default search action
International Journal of Communication Networks and Information Security (IJCNIS), Volume 9
Volume 9, Number 1, 2017
- Lyamine Guezouli, Kamel Barka, Souheila Bouam, Abdelmadjid Zidani:
Implementation and Optimization of RWP Mobility Model in WSNS under Tossim Simulator. - Vijaya Kumar Gurram, Shoba Bindu Chigarepalli:
A New Method of User Association in Wireless Mesh Networks. - Abdelkabir Sahnoun, Ahmed Habbani, Jamal El Abbadi:
EEPR-OLSR: an Energy Efficient and Path Reliability protocol for proactive MANET routing. - Shahid Bashir, M. Salman Khan, Khadim Ullah Jan, Sadiq Ullah:
Performance Enhancement of Wearable Antenna Using High Impedance Surfaces. - Mohsin Khan, Majid Ashraf, Haseeb Zafar, Tufail Ahmad:
Enhanced Handover Mechanism in Long Term Evolution (LTE) Networks. - A. Ajina, Mydhili K. Nair:
Cross Layered Network Condition Aware Mobile-Wireless Multimedia Sensor Network Routing Protocol for Mission Critical Communication. - Indrarini Dyah Irawati, Andriyan Bayu Suksmono, Ian Yosef Matheus Edward:
Missing Internet Traffic Reconstruction using Compressive Sampling. - Azuan Ahmad, Norbik Bashah Idris, Mohd Nazri Kama:
CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism. - Rastislav Róka, Pavol Salík:
Impact of Environmental Influences on Multilevel Modulation Formats at the Signal Transmission in the Optical Transmission Medium. - Nyoman Gunantara, Agus Dharma:
Optimal Path Pair Routes through Multi-Criteria Weights in Ad Hoc Network Using the Genetic Algorithm. - Kavitha R, Padmavathi G:
Advanced Random Time Queue Blocking With Traffic Prediction For Defense Of Low-Rate Dos Attacks Against Application Servers. - Ramesh Kumar, Ayaz Hussain, Abdul Aziz, Inwhee Joe:
Wireless DF Relaying with Beamforming for an Unmanned Aircraft System over κ-μ Fading Channels. - Doan Perdana, Favian Dewanta, Ig Prasetya Dwi Wibawa:
Extending Monitoring Area of Production Plant Using Synchronized Relay Node Message Scheduling.
- Sanaa Oulaourf, Abdelfatteh Haidine, Abdelhak Aqqal, Hassan Ouahmane:
Review on Radio Resource Allocation Optimization in LTE/LTE-Advanced using Game Theory.
Volume 9, Number 2, 2017
- Muhammad Zeeshan, Huma Javed, Sifat Ullah:
Discrete R-Contiguous bit Matching mechanism appropriateness for anomaly detection in Wireless Sensor Networks. - Lekha J, Ganapathi Padmavathi:
Detection of illegal traffic pattern using Hybrid Improved CART and Multiple Extreme Learning Machine Approach. - Firas AlBalas, Wail Mardini, Dua'a Bani-salameh:
Optimized Job Scheduling approach based on Genetic algorithms in smart Grid environment. - Selvi E, Shashidhara M. S:
Quantum Phase Shift For Energy Conserved Secured Data Communication In Manet. - Mohammed Abdel-Azim, Hossam El-Din Salah, Menas Ebrahim Eissa:
Black Hole attack Detection using fuzzy based IDS. - Badr Benmammar, Youcef Benmouna, Asma Amraoui, Francine Krief:
A parallel implementation on a multi-core architecture of a dynamic programming algorithm applied in cognitive radio ad hoc networks. - Sweta Jain, Vinuraj R:
CALAR: Community Aware Location Assisted Routing Framework for Delay Tolerant Networks. - Magdy Ibrahim ElSharkawy:
Quaternion-based Encryption/Decryption of Audio Signal Using Digital Image as Variable Key. - Anant Ram, Manas Kumar Mishra:
Mobility Adaptive Density Connected Clustering Approach in Vehicular Ad Hoc Networks. - Eyad Salah Taqieddin:
On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols. - Chafiq Titouna, Abdelhak Mourad Guéroui, Makhlouf Aliouat, Ado Adamou Abba Ari, Amine Adouane:
Distributed Fault-Tolerant Algorithm for Wireless Sensor Networks. - Ahmed M. Shamsan Saleh:
Bio-Inspired Technique: An Adaptive Routing for Reliability and Energy Efficiency Method in Wireless Sensor Networks. - Sambhaji Sarode, Jagdish W. Bakal:
PFPS: Priority-First Packet Scheduler for IEEE 802.15.4 Heterogeneous Wireless Sensor Networks. - Venifa Mini G, K. S. Angel Viji:
A Comprehensive Cloud Security Model with Enhanced Key Management, Access Control and Data Anonymization Features. - Nur Hidayah Mohd Saudi, Mohd Faizal Abdollah, Siti Rahayu Selamat, Rudy Fadhlee M. D, Wan Ahmad Ramzi W. Y.:
Revealing the Feature Influence in HTTP Botnet Detection. - Franco Frattolillo:
Digital Copyright Protection: Focus on Some Relevant Solutions.
