Search dblp for Publications

export results for "stream:streams/journals/ijcnis:"

 download as .bib file

@article{DBLP:journals/ijcnis/AA23,
  author       = {Suganya. A and
                  S. L. Aarthy},
  title        = {Alzheimer's And Parkinson's Disease Classification Using Deep Learning
                  Based On {MRI:} {A} Review},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1s},
  pages        = {9--21},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v14i1s.5588},
  doi          = {10.17762/IJCNIS.V14I1S.5588},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Aravindhan23,
  author       = {M. R. Tamjis Surendar Aravindhan},
  title        = {Leaf Disease Detection by Using Convolutional Pretrained Model},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1s},
  pages        = {114--120},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v14i1s.5619},
  doi          = {10.17762/IJCNIS.V14I1S.5619},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Aravindhan23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BSD23,
  author       = {Arulmozhi. B and
                  J. I. Sheeba and
                  S. Pradeep Devaneyan},
  title        = {A Review of Blockchain Technology Based Techniques to Preserve Privacy
                  and to Secure for Electronic Health Records},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1s},
  pages        = {177--188},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v14i1s.5641},
  doi          = {10.17762/IJCNIS.V14I1S.5641},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BSD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Ernawan23,
  author       = {Chandra Wijaya Fibria Indriati Yana Ernawan},
  title        = {Application of Internet of Things to Ensure Improved Performance within
                  the Internal Supply Chain Unit of an Organization},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1s},
  pages        = {121--135},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v14i1s.5620},
  doi          = {10.17762/IJCNIS.V14I1S.5620},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Ernawan23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GoparajuR23,
  author       = {Bhargavi Goparaju and
                  Bandla Sreenivasa Rao},
  title        = {A DDoS Attack Detection using {PCA} Dimensionality Reduction and Support
                  Vector Machine},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1s},
  pages        = {1--8},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v14i1s.5586},
  doi          = {10.17762/IJCNIS.V14I1S.5586},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GoparajuR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Kim23,
  author       = {Deageon Kim},
  title        = {Research On Text Classification Based On Deep Neural Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1s},
  pages        = {100--113},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v14i1s.5618},
  doi          = {10.17762/IJCNIS.V14I1S.5618},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Kim23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KuAS23,
  author       = {V. T. Ram Pavan Ku and
                  M. Arulselvi and
                  K. B. S. Sastry},
  title        = {An Optimized Deep Learning Based Optimization Algorithm for the Detection
                  of Colon Cancer Using Deep Recurrent Neural Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1s},
  pages        = {22--36},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v14i1s.5589},
  doi          = {10.17762/IJCNIS.V14I1S.5589},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KuAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/NagalaxmiRC23,
  author       = {T. Nagalaxmi and
                  E. Sreenivasa Rao and
                  P. Chandrasekhar},
  title        = {Design and Performance Analysis of Low Latency Routing Algorithm based
                  NoC for MPSoC},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1s},
  pages        = {37--53},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v14i1s.5590},
  doi          = {10.17762/IJCNIS.V14I1S.5590},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/NagalaxmiRC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/NarayanaR23,
  author       = {Ranga Narayana and
                  G. Venkateswara Rao},
  title        = {A Grey Wolf Intelligence based Recognition of Human-Action in Low
                  Resolution Videos with Minimal Processing Time},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1s},
  pages        = {91--99},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v14i1s.5597},
  doi          = {10.17762/IJCNIS.V14I1S.5597},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/NarayanaR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RaoKRNB23,
  author       = {Nelapati Ananda Rao and
                  Lalitha Bhavani Konkyana and
                  Vysyaraju Lokesh Raju and
                  M. S. R. Naidu and
                  Chukka Ramesh Babu},
  title        = {A Broadband Meta surface Based {MIMO} Antenna with High Gain and Isolation
                  For 5G Millimeter Wave Applications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1s},
  pages        = {54--66},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v14i1s.5592},
  doi          = {10.17762/IJCNIS.V14I1S.5592},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RaoKRNB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SatyanarayanaDR23,
  author       = {S. K. Satyanarayana and
                  Lavadya Nirmala Devi and
                  A. Nageswar Rao},
  title        = {{MPIGA} - Multipath Selection Using Improved Genetic Algorithm},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1s},
  pages        = {67--78},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v14i1s.5595},
  doi          = {10.17762/IJCNIS.V14I1S.5595},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SatyanarayanaDR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TejasreeC23,
  author       = {S. Tejasree and
                  B. Chandramohan},
  title        = {Hybrid Multi Attribute Relation Method for Document Clustering for
                  Information Mining},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1s},
  pages        = {79--90},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v14i1s.5596},
  doi          = {10.17762/IJCNIS.V14I1S.5596},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TejasreeC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/WarisK23,
  author       = {Saiyed Faiayaz Waris and
                  S. Koteeswaran},
  title        = {An Investigation on Disease Diagnosis and Prediction by Using Modified
                  K-Mean clustering and Combined {CNN} and {ELM} Classification Techniques},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1s},
  pages        = {167--176},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v14i1s.5639},
  doi          = {10.17762/IJCNIS.V14I1S.5639},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/WarisK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AbdulaalSP22,
  author       = {Alaa Hussein Abdulaal and
                  A. F. M. Shahen Shah and
                  Al{-}Sakib Khan Pathan},
  title        = {{NM-LEACH:} {A} Novel Modified {LEACH} Protocol to Improve Performance
                  in {WSN}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i1.5127},
  doi          = {10.17762/IJCNIS.V14I1.5127},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbdulaalSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AgarwalH22,
  author       = {Himanshu Agarwal and
                  Farooq Husain},
  title        = {Protecting Ownership Rights of Videos Against Digital Piracy: An Efficient
                  Digital Watermarking Scheme},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.4945},
  doi          = {10.17762/IJCNIS.V13I2.4945},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AgarwalH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlDaraisehCOTT22,
  author       = {Ahmad A. Al{-}Daraiseh and
                  Rasel Chowdhury and
                  Hakima Ould{-}Slimane and
                  Chamseddine Talhi and
                  Mohammad Bany Taha},
  title        = {Lightweight Scheme for Smart Home Environments using Offloading Technique},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i1.5065},
  doi          = {10.17762/IJCNIS.V14I1.5065},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlDaraisehCOTT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlShabi22,
  author       = {Mohammed Al{-}Shabi},
  title        = {Performance Ameliorations of {AODV} by Black Hole Attack Detection
                  Utilizing {IDSAODV} as Well as Reverse {AODV}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {99--110},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5483},
  doi          = {10.17762/IJCNIS.V14I2.5483},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlShabi22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlabdulrazzaqA22,
  author       = {Haneen Khalid Alabdulrazzaq and
                  Mohammed N. Alenezi},
  title        = {Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish,
                  Twofish, and Threefish},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i1.5262},
  doi          = {10.17762/IJCNIS.V14I1.5262},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlabdulrazzaqA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AleneziA22,
  author       = {Mohammed N. Alenezi and
                  Fawaz S. Al{-}Anzi},
  title        = {A Study of Z-Transform Based Encryption Algorithm},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.5052},
  doi          = {10.17762/IJCNIS.V13I2.5052},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AleneziA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlhusenatAH22,
  author       = {Ahmad Y. Alhusenat and
                  Abdallah Y. Alma'aitah and
                  Khaled F. Hayajneh},
  title        = {Matching Subcarrier Resource Allocation and Offloading Decision},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.4956},
  doi          = {10.17762/IJCNIS.V13I2.4956},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlhusenatAH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Alhussain22,
  author       = {Thamer Alhussain},
  title        = {An Energy-Efficient Scheme for IoT Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.4934},
  doi          = {10.17762/IJCNIS.V13I2.4934},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Alhussain22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Aljarrah22,
  author       = {Inad A. Aljarrah},
  title        = {Effect of image degradation on performance of Convolutional Neural
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.4946},
  doi          = {10.17762/IJCNIS.V13I2.4946},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Aljarrah22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AljarrahA22,
  author       = {Inad A. Aljarrah and
                  Eman M. Alshare},
  title        = {Improved Residual Dense Network for Large Scale Super-Resolution via
                  Generative Adversarial Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i1.5221},
  doi          = {10.17762/IJCNIS.V14I1.5221},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AljarrahA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlleemaRCRCAK22,
  author       = {N. Noor Alleema and
                  Ramakrishnan Raman and
                  Fidel Castro{-}Cayllahua and
                  Vinod Motiram Rathod and
                  Juan Carlos Cotrina{-}Aliaga and
                  Supriya Sanjay Ajagekar and
                  Reshma Ramakant Kanse},
  title        = {Security of Big Data over IoT Environment by Integration of Deep Learning
                  and Optimization},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {203--221},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5510},
  doi          = {10.17762/IJCNIS.V14I2.5510},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlleemaRCRCAK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Alqhatani22,
  author       = {Mohammed A Alqhatani},
  title        = {Machine Learning Techniques for Malware Detection with Challenges
                  and Future Directions},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.5047},
  doi          = {10.17762/IJCNIS.V13I2.5047},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Alqhatani22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlsaqourMAAA22,
  author       = {Raed A. Alsaqour and
                  Ahmed Majrashi and
                  Mohammed Alreedi and
                  Khalid Alomar and
                  Maha S. Abdelhaq},
  title        = {Defense in Depth: Multilayer of security},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.4951},
  doi          = {10.17762/IJCNIS.V13I2.4951},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlsaqourMAAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AmudaOSA22,
  author       = {Olarotimi Kabir Amuda and
                  Akinyemi Bodunde Odunola and
                  Mistura Laide Sanni and
                  Ganiyu Adesola Aderounmu},
  title        = {A predictive User behaviour analytic Model for Insider Threats in
                  Cyberspace},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i1.5208},
  doi          = {10.17762/IJCNIS.V14I1.5208},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AmudaOSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ArfaouiBM22,
  author       = {Siham Arfaoui and
                  Abdelhamid Belmekki and
                  Abdellatif Mezrioui},
  title        = {A Privacy by Design Methodology Application in Telecom Domain},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.4926},
  doi          = {10.17762/IJCNIS.V13I2.4926},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ArfaouiBM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Ariff22,
  author       = {Nor Azman Mat Ariff},
  title        = {Ensemble Method for Mobile Malware Detection using N-Gram Sequences
                  of System Calls},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.4937},
  doi          = {10.17762/IJCNIS.V13I2.4937},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Ariff22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AroraSKPVT22,
  author       = {Gopal Arora and
                  Munish Sabharwal and
                  Pooja Kapila and
                  Divya Paikaray and
                  Vipul Vekariya and
                  Narmadha T},
  title        = {Deep Residual Adaptive Neural Network Based Feature Extraction for
                  Cognitive Computing with Multimodal Sentiment Sensing and Emotion
                  Recognition Process},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {189--202},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5507},
  doi          = {10.17762/IJCNIS.V14I2.5507},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AroraSKPVT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AwasthiMJPSG22,
  author       = {Aishwary Awasthi and
                  T. R. Mahesh and
                  Rutvij Joshi and
                  Arvind Kumar Pandey and
                  Rini Saxena and
                  Subhashish Goswami},
  title        = {Smart Grid Sensor Monitoring Based on Deep Learning Technique with
                  Control System Management in Fault Detection},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {123--137},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5600},
  doi          = {10.17762/IJCNIS.V14I3.5600},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AwasthiMJPSG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BatyhaJRLON22,
  author       = {Radwan M. Batyha and
                  S. Janani and
                  S. G. Hymlin Rose and
                  Yanina Gallardo Lolandes and
                  Geovanny Genaro Reivan Ortiz and
                  Shahista Navaz},
  title        = {Cyclostationary Algorithm for Signal Analysis in Cognitive 4G Networks
                  with Spectral Sensing and Resource Allocation},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {47--58},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5570},
  doi          = {10.17762/IJCNIS.V14I3.5570},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BatyhaJRLON22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BhatiaGK22,
  author       = {Vaneet Kaur Bhatia and
                  Akshay Girdhar and
                  Sawtantar Singh Khurmi},
  title        = {Gaussian functional shapes-based type-II fuzzy membership-based cluster
                  protocol for energy harvesting IoT networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.4901},
  doi          = {10.17762/IJCNIS.V13I2.4901},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BhatiaGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BhattSRSPB22,
  author       = {Rahul Bhatt and
                  Rishi Shikka and
                  Manjunath C. R and
                  SSPM Sharma and
                  Arvind Kumar Pandey and
                  Kiran Bala},
  title        = {Centralized Cloud Service Providers in Improving Resource Allocation
                  and Data Integrity by 4G IoT Paradigm},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {138--149},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5601},
  doi          = {10.17762/IJCNIS.V14I3.5601},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BhattSRSPB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/CastroCayllahuaCDIRC22,
  author       = {Fidel Castro{-}Cayllahua and
                  Juan Luis Meza Carhuancho and
                  Carlos Mario Fern{\'{a}}ndez D{\'{\i}}az and
                  Zoila Mercedes Collantes Inga and
                  Tariq Rasheed and
                  Juan Carlos Cotrina{-}Aliaga},
  title        = {Autonomous Underwater Vehicle: 5G Network Design and Simulation Based
                  on Mimetic Technique Control System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {1--15},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5566},
  doi          = {10.17762/IJCNIS.V14I3.5566},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/CastroCayllahuaCDIRC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Chandrakar22,
  author       = {Ila Chandrakar},
  title        = {Improved Technique for Preserving Privacy while Mining Real Time Big
                  Data},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i1.5187},
  doi          = {10.17762/IJCNIS.V14I1.5187},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Chandrakar22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ChenniappanadarSSK22,
  author       = {Santhosh Kumar Chenniappanadar and
                  Gnanamurthy Sundharamurthy and
                  Vinoth Kumar Sakthivelu and
                  Vishnu Kumar Kaliappan},
  title        = {A Supervised Machine Learning Based Intrusion Detection Model for
                  Detecting Cyber-Attacks Against Computer System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {16--25},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5567},
  doi          = {10.17762/IJCNIS.V14I3.5567},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ChenniappanadarSSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ChibaAAM22,
  author       = {Zouhair Chiba and
                  Moulay Seddiq El Kasmi Alaoui and
                  Noreddine Abghour and
                  Khalid Moussaid},
  title        = {Automatic Building of a Powerful {IDS} for The Cloud Based on Deep
                  Neural Network by Using a Novel Combination of Simulated Annealing
                  Algorithm and Improved Self- Adaptive Genetic Algorithm},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i1.5264},
  doi          = {10.17762/IJCNIS.V14I1.5264},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ChibaAAM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/DeshmukhR22,
  author       = {Sneha R. Deshmukh and
                  Vijay T. Raisinghani},
  title        = {A Survey on Congestion Control Protocols for CoAP},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {111--123},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5484},
  doi          = {10.17762/IJCNIS.V14I2.5484},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/DeshmukhR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/DeviSLS22,
  author       = {Lanka Madhavi Devi and
                  C. Subbarao and
                  Boppana Swathi Lakshmi and
                  T. Sushma},
  title        = {Multiple Slot Fractal Structured Antenna for Wi-Fi and Radio Altimeter
                  for uncertain Applications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {1--14},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5456},
  doi          = {10.17762/IJCNIS.V14I2.5456},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/DeviSLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ElYahyaouiO22,
  author       = {Ahmed El{-}Yahyaoui and
                  Fouzia Omary},
  title        = {A Like {ELGAMAL} Cryptosystem But Resistant To Post-Quantum Attacks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i1.5180},
  doi          = {10.17762/IJCNIS.V14I1.5180},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ElYahyaouiO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/FirdausK22,
  author       = {Muhammad Yus Firdaus and
                  Mustofa Kamil},
  title        = {Climate Change Analysis Based on Satellite Multispectral Image Processing
                  in Feature Selection Using Reinforcement Learning},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {261--272},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5520},
  doi          = {10.17762/IJCNIS.V14I2.5520},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/FirdausK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GargSBSBB22,
  author       = {Meenakshi Garg and
                  Sachin Sharma and
                  Vincent Balu and
                  Deepak K. Sinha and
                  Pujita Bhatt and
                  Akash Kumar Bhagat},
  title        = {Underwater Acoustic Sensor Network Data Optimization with Enhanced
                  Void Avoidance and Routing Protocol},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {150--162},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5602},
  doi          = {10.17762/IJCNIS.V14I3.5602},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GargSBSBB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GoswamiC22,
  author       = {Hemangi Goswami and
                  Hiten Choudhury},
  title        = {Security of IoT in 5G Cellular Networks: {A} Review of Current Status,
                  Challenges and Future Directions},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.4955},
  doi          = {10.17762/IJCNIS.V13I2.4955},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GoswamiC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GuptaJRHCG22,
  author       = {Neeraj Gupta and
                  S. Janani and
                  Dilip R and
                  Ravi Hosur and
                  Abhay Chaturvedi and
                  Ankur Gupta},
  title        = {Wearable Sensors for Evaluation Over Smart Home Using Sequential Minimization
                  Optimization-based Random Forest},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {179--188},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5499},
  doi          = {10.17762/IJCNIS.V14I2.5499},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GuptaJRHCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/HamarshehDADB22,
  author       = {Qadri Hamarsheh and
                  Omar Rawhi Daoud and
                  Marwan Al{-}Akaidi and
                  Ahlam Damati and
                  Mohammed Baniyounis},
  title        = {Robust Vehicular Communications Using the Fast-Frequency-Hopping-OFDM
                  Technology and the {MIMO} Spatial Multiplexing},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i1.5216},
  doi          = {10.17762/IJCNIS.V14I1.5216},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/HamarshehDADB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/HermawanPK22,
  author       = {Dadang Hermawan and
                  Ni Made Dewi Kansa Putri and
                  Lucky Kartanto},
  title        = {Cyber Physical System Based Smart Healthcare System with Federated
                  Deep Learning Architectures with Data Analytics},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {222--233},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5513},
  doi          = {10.17762/IJCNIS.V14I2.5513},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/HermawanPK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/IkididFS22,
  author       = {Abdelouafi Ikidid and
                  Abdelaziz El Fazziki and
                  Mohamed Sadgal},
  title        = {A multi-agent Framework for dynamic traffic management Considering
                  Priority Link},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.4977},
  doi          = {10.17762/IJCNIS.V13I2.4977},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/IkididFS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/JamaKS22,
  author       = {Abdirisaq Jama and
                  Othman O. Khalifa and
                  Nantha Kumar Subramaniam},
  title        = {Novel Approach for {IP-PBX} Denial of Service Intrusion Detection
