scispace - formally typeset
Search or ask a question
JournalISSN: 2225-658X

International Journal of Digital Information and Wireless Communications 

The Society of Digital Information and Wireless Communications (SDIWC)
About: International Journal of Digital Information and Wireless Communications is an academic journal. The journal publishes majorly in the area(s): Information system & Wireless. Over the lifetime, 288 publications have been published receiving 1303 citations.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
TL;DR: A research based on a tool that uses Genetic Algorithm, called the GA Playground is done to demonstrate the capability of solving the Knapsack Problem with the fitness function and a case study on how images can be reproduced using the optimal parameters.
Abstract: In today’s world, an optimal and intelligent problem solving approaches are required in every field, regardless of simple or complex problems. Researches and developers are trying to make machines and software's more efficient and intelligent. This is where the Artificial Intelligence plays its role in developing efficient and optimal searching algorithm solutions. Genetic algorithm is one of most pervasive and advanced developed heuristic search technique in AI. Genetic algorithm (GA) is developed to find the most optimized solution for a given problem based on inheritance, mutation, selection and some other techniques. It was proved that genetic algorithms are the most powerful unbiased optimization techniques for sampling a large solution space. In this paper, we have used GA for the image optimization and Knapsack Problems, which are commonly found in a real world scenario. Furthermore, a research based on a tool that uses Genetic Algorithm, called the GA Playground is done to demonstrate the capability of solving the Knapsack Problem with the fitness function and a case study on how images can be reproduced using the optimal parameters. Lastly, a few methods such as the Hash Table and the Taguchi Method are suggested to improve the performance of the Genetic Algorithm.

89 citations

Journal Article
TL;DR: The result of this paper presents that existing toolkits are deficient to gather volatile data as well as deleted information in extracting data from a Nokia E5-00 smartphone.
Abstract: In the past few years, there has been an exponential increase in the number of smartphone users. By its very nature, smartphone saves and manages vast amount of information pertaining to its owner. As a result, this ubiquitous device is being regarded as a valuable evidence item in forensic investigations. Nevertheless owing to disparity in smartphone models, retrieving whole data from all models using predefined instructions and tools is not always possible. This paper studies demo or trial versions of four widely used mobile forensics tools namely, Oxygen Forensic Suite, Paraben's Device Seizure, Mobile Internal Acquisition Tool, and MOBILedit! Forensic Lite in extracting data from a Nokia E5-00 smartphone. The result of this paper presents that existing toolkits are deficient to gather volatile data as well as deleted information. User may configure a security code (aka lock code) on Nokia E5-00 to prevent unauthorized access to the device [3]. The default security code is 12345 which is not activated by default [3]. Nokia E5-00 will encrypt data stored on its flash memory and attached memory card if user enables encryption option [3].

46 citations

Journal Article
TL;DR: The findings from reviewing these research papers proved that the complexity of the attacks had increased by time and the attacks in WiFi network are passive and more dangerous to the end users.
Abstract: This paper discusses current threats in wireless networks and some academia research reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man In the Middle Attack (MITM), Rogue Access Points (RAP), Denial Of Services (DoS) and social engineering attacks. Some current developments of wireless communication technology such as short range communication, cloud computing, bring your own device policy (BYOD), devices tethering and convergences of WiFi and cellular network technology are also presented. Some practical suggestion and advanced countermeasures are also reviewed in this paper. The findings from reviewing these research papers proved that the complexity of the attacks had increased by time and the attacks in WiFi network are passive and more dangerous to the end users.

32 citations

Journal Article
Alan S. Weber1
TL;DR: Social Networking Sites such as Facebook, Google+, Myspace, LinkedIn and Twitter have now become commonplace in international virtual space and the business models of many SNSs as essentially advertizing platforms and as a means of tracking online behaviors which can be monetized raise some key concerns for educators.
Abstract: Social Networking Sites (SNSs) such as Facebook, Google+, Myspace, LinkedIn and Twitter have now become commonplace in international virtual space. Approximately 75% of all online adults maintain at least one social network profile. As SNSs are becoming more ubiquitous, they are also becoming more sophisticated and many operate on a free service model based on advertizing revenues. Free services are obviously attractive to educational institutions in the developing world with small education budgets. With the exception of sites such as Edmodo, SNSs, however, are generally commercially driven and educational goals and purposes were not part of their original design: educational uses have generally been the result of the creative adaptation of SNSs by educators and application builders. Therefore some serious issues of data privacy, trust, and security have arisen since both the educational, medical, and medical education realms operate in the U.S. under strict data protection laws such as HITECH, HIPAA, FERPA, and COPPA. Potential educational advantages of SNSs are similar to general elearning benefits such as: anytime / anywhere instruction, lower cost for institutions, knowledge crowdsourcing, interconnectivity and facilitation of online collaborative work, peer-to-peer instruction, and the provision of virtual training scenarios (role-playing) not available or practical in the non-virtual world. However, the business models of many SNSs as essentially advertizing platforms and as a means of tracking online behaviors which can be monetized (with non-transparent policies of data collection and retention) raise some key concerns for educators.

32 citations

Journal Article
TL;DR: Different techniques such as repacking, reverse engineering and hex editing for bypassing host-based Anti Virus (AV) signatures are illustrated, and the description and comparison of different channels and methods when malware might reach the host from outside the networks are demonstrated.
Abstract: Malwares are considered as a major threat vector which can be potentially caused huge damage to both network infrastructure as well as network applications. In this paper, different techniques such as repacking, reverse engineering and hex editing for bypassing host-based Anti Virus (AV) signatures are illustrated, and the description and comparison of different channels and methods when malware might reach the host from outside the networks are demonstrated. After that, bypassing HTTP/SSL and SMTP malware defences as channels are discussed. Finally, a new malware detection technique base on honeynet systems is discussed and its strengths and weaknesses were highlighted. best way for detection prevention by defences, we survey a detection system base on honeynet for organization to detect unknown malware before the malware reaches to their private networks. II. REVIEW OF RELATED WORKS Many companies’ employees use unknown sources in Internet and they download executable files, which might be malicious files. The reason of preventing these activities by security administrators in companies is given and it is shown that how new malware or an existing malware, which is changed, might be pass by AV engines [4]. The ability of AVs in detection of some malware is indicated and it is tested to determine how often the malware are recognized by standard AVs. All the malware, which are mentioned in this part, have been scanned in VirusTotal [4]. It is a free service from Hispasec Sistemas and VirusTotal site scans all uploaded files by using 41 AVs base on signature detection method and each AV has updated with the newest malware signature [4]. The result of detection is different between stored and executed malware, which respectively shows malicious behavior and signature; therefore, it is not always deduced from only stored files [5]. The example is a malware with a known signature, which has changed its codes. But when a malware runs, the malicious signature may re-emerge base on packet’s nature [5]. There are two different situations that malware can be detected or bypassed. First, bypassing host-based AVs and second Bypassing from AV gateways [5], which are protecting a network. different ways that a malware might bypass host-based defenders is given below:

32 citations

Network Information
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
20211
20202
20193
201830
201718
201628