- Aun Yichiet, Selvakumar Manickam, Shankar Karuppayah:
A Review on Features' Robustness in High Diversity Mobile Traffic Classifications.
Volume 9, Number 3, 2017
- Atef A. Obeidat:
Hybrid Approach for Botnet Detection Using K-Means and K-Medoids with Hopfield Neural Network. - Imran Khan:
Performance Analysis of 5G Cooperative-NOMA for IoT-Intermittent Communication. - Wail Mardini, Maad Ebrahim, Mohammed Al-Rudaini:
Comprehensive Performance Analysis of RPL Objective Functions in IoT Networks. - Iman El Mir, Kandoussi el Mehdi, Mohamed Hanini, Abdelkrim Haqiq, Dong Seong Kim:
A Game Theoretic approach based virtual machine migration for cloud environment security. - Shadi Ismail Nashwan:
SE-H: A Secure and Efficient Hash Protocol for RFID System. - Dina M. Omar, Ahmed M. Khedr:
Optimized Clustering Protocol for Balancing Energy in Wireless Sensor Networks. - Amiruddin Amiruddin, Anak Agung Putri Ratna, Riri Fitri Sari:
New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks. - Husna Jamal Abdul Nasir, Ku Ruhana Ku-Mahamud, Eiji Kamioka:
Enhanced Ant-Based Routing for Improving Performance of Wireless Sensor Network. - Dixon Salcedo Morillo, César D. Guerrero, Julian Guerrero:
Overhead in Available Bandwidth Estimation Tools: Evaluation and Analysis. - Anggun Fitrian Isnawati, Risanuri Hidayat, Selo Sulistyo, I Wayan Mustika:
A Novel Utility Function of Power Control Game in Multi-Channel Cognitive Femtocell Network. - Magdy Ibrahim ElSharkawy:
Integrating and Securing Video, Audio and Text Using Quaternion Fourier Transform. - Wael Alosaimi, Michal Zák, Khalid Al-Begain, Roobaea Alroobaea, Mehedi Masud:
Economic Denial of Sustainability Attacks Mitigation in the Cloud. - Selo Sulistyo, Sahirul Alam:
Distributed Channel and Power Level Selection in VANET Based on SINR using Game Model. - Jhum Swain, Binod Kumar Pattanayak, Bibudhendu Pati:
A New Approach for DDoS attacks to discriminate the attack level and provide security for DDoS nodes in MANET. - Emran Aljarrah:
Deployment of Multi-Fuzzy Model Based Routing in RPL to Support Efficient IoT. - Pooja Singh, Vikas Pareek, Anil K. Ahlawat:
Designing an Energy Efficient Network Using Integration of KSOM, ANN and Data Fusion Techniques. - Mike Yuliana, Wirawan, Suwadi:
Performance Improvement of Secret Key Generation Scheme in Wireless Indoor Environment. - Bhupendra Kumar Gupta, Srikanta Patnaik, Ajit Kumar Nayak, Manas Kumar Mallick:
Congestion Managed Multicast Routing in Wireless Mesh Network. - Veeresh Poola, R. Praveen Sam, Shoba Bindhu C:
Fuzzy Based Optimal QoS Constraint Services Composition in Mobile Ad Hoc Networks. - Wan Ahmad Ramzi W. Y., Mohd Faizal Abdollah, Rudy Fadhlee M. D, Nur Hidayah Mohd Saudi:
Revealing Influenced Selected Feature for P2P Botnet Detection.
- Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod:
State of the Art in Biometric Key Binding and Key Generation Schemes. - Movva Pavani, Polipalli Trinatha Rao:
Urban Air Pollution Monitoring Using Wireless Sensor Networks: A Comprehensive Review.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.