                  Using Support Vector Machine Algorithm},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.4967},
  doi          = {10.17762/IJCNIS.V13I2.4967},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/JamaKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/JoshiPASSR22,
  author       = {Rutvij Joshi and
                  Arvind Kumar Pandey and
                  Aarju and
                  Arjun Singh and
                  Pooran Singh and
                  Chandramma R},
  title        = {Energy Aware Channel Allocation with Spectrum Sensing in Pilot Contamination
                  Analysis for Cognitive Radio Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {226--238},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5608},
  doi          = {10.17762/IJCNIS.V14I3.5608},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/JoshiPASSR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KCSCVC22,
  author       = {Priyadarsini K and
                  Sri Lakshmi Chandana and
                  Severo Sim{\'{o}}n Calder{\'{o}}n Samaniego and
                  Megha Gupta Chaudhary and
                  Vipul Vekariya and
                  Abhay Chaturvedi},
  title        = {Intelligent Mobile Edge Computing Integrated with Blockchain Security
                  Analysis for Millimetre-Wave Communication},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {100--122},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5577},
  doi          = {10.17762/IJCNIS.V14I3.5577},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KCSCVC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KeserwaniRKJRRG22,
  author       = {Hitesh Keserwani and
                  Himanshu Rastogi and
                  Ardhariksa Zukhruf Kurniullah and
                  Sushil Kumar Janardan and
                  Ramakrishnan Raman and
                  Vinod Motiram Rathod and
                  Ankur Gupta},
  title        = {Security Enhancement by Identifying Attacks Using Machine Learning
                  for 5G Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {124--141},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5494},
  doi          = {10.17762/IJCNIS.V14I2.5494},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KeserwaniRKJRRG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KhanboubiHG22,
  author       = {Yassine El Khanboubi and
                  Mostafa Hanoune and
                  Mohamed El Ghazouani},
  title        = {A New Data Deletion Scheme for a Blockchain-based De-duplication System
                  in the Cloud},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.4975},
  doi          = {10.17762/IJCNIS.V13I2.4975},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KhanboubiHG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KiranRR22,
  author       = {K. Uday Kiran and
                  K. S. Ramesh and
                  S. Koteswara Rao},
  title        = {Adaptive And Reliable {GPS} Uncertain Position Estimation an Insightful
                  Oceanography and Geography Applications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {83--98},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5481},
  doi          = {10.17762/IJCNIS.V14I2.5481},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KiranRR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KourGSSVK22,
  author       = {Kushnian Kour and
                  Subhashish Goswami and
                  Meenakshi Sharma and
                  P. Thiruvannamalai SivaSankar and
                  Vipul Vekariya and
                  Alka Kumari},
  title        = {Honeynet Implementation in Cyber Security Attack Prevention with Data
                  Monitoring System Using {AI} Technique and IoT 4G Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {163--175},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5603},
  doi          = {10.17762/IJCNIS.V14I3.5603},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KourGSSVK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/LaptievTMKOKP22,
  author       = {Oleksandr Laptiev and
                  Volodymyr Tkachev and
                  Oleksii Maystrov and
                  Oleksandr Krasikov and
                  Pavlo Open'ko and
                  Volodimir Khoroshko and
                  Lubomir Parkhuts},
  title        = {The method of spectral analysis of the determination of random digital
                  signals},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.5008},
  doi          = {10.17762/IJCNIS.V13I2.5008},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/LaptievTMKOKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/LiraKRKMC22,
  author       = {Luis Alberto N{\'{u}}{\~{n}}ez Lira and
                  Kukati Aruna Kumari and
                  Ramakrishnan Raman and
                  Ardhariksa Zukhruf Kurniullah and
                  Santiago Aquiles Gallarday Morales and
                  Tula Del Carmen Espinoza Cordero},
  title        = {Data Security Enhancement in 4G Vehicular Networks Based on Reinforcement
                  Learning for Satellite Edge Computing},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {59--72},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5571},
  doi          = {10.17762/IJCNIS.V14I3.5571},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/LiraKRKMC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MPSIK22,
  author       = {Ranjani M and
                  Unggul Priyadi and
                  Anas A. Salameh and
                  Mochamad Ali Imron and
                  Kakarla Hari Kishore},
  title        = {Cloud Computing Based Computing System for Women's Higher Education
                  in Isolated Areas},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {26--35},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5568},
  doi          = {10.17762/IJCNIS.V14I3.5568},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MPSIK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MaheshGSSKK22,
  author       = {T. R. Mahesh and
                  Tanmay Goswami and
                  Srinivasan Sriramulu and
                  Neeraj Sharma and
                  Alka Kumari and
                  Ganesh Khekare},
  title        = {Cognitive Based Attention Deficit Hyperactivity Disorder Detection
                  with Ability Assessment Using Auto Encoder Based Hidden Markov Model},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {53--65},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5464},
  doi          = {10.17762/IJCNIS.V14I2.5464},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MaheshGSSKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MalkawiMZ22,
  author       = {Mohammad Malkawi and
                  Wail Mardini and
                  Toqa' Abu Zaitoun},
  title        = {Auto Signature Verification Using Line Projection Features Combined
                  With Different Classifiers and Selection Methods},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.5027},
  doi          = {10.17762/IJCNIS.V13I2.5027},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MalkawiMZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MansouriC22,
  author       = {Sofiene Mansouri and
                  Souhir Chabchoub},
  title        = {Emotion Detection Based on {EEG} Signal Processing by Body Sensor
                  5G Networks Using Deep Learning Architectures},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {123--132},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5576},
  doi          = {10.17762/IJCNIS.V14I3.5576},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MansouriC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MarandiDBGRB22,
  author       = {Arun Kumar Marandi and
                  Richa Dogra and
                  Rahul Bhatt and
                  Rajesh Gupta and
                  Somashekar Reddy and
                  Amit Barve},
  title        = {Generative Boltzmann Adversarial Network in Manet Attack Detection
                  and {QOS} Enhancement with Latency},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {199--213},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5606},
  doi          = {10.17762/IJCNIS.V14I3.5606},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MarandiDBGRB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MarandiJRGSS22,
  author       = {Arun Kumar Marandi and
                  Gordhan Jethava and
                  A. Rajesh and
                  Sachin Gupta and
                  Shrddha Sagar and
                  Sonia Sharma},
  title        = {Cognitive Computing for Multimodal Sentiment Sensing and Emotion Recognition
                  Fusion Based on Machine Learning Techniques Implemented by Computer
                  Interface System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {15--32},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5462},
  doi          = {10.17762/IJCNIS.V14I2.5462},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MarandiJRGSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MohammedVYLKT22,
  author       = {Mohialdeen Mustafa Mohammed and
                  Zaika Viktor and
                  Khlaponin Yurii and
                  Berkman Lyubov and
                  Polonskyi Konstiantyn and
                  Oleksandr Leonidovich Turovsky},
  title        = {Methods for assessing the impact of bandwidth of control channels
                  on the quality of telecommunications networks in the transmission
                  of data packets of different types},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.5034},
  doi          = {10.17762/IJCNIS.V13I2.5034},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MohammedVYLKT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MohanKK22,
  author       = {C. Leela Mohan and
                  K. Sarat Kumar and
                  Korada Chinnari Sri Kavya},
  title        = {Performance Exploration of Uncertain {RF} {MEMS} Switch Design with
                  Uniform Meanders},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {66--82},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5480},
  doi          = {10.17762/IJCNIS.V14I2.5480},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MohanKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MonirM22,
  author       = {Marvy Badr Monir and
                  Amr Ayman Mohamed},
  title        = {Energy Aware Routing for Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i1.5215},
  doi          = {10.17762/IJCNIS.V14I1.5215},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MonirM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Monowar22,
  author       = {Muhammad Mostafa Monowar},
  title        = {{TRW-MAC:} {A} thermal-aware receiver-driven wake-up radio enabled
                  duty cycle {MAC} protocol for multi-hop implantable wireless body
                  area networks in Internet of Things},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i1.5182},
  doi          = {10.17762/IJCNIS.V14I1.5182},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Monowar22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MubeenKTKND22,
  author       = {Suraya Mubeen and
                  Nandini Kulkarni and
                  Manuel R. Tanpoco and
                  R. Dinesh Kumar and
                  M. Lakshmu Naidu and
                  Tanuja Dhope},
  title        = {Linguistic Based Emotion Detection from Live Social Media Data Classification
                  Using Metaheuristic Deep Learning Techniques},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {176--186},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5604},
  doi          = {10.17762/IJCNIS.V14I3.5604},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MubeenKTKND22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/NaikwadiP22,
  author       = {Mudassar H. Naikwadi and
                  Kishor P. Patil},
  title        = {A Multi-dimensional Real World Spectrum Occupancy Data Measurement
                  and Analysis for Spectrum Inference in Cognitive Radio Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {244--260},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5516},
  doi          = {10.17762/IJCNIS.V14I2.5516},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/NaikwadiP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/NamHL22,
  author       = {Tran Sy Nam and
                  Van{-}Thuc Hoang and
                  Nguyen Van Long},
  title        = {A High-Throughput Hardware Implementation of {NAT} Traversal For {IPSEC}
                  {VPN}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i1.5260},
  doi          = {10.17762/IJCNIS.V14I1.5260},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/NamHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/OsamaREEM22,
  author       = {Islam Osama and
                  Mohamed Rihan and
                  Mohamed Elhefnawy and
                  Sami A. El{-}Dolil and
                  Hend Abd El{-}Azem Malhat},
  title        = {A review on Precoding Techniques For mm-Wave Massive {MIMO} Wireless
                  Systems},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i1.5206},
  doi          = {10.17762/IJCNIS.V14I1.5206},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/OsamaREEM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PaikarayCSGKJ22,
  author       = {Divya Paikaray and
                  Divyanshi Chhabra and
                  Sachin Sharma and
                  Sachin Goswami and
                  Shashikala H. K and
                  Gordhan Jethava},
  title        = {Energy Efficiency Based Load Balancing Optimization Routing Protocol
                  In 5G Wireless Communication Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {187--198},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5605},
  doi          = {10.17762/IJCNIS.V14I3.5605},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PaikarayCSGKJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PasaniR22,
  author       = {Chairil Faif Pasani and
                  Euis Eti Rohaeti},
  title        = {Industrial Cyber Blockchain Physical System for Microgrid in Data
                  Based Predictive Analysis for Automatic Control Analysis},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {234--243},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5514},
  doi          = {10.17762/IJCNIS.V14I2.5514},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PasaniR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PiesessaS22,
  author       = {Irwan Piesessa and
                  Benfano Soewito},
  title        = {Analysis of {BGP4} Peering Establishment Time on IPv6 Connection over
                  6PE and 6VPE},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.4772},
  doi          = {10.17762/IJCNIS.V13I2.4772},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PiesessaS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ReddyS22,
  author       = {Dhoma Harshavardhan Reddy and
                  N. Sirisha},
  title        = {Multifactor Authentication Key Management System based Security Model
                  Using Effective Handover Tunnel with {IPV6}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {273--284},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5521},
  doi          = {10.17762/IJCNIS.V14I2.5521},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ReddyS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RubaieiJS22,
  author       = {Mazoon Hashil Al Rubaiei and
                  Hothefa Shaker Jassim and
                  Baraa T. Sharef},
  title        = {Performance analysis of black hole and worm hole attacks in MANETs},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i1.5078},
  doi          = {10.17762/IJCNIS.V14I1.5078},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RubaieiJS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SeechurnMAP22,
  author       = {Nikheel Tashvin Seechurn and
                  Avinash Mungur and
                  Sheeba Armoogum and
                  Sameerchand Pudaruth},
  title        = {Issues and Challenges for Network Virtualisation},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.4990},
  doi          = {10.17762/IJCNIS.V13I2.4990},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SeechurnMAP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ShakirAH22,
  author       = {Dhifaf Talal Shakir and
                  Hassan Jassim Al{-}Qureshy and
                  Saad S. Hreshee},
  title        = {Performance Analysis of {MEMS} Based Oscillator for High Frequency
                  Wireless Communication Systems},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {86--98},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5574},
  doi          = {10.17762/IJCNIS.V14I3.5574},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ShakirAH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SharmaH22,
  author       = {Anamika Shukla Sharma and
                  H. S. Hota},
  title        = {{ECG} Analysis-Based Cardiac Disease Prediction Using Signal Feature
                  Selection with Extraction Based on {AI} Techniques},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {73--85},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5573},
  doi          = {10.17762/IJCNIS.V14I3.5573},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SharmaH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ShatnawiA22,
  author       = {Mohammed Q. Shatnawi and
                  Batool Alazzam},
  title        = {An Assessment of Eclipse Bugs' Priority and Severity Prediction Using
                  Machine Learning},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i1.5266},
  doi          = {10.17762/IJCNIS.V14I1.5266},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ShatnawiA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Silva22,
  author       = {Leandro Marcos da Silva},
  title        = {Early Identification of Abused Domains in {TLD} through Passive {DNS}
                  Applying Machine Learning Techniques},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i1.5256},
  doi          = {10.17762/IJCNIS.V14I1.5256},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Silva22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SowmyaSBVVW22,
  author       = {M. S. Sowmya and
                  S. S. P. M. Sharma and
                  Akash Kumar Bhagat and
                  Pooja Verma and
                  Sunny Verma and
                  Durgesh Wadhwa},
  title        = {Construction of Data Driven Decomposition Based Soft Sensors with
                  Auto Encoder Deep Neural Network for IoT Healthcare Applications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {142--154},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5495},
  doi          = {10.17762/IJCNIS.V14I2.5495},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SowmyaSBVVW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SuleimanSB22,
  author       = {Sani Makusidi Suleiman and
                  Dahiru Sani Shu'aibu and
                  Suleiman Aliyu Babale},
  title        = {Investigating the effect of High Altitude Platform Positioning on
                  Latency and Coverage of 4G Cellular Systems},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i1.5161},
  doi          = {10.17762/IJCNIS.V14I1.5161},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SuleimanSB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SuprajaSRAP22,
  author       = {P. Supraja and
                  Anas A. Salameh and
                  Varadaraju H. R and
                  M. Anand and
                  Unggul Priyadi},
  title        = {An Optimal Routing Protocol Using a Multiverse Optimizer Algorithm
                  for Wireless Mesh Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {36--46},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5569},
  doi          = {10.17762/IJCNIS.V14I3.5569},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SuprajaSRAP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TelloJMMS22,
  author       = {Alcides Bernardo Tello and
                  Shi Jie and
                  D. Manjunath and
                  Kusuma Kumari B. M and
                  Shabnam Sayyad},
  title        = {Cloud Computing Based Network Analysis in Smart Healthcare System
                  with Neural Network Architecture},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {269--279},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5622},
  doi          = {10.17762/IJCNIS.V14I3.5622},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TelloJMMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TelloXPPS22,
  author       = {Alcides Bernardo Tello and
                  Jiuhong Xing and
                  Aparna Lalitkumar Patil and
                  Lalitkumar Premchandra Patil and
                  Shabnam Sayyad},
  title        = {Blockchain Technologies in Healthcare System for Real Time Applications
                  Using IoT and Deep Learning Techniques},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {257--268},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5621},
  doi          = {10.17762/IJCNIS.V14I3.5621},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TelloXPPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TodingR22,
  author       = {Apriana Toding and
                  Muhammad Resha and
                  Askar Taliang and
                  Charnia Iradat Rapa and
                  Rismawaty Arunglabi},
  title        = {5G Technology in Smart Healthcare and Smart City Development Integration
                  with Deep Learning Architectures},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {99--109},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5575},
  doi          = {10.17762/IJCNIS.V14I3.5575},
  timestamp    = {Wed, 31 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TodingR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TurzhanovaTKS22,
  author       = {Karina Turzhanova and
                  Valery Tikhvinskiy and
                  Sergey Konshin and
                  Alexandr Solochshenko},
  title        = {Experimental Performance Evaluation of {NB-IOT} Deployment Modes in
                  Urban Area},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.4969},
  doi          = {10.17762/IJCNIS.V13I2.4969},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TurzhanovaTKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/VekariyaKGMMP22,
  author       = {Daxa Vekariya and
                  Mk Jayanthi Kannan and
                  Sachin Gupta and
                  P. Muthusamy and
                  Rohini Mahajan and
                  Arvind Kumar Pandey},
  title        = {Analysis of Computer Network Security Storage System Based on Cloud
                  Computing Environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {33--52},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5463},
  doi          = {10.17762/IJCNIS.V14I2.5463},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/VekariyaKGMMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/VekariyaKGMMP22a,
  author       = {Daxa Vekariya and
                  Mk Jayanthi Kannan and
                  Sachin Gupta and
                  P. Muthusamy and
                  Rohini Mahajan and
                  Arvind Kumar Pandey},
  title        = {Recommendation Model-Based 5G Network and Cognitive System of Cloud
                  Data with {AI} Technique in {IOMT} Applications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {239--256},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5609},
  doi          = {10.17762/IJCNIS.V14I3.5609},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/VekariyaKGMMP22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/VermaBBKGS22,
  author       = {Diksha Verma and
                  Sweta Kumari Barnwal and
                  Amit Barve and
                  M. K. Jayanthi Kannan and
                  Rajesh Gupta and
                  R. Swaminathan},
  title        = {Multimodal Sentiment Sensing and Emotion Recognition Based on Cognitive
                  Computing Using Hidden Markov Model with Extreme Learning Machine},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {155--167},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5496},
  doi          = {10.17762/IJCNIS.V14I2.5496},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/VermaBBKGS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/VictoriaMRWK22,
  author       = {A. Helen Victoria and
                  S. V. Manikanthan and
                  Varadaraju H. R and
                  Muhammad Alkirom Wildan and
                  Kakarla Hari Kishore},
  title        = {Radar Based Activity Recognition using {CNN-LSTM} Network Architecture},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {303--312},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5630},
  doi          = {10.17762/IJCNIS.V14I3.5630},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/VictoriaMRWK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/YadavSBSMA22,
  author       = {Ashok Kumar Yadav and
                  Bhanu Sharma and
                  Akash Kumar Bhagat and
                  Harshal Shah and
                  C. R. Manjunath and
                  Aishwary Awasthi},
  title        = {Edge Computing in Centralized Data Server Deployment for Network Qos
                  and Latency Improvement for Virtualization Environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {214--225},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5607},
