internet. By trusting ten certificate authorities, a webbrowser can access almost 80% of HTTPS websites.
    Keywords: HTTPS; Certificate Authorities; Overhead; SSL; TLS; Measurement; Overhead; Security; Web.