Volume 12 Number 3 September 2021


Developing Visible Watermarking using an Effective Algorithm from Images

Bojan Prlinevi, Zoran Milivojevi and Stefan Pani

https://doi.org/10.6025/jisr/2021/12/3/69-76

Abstract In this work initially we have discussed the adding and removing Visible Watermarking using an effective algorithm from images. For doing it, the on visible watermarked image, the impulse noise should be superimposed. Later the image with the visible watermark is superimposed with the impulse noise and the experiments conducted to practice it are explained. The parameters used for the... Read More


Security Sensor System for Unmanned Aerial System

Krume Andreev and Rumen Arnaudov

https://doi.org/10.6025/jisr/2021/12/3/77-83

Abstract Extensive progress has been reported in the unmanned aerial systems recently. Soliciting data and required information from many points is somewhat complex for which we have employed operators and technicians. In the current work, we have to ensure the efficiency of the current plan and offset the varied environmental conditions, we used secured sensor system for in-vehicle implementation. We have... Read More


A Framework of Expert System for Mitigating Financial Frauds and Cybercrimes

George Popov, Peter Yovchev and Alexander Balevsky

https://doi.org/10.6025/jisr/2021/12/3/84-87

Abstract To prevent the financial fraud, and money motive offenses, we have introduced an expert system. Many earlier researchers also have developed such models and practicing it. We in this work, have described some issues relating to the current problem and proposed a common country-specific approach for developing an expert system. We expect good impact of the proposed security model for... Read More


Distributed Denial of Service Detection and Mitigation Solutions using Software induced Networks

Branislav Mladenov

https://doi.org/10.6025/jisr/2021/12/3/88-93

Abstract We have offered many distributed denial of service detection and mitigation solutions. We have used the Software defined network (SDN) network and the SDN for the detection and we aimed to generate actions to counter the malicious traffic. This process will enable the filtration and isolation.... Read More