  doi          = {10.17762/IJCNIS.V14I3.5607},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/YadavSBSMA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/YuwonoU22,
  author       = {Imam Yuwono and
                  Eviani Damastuti Utomo},
  title        = {Neurological Disorders Detection Based on Computer Brain Interface
                  Using Centralized Blockchain with Intrusion System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {168--178},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5498},
  doi          = {10.17762/IJCNIS.V14I2.5498},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/YuwonoU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ZagroubaA22,
  author       = {Rachid Zagrouba and
                  Reem Alhajri},
  title        = {Machine Learning based Attacks Detection and Countermeasures in IoT},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v13i2.4943},
  doi          = {10.17762/IJCNIS.V13I2.4943},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ZagroubaA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AbdellaouiF21,
  author       = {Sa{\^{\i}}d El Abdellaoui and
                  Youssef Fakhri},
  title        = {Power Management Strategies in Energy-Harvesting Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {1},
  year         = {2021},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4827},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbdellaouiF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Abouhogail21,
  author       = {Reham Abdellatif Abouhogail},
  title        = {Untraceable Authentication Protocol for IEEE802.11s Standard},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.5090},
  doi          = {10.17762/IJCNIS.V13I3.5090},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Abouhogail21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Abouhogail21a,
  author       = {Reham Abdellatif Abouhogail},
  title        = {Untraceable Authentication Protocol for IEEE802.11s Standard},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.5090},
  doi          = {10.54039/IJCNIS.V13I3.5090},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Abouhogail21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AbuzanounehH21,
  author       = {Khalil Ibrahim Mohammad Abuzanouneh and
                  Mohammed Hadwan},
  title        = {Multi-Stage Protection Using Pixel Selection Technique for Enhancing
                  Steganography},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {1},
  year         = {2021},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4907},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbuzanounehH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AhmadEA21,
  author       = {Marwa Ahmad and
                  Nameer N. El{-}Emam and
                  Ali F. Al{-}Azawi},
  title        = {Improved Deep Hiding/Extraction Algorithm to Enhance the Payload Capacity
                  and Security Level of Hidden Information},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.4759},
  doi          = {10.54039/IJCNIS.V13I3.4759},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AhmadEA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AhmadEA21a,
  author       = {Marwa Ahmad and
                  Nameer N. El{-}Emam and
                  Ali F. Al{-}Azawi},
  title        = {Improved Deep Hiding/Extraction Algorithm to Enhance the Payload Capacity
                  and Security Level of Hidden Information},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.4759},
  doi          = {10.17762/IJCNIS.V13I3.4759},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AhmadEA21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Al-AhmadAA21,
  author       = {Alaa' Al{-}Ahmad and
                  Omar Saad Almousa and
                  Qusai Abuein},
  title        = {Enhancing Steganography by Image Segmentation and Multi-level Deep
                  Hiding},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {1},
  year         = {2021},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4869},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Al-AhmadAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Al-ShqeeratA21,
  author       = {Khalil Al{-}Shqeerat and
                  Khalil Ibrahim Abuzanouneh},
  title        = {A Hybrid Graphical User Authentication Scheme in Mobile Cloud Computing
                  Environments},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {1},
  year         = {2021},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4890},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Al-ShqeeratA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Al-ZubiAS21,
  author       = {Hala Al{-}Zu'bi and
                  Osama Daifallah Al{-}Khaleel and
                  Ali M. Shatnawi},
  title        = {{FPGA} Implementation of Data Flow Graphs for Digital Signal Processing
                  Applications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {1},
  year         = {2021},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4928},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Al-ZubiAS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlRawashdehAM21,
  author       = {Rana Al{-}Rawashdeh and
                  Mohammad Al{-}Fawa'reh and
                  Wail Mardini},
  title        = {Enhanced Epileptic Seizure diagnosis using {EEG} Signals with Support
                  vector machine and Bagging Classifiers},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.5114},
  doi          = {10.54039/IJCNIS.V13I3.5114},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlRawashdehAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlRawashdehAM21a,
  author       = {Rana Al{-}Rawashdeh and
                  Mohammad Al{-}Fawa'reh and
                  Wail Mardini},
  title        = {Enhanced Epileptic Seizure diagnosis using {EEG} Signals with Support
                  vector machine and Bagging Classifiers},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.5114},
  doi          = {10.17762/IJCNIS.V13I3.5114},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlRawashdehAM21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlSarairehJ21,
  author       = {Ja'afer Al{-}Saraireh and
                  Haya Joudeh},
  title        = {An Efficient Authentication Scheme for Internet of Things},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.3422},
  doi          = {10.17762/IJCNIS.V13I3.3422},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlSarairehJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlShabi21,
  author       = {Mohammed Abdulhameed Al{-}Shabi},
  title        = {Design of a Network Intrusion Detection System Using Complex Deep
                  Neuronal Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.5148},
  doi          = {10.54039/IJCNIS.V13I3.5148},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlShabi21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlShabi21a,
  author       = {Mohammed Abdulhameed Al{-}Shabi},
  title        = {Design of a Network Intrusion Detection System Using Complex Deep
                  Neuronal Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.5148},
  doi          = {10.17762/IJCNIS.V13I3.5148},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlShabi21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlissaAADAAA21,
  author       = {Khalid Adnan Alissa and
                  Bashar A. Aldeeb and
                  Hanan A. Alshehri and
                  Shahad A. Dahdouh and
                  Basstaa M. Alsubaie and
                  Afnan M. Alghamdi and
                  Mutasem Alsmadi},
  title        = {Developing a simulated intelligent instrument to measure user behavior
                  toward cybersecurity policies},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {1},
  year         = {2021},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4923},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlissaAADAAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlzaqebahJMAA21,
  author       = {Malek Alzaqebah and
                  Sana Jawarneh and
                  Rami Mustafa A. Mohammad and
                  Mutasem K. Alsmadi and
                  Ibrahim Almarashdeh},
  title        = {Improved Multi-Verse Optimizer Feature Selection Technique With Application
                  To Phishing, Spam, and Denial Of Service Attacks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {1},
  year         = {2021},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4929},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlzaqebahJMAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BarakateAWMHH21,
  author       = {Ahmed Amine Barakate and
                  Rida Abdelmoumene and
                  Azeddine Wahbi and
                  Mohamed Maddi and
                  Laamari Hlou and
                  Abdelkader Hadjoudja},
  title        = {Modeling, Development and Analysis Performance of an Intelligent Control
                  of Photovoltaic System by Fuzzy Logic approach for Maximum Power Point
                  Tracking},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {1},
  year         = {2021},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4881},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BarakateAWMHH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BelavagiM21,
  author       = {Manjula C. Belavagi and
                  Balachandra Muniyal},
  title        = {Improved Intrusion Detection System using Quantal Response Equilibrium-based
                  Game Model and Rule-based Classification},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {1},
  year         = {2021},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4875},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BelavagiM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BorgohainBD21,
  author       = {Utpala Borgohain and
                  Surajit Borkotokey and
                  S. K. Deka},
  title        = {A Coalition Formation Game for Cooperative Spectrum Sensing in Cognitive
                  Radio Network under the Constraint of Overhead},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.5077},
  doi          = {10.17762/IJCNIS.V13I3.5077},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BorgohainBD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BorgohainBD21a,
  author       = {Utpala Borgohain and
                  Surajit Borkotokey and
                  S. K. Deka},
  title        = {A Coalition Formation Game for Cooperative Spectrum Sensing in Cognitive
                  Radio Network under the Constraint of Overhead},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.5077},
  doi          = {10.54039/IJCNIS.V13I3.5077},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BorgohainBD21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/CostaPG21,
  author       = {Wanderson L. Costa and
                  Ariel L. C. Portela and
                  Rafael Lopes Gomes},
  title        = {Features-Aware DDoS Detection in Heterogeneous Smart Environments
                  based on Fog and Cloud Computing},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.5080},
  doi          = {10.17762/IJCNIS.V13I3.5080},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/CostaPG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/CostaPG21a,
  author       = {Wanderson L. Costa and
                  Ariel L. C. Portela and
                  Rafael Lopes Gomes},
  title        = {Features-Aware DDoS Detection in Heterogeneous Smart Environments
                  based on Fog and Cloud Computing},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.5080},
  doi          = {10.54039/IJCNIS.V13I3.5080},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/CostaPG21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/DegamburMAP21,
  author       = {Lavanya{-}Nehan Degambur and
                  Avinash Mungur and
                  Sheeba Armoogum and
                  Sameerchand Pudaruth},
  title        = {Resource Allocation in 4G and 5G Networks: {A} Review},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.5116},
  doi          = {10.17762/IJCNIS.V13I3.5116},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/DegamburMAP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/DegamburMAP21a,
  author       = {Lavanya{-}Nehan Degambur and
                  Avinash Mungur and
                  Sheeba Armoogum and
                  Sameerchand Pudaruth},
  title        = {Resource Allocation in 4G and 5G Networks: {A} Review},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.5116},
  doi          = {10.54039/IJCNIS.V13I3.5116},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/DegamburMAP21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ElYahyaouiO21,
  author       = {Ahmed El{-}Yahyaoui and
                  Fouzia Omary},
  title        = {An improved Framework for Biometric Database's privacy},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.5143},
  doi          = {10.54039/IJCNIS.V13I3.5143},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ElYahyaouiO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ElYahyaouiO21a,
  author       = {Ahmed El{-}Yahyaoui and
                  Fouzia Omary},
  title        = {An improved Framework for Biometric Database's privacy},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.5143},
  doi          = {10.17762/IJCNIS.V13I3.5143},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ElYahyaouiO21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Husin21,
  author       = {Husna Sarirah Husin},
  title        = {Preventing data leakage by securing chat session with randomized session
                  {ID}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.5029},
  doi          = {10.54039/IJCNIS.V13I3.5029},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Husin21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Husin21a,
  author       = {Husna Sarirah Husin},
  title        = {Preventing data leakage by securing chat session with randomized session
                  {ID}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.5029},
  doi          = {10.17762/IJCNIS.V13I3.5029},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Husin21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KS21,
  author       = {Srinivas K and
                  Srinivasulu Tadisetty},
  title        = {Design and Development of Novel Hybrid Precoder for Millimeter-Wave
                  {MIMO} System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.5096},
  doi          = {10.54039/IJCNIS.V13I3.5096},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KS21a,
  author       = {Srinivas K and
                  Srinivasulu Tadisetty},
  title        = {Design and Development of Novel Hybrid Precoder for Millimeter-Wave
                  {MIMO} System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.5096},
  doi          = {10.17762/IJCNIS.V13I3.5096},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KS21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KatukC21,
  author       = {Norliza Katuk and
                  Ikenna Rene Chiadighikaobi},
  title        = {An Enhanced Block Pre-processing of {PRESENT} Algorithm for Fingerprint
                  Template Encryption in the Internet of Things Environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.5101},
  doi          = {10.17762/IJCNIS.V13I3.5101},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KatukC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KatukC21a,
  author       = {Norliza Katuk and
                  Ikenna Rene Chiadighikaobi},
  title        = {An Enhanced Block Pre-processing of {PRESENT} Algorithm for Fingerprint
                  Template Encryption in the Internet of Things Environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.5101},
  doi          = {10.54039/IJCNIS.V13I3.5101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KatukC21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KremenetskaMBLRV21,
  author       = {Yana Kremenetska and
                  Anatoliy Makarenko and
                  Andrii Bereznyuk and
                  Serhii Lazebnyi and
                  Natalia Rudenko and
                  Olexander Vlasov},
  title        = {High-Altitude Configuration of Non-Terrestrial Telecommunication Network
                  using Optical Wireless Technologies},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.5263},
  doi          = {10.54039/IJCNIS.V13I3.5263},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KremenetskaMBLRV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KremenetskaMBLRV21a,
  author       = {Yana Kremenetska and
                  Anatoliy Makarenko and
                  Andrii Bereznyuk and
                  Serhii Lazebnyi and
                  Natalia Rudenko and
                  Olexander Vlasov},
  title        = {High-Altitude Configuration of Non-Terrestrial Telecommunication Network
                  using Optical Wireless Technologies},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.5263},
  doi          = {10.17762/IJCNIS.V13I3.5263},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KremenetskaMBLRV21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/LaptievSKASSB21,
  author       = {Oleksandr Laptiev and
                  Vitalii Savchenko and
                  Andrii Kotenko and
                  Volodimir Akhramovych and
                  Vladimir Samosyuk and
                  German Shuklin and
                  Anatjliy Biehun},
  title        = {Method of Determining Trust and Protection of Personal Data in Social
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {1},
  year         = {2021},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4882},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/LaptievSKASSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/LaptievSPALKH21,
  author       = {Oleksandr Laptiev and
                  Vitalii Savchenko and
                  Andrii Pravdyvyi and
                  Ivan Ablazov and
                  Rostyslav Lisnevsky and
                  Oleksandr Koloss and
                  Viktor Hudyma},
  title        = {Method of Detecting Radio Signals using Means of Covert by Obtaining
                  Information on the basis of Random Signals Model},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {1},
  year         = {2021},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4902},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/LaptievSPALKH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/LaptievYHDIFH21,
  author       = {Oleksandr Laptiev and
                  Serhii Yevseiev and
                  Larysa Hatsenko and
                  Olena Daki and
                  Vitaliy Ivanenko and
                  Valery Fedunov and
                  Spartak Hohoniants},
  title        = {The method of discretization signals to minimize the fallibility of
                  information recovery},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.5070},
  doi          = {10.17762/IJCNIS.V13I3.5070},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/LaptievYHDIFH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/LaptievYHDIFH21a,
  author       = {Oleksandr Laptiev and
                  Serhii Yevseiev and
                  Larysa Hatsenko and
                  Olena Daki and
                  Vitaliy Ivanenko and
                  Valery Fedunov and
                  Spartak Hohoniants},
  title        = {The method of discretization signals to minimize the fallibility of
                  information recovery},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.5070},
  doi          = {10.54039/IJCNIS.V13I3.5070},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/LaptievYHDIFH21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Mahmoud21,
  author       = {Hanan A. Hosni Mahmoud},
  title        = {A Low Power Architectural Framework for Automated Surveillance System
                  with Low Bit Rate Transmission},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {1},
  year         = {2021},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4424},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Mahmoud21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MahmoudGES21,
  author       = {Essraa Hesham Mahmoud and
                  Mohammed S. Gadelrab and
                  Khaled Elsayed and
                  Abdel Rahman Sallam},
  title        = {Modelling Multilayer Communication Channel in Terahertz Band for Medical
                  Applications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.5041},
  doi          = {10.54039/IJCNIS.V13I3.5041},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MahmoudGES21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MahmoudGES21a,
  author       = {Essraa Hesham Mahmoud and
                  Mohammed S. Gadelrab and
                  Khaled Elsayed and
                  Abdel Rahman Sallam},
  title        = {Modelling Multilayer Communication Channel in Terahertz Band for Medical
                  Applications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.5041},
  doi          = {10.17762/IJCNIS.V13I3.5041},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MahmoudGES21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MalkawiAS21,
  author       = {Mohammad Malkawi and
                  Khaldoon Al{-}Zoubi and
                  Ahmed Shatnawi},
  title        = {Quasi Real-Time Intermodulation Interference Method: Analysis and
                  Performance},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {1},
  year         = {2021},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4924},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MalkawiAS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MeddebMA21,
  author       = {Nesrine Meddeb and
                  Amel Meddeb{-}Makhlouf and
                  Mohamed Ali Ben Ayed},
  title        = {Secure and Efficient Video Transmission in {VANET}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {1},
  year         = {2021},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4888},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MeddebMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MohsenHA21,
  author       = {Duhaq Ehasn Mohsen and
                  Ali Mehdi Hammadi and
                  Ali J. Al{-}Askery},
  title        = {{WDM} and {DWDM} based RoF system in Fiber Optic Communication Systems:
                  {A} review},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {1},
  year         = {2021},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4887},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MohsenHA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RSV21,
  author       = {Drishya S. R. and
                  Renukadevi S. and
                  Vaidehi V.},
  title        = {A Stable Clustering Scheme with Node Prediction in {MANET}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {1},
  year         = {2021},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4746},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RSV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SarairehJ21,
  author       = {Jaafer Saraireh and
                  Haya Joudeh},
  title        = {An Efficient Authentication Scheme for Internet of Things},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.3422},
  doi          = {10.54039/IJCNIS.V13I3.3422},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SarairehJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SerikbayevaTSYBT21,
  author       = {Sandugash Serikbayeva and
                  J. A. Tussupov and
                  M. A. Sambetbayeva and
                  A. S. Yerimbetova and
                  Gauchar Borankulova and
                  Aigul Tungatarova},
  title        = {A Model of a Distributed Information System based on the {Z39.50}
                  Protocol},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.5122},
  doi          = {10.17762/IJCNIS.V13I3.5122},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SerikbayevaTSYBT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SerikbayevaTSYBT21a,
  author       = {Sandugash Serikbayeva and
                  J. A. Tussupov and
                  M. A. Sambetbayeva and
                  A. S. Yerimbetova and
                  Gauchar Borankulova and
                  Aigul Tungatarova},
  title        = {A Model of a Distributed Information System based on the {Z39.50}
                  Protocol},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.5122},
  doi          = {10.54039/IJCNIS.V13I3.5122},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SerikbayevaTSYBT21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Silva21,
  author       = {Andrey Silva},
  title        = {Security Improvements for Connected Vehicles Position-Based Routing},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.4953},
  doi          = {10.17762/IJCNIS.V13I3.4953},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Silva21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Silva21a,
  author       = {Andrey Silva},
  title        = {Security Improvements for Connected Vehicles Position-Based Routing},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.4953},
  doi          = {10.54039/IJCNIS.V13I3.4953},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Silva21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Taleb21,
