default search action
International Journal of Communication Networks and Information Security (IJCNIS), Volume 11
Volume 11, Number 1, 2019
- Dina M. Omar, Ahmed Khedr:
SEPCS: Prolonging Stability Period of Wireless Sensor Networks using Compressive Sensing. - Esmael Verano Maliberan:
Modified SHA1: A Hashing Solution to Secure Web Applications through Login Authentication. - Farizah Yunus:
A Rate Control Model of MPEG-4 Encoder for Video Transmission over Wireless Sensor Network. - Mohammed Saber, Abdessamad El Rharras, Rachid Saadane, Hatim Kharraz Aroussi, Mohamed Wahbi:
Artificial Neural Networks, Support Vector Machine And Energy Detection For Spectrum Sensing Based On Real Signals. - Zouhair Chiba:
New Anomaly Network Intrusion Detection System in Cloud Environment Based on Optimized Back Propagation Neural Network Using Improved Genetic Algorithm. - Bongisizwe Erasmus Buthelezi, Maredi Mphahlele, Deon Du Plessis, Solly Maswikaneng, Topside E. Mathonsi:
ZigBee Healthcare Monitoring System for Ambient Assisted Living Environments. - A. Basnet, Abeer Alsadoon, P. W. C. Prasad, Omar Hisham Alsadoon, Linh Pham, Amr Elchouemi:
A Novel Secure Patient Data Transmission through Wireless Body Area Network: Health Tele-Monitoring. - Ahmed Jedidi:
Workload Cluster Balance Algorithm to Improve Wireless Sensor Network Performance. - Mohammed Alsaedi:
Image Encryption and Decryption Using Chua's Circuits. - Deris Stiawan, Diky Aryandi, Ahmad Heryanto, Tri Wanda Septian, Farkhana Binti Muchtar, Mohd Yazid Idris, Rahmat Budiarto:
Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method. - Felomino Porras Alba, Enrique D. Festijo, Ruji P. Medina:
A Distance-Based Data-Mule Scheduling Technique for Lesser Nodal Delay in Wireless Sensor Network. - Hamza Toulni, Mounia Miyara, Benayad Nsiri, Mohcine Boudhane:
Traffic congestion prevention system. - Karim Benzidane, Saad Khoudali, Leila Fetjah, Said Jai-Andaloussi, Abderrahim Sekkaki:
Application-based authentication on an inter-VM traffic in a Cloud environment. - Mohammed Falah Abood Salman, Leili Farzinvash:
A Hybrid Algorithm for Reliable and Energy-efficient Data Gathering in Wireless Sensor Networks. - Mohamed El Ghazouani, Moulay Ahmed El Kiram, Latifa Er-Rajy:
Blockchain & Multi-Agent System: A New Promising Approach for Cloud Data Integrity Auditing with Deduplication. - Alaa Al-Nusirat, Feras Hanandeh, Mohammad Kamel Kharabsheh, Mahmoud Al-Ayyoub, Nahla Al-dhfairi:
Dynamic Detection of Software Defects Using Supervised Learning Techniques. - Dalveer Kaur, Neeraj Kumar:
Dexterity for Channel Capacity Enhancement in MU-MIMO by Abrogating Interference. - Rafat Ahmed Alhanani, Jaafar Abouchabaka, Najat Rafalia:
CDS-MIP: CDS-based Multiple Itineraries Planning for mobile agents in wireless sensor network. - Gabriel Vasconcelos, Rodrigo Sanches Miani, Vitor Guizlini, Jefferson R. Souza:
Evaluation of DoS attacks on Commercial Wi-Fi-Based UAVs. - Muhammad Biben Triadi, Doan Perdana, Rendy Munadi, Wenzao Li:
A New Variant of Game Theory Based Decision Making (GTDM) Algorithm Routing Protocols to Improve Energy Efficiency on Vehicular Delay Tolerant Network (VDTN). - Amjad Yosef Hendi, Majed O. Dwairi, Ziad Abdulkareem Al-Qadi, Mohamed S. Soliman:
A NOVEL SIMPLE AND HIGHLY SECURE METHOD FOR DATA ENCRYPTION-DECRYPTION. - Nayab Taj, Mohammad Haseeb Zafar, Shakeel Ahmad Waqas, Humaira Rehman, Madini O. Alassafi, Imran Khan:
Smart Relay Selection Scheme Based on Fuzzy Logic with Optimal Power Allocation and Adaptive Data Rate Assignment.
- Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang:
Efficient and Secure ECDSA Algorithm and its Applications: A Survey. - Zheng Wei Clement Chan, Chuah Chai Wen, Janaka Alawatugoda:
Review on Leakage Resilient Key Exchange Security Model.
Volume 11, Number 2, 2019
- Mohammad Equebal Hussain, Mohammed Qayyum, Mohammad Rashid Hussain, Rashid Hussain:
Effective and Secure vWSN Applications in a Virtualized Cloud Computing Environment. - Muni Lavanya, Chigarapalle Shoba Bindu, Vijay Kumar:
Internet Traffic based Channel Selection in Multi-Radio Multi-Channel Wireless Mesh Networks. - Rakesh K. Kadu, Dattatraya S. Adane:
Hardware Implementation of Efficient Elliptic Curve Scalar Multiplication using Vedic Multiplier. - Ravindra S, Siddesh G. K:
Distance Based Power Control for D2D Communication in LTE-Advanced Networks. - Reham Abdellatif Abouhogail:
A New Secure Lightweight Authentication Protocol for NFC mobile Payment. - Kalpana Murugan, Al-Sakib Khan Pathan:
A Routing Algorithm for Extending Mobile Sensor Network's Lifetime using Connectivity and Target Coverage. - Saufi Bukhari, Ku Ruhana Ku-Mahamud, Hiroaki Morino:
Load Balancing Using Dynamic Ant Colony System Based Fault Tolerance in Grid Computing. - Khalid Saleh Aloufi:
6LoWPAN Stack Model Configuration for IoT Streaming Data Transmission over CoAP. - Zouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El Omri, Mohammed Rida:
Intelligent and Improved Self-Adaptive Anomaly based Intrusion Detection System for Networks.
- Amiruddin Amiruddin, Anak Agung Putri Ratna, Riri Fitri Sari:
Systematic Review of Internet of Things Security.
Volume 11, Number 3, 2019
- Abdullah Shakir, Raed A. Alsaqour, Maha S. Abdelhaq, Amal Alhussan, Mohd Othman, Ahmed Mahdi:
Novel Method of Improving Quality of Service for Voice over Internet Protocol Traffic in Mobile Ad Hoc Networks. - Alvin Jason A. Virata, Enrique Festijo:
Identity Verification through Face Recognition Implemented on Raspberry Pi Framework. - Yassine El Khanboubi, Mostafa Hanoune:
Exploiting Blockchains to improve Data Upload and Storage in the Cloud. - Priyang Prakashchandra Bhatt, Bhaskar V. Thakker:
Mass Removal of Botnet Attacks Using Heterogeneous Ensemble Stacking PROSIMA classifier in IoT. - Salim El Khediri, Rehan Ullah Khan, Waleed Albattah:
An optimal clustering algorithm based distance-aware routing protocol for wireless sensor networks. - Febrian Wahyu Christanto, Susanto, Agus Priyanto:
LOAD BALANCING-FAILOVER METHODS USING STATIC ROUTE WITH ADDRESS LIST, ECMP, PCC, AND NTH FOR OPTIMIZING LAN NETWORK : A COMPARISON. - Doan Perdana, Muhammad Imadudin, Gustommy Bisono:
Performance Evaluation of Soil Substance Measurement System in Garlic Plant based on Internet of Things with Mesh Topology Network Scenario. - May A. Alotaibi, Mohammed A. Alzain, Ben Soh, Mehedi Masud, Jehad F. Al-Amri:
Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection.
- Ali M. A. Abuagoub:
IoT Security Evolution: Challenges and Countermeasures Review. - Jhon Francined Herrera Cubides, Paulo Alonso Gaona-García, Carlos Enrique Montenegro-Marín, Diego Mauricio Cataño, Rubén González Crespo:
Security Aspects in Web of Data Based on Trust Principles. A brief of Literature Review. - Nur Fasihah Mohd Esa, Shekh Faisal Abdul-Latip, Mohd Rizuan Baharon:
A Survey of ARX-based Symmetric-key Primitives.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.