  author       = {Anas Abu Taleb},
  title        = {Sink Mobility Model for Wireless Sensor Networks Using Kohonen Self-Organizing
                  Map},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {1},
  year         = {2021},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4813},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Taleb21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TawalbehMAA21,
  author       = {Nabeel Tawalbeh and
                  Mohammad Malkawi and
                  Hanan M. Abusamaha and
                  Sahban Alnaser},
  title        = {Demand Based Cost Optimization of Electric Bills for Household Users},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.5111},
  doi          = {10.54039/IJCNIS.V13I3.5111},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TawalbehMAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TawalbehMAA21a,
  author       = {Nabeel Tawalbeh and
                  Mohammad Malkawi and
                  Hanan M. Abusamaha and
                  Sahban Alnaser},
  title        = {Demand Based Cost Optimization of Electric Bills for Household Users},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.5111},
  doi          = {10.17762/IJCNIS.V13I3.5111},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TawalbehMAA21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Tawfeeq21,
  author       = {Mohammed Ali Tawfeeq},
  title        = {Enhancing Route lifetime in Vehicular Ad Hoc ?Networks Based on Skellam
                  Distribution Model},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.5028},
  doi          = {10.17762/IJCNIS.V13I3.5028},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Tawfeeq21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Tawfeeq21a,
  author       = {Mohammed Ali Tawfeeq},
  title        = {Enhancing Route lifetime in Vehicular Ad Hoc {\unicode{8206}}Networks
                  Based on Skellam Distribution Model},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.5028},
  doi          = {10.54039/IJCNIS.V13I3.5028},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Tawfeeq21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TurovskyVRGKD21,
  author       = {Oleksandr Leonidovich Turovsky and
                  Vadym Vlasenko and
                  Nataliia Rudenko and
                  Oleksandr Golubenko and
                  Oleh Kitura and
                  Oleksandr Drobyk},
  title        = {Two-Time Procedure for Calculation of Carrier Frequency of Phasomodulated
                  in Communication Systems},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.5165},
  doi          = {10.17762/IJCNIS.V13I3.5165},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TurovskyVRGKD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TurovskyVRGKD21a,
  author       = {Oleksandr Leonidovich Turovsky and
                  Vadym Vlasenko and
                  Nataliia Rudenko and
                  Oleksandr Golubenko and
                  Oleh Kitura and
                  Oleksandr Drobyk},
  title        = {Two-Time Procedure for Calculation of Carrier Frequency of Phasomodulated
                  in Communication Systems},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.5165},
  doi          = {10.54039/IJCNIS.V13I3.5165},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TurovskyVRGKD21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/WahbiIRBH21,
  author       = {Azeddine Wahbi and
                  Anas el Habti el Idrissi and
                  Ahmed Roukhe and
                  Bahloul Bensassi and
                  Laamari Hlou},
  title        = {Design, optimization and Real Time implementation of a new Embedded
                  Chien Search Block for Reed-Solomon {(RS)} and Bose-Chaudhuri-Hocquenghem
                  {(BCH)} codes on {FPGA} Board},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {1},
  year         = {2021},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4889},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/WahbiIRBH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/YusufSB21,
  author       = {Kabiru Yusuf and
                  Dahiru Sani Shu'aibu and
                  Suleiman Aliyu Babale},
  title        = {Channel Propagation Characteristics on the Performance of 4G Cellular
                  Systems from High Altitude Platforms (HAPs)},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.5133},
  doi          = {10.17762/IJCNIS.V13I3.5133},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/YusufSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/YusufSB21a,
  author       = {Kabiru Yusuf and
                  Dahiru Sani Shu'aibu and
                  Suleiman Aliyu Babale},
  title        = {Channel Propagation Characteristics on the Performance of 4G Cellular
                  Systems from High Altitude Platforms (HAPs)},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.5133},
  doi          = {10.54039/IJCNIS.V13I3.5133},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/YusufSB21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AbbasE20,
  author       = {Sara Adel Abbas and
                  Eman Mohamed El{-}Didamony},
  title        = {Reduction of secondary lobes in joint angle and delay estimation in
                  angle of arrival localization to detect {MAC} address spoofing in
                  wireless networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4353},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbbasE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AbdallahA20,
  author       = {Hanaa A. Abdallah and
                  Sara Alsodairi},
  title        = {A novel Watermarking Technique Based on Hybrid Transforms},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4321},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbdallahA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AbdelhaqAAAAAAA20,
  author       = {Maha S. Abdelhaq and
                  Raed A. Alsaqour and
                  Noura Albrahim and
                  Manar Alshehri and
                  Maram Alshehri and
                  Shehana Alserayee and
                  Eatmad Almutairi and
                  Farah Alnajjar},
  title        = {The Impact of selfishness Attack on Mobile Ad Hoc Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4444},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbdelhaqAAAAAAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AbdelkhalkiAB20,
  author       = {Jamal El Abdelkhalki and
                  Mohamed Ben Ahmed and
                  Anouar Abdelhakim Boudhir},
  title        = {Image malware detection using deep learning},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4600},
  timestamp    = {Fri, 11 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbdelkhalkiAB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlKhateeb20,
  author       = {Jawad Hasan Yasin AlKhateeb},
  title        = {Handwritten Arabic Digit Recognition Using Convolutional Neural Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4807},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlKhateeb20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlamSMA20,
  author       = {Sahirul Alam and
                  Selo Sulistyo and
                  I Wayan Mustika and
                  Ronald Adrian},
  title        = {Fuzzy Adaptive Hysteresis of {RSS} for Handover Decision in {V2V}
                  {VANET}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4859},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlamSMA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlbdourMS20,
  author       = {Layla Albdour and
                  Saher Manaseer and
                  Ahmad Sharieh},
  title        = {IoT Crawler with Behavior Analyzer at Fog layer for Detecting Malicious
                  Nodes},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4459},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlbdourMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AleneziAAA20,
  author       = {Mohammad Nasser Alenezi and
                  Haneen Khalid Alabdulrazzaq and
                  Abdullah Abdulhai Alshaher and
                  Mubarak Mohammad Alkharang},
  title        = {Evolution of Malware Threats and Techniques: a Review},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4723},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AleneziAAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AleneziAM20,
  author       = {Mohammad Nasser Alenezi and
                  Haneen Khalid Alabdulrazzaq and
                  Nada Qasem Mohammad},
  title        = {Symmetric Encryption Algorithms: Review and Evaluation Study},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4698},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AleneziAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Allam20,
  author       = {Ali Mohamed Nabil Allam},
  title        = {Cooperative Key Establishment Protocol for Full-Duplex Relay Systems},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4589},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Allam20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlmousaM20,
  author       = {Omar Saad Almousa and
                  Hazem Migdady},
  title        = {Introducing a Machine Learning Password Metric Based on {EFKM} Clustering
                  Algorithm},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4795},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlmousaM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlmrezeqAAEN20,
  author       = {Nourah Almrezeq and
                  Lama Almadhoor and
                  Thowg Alrasheed and
                  A. A. Abd El{-}Aziz and
                  Shadi Nashwan},
  title        = {Design a secure IoT Architecture using Smart Wireless Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4877},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlmrezeqAAEN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Alnfiai20,
  author       = {Mrim Mhsn Alnfiai},
  title        = {A Novel Design of Audio {CAPTCHA} for Visually Impaired Users},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4529},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Alnfiai20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AnnaneAG20,
  author       = {Boubakeur Annane and
                  Adel Alti and
                  Osman Ghazali},
  title        = {SecNetworkCloudSim: An Extensible Simulation Tool for Secure Distributed
                  Mobile Applications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4384},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AnnaneAG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AnuarMBA20,
  author       = {Noor Azleen Anuar and
                  Mohd Zaki Mas'ud and
                  Nazrulazhar Bahamanan and
                  Nor Azman Mat Ariff},
  title        = {Mobile Malware Behaviour through Opcode Analysis},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4732},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AnuarMBA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ArfaouiMB20,
  author       = {Siham Arfaoui and
                  Abdellatif Mezrioui and
                  Abdelhamid Belmekki},
  title        = {A Methodology for Assuring Privacy by Design in Information Systems},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4852},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ArfaouiMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AsakipaamKAA20,
  author       = {Simon Atuah Asakipaam and
                  Jerry John Kponyo and
                  Justice Owusu Agyemang and
                  Fredrick Appiah{-}Twum},
  title        = {{AP} Design of a Minimal Overhead Control Traffic Topology Discovery
                  and Data Forwarding Protocol for Software-Defined Wireless Sensor
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4803},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AsakipaamKAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AsassfehOA20,
  author       = {Mahmoud Rajallah Asassfeh and
                  Nadim Obeid and
                  Wesam Almobaideen},
  title        = {Anonymous Authentication Protocols for IoT Based Healthcare: {A} Survey},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4713},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AsassfehOA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AssaouyZO20,
  author       = {Mohammed Assaouy and
                  Ouadoudi Zytoune and
                  Mohamed Ouadou},
  title        = {Rapid Learning Optimization Approach for Battery Recovery-Aware Embedded
                  System Communications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4774},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AssaouyZO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Chandrakar20,
  author       = {Ila Chandrakar},
  title        = {Articulation Point Based Quasi Identifier Detection for Privacy Preserving
                  in Distributed Environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4426},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Chandrakar20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ElghayyatyMWBIH20,
  author       = {Mohamed Elghayyaty and
                  Omar Mouhib and
                  Azeddine Wahbi and
                  Ahmed Amine Barakate and
                  Anas el Habti el Idrissi and
                  Laamari Hlou and
                  Abdelkader Hadjoudja},
  title        = {Performance Comparison of new Designs of Chien Search and Syndrome
                  Blocks for {BCH} and Reed Solomon Codes},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4562},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ElghayyatyMWBIH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/FajriR20,
  author       = {Misbahul Fajri and
                  Kalamullah Ramli},
  title        = {Adaptive Active Queue Management based on Queue Ratio of Set-point
                  Weighting},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4428},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/FajriR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GhmaryCHM20,
  author       = {Mohamed El Ghmary and
                  Tarik Chanyour and
                  Youssef Hmimz and
                  Mohammed Ou{\c{c}}amah Cherkaoui Malki},
  title        = {Offloading Decisions in a Mobile Edge Computing Node with Time and
                  Energy Constraints},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4419},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GhmaryCHM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GhmaryHCM20,
  author       = {Mohamed El Ghmary and
                  Youssef Hmimz and
                  Tarik Chanyour and
                  Mohammed Ou{\c{c}}amah Cherkaoui Malki},
  title        = {Energy and Processing Time Efficiency for an Optimal Offloading in
                  a Mobile Edge Computing Node},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4750},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GhmaryHCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/HamidASP20,
  author       = {Abdul Hamid and
                  Monsur Alam and
                  Hafsina Sheherin and
                  Al{-}Sakib Khan Pathan},
  title        = {Cyber Security Concerns in Social Networking Service},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4634},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/HamidASP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/HassaniSB20,
  author       = {Abdelhadi Eloudrhiri Hassani and
                  Aicha Sahel and
                  Abdelmajid Badri},
  title        = {A New Objective Function Based on Additive Combination of Node and
                  Link Metrics as a Mechanism Path Selection for {RPL} Protocol},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4446},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/HassaniSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Ibrahim20,
  author       = {Amr Ibrahim},
  title        = {{HP4} High-Performance Programmable Packet Parser},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4734},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Ibrahim20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KarriT20,
  author       = {Ganesh Reddy Karri and
                  P. Santhi Thilagam},
  title        = {Na{\"{\i}}ve Bayes Classifier to Mitigate the DDoS Attacks Severity
                  in Ad-Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4574},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KarriT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KponyoAK20,
  author       = {Jerry John Kponyo and
                  Justice Owusu Agyemang and
                  Griffith Selorm Klogo},
  title        = {Detecting End-Point {(EP)} Man-In-The-Middle {(MITM)} Attack based
                  on {ARP} Analysis: {A} Machine Learning Approach},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4735},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KponyoAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/NkosiMOM20,
  author       = {Themba Lucky Nkosi and
                  Maredi Mphahlele and
                  Sunday Olusegun Ojo and
                  Topside E. Mathonsi},
  title        = {Enhanced Dynamic Bandwidth Allocation Algorithm for Intelligent Home
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4196},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/NkosiMOM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Obeidat20,
  author       = {Atef A. Obeidat},
  title        = {Novel Approach for Intrusion Detection Using Simulated Annealing Algorithm
                  Combined with Hopfield Neural Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4665},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Obeidat20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/OuazzaniB20,
  author       = {Zakariae El Ouazzani and
                  Hanan El Bakkali},
  title        = {A Classification of non-Cryptographic Anonymization Techniques Ensuring
                  Privacy in Big Data},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4401},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/OuazzaniB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PangAR20,
  author       = {Kok{-}An Pang and
                  Shekh Faisal Abdul{-}Latip and
                  Hazlin Abdul Rani},
  title        = {Slid Pairs of the Fruit-80 Stream Cipher},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4382},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PangAR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PatchmuthuWS20,
  author       = {Ravi Kumar Patchmuthu and
                  Au Thien Wan and
                  Wida Susanty Suhaili},
  title        = {Exploring Data Security and Privacy Issues in Internet of Things Based
                  on Five-Layer Architecture},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4345},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PatchmuthuWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SaheedU20,
  author       = {Kayode Yakub Saheed and
                  Fatimah E. Usman{-}Hamza},
  title        = {Feature Selection with {IG-R} for Improving Performance of Intrusion
                  Detection System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4569},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SaheedU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SalehDAA20,
  author       = {Ma'en Saleh and
                  Liang Dong and
                  Ahmad Aljaafreh and
                  Naeem Al{-}Oudat},
  title        = {Secure Location-Aided Routing Protocols With Wi-Fi Direct For Vehicular
                  Ad Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4351},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SalehDAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SerhaneSBA20,
  author       = {Yassine Serhane and
                  Abderrahim Sekkaki and
                  Karim Benzidane and
                  Mehdi Abid},
  title        = {Cost Effective Cloud Storage Interoperability Between Public Cloud
                  Platforms},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4822},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SerhaneSBA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ShahiBE20,
  author       = {Gurpreet singh Shahi and
                  Ranbir Singh Batth and
                  Simon Egerton},
  title        = {{MRGM:} An Adaptive Mechanism for Congestion Control in Smart Vehicular
                  Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4684},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ShahiBE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ShakerSS20,
  author       = {Hothefa Shaker and
                  Baraa T. Sharef and
                  Zeyad T. Sharef},
  title        = {Fuzzy Logic-based Trusted and Power-aware Routing Protocol in Mobile
                  Ad-hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4587},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ShakerSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Siswanto20,
  author       = {Apri Siswanto},
  title        = {Chaotic-Based Encryption Algorithm using Henon and Logistic Maps for
                  Fingerprint Template Protection},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4395},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Siswanto20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Somwang20,
  author       = {Preecha Somwang},
  title        = {Efficient Load Balancing for Cloud Computing by Using Content Analysis},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4557},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Somwang20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Sone20,
  author       = {Michael Ekonde Sone},
  title        = {Physical Layer Security for Wireless Networks Based on Coset Convolutional
                  Coding},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4433},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Sone20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SukuvaaraMSK20,
  author       = {Timo Sukuvaara and
                  Kari M{\"{a}}enp{\"{a}}{\"{a}} and
                  Daria Stepanova and
                  Virve Karsisto},
  title        = {Vehicular Networking Road Weather Information System Tailored for
                  Arctic Winter Conditions},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4595},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SukuvaaraMSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SupMB20,
  author       = {Luciano Mauro Arley Sup and
                  Renato Mariz de Moraes and
                  Adolfo Bauchspiess},
  title        = {Acknowledge-Based Non-Congestion Estimation: An Indirect Queue Management
                  Approach for Concurrent {TCP} and UDP-Like Flows},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4371},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SupMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SyafeiSP20,
  author       = {Wahyul Amien Syafei and
                  Yosua Alvin Adi Soetrisno and
                  Agung Budi Prasetijo},
  title        = {Smart Agent and Modified Master-Backup Algorithm for Auto Switching
                  Dynamic Host Configuration Protocol Relay through Wireless Router},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4478},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SyafeiSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SyafrizalSZ20,
  author       = {Melwin Syafrizal and
                  Siti Rahayu Selamat and
                  Nurul Azma Zakaria},
  title        = {Analysis of Cybersecurity Standard and Framework Components},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4817},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SyafrizalSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ThangPJ20,
  author       = {Nguyen Canh Thang and
                  Minho Park and
                  Yang{-}Ick Joo},
  title        = {{EVHS} - Elastic Virtual Honeypot System for SDNFV-Based Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4701},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ThangPJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TriptiJ20,
  author       = {Tripti C and
                  Jibukumar M G},
  title        = {An enhanced synchronized multi-channel {MAC} scheme to improve throughput
                  in {VANET}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4566},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TriptiJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/VermaB20,
  author       = {Upendra Verma and
                  Diwakar Bhardwaj},
  title        = {Design of Lightweight Authentication Protocol for Fog enabled Internet
                  of Things- {A} Centralized Authentication Framework},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4464},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/VermaB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/godalaV20,
  author       = {Sravanthi Godala and
                  Rama Prasad V. Vaddella},
  title        = {A Study on Intrusion Detection System in Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4429},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/godalaV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Abouhogail19,
  author       = {Reham Abdellatif Abouhogail},
  title        = {A New Secure Lightweight Authentication Protocol for {NFC} mobile
                  Payment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {2},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4142},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Abouhogail19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Abuagoub19,
  author       = {Ali M. A. Abuagoub},
  title        = {IoT Security Evolution: Challenges and Countermeasures Review},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {3},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4272},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Abuagoub19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Al-NusiratHKAA19,
  author       = {Alaa Al{-}Nusirat and
                  Feras Hanandeh and
                  Mohammad Kamel Kharabsheh and
                  Mahmoud Al{-}Ayyoub and
                  Nahla Al{-}dhfairi},
  title        = {Dynamic Detection of Software Defects Using Supervised Learning Techniques},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3966},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Al-NusiratHKAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Al-ZubaidieZZ19,
  author       = {Mishall Al{-}Zubaidie and
                  Zhongwei Zhang and
                  Ji Zhang},
  title        = {Efficient and Secure {ECDSA} Algorithm and its Applications: {A} Survey},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3827},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Al-ZubaidieZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlbaFM19,
  author       = {Felomino Porras Alba and
                  Enrique D. Festijo and
                  Ruji P. Medina},
  title        = {A Distance-Based Data-Mule Scheduling Technique for Lesser Nodal Delay
                  in Wireless Sensor Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3916},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlbaFM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlhananiAR19,
  author       = {Rafat Ahmed Alhanani and
                  Jaafar Abouchabaka and
                  Najat Rafalia},
  title        = {{CDS-MIP:} CDS-based Multiple Itineraries Planning for mobile agents
                  in wireless sensor network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4016},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlhananiAR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlotaibiASMA19,
  author       = {May A. Alotaibi and
                  Mohammed A. Alzain and
                  Ben Soh and
                  Mehedi Masud and
                  Jehad F. Al{-}Amri},
  title        = {Computer Forensics: Dark Net Forensic Framework and Tools Used for
                  Digital Evidence Detection},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {3},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4407},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlotaibiASMA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Aloufi19,
  author       = {Khalid Saleh Aloufi},
  title        = {6LoWPAN Stack Model Configuration for IoT Streaming Data Transmission
                  over CoAP},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {2},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4034},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Aloufi19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Alsaedi19,
  author       = {Mohammed Alsaedi},
  title        = {Image Encryption and Decryption Using Chua's Circuits},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3800},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Alsaedi19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AmiruddinRS19,
  author       = {Amiruddin Amiruddin and
                  Anak Agung Putri Ratna and
                  Riri Fitri Sari},
  title        = {Systematic Review of Internet of Things Security},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {2},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3533},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AmiruddinRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BasnetAPAPE19,
  author       = {A. Basnet and
                  Abeer Alsadoon and
                  P. W. C. Prasad and
                  Omar Hisham Alsadoon and
                  Linh Pham and
                  Amr Elchouemi},
  title        = {A Novel Secure Patient Data Transmission through Wireless Body Area
                  Network: Health Tele-Monitoring},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3801},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BasnetAPAPE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BenzidaneKFJS19,
  author       = {Karim Benzidane and
                  Saad Khoudali and
                  Leila Fetjah and
                  Said Jai{-}Andaloussi and
                  Abderrahim Sekkaki},
  title        = {Application-based authentication on an inter-VM traffic in a Cloud
                  environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3841},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BenzidaneKFJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BhattT19,
  author       = {Priyang Prakashchandra Bhatt and
                  Bhaskar V. Thakker},
  title        = {Mass Removal of Botnet Attacks Using Heterogeneous Ensemble Stacking
                  {PROSIMA} classifier in IoT},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {3},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4275},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BhattT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BukhariKM19,
  author       = {Saufi Bukhari and
                  Ku Ruhana Ku{-}Mahamud and
                  Hiroaki Morino},
  title        = {Load Balancing Using Dynamic Ant Colony System Based Fault Tolerance
                  in Grid Computing},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {2},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3861},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BukhariKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ButheleziMPMM19,
  author       = {Bongisizwe Erasmus Buthelezi and
                  Maredi Mphahlele and
                  Deon Du Plessis and
                  Solly Maswikaneng and
                  Topside E. Mathonsi},
  title        = {ZigBee Healthcare Monitoring System for Ambient Assisted Living Environments},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3677},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ButheleziMPMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ChanWA19,
  author       = {Zheng Wei Clement Chan and
                  Chuah Chai Wen and
                  Janaka Alawatugoda},
  title        = {Review on Leakage Resilient Key Exchange Security Model},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3790},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ChanWA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Chiba19,
  author       = {Zouhair Chiba},
  title        = {New Anomaly Network Intrusion Detection System in Cloud Environment
                  Based on Optimized Back Propagation Neural Network Using Improved
                  Genetic Algorithm},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3764},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Chiba19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ChibaAMOR19,
  author       = {Zouhair Chiba and
                  Noreddine Abghour and
                  Khalid Moussaid and
                  Amina El Omri and
                  Mohammed Rida},
  title        = {Intelligent and Improved Self-Adaptive Anomaly based Intrusion Detection
                  System for Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {2},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4144},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ChibaAMOR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ChristantoSP19,
  author       = {Febrian Wahyu Christanto and
                  Susanto and
                  Agus Priyanto},
  title        = {{LOAD} {BALANCING-FAILOVER} {METHODS} {USING} {STATIC} {ROUTE} {WITH}
                  {ADDRESS} LIST, ECMP, PCC, {AND} {NTH} {FOR} {OPTIMIZING} {LAN} {NETWORK}
                  : {A} {COMPARISON}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {3},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4340},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ChristantoSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/CubidesGMCC19,
  author       = {Jhon Francined Herrera Cubides and
                  Paulo Alonso Gaona{-}Garc{\'{\i}}a and
                  Carlos Enrique Montenegro Mar{\'{\i}}n and
                  Diego Mauricio Cata{\~{n}}o and
                  Rub{\'{e}}n Gonz{\'{a}}lez Crespo},
  title        = {Security Aspects in Web of Data Based on Trust Principles. {A} brief
                  of Literature Review},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {3},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4334},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/CubidesGMCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/EsaAB19,
  author       = {Nur Fasihah Mohd Esa and
                  Shekh Faisal Abdul{-}Latip and
                  Mohd Rizuan Baharon},
  title        = {A Survey of ARX-based Symmetric-key Primitives},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {3},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4258},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/EsaAB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GhazouaniKL19,
  author       = {Mohamed El Ghazouani and
                  Moulay Ahmed El Kiram and
                  Latifa Er{-}Rajy},
  title        = {Blockchain {\&} Multi-Agent System: {A} New Promising Approach
                  for Cloud Data Integrity Auditing with Deduplication},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3880},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GhazouaniKL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/HendiDAS19,
  author       = {Amjad Yosef Hendi and
                  Majed O. Dwairi and
                  Ziad Abdulkareem Al{-}Qadi and
                  Mohamed S. Soliman},
  title        = {A {NOVEL} {SIMPLE} {AND} {HIGHLY} {SECURE} {METHOD} {FOR} {DATA} {ENCRYPTION-DECRYPTION}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3999},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/HendiDAS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/HussainQHH19,
  author       = {Mohammad Equebal Hussain and
                  Mohammed Qayyum and
                  Mohammad Rashid Hussain and
                  Rashid Hussain},
  title        = {Effective and Secure vWSN Applications in a Virtualized Cloud Computing
                  Environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {2},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3920},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/HussainQHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Jedidi19,
  author       = {Ahmed Jedidi},
  title        = {Workload Cluster Balance Algorithm to Improve Wireless Sensor Network
                  Performance},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3901},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Jedidi19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KaduA19,
  author       = {Rakesh K. Kadu and
                  Dattatraya S. Adane},
  title        = {Hardware Implementation of Efficient Elliptic Curve Scalar Multiplication
                  using Vedic Multiplier},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {2},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3763},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KaduA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KaurK19,
  author       = {Dalveer Kaur and
                  Neeraj Kumar},
  title        = {Dexterity for Channel Capacity Enhancement in {MU-MIMO} by Abrogating
                  Interference},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3753},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KaurK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KhanboubiH19,
  author       = {Yassine El Khanboubi and
                  Mostafa Hanoune},
  title        = {Exploiting Blockchains to improve Data Upload and Storage in the Cloud},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {3},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4237},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KhanboubiH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KhediriKA19,
  author       = {Salim El Khediri and
                  Rehan Ullah Khan and
                  Waleed Albattah},
  title        = {An optimal clustering algorithm based distance-aware routing protocol
                  for wireless sensor networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {3},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3939},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KhediriKA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/LavanyaBK19,
  author       = {Muni Lavanya and
                  Chigarapalle Shoba Bindu and
                  Vijay Kumar},
  title        = {Internet Traffic based Channel Selection in Multi-Radio Multi-Channel
                  Wireless Mesh Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {2},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4110},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/LavanyaBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Maliberan19,
  author       = {Esmael Verano Maliberan},
  title        = {Modified {SHA1:} {A} Hashing Solution to Secure Web Applications through
                  Login Authentication},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3726},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Maliberan19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MuruganP19,
  author       = {Kalpana Murugan and
                  Al{-}Sakib Khan Pathan},
  title        = {A Routing Algorithm for Extending Mobile Sensor Network's Lifetime
                  using Connectivity and Target Coverage},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {2},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4102},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MuruganP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/OmarK19,
  author       = {Dina M. Omar and
                  Ahmed Khedr},
  title        = {{SEPCS:} Prolonging Stability Period of Wireless Sensor Networks using
                  Compressive Sensing},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3775},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/OmarK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PerdanaIB19,
  author       = {Doan Perdana and
                  Muhammad Imadudin and
                  Gustommy Bisono},
  title        = {Performance Evaluation of Soil Substance Measurement System in Garlic
                  Plant based on Internet of Things with Mesh Topology Network Scenario},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {3},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4378},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PerdanaIB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SK19,
  author       = {Ravindra S and
                  Siddesh G. K},
  title        = {Distance Based Power Control for {D2D} Communication in LTE-Advanced
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {2},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4057},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SaberRSAW19,
  author       = {Mohammed Saber and
                  Abdessamad El Rharras and
                  Rachid Saadane and
                  Hatim Kharraz Aroussi and
                  Mohamed Wahbi},
  title        = {Artificial Neural Networks, Support Vector Machine And Energy Detection
                  For Spectrum Sensing Based On Real Signals},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3718},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SaberRSAW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SalmanF19,
  author       = {Mohammed Falah Abood Salman and
                  Leili Farzinvash},
  title        = {A Hybrid Algorithm for Reliable and Energy-efficient Data Gathering
                  in Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3663},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SalmanF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ShakirAAAOM19,
  author       = {Abdullah Shakir and
                  Raed A. Alsaqour and
                  Maha S. Abdelhaq and
                  Amal Alhussan and
                  Mohd Othman and
                  Ahmed Mahdi},
  title        = {Novel Method of Improving Quality of Service for Voice over Internet
                  Protocol Traffic in Mobile Ad Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {3},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4235},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ShakirAAAOM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/StiawanAHSMIB19,
  author       = {Deris Stiawan and
                  Diky Aryandi and
                  Ahmad Heryanto and
                  Tri Wanda Septian and
                  Farkhana Muchtar and
                  Mohd Yazid Idris and
                  Rahmat Budiarto},
  title        = {Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter
                  Method},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3789},
  timestamp    = {Fri, 04 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/StiawanAHSMIB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TajZWRAK19,
  author       = {Nayab Taj and
                  Mohammad Haseeb Zafar and
                  Shakeel Ahmad Waqas and
                  Humaira Rehman and
                  Madini O. Alassafi and
                  Imran Khan},
  title        = {Smart Relay Selection Scheme Based on Fuzzy Logic with Optimal Power
                  Allocation and Adaptive Data Rate Assignment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4049},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TajZWRAK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ToulniMNB19,
  author       = {Hamza Toulni and
                  Mounia Miyara and
                  Benayad Nsiri and
                  Mohcine Boudhane},
  title        = {Traffic congestion prevention system},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3485},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ToulniMNB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TriadiPML19,
  author       = {Muhammad Biben Triadi and
                  Doan Perdana and
                  Rendy Munadi and
                  Wenzao Li},
  title        = {A New Variant of Game Theory Based Decision Making {(GTDM)} Algorithm
                  Routing Protocols to Improve Energy Efficiency on Vehicular Delay
                  Tolerant Network {(VDTN)}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4078},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TriadiPML19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/VasconcelosMGS19,
  author       = {Gabriel Vasconcelos and
                  Rodrigo Sanches Miani and
                  Vitor Guizlini and
                  Jefferson R. Souza},
  title        = {Evaluation of DoS attacks on Commercial Wi-Fi-Based UAVs},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3969},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/VasconcelosMGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/VirataF19,
  author       = {Alvin Jason A. Virata and
                  Enrique Festijo},
  title        = {Identity Verification through Face Recognition Implemented on Raspberry
                  Pi Framework},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {3},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4254},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/VirataF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Yunus19,
  author       = {Farizah Yunus},
  title        = {A Rate Control Model of {MPEG-4} Encoder for Video Transmission over
                  Wireless Sensor Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3710},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Yunus19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AN18,
  author       = {A. Ajina and
                  Mydhili K. Nair},
  title        = {Dynamic Network State Learning Model for Mobility Based {WMSN} Routing
                  Protocol},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3183},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AbdellaouiEB18,
  author       = {Ayoub Abdellaoui and
                  Jamal Elmhamdi and
                  Halim Berradi},
  title        = {Multipoint Relay Selection based on Stability of Spatial Relation
                  in Mobile Ad hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3132},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbdellaouiEB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AbdullaH18,
  author       = {Shubair Abdulla and
                  Amaal Saleh Al Hashimy},
  title        = {TiSEFE: Time Series Evolving Fuzzy Engine for Network Traffic Classification},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3125},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbdullaH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Achbarou18,
  author       = {Omar Achbarou},
  title        = {A New Distributed Intrusion Detection System Based on Multi-Agent
                  System for Cloud Environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {3},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3546},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Achbarou18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Ahanger18,
  author       = {Tariq Ahamed Ahanger},
  title        = {Mobility of Internet of Things and Fog Computing: Serious Concerns
                  and Future Directions},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {3},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3706},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Ahanger18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AhmadZKISZ18,
  author       = {Azuan Ahmad and
                  Wan Shafiuddin Zainudin and
                  Mohd Nazri Kama and
                  Norbik Bashah Idris and
                  Madihah Mohd Saudi and
                  Nur Hafiza Zakaria},
  title        = {State of the Art Intrusion Detection System for Cloud Computing},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {3},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3590},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AhmadZKISZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AjinegoroPN18,
  author       = {Riski Muktiarto Nugroho Ajinegoro and
                  Doan Perdana and
                  Ridha Muldina Negara},
  title        = {Performance Analysis of Mobility Impact on {IEEE} 802.11ah Standard
                  with Traffic Pattern Scheme},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3212},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AjinegoroPN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Al-AzzehMZOGA18,
  author       = {Jamil Al{-}Azzeh and
                  Abdelwadood Mesleh and
                  Zhengbing Hu and
                  Roman Odarchenko and
                  Sergiy Gnatyuk and
                  Anastasiia Abakumova},
  title        = {Evaluation Method for {SDN} Network Effectiveness in Next Generation
                  Cellular Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {3},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3605},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Al-AzzehMZOGA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Al-FayoumiN18,
  author       = {Mustafa Al{-}Fayoumi and
                  Shadi Nashwan},
  title        = {Performance Analysis of {SAP-NFC} Protocol},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3237},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Al-FayoumiN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Al-MutiriAT18,
  author       = {Rasha Al{-}Mutiri and
                  Mznah Al{-}Rodhaan and
                  Yuan Tian},
  title        = {Improving Vehicular Authentication in {VANET} Using},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3124},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Al-MutiriAT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Al-ShayeaA18,
  author       = {Qeethara Al{-}Shayea and
                  Muzhir Al{-}Ani},
  title        = {Biometric Face Recognition Based on Enhanced Histogram Approach},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3142},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Al-ShayeaA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlqeremH18,
  author       = {Ahmad Alqerem and
                  Ala Hamarsheh},
  title        = {Statistical-Based Heuristic for Scheduling of Independent Tasks in
                  Cloud Computing},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3406},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlqeremH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Ara18,
  author       = {Tabassum Ara},
  title        = {Energy efficient secured cluster based distributed fault diagnosis
                  protocol for IoT},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {3},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3586},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Ara18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BaharonSAYI18,
  author       = {Mohd Rizuan Baharon and
                  Qi Shi and
                  Mohd Faizal Abdollah and
                  S. M. Warusia Mohamed S. M. M. Yassin and
                  Ariff Idris},
  title        = {An Improved Fully Homomorphic Encryption Scheme for Cloud Computing},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {3},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3573},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BaharonSAYI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BawanehOA18,
  author       = {Mohammad Jazi Bawaneh and
                  Atef A. Obeidat and
                  Majd M. Al{-}Kofahi},
  title        = {An Adaptive {FLV} Steganography Approach Using Simulated Annealing},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3072},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BawanehOA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BiradarS18,
  author       = {Shobha Biradar and
                  P. M. Mallikarjuna Shastry},
  title        = {Redundancy Elimination with Coverage Preserving algorithm in Wireless
                  Sensor Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {3},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3576},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BiradarS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/CevikG18,
  author       = {Taner {\c{C}}evik and
                  Alex Gunagwera},
  title        = {Coverage and Energy Efficiency Optimization for Randomly Deployed
                  Multi-Tier Wireless Multimedia Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3032},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/CevikG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Do18,
  author       = {Dinh{-}Thuan Do},
  title        = {Performance Analysis In Wireless Powered D2D-Aided Non-Orthogonal
                  Multiple Access Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3312},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Do18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ElSharkawy18,
  author       = {Magdy Ibrahim ElSharkawy},
  title        = {A New Scheme for Spreading {\&} De-spreading in the Direct Sequence
                  Spread Spectrum Mechanism},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3253},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ElSharkawy18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ElSharkawy18a,
  author       = {Magdy Ibrahim ElSharkawy},
  title        = {Using Quaternion Fourier Transform in Steganography Systems},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3266},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ElSharkawy18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ElshareE18,
  author       = {Shadi Elshare and
                  Nameer N. El{-}Emam},
  title        = {Modified Multi-Level Steganography to Enhance Data Security},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {3},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3614},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ElshareE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/EyadehA18,
  author       = {Ali Ahmad Eyadeh and
                  Mohammad Bani Amerah},
  title        = {Ferry-Based Directional Forwarding Mechanism for Improved Network
                  Life-Time in Cluster-Based Wireless Sensor Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2776},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/EyadehA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Frattolillo18,
  author       = {Franco Frattolillo},
  title        = {Assisted Navigation Algorithm for Wireless Sensor Actuator and Robot
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3429},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Frattolillo18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GadelrabEGR18,
  author       = {Mohammed S. Gadelrab and
                  Muhammad H. ElSheikh and
                  Mahmoud A. Ghoneim and
                  Mohsen A. Rashwan},
  title        = {BotCap: Machine Learning Approach for Botnet Detection Based on Statistical
                  Features},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {3},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3624},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GadelrabEGR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/HindumathiR18,
  author       = {Voruganti Hindumathi and
                  Katta Rama Linga Reddy},
  title        = {Delay aware optimal resource allocation in {MU} {MIMO-OFDM} using
                  enhanced spider monkey optimization},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3102},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/HindumathiR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/HussainiNA18,
  author       = {Muktar Hussaini and
                  Shahrudin Awang Nor and
                  Amran Ahmad},
  title        = {{PMSS:} Producer Mobility Support Scheme Optimization with {RWP} Mobility
                  Model in Named Data Networking},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3272},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/HussainiNA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Jan18,
  author       = {Tariqullah Jan},
  title        = {Implementing Enhanced {MIMO} with {F-OFDM} to Increase System Efficiency
                  for Future 5G Cellular Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3286},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Jan18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/JusakM18,
  author       = {Jusak Jusak and
                  Seedahmed Sharif Mahmoud},
  title        = {A Novel and Low Processing Time {ECG} Security Method Suitable for
                  Sensor Node Platforms},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3169},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/JusakM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KandoussiB18,
  author       = {Asmaa El Kandoussi and
                  Hanan El Bakkali},
  title        = {Security based partner selection in Inter-organizational workflow
                  systems},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {3},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3670},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KandoussiB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Karanam18,
  author       = {Ramesh Rao Karanam},
  title        = {Node Activities Learning(NAL)Approach to Build Secure and Privacy-Preserving
                  Routing in Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {3},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3699},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Karanam18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KhamaysehA18,
  author       = {Yaser M. Khamayseh and
                  Rabiah Al{-}qudah},
  title        = {Resource Allocation using Genetic Algorithm in Multimedia Wireless
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3280},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KhamaysehA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KhedrA18,
  author       = {Ahmed Khedr and
                  Arwa Attia},
  title        = {New Holes and Boundary Detection Algorithm for Heterogeneous Wireless
                  Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2973},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KhedrA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KumarK18,
  author       = {Neeraj Kumar and
                  Dalveer Kaur},
  title        = {Capacity Enhancement of Multiuser Wireless Communication System through
                  Adaptive Non-Linear Pre coding},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3056},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KumarK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Lekha18,
  author       = {Sri Lekha},
  title        = {A Multilevel Scheduling {MAC} Protocol for Underwater Acoustic Sensor
                  Networks(UASN)},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3420},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Lekha18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MaliberanSM18,
  author       = {Esmael Verano Maliberan and
                  Ariel M. Sison and
                  Ruji P. Medina},
  title        = {A New Approach in Expanding the Hash Size of {MD5}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3292},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MaliberanSM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MarwanPS18,
  author       = {Abdul Aziz Marwan and
                  Doan Perdana and
                  Danu Dwi Sanjoyo},
  title        = {Performance Analysis of User Speed Impact on {IEEE} 802.11ah Standard
                  affected by Doppler Effect},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3334},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MarwanPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MasdukiRM18,
  author       = {Bisyron Wahyudi Masduki and
                  Kalamullah Ramli and
                  Hendri Murfi},
  title        = {Implementation and Analysis of Combined Machine Learning Method for
                  Intrusion Detection System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3375},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MasdukiRM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MezghaniA18,
  author       = {Omnia Mezghani and
                  Pr. Mahmoud Abdellaoui},
  title        = {Efficient Clustering Protocol Based on Stochastic Matrix {\&}
                  {MCL} and Data Routing for Mobile Wireless Sensors Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3208},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MezghaniA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Monsakul18,
  author       = {Annop Monsakul},
  title        = {{SRAD:} Smart Routing Algorithm Design for Supporting IoT Network
                  Architecture},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3121},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Monsakul18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MorilloGM18,
  author       = {Dixon Salcedo Morillo and
                  C{\'{e}}sar D. Guerrero and
                  Roberto Mart{\'{\i}}nez},
  title        = {Available Bandwidth Estimation Tools Metrics, Approaches and Performance},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {3},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3516},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MorilloGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MoudniEMH18,
  author       = {Houda Moudni and
                  Mohamed Er{-}rouidi and
                  Hicham Mouncif and
                  Benachir El Hadadi},
  title        = {Fuzzy Logic based Intrusion Detection System against Black Hole Attack
                  in Mobile Ad Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3267},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MoudniEMH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MunanzarAS18,
  author       = {Hery Munanzar and
                  Teuku Yuliar Arif and
                  Syahrial},
  title        = {{AARF-HT:} Adaptive Auto Rate Fallback for High-Throughput {IEEE}
                  802.11n WLANs},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3122},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MunanzarAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Nashwan18,
  author       = {Imad I. H. Nashwan},
  title        = {Reliability and Failure Functions of the Consecutive k-out-of-m-from-n:
                  {F} Linear and Circular System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3449},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Nashwan18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/NayyarBHS18,
  author       = {Anand Nayyar and
                  Ranbir Singh Batth and
                  Dac{-}Binh Ha and
                  G. Sussendran},
  title        = {Opportunistic Networks: Present Scenario- {A} Mirror Review},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3283},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/NayyarBHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/OliveiraGF18,
  author       = {Ren{\^{e}} Pomilio de Oliveira and
                  Lourival Aparecido de G{\'{o}}is and
                  Augusto Foronda},
  title        = {Enhanced {PF} Scheduling Algorithm for {LTE} Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3026},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/OliveiraGF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/OsamyK18,
  author       = {Walid Osamy and
                  Ahmed M. Khedr},
  title        = {An algorithm for enhancing coverage and network lifetime in cluster-based
                  Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2849},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/OsamyK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ParedesSM18,
  author       = {Rolysent Paredes and
                  Ariel M. Sison and
                  Ruji P. Medina},
  title        = {Bandwidth Allocation Mechanism based on Users' Web Usage Patterns
                  for Campus Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3400},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ParedesSM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PatilGK18,
  author       = {Veeresh Patil and
                  Sanjeev Gupta and
                  C. Keshavamurthy},
  title        = {{S-RLNC} based {MAC} Optimization for Multimedia Data Transmission
                  over {LTE/LTE-A} Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2984},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PatilGK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PorrasDP18,
  author       = {Jonier Porras and
                  Daniel Ducuara and
                  Gustavo Puerto},
  title        = {OpenDaylight vs. Floodlight: Comparative Analysis of a Load Balancing
                  Algorithm for Software Defined Networking},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3178},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PorrasDP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PutraASK18,
  author       = {Septafiansyah Dwi Putra and
                  Adang Suwandi Ahmad and
                  Sarwono Sutikno and
                  Yusuf Kurniawan},
  title        = {Attacking AES-Masking Encryption Device with Correlation Power Analysis},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2884},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PutraASK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/R18,
  author       = {Vijaya Saraswathi R},
  title        = {Muti-stage Key Management Scheme for Cluster based {WSN}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {3},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3650},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/R18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RaisBO18,
  author       = {Amine Rais and
                  Khalid Bouragba and
                  Mohamed Ouzzif},
  title        = {Determination of Itinerary Planning for Multiple Agents in Wireless
                  Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3081},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RaisBO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ReddyS18,
  author       = {Y. Narasimha Reddy and
                  P. V. S. Srinivas},
  title        = {A Routing Delay Predication Based on Packet Loss and Explicit Delay
                  Acknowledgement for Congestion Control in {MANET}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {3},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3582},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ReddyS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ReyesFM18,
  author       = {Ariel Roy L. Reyes and
                  Enrique D. Festijo and
                  Ruji P. Medina},
  title        = {Securing One Time Password {(OTP)} for Multi-Factor Out-of-Band Authentication
                  through a 128-bit Blowfish Algorithm},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3188},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ReyesFM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Saberi18,
  author       = {Mohsen Saberi},
  title        = {Private and Mobile inter-network routing for Wireless Sensor Networks
                  and Internet of Things},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3003},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Saberi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SatizabalP18,
  author       = {Cristina Satiz{\'{a}}bal and
                  Rafael P{\'{a}}ez},
  title        = {Internet Voting Protocols: An Analysis of the Cryptographic Operations
                  per Phase},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3112},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SatizabalP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ShatnawiAJ18,
  author       = {Ali M. Shatnawi and
                  Bushra AlHajouj and
                  Moath H. A. Jarrah},
  title        = {A New Multi-threaded and Interleaving Approach to Enhance String Matching
                  for Intrusion Detection Systems},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3209},
  timestamp    = {Wed, 26 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ShatnawiAJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SuudZOH18,
  author       = {Jamaah Binti Suud and
                  Hushairi Zen and
                  Al{-}Khalid Othman and
                  Khairuddin Abdul Hamid},
  title        = {Decoding of Decode and Forward {(DF)} Relay Protocol using Min-Sum
                  Based Low Density Parity Check {(LDPC)} System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3066},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SuudZOH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ThakurSP18,
  author       = {Kutub Thakur and
                  Juan Shan and
                  Al{-}Sakib Khan Pathan},
  title        = {Innovations of Phishing Defense: The Mechanism, Measurement and Defense
                  Strategies},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2991},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ThakurSP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/VenkataramananL18,
  author       = {V. Venkataramanan and
                  S. Lakshmi},
  title        = {A Case Study of Various Wireless Network Simulation Tools},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {2},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3261},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/VenkataramananL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Wenceslao18,
  author       = {Felicisimo Villarico Wenceslao Jr.},
  title        = {Enhancing the Performance of the Advanced Encryption Standard {(AES)}
                  Algorithm Using Multiple Substitution Boxes},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {3},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3589},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Wenceslao18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/WulandariPN18,
  author       = {Triani Wulandari and
                  Doan Perdana and
                  Ridha Muldina Negara},
  title        = {Node Density Performance Analysis on {IEEE} 802.11ah Standard for
                  VoIP Service},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3023},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/WulandariPN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Yassein18,
  author       = {Muneer O. Bani Yassein},
  title        = {Enhanced Home Energy Management Scheme {(EHEM)} in Smart Grids},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3109},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Yassein18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ZayoudAAK18,
  author       = {Maha Zayoud and
                  Hanady M. Abdulsalam and
                  A. Al{-}Yatama and
                  Seifedine Nimer Kadry},
  title        = {Split and Merge {LEACH} Based Routing Algorithm for Wireless Sensor
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3028},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ZayoudAAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/adelaniMH18,
  author       = {Zahra Adelani and
                  Ghasem Mirjalily and
                  Milad HajMirzaei},
  title        = {Balanced Multi-Channel Data Collection in Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {10},
  number       = {1},
  year         = {2018},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2893},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/adelaniMH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AN17,
  author       = {A. Ajina and
                  Mydhili K. Nair},
  title        = {Cross Layered Network Condition Aware Mobile-Wireless Multimedia Sensor
                  Network Routing Protocol for Mission Critical Communication},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2174},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Abdel-AzimSe17,
  author       = {Mohammed Abdel{-}Azim and
                  Hossam El{-}Din Salah and
                  Menas Ebrahim Eissa},
  title        = {Black Hole attack Detection using fuzzy based {IDS}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2281},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Abdel-AzimSe17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AhmadIK17,
  author       = {Azuan Ahmad and
                  Norbik Bashah Idris and
                  Mohd Nazri Kama},
  title        = {CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell
                  Mechanism},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2233},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AhmadIK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlBalasMB17,
  author       = {Firas AlBalas and
                  Wail Mardini and
                  Dua'a Bani{-}salameh},
  title        = {Optimized Job Scheduling approach based on Genetic algorithms in smart
                  Grid environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2285},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlBalasMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Aljarrah17,
  author       = {Emran Aljarrah},
  title        = {Deployment of Multi-Fuzzy Model Based Routing in {RPL} to Support
                  Efficient IoT},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2918},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Aljarrah17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlosaimiZAAM17,
  author       = {Wael Alosaimi and
                  Michal Z{\'{a}}k and
                  Khalid Al{-}Begain and
                  Roobaea Alroobaea and
                  Mehedi Masud},
  title        = {Economic Denial of Sustainability Attacks Mitigation in the Cloud},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2798},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlosaimiZAAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AmiruddinRS17,
  author       = {Amiruddin Amiruddin and
                  Anak Agung Putri Ratna and
                  Riri Fitri Sari},
  title        = {New Key Generation and Encryption Algorithms for Privacy Preservation
                  in Mobile Ad Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2307},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AmiruddinRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BashirKJU17,
  author       = {Shahid Bashir and
                  M. Salman Khan and
                  Khadim Ullah Jan and
                  Sadiq Ullah},
  title        = {Performance Enhancement of Wearable Antenna Using High Impedance Surfaces},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2220},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BashirKJU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BenmammarBAK17,
  author       = {Badr Benmammar and
                  Youcef Benmouna and
                  Asma Amraoui and
                  Francine Krief},
  title        = {A parallel implementation on a multi-core architecture of a dynamic
                  programming algorithm applied in cognitive radio ad hoc networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2354},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BenmammarBAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ES17,
  author       = {Selvi E and
                  Shashidhara M. S},
  title        = {Quantum Phase Shift For Energy Conserved Secured Data Communication
                  In Manet},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2365},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ES17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ElSharkawy17,
  author       = {Magdy Ibrahim ElSharkawy},
  title        = {Quaternion-based Encryption/Decryption of Audio Signal Using Digital
                  Image as Variable Key},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2379},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ElSharkawy17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ElSharkawy17a,
  author       = {Magdy Ibrahim ElSharkawy},
  title        = {Integrating and Securing Video, Audio and Text Using Quaternion Fourier
                  Transform},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2634},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ElSharkawy17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ElmirMHHK17,
  author       = {Iman El Mir and
                  Kandoussi el Mehdi and
                  Mohamed Hanini and
                  Abdelkrim Haqiq and
                  Dong Seong Kim},
  title        = {A Game Theoretic approach based virtual machine migration for cloud
                  environment security},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2579},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ElmirMHHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Frattolillo17,
  author       = {Franco Frattolillo},
  title        = {Digital Copyright Protection: Focus on Some Relevant Solutions},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2425},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Frattolillo17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GV17,
  author       = {Venifa Mini G and
                  K. S. Angel Viji},
  title        = {A Comprehensive Cloud Security Model with Enhanced Key Management,
                  Access Control and Data Anonymization Features},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2372},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GuezouliBBZ17,
  author       = {Lyamine Guezouli and
                  Kamel Barka and
                  Souheila Bouam and
                  Abdelmadjid Zidani},
  title        = {Implementation and Optimization of {RWP} Mobility Model in {WSNS}
                  under Tossim Simulator},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2116},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GuezouliBBZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GunantaraD17,
  author       = {Nyoman Gunantara and
                  Agus Dharma},
  title        = {Optimal Path Pair Routes through Multi-Criteria Weights in Ad Hoc
                  Network Using the Genetic Algorithm},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2037},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GunantaraD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GuptaPNM17,
  author       = {Bhupendra Kumar Gupta and
                  Srikanta Patnaik and
                  Ajit Kumar Nayak and
                  Manas Kumar Mallick},
  title        = {Congestion Managed Multicast Routing in Wireless Mesh Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2643},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GuptaPNM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GurramB17,
  author       = {Vijaya Kumar Gurram and
                  Shoba Bindu Chigarepalli},
  title        = {A New Method of User Association in Wireless Mesh Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1960},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GurramB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/IrawatiSE17,
  author       = {Indrarini Dyah Irawati and
                  Andriyan Bayu Suksmono and
                  Ian Yosef Matheus Edward},
  title        = {Missing Internet Traffic Reconstruction using Compressive Sampling},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2249},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/IrawatiSE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/IsnawatiHSM17,
  author       = {Anggun Fitrian Isnawati and
                  Risanuri Hidayat and
                  Selo Sulistyo and
                  I Wayan Mustika},
  title        = {A Novel Utility Function of Power Control Game in Multi-Channel Cognitive
                  Femtocell Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2770},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/IsnawatiHSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/JG17,
  author       = {Lekha J and
                  Ganapathi Padmavathi},
  title        = {Detection of illegal traffic pattern using Hybrid Improved {CART}
                  and Multiple Extreme Learning Machine Approach},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2053},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/JG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/JainR17,
  author       = {Sweta Jain and
                  Vinuraj R},
  title        = {{CALAR:} Community Aware Location Assisted Routing Framework for Delay
                  Tolerant Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2082},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/JainR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/JegedeUAM17,
  author       = {Abayomi Jegede and
                  Nur Izura Udzir and
                  Azizol Abdullah and
                  Ramlan Mahmod},
  title        = {State of the Art in Biometric Key Binding and Key Generation Schemes},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2388},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/JegedeUAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Khan17,
  author       = {Imran Khan},
  title        = {Performance Analysis of 5G Cooperative-NOMA for IoT-Intermittent Communication},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2641},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Khan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KhanAZA17,
  author       = {Mohsin Khan and
                  Majid Ashraf and
                  Haseeb Zafar and
                  Tufail Ahmad},
  title        = {Enhanced Handover Mechanism in Long Term Evolution {(LTE)} Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2219},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KhanAZA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KumarHAJ17,
  author       = {Ramesh Kumar and
                  Ayaz Hussain and
                  Abdul Aziz and
                  Inwhee Joe},
  title        = {Wireless {DF} Relaying with Beamforming for an Unmanned Aircraft System
                  over {\(\kappa\)}-{\(\mu\)} Fading Channels},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2275},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KumarHAJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MardiniEA17,
  author       = {Wail Mardini and
                  Maad Ebrahim and
                  Mohammed Al{-}Rudaini},
  title        = {Comprehensive Performance Analysis of {RPL} Objective Functions in
                  IoT Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2515},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MardiniEA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Nashwan17,
  author       = {Shadi Ismail Nashwan},
  title        = {{SE-H:} {A} Secure and Efficient Hash Protocol for {RFID} System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2728},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Nashwan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/NasirKK17,
  author       = {Husna Jamal Abdul Nasir and
                  Ku Ruhana Ku{-}Mahamud and
                  Eiji Kamioka},
  title        = {Enhanced Ant-Based Routing for Improving Performance of Wireless Sensor
                  Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2611},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/NasirKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Obeidat17,
  author       = {Atef A. Obeidat},
  title        = {Hybrid Approach for Botnet Detection Using K-Means and K-Medoids with
                  Hopfield Neural Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2514},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Obeidat17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/OmarK17,
  author       = {Dina M. Omar and
                  Ahmed M. Khedr},
  title        = {Optimized Clustering Protocol for Balancing Energy in Wireless Sensor
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2607},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/OmarK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/OulaourfHAO17,
  author       = {Sanaa Oulaourf and
                  Abdelfatteh Haidine and
                  Abdelhak Aqqal and
                  Hassan Ouahmane},
  title        = {Review on Radio Resource Allocation Optimization in LTE/LTE-Advanced
                  using Game Theory},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2257},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/OulaourfHAO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PavaniR17,
  author       = {Movva Pavani and
                  Polipalli Trinatha Rao},
  title        = {Urban Air Pollution Monitoring Using Wireless Sensor Networks: {A}
                  Comprehensive Review},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2708},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PavaniR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PerdanaDW17,
  author       = {Doan Perdana and
                  Favian Dewanta and
                  Ig Prasetya Dwi Wibawa},
  title        = {Extending Monitoring Area of Production Plant Using Synchronized Relay
                  Node Message Scheduling},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2280},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PerdanaDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PoolaSC17,
  author       = {Veeresh Poola and
                  R. Praveen Sam and
                  Shoba Bindhu C},
  title        = {Fuzzy Based Optimal QoS Constraint Services Composition in Mobile
                  Ad Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2525},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PoolaSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RG17,
  author       = {Kavitha R and
                  Padmavathi G},
  title        = {Advanced Random Time Queue Blocking With Traffic Prediction For Defense
                  Of Low-Rate Dos Attacks Against Application Servers},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2253},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RamM17,
  author       = {Anant Ram and
                  Manas Kumar Mishra},
  title        = {Mobility Adaptive Density Connected Clustering Approach in Vehicular
                  Ad Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2325},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RamM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RokaS17,
  author       = {Rastislav R{\'{o}}ka and
                  Pavol Sal{\'{\i}}k},
  title        = {Impact of Environmental Influences on Multilevel Modulation Formats
                  at the Signal Transmission in the Optical Transmission Medium},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2134},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RokaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SahnounHA17,
  author       = {Abdelkabir Sahnoun and
                  Ahmed Habbani and
                  Jamal El Abbadi},
  title        = {{EEPR-OLSR:} an Energy Efficient and Path Reliability protocol for
                  proactive {MANET} routing},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2215},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SahnounHA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SalcedoGG17,
  author       = {Dixon Salcedo Morillo and
                  C{\'{e}}sar D. Guerrero and
                  Julian Guerrero},
  title        = {Overhead in Available Bandwidth Estimation Tools: Evaluation and Analysis},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2475},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SalcedoGG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Saleh17,
  author       = {Ahmed M. Shamsan Saleh},
  title        = {Bio-Inspired Technique: An Adaptive Routing for Reliability and Energy
                  Efficiency Method in Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2326},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Saleh17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SarodeB17,
  author       = {Sambhaji Sarode and
                  Jagdish W. Bakal},
  title        = {{PFPS:} Priority-First Packet Scheduler for {IEEE} 802.15.4 Heterogeneous
                  Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2419},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SarodeB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SaudiFSDY17,
  author       = {Nur Hidayah Mohd Saudi and
                  M. A. Faizal and
                  Siti Rahayu Selamat and
                  Rudy Fadhlee M. D and
                  Wan Ahmad Ramzi W. Y.},
  title        = {Revealing the Feature Influence in {HTTP} Botnet Detection},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2391},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SaudiFSDY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SinghPA17,
  author       = {Pooja Singh and
                  Vikas Pareek and
                  Anil K. Ahlawat},
  title        = {Designing an Energy Efficient Network Using Integration of KSOM, {ANN}
                  and Data Fusion Techniques},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2769},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SinghPA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SulistyoA17,
  author       = {Selo Sulistyo and
                  Sahirul Alam},
  title        = {Distributed Channel and Power Level Selection in {VANET} Based on
                  {SINR} using Game Model},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2896},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SulistyoA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SwainPP17,
  author       = {Jhum Swain and
                  Binod Kumar Pattanayak and
                  Bibudhendu Pati},
  title        = {A New Approach for DDoS attacks to discriminate the attack level and
                  provide security for DDoS nodes in {MANET}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2903},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SwainPP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Taqieddin17,
  author       = {Eyad Salah Taqieddin},
  title        = {On the Improper Use of {CRC} for Cryptographic Purposes in {RFID}
                  Mutual Authentication Protocols},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2376},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Taqieddin17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TitounaGAAA17,
  author       = {Chafiq Titouna and
                  Abdelhak Mourad Gu{\'{e}}roui and
                  Makhlouf Aliouat and
                  Ado Adamou Abba Ari and
                  Amine Adouane},
  title        = {Distributed Fault-Tolerant Algorithm for Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1848},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TitounaGAAA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/YFDS17,
  author       = {Wan Ahmad Ramzi W. Y. and
                  M. A. Faizal and
                  Rudy Fadhlee M. D and
                  Nur Hidayah Mohd Saudi},
  title        = {Revealing Influenced Selected Feature for {P2P} Botnet Detection},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2927},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/YFDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/YichietMK17,
  author       = {Aun Yichiet and
                  Selvakumar Manickam and
                  Shankar Karuppayah},
  title        = {A Review on Features' Robustness in High Diversity Mobile Traffic
                  Classifications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2368},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/YichietMK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/YulianaWS17,
  author       = {Mike Yuliana and
                  Wirawan and
                  Suwadi},
  title        = {Performance Improvement of Secret Key Generation Scheme in Wireless
                  Indoor Environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2890},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/YulianaWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ZeeshanJU17,
  author       = {Muhammad Zeeshan and
                  Huma Javed and
                  Sifat Ullah},
  title        = {Discrete R-Contiguous bit Matching mechanism appropriateness for anomaly
                  detection in Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2456},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ZeeshanJU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Al-SmoulAA16,
  author       = {Khalid M. Al{-}Smoul and
                  Thamer Alrwashdeh and
                  Ali A. Al{-}Dahoud},
  title        = {An Improved Solar Low Energy Adaptive Clustering Hierarchy {(IS-LEACH)}
                  Technique},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {3},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2070},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Al-SmoulAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlmarshadMP16,
  author       = {Malak Abdullah I. Almarshad and
                  Mohssen M. Z. E. Mohammed and
                  Al{-}Sakib Khan Pathan},
  title        = {Detecting Zero-day Polymorphic Worms with Jaccard Similarity Algorithm},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {3},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2128},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlmarshadMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ArbiAHQ16,
  author       = {Abdellaoui Alaoui El Arbi and
                  Said Agoujil and
                  Moha Hajar and
                  Youssef Qaraai},
  title        = {Optimal Cluster Head in {DTN} Routing Hierarchical Topology {(DRHT)}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {2},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1642},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ArbiAHQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AtallaTHH16,
  author       = {Shadi Atalla and
                  Saed Tarapiah and
                  Mahmoud El Hendy and
                  Kamarul Faizal Bin Hashim},
  title        = {Smart Algorithms for Hierarchical Clustering in Optical Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {2},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1943},
  timestamp    = {Mon, 01 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AtallaTHH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AyadKBT16,
  author       = {Soheyb Ayad and
                  Okba Kazar and
                  A{\"{\i}}cha{-}Nabila Benharkat and
                  Labib Sadek Terrissa},
  title        = {Cross-Layer Routing Based on Semantic Web Services Discovery with
                  Energy Evaluation and Optimization in {MANET}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {1},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1698},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AyadKBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AyubZ16,
  author       = {Kamran Ayub and
                  Valerijs Zagurskis},
  title        = {Adoption features and approach for {UWB} Wireless Sensor Network based
                  on Pilot Signal assisted {MAC}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {1},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1574},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AyubZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AzhariTLM16,
  author       = {Maryam el Azhari and
                  Ahmed Toumanari and
                  Rachid Latif and
                  Nadya el Moussaid},
  title        = {Relay based thermal aware and mobility support routing protocol for
                  wireless body sensor networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {2},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1718},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AzhariTLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/DasariV16,
  author       = {Naga Raju Dasari and
                  Vankadara Saritha},
  title        = {Architecture for Fault Tolerance in Mobile Cloud Computing using Disease
                  Resistance Approach},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {2},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1945},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/DasariV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Devi16,
  author       = {Vallala Sowmya Devi},
  title        = {Energy efficient multipath routing protocol for {MANET} for enhancing
                  QoS and QoE in multimedia applications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {3},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2073},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Devi16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Frattolillo16,
  author       = {Franco Frattolillo},
  title        = {A Deterministic Algorithm for the Deployment of Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {1},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1476},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Frattolillo16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/HarwahyuMS16,
  author       = {Ruki Harwahyu and
                  Misbahuddin and
                  Riri Fitri Sari},
  title        = {Performance Evaluation of {LTE} Random Access Procedure under Distributed
                  Location Data Mining for Road Traffic Monitoring},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {3},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2055},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/HarwahyuMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Kamruzzaman16,
  author       = {S. M. Kamruzzaman and
                  Xavier N. Fernando and
                  Mohammad Jaseemuddin},
  title        = {Energy Aware Multipath Routing Protocol for Cognitive Radio Ad Hoc
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {3},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1420},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Kamruzzaman16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MehmoodRNS16,
  author       = {Amir Mehmood and
                  Akhter Raza and
                  Adnan Nadeem and
                  Umair Saeed},
  title        = {Study of Multi-Classification of Advanced Daily Life Activities on
                  {SHIMMER} Sensor Dataset},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {2},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1793},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MehmoodRNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MoussaH16,
  author       = {Ali Cherif Moussa and
                  Sofiane Boukli Hacene},
  title        = {A energy-conserving predictive preemptive multipath routing protocol
                  for adhoc networks: a lifetime improvement},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {1},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1009},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MoussaH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/NozoeNSI16,
  author       = {Tadasuke Nozoe and
                  Masahiko Noguchi and
                  Minoru Sakuma and
                  Mikio Isawa},
  title        = {Live Migration of Virtualized Carrier Grade {SIP} Server},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {2},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1297},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/NozoeNSI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/OrumwenseAS16,
  author       = {Efe Francis Orumwense and
                  Thomas Joachim Odhiambo Afullo and
                  Viranjay M. Srivastava},
  title        = {Energy Efficiency Metrics in Cognitive Radio Networks: {A} Hollistic
                  Overview},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {2},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1805},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/OrumwenseAS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RehmanRKMH16,
  author       = {Aqeel{-}ur Rehman and
                  Sadiq ur Rehman and
                  Iqbal Uddin Khan and
                  Muzaffar Moiz and
                  Sarmad Hasan},
  title        = {Security and Privacy Issues in IoT},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {3},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2074},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RehmanRKMH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RezakhaniSM16,
  author       = {Afshin Rezakhani and
                  Hossein Shirazi and
                  Nasser Modiri},
  title        = {A Novel Access Control Model Based on the Structure of Applications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {2},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1994},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RezakhaniSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SirisalaB16,
  author       = {Nageswararao Sirisala and
                  Shoba Bindu Chigarepalli},
  title        = {Recommendations Based QoS Trust Aggregation and Routing in Mobile
                  Adhoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {3},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2065},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SirisalaB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ThandeeswaranD16,
  author       = {R. Thandeeswaran and
                  M. A. Saleem Durai},
  title        = {{DPCA:} Dual Phase Cloud Infrastructure Authentication},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {3},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2158},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ThandeeswaranD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/UahhabiB16,
  author       = {Zakia El Uahhabi and
                  Hanan El Bakkali},
  title        = {Calculating and Evaluating Trustworthiness of Certification Authority},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {3},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1850},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/UahhabiB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/UllahIKS16,
  author       = {Zakir Ullah and
                  Muhammad Hasan Islam and
                  Adnan Ahmed Khan and
                  Sohail Sarwar},
  title        = {Filtering Dishonest Trust Recommendations in Trust Management Systems
                  in Mobile Ad Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {1},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1568},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/UllahIKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/YazdaniKMG16,
  author       = {Marjan Yazdani and
                  Maryam Kamali and
                  Neda Moghim and
                  Mahdieh Ghazvini},
  title        = {A fair access mechanism based on {TXOP} in {IEEE} 802.11e wireless
                  networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {1},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1278},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/YazdaniKMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/YenkySAG16,
  author       = {Blaise Omer Yenke and
                  Damien Wohwe Sambo and
                  Ado Adamou Abba Ari and
                  Abdelhak Gu{\'{e}}roui},
  title        = {{MMEDD:} Multithreading Model for an Efficient Data Delivery in wireless
                  sensor networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {3},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1787},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/YenkySAG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/alhaddadHM16,
  author       = {Zayed Alhaddad and
                  Mostafa Hanoune and
                  Abdelaziz Mamouni},
  title        = {A collaborative framework for intrusion detection {(C-NIDS)} in Cloud
                  computing},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {8},
  number       = {3},
  year         = {2016},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1950},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/alhaddadHM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AkbilA15,
  author       = {Brahim Akbil and
                  Driss Aboutajdine},
  title        = {Improved {IDMA} for Multiple Access of 5G},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {3},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/940},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AkbilA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlouiKKS15,
  author       = {Imene Aloui and
                  Okba Kazar and
                  La{\"{\i}}d Kahloul and
                  Sylvie Servigne},
  title        = {A new Itinerary planning approach among multiple mobile agents in
                  wireless sensor networks {(WSN)} to reduce energy consumption},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1276},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlouiKKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AouinatouBA15,
  author       = {Rkia Aouinatou and
                  Mostafa Belkasmi and
                  Mohamed Askali},
  title        = {A dynamic study with side channel against An Identification Based
                  Encryption},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {1},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/860},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AouinatouBA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AraujoRMAL15,
  author       = {Josenilson Dias Ara{\'{u}}jo and
                  Dhileane Andrade Rodrigues and
                  Leonardo Silva Melo and
                  Zair Abdelouahab and
                  Denivaldo Cicero Pav{\~{a}}o Lopes},
  title        = {EICIDS-Elastic and Internal Cloud-based Intrusion Detection System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {1},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1031},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AraujoRMAL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AyubZ15,
  author       = {Kamran Ayub and
                  Valerijs Zagurskis},
  title        = {Technology Implications of {UWB} on Wireless Sensor Network-A detailed
                  Survey},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {3},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1261},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AyubZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/CarvalhoR15,
  author       = {Celso Barbosa Carvalho and
                  Jos{\'{e}} Ferreira de Rezende},
  title        = {Routing for capacity improvement in Multi-Channel-Width Multi-Radio
                  Wireless Mesh Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {3},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1201},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/CarvalhoR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/CsokaP15,
  author       = {Tibor Cs{\'{o}}ka and
                  Jaroslav Polec},
  title        = {Modeling Poisson Error Process on Wireless Channels},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {1},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/874},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/CsokaP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/HaKPYR15,
  author       = {Tran Thi Thu Ha and
                  Jinsul Kim and
                  Jaehyung Park and
                  Sunghyun Yoon and
                  HoYong Ryu},
  title        = {Topology Optimization in Hybrid Tree/Mesh-based Peer-to-Peer Streaming
                  System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1306},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/HaKPYR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/HasanK15,
  author       = {Mohammad Irfanul Hasan and
                  Sanjay Kumar},
  title        = {Average Channel Capacity Evaluation for Selection Combining Diversity
                  Schemes over Nakagami-0.5 fading Channels},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1004},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/HasanK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/HasanK15a,
  author       = {Mohammad Irfanul Hasan and
                  Sanjay Kumar},
  title        = {Spectral Efficiency Evaluation for Selection Combining Diversity Schemes
                  under Worst Case of Fading Scenario},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {3},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1314},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/HasanK15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KhalidMAR15,
  author       = {Shahrukh Khalid and
                  Athar Mahboob and
                  Choudhry Fahad Azim and
                  Aqeel{-}ur Rehman},
  title        = {{IDHOCNET-A} Novel Protocol Stack and Architecture for Ad hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {1},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/975},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KhalidMAR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KhokharN15,
  author       = {Umar Mujahid Khokhar and
                  Muhammad Najam{-}ul{-}Islam},
  title        = {Pitfalls in Ultralightweight {RFID} Authentication Protocol},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {3},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1357},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KhokharN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/LavrovaP15,
  author       = {Daria S. Lavrova and
                  Alexander I. Pechenkin},
  title        = {Applying Correlation and Regression Analysis Methods for Security
                  Incidents Detection in the Internet of Things},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {3},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1375},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/LavrovaP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MirjazaeeM15,
  author       = {Nassim Mirjazaee and
                  Neda Moghim},
  title        = {A Driving Path Based Opportunistic Routing in Vehicular Ad Hoc Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {3},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1292},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MirjazaeeM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PrakashP15,
  author       = {Maria Johan Viju Prakash and
                  Balasubramanian Paramasivan},
  title        = {An Individual Node Delay Based Efficient Power Aware Routing Protocol
                  for Wireless Heterogeneous Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {1},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/998},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PrakashP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RokaM15,
  author       = {Rastislav R{\'{o}}ka and
                  Martin Mokr{\'{a}}n},
  title        = {Modeling of the {PSK} utilization at the signal transmission in the
                  optical transmission medium},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {3},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1471},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RokaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SaraylooGS15,
  author       = {Mahdiyar Sarayloo and
                  Ennio Gambi and
                  Susanna Spinsante},
  title        = {Full-length non-linear binary sequences with Zero Correlation Zone
                  for multiuser communications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1143},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SaraylooGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ShobanaP15,
  author       = {Jeya Shobana and
                  Balasubramanian Paramasivan},
  title        = {{GCCP} - {NS:} Grid based Congestion Control protocol with N-Sinks
                  in a Wireless Sensor Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1085},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ShobanaP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SukuvaaraMYKPVA15,
  author       = {Timo Sukuvaara and
                  Kari M{\"{a}}enp{\"{a}}{\"{a}} and
                  Riika Ylitalo and
                  Heikki Konttaniemi and
                  Juha Pet{\"{a}}j{\"{a}}j{\"{a}}rvi and
                  Juho Veskoniemi and
                  Matti Autioniemi},
  title        = {Vehicular Networking Road Weather Information System Tailored for
                  Arctic Winter Conditions},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {1},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1043},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SukuvaaraMYKPVA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ToumiTMET15,
  author       = {Hicham Toumi and
                  Amal Talea and
                  Bouchra Marzak and
                  Ahmed Eddaoui and
                  Mohamed Talea},
  title        = {Cooperative Trust Framework for Cloud Computing Based on Mobile Agents},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1094},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ToumiTMET15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/VSIK15,
  author       = {Sarasvathi V. and
                  Snehanshu Saha and
                  N. Ch. S. N. Iyengar and
                  Mahalaxmi Koti},
  title        = {Coefficient of Restitution based Cross Layer Interference Aware Routing
                  Protocol in Wireless Mesh Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {3},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1358},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/VSIK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/YangKC15,
  author       = {Hongsun Yang and
                  Seungcheon Kim and
                  Soon{-}Yong Chun},
  title        = {Bearing Accuracy Improvement of the Amplitude Comparison Direction
                  Finding Equipment by Analyzing the Error},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2015},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1309},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/YangKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AbrarGP14,
  author       = {Muhammad Abrar and
                  Xiang Gui and
                  Amal Punchihewa},
  title        = {Low Complexity Joint Sub-Carrier Pairing, Allocation and Relay Selection
                  in Cooperative Wireless Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {3},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/608},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbrarGP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AliJF14,
  author       = {Tariq Ali and
                  Low Tang Jung and
                  Ibrahima Faye},
  title        = {Classification of Routing Algorithms in Volatile Environment of Underwater
                  Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {2},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/670},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AliJF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BaddiK14,
  author       = {Youssef Baddi and
                  Mohamed D{\^{a}}fir Ech{-}Cherif El Kettani},
  title        = {QoS-VNS-CS: QoS constraints Core Selection Algorithm based on Variable
                  Neighborhood Search Algorithm},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {1},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/454},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BaddiK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BuiNP14,
  author       = {Ninh Trung Bui and
                  Tuan Q. Nguyen and
                  Hoi V. Pham},
  title        = {Effects of {ASE} noise and dispersion chromatic on performance of
                  {DWDM} networks using distributed Raman amplifiers},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {2},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/716},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BuiNP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/EbrahimC14,
  author       = {Mansoor Ebrahim and
                  Chai Wai Chong},
  title        = {A Comprehensive Review of Distributed Coding Algorithms for Visual
                  Sensor Network {(VSN)}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {2},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/587},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/EbrahimC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GuerroumiPBM14,
  author       = {Mohamed Guerroumi and
                  Al{-}Sakib Khan Pathan and
                  Nadjib Badache and
                  Samira Moussaoui},
  title        = {On the Medium Access Control Protocols Suitable for Wireless Sensor
                  Networks - {A} Survey},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {2},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/611},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GuerroumiPBM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/HaceneOB14,
  author       = {Sofiane Boukli Hacene and
                  Abdelkader Ouali and
                  Asmaa Bassou},
  title        = {Predictive preemptive certificate transfer in Cluster-Based Certificate
                  Chain},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {1},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/579},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/HaceneOB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ImtiazA14,
  author       = {Waqas Ahmed Imtiaz and
                  Nasim Ahmed},
  title        = {Cardinality Enhancement of {SAC-OCDMA} Systems Using New Diagonal
                  Double Weight Code},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {3},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/852},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ImtiazA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/IyengarBG14,
  author       = {N. Ch. S. N. Iyengar and
                  Arindam Banerjee and
                  Gopinath Ganapathy},
  title        = {A Fuzzy Logic Based Defense Mechanism against Distributed Denial of
                  Services Attack in Cloud Environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {3},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/864},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/IyengarBG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/JavedSM14,
  author       = {Farrukh Javed and
                  Imran Shafi and
                  Asad Mahmood},
  title        = {Optimal Spectrum Sensing Threshold for Unequal Priors Case},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {1},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/546},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/JavedSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/JungLK14,
  author       = {Whoi Jin Jung and
                  Jae Yong Lee and
                  Byung{-}Chul Kim},
  title        = {Joint Link Scheduling and Routing for Load Balancing in {STDMA} Wireless
                  Mesh Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {3},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/857},
  timestamp    = {Thu, 07 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/JungLK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KazatzopoulosDA14,
  author       = {Leonidas Kazatzopoulos and
                  Costas Delakouridis and
                  Christos Anagnostopoulos},
  title        = {{WSN} Location Privacy Scheme Enhancement through Epidemical Information
                  Dissemination},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {2},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/717},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KazatzopoulosDA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Khan14,
  author       = {Adnan Shahid Khan},
  title        = {Secure and Efficient Distributed Relay-Based Rekeying Algorithm for
                  Group Communication in Mobile Multihop Relay Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {3},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/745},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Khan14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KhokharN14,
  author       = {Umar Mujahid Khokhar and
                  Muhammad Najam{-}ul{-}Islam},
  title        = {Ultralightweight Cryptography for passive {RFID} systems},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {3},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/630},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KhokharN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/LataK14,
  author       = {Manju Lata and
                  Adarsh Kumar},
  title        = {Survey on Lightweight Primitives and Protocols for {RFID} in Wireless
                  Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {1},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/572},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/LataK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MuthumeenakshiR14,
  author       = {K. Muthumeenakshi and
                  S. Radha},
  title        = {Improved Sensing Accuracy using Enhanced Energy Detection Algorithm
                  with Secondary User Cooperation in Cognitive Radios},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {1},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/533},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MuthumeenakshiR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/NguyenNMS14,
  author       = {Duc Kien Nguyen and
                  Hoang Nam Nguyen and
                  Hiroaki Morino and
                  Iwao Sasase},
  title        = {Uplink Channel Allocation Scheme and QoS Management Mechanism for
                  Cognitive Cellular-Femtocell Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {1},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/624},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/NguyenNMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/OlufonCHRS14,
  author       = {Tope Olufon and
                  Carlene E.{-}A. Campbell and
                  Stephen Hole and
                  Kapilan Radhakrishnan and
                  Arya Sedigh},
  title        = {Mitigating External Threats in Wireless Local Area Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {3},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/797},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/OlufonCHRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SadeghianFA14,
  author       = {Hooman Sadeghian and
                  Ali Farahani and
                  Maghsoud Abbaspour},
  title        = {Overhead-controlled contention-based routing for VANETs},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {2},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/631},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SadeghianFA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SaeedKSY14,
  author       = {Awais Saeed and
                  Adnan Ahmed Khan and
                  Syed Ismail Shah and
                  Shariq Yasin},
  title        = {Capacity Dimensioning of {HSDPA} Urban Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {2},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/651},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SaeedKSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TouilF14,
  author       = {Hicham Touil and
                  Youssef Fakhri},
  title        = {A fuzzy-based QoS Maximization protocol for WiFi Multimedia {(IEEE}
                  802.11e) Ad hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {3},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/767},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TouilF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/VIS14,
  author       = {Sarasvathi V. and
                  N. Ch. S. N. Iyengar and
                  Snehanshu Saha},
  title        = {An Efficient Interference Aware Partially Overlapping Channel Assignment
                  and Routing in Wireless Mesh Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {1},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/574},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/VIS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/WangC14,
  author       = {Gicheol Wang and
                  Gihwan Cho},
  title        = {Securing Cluster Formation and Cluster Head Elections in Wireless
                  Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {6},
  number       = {1},
  year         = {2014},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/643},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/WangC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AbdelhakBG13,
  author       = {Ferchichi Abdelhak and
                  Sabri Beldi and
                  Ali Gharsallah},
  title        = {An electrical model to design a Metamaterial Left Hand Antenna},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {3},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/413},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbdelhakBG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AbidinDR13,
  author       = {Husna Zainol Abidin and
                  Norashidah Md Din and
                  Nurul Asyikin Mohamed Radzi},
  title        = {Deterministic Static Sensor Node Placement in Wireless Sensor Network
                  based on Territorial Predator Scent Marking Behaviour},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {3},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/426},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbidinDR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BenmammarAK13,
  author       = {Badr Benmammar and
                  Asma Amraoui and
                  Francine Krief},
  title        = {A Survey on Dynamic Spectrum Access Techniques in Cognitive Radio
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {2},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/327},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BenmammarAK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/DehbiBM13,
  author       = {Youssef Dehbi and
                  Hafssa Benaboud and
                  Noufissa Mikou},
  title        = {A Geometric Backoff Time Distribution of {IEEE} 802.11 {DCF:} An Analytical
                  Study},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {3},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/453},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/DehbiBM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/FahmiAG13,
  author       = {Arfianto Fahmi and
                  Muhamad Asvial and
                  Dadang Gunawan},
  title        = {Combined-order Algorithm using Promethee Method Approach and Analytic
                  Hierarchy Decision for Chunk Allocation in {LTE} Uplink Systems},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {1},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/291},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/FahmiAG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/FrancoBC13,
  author       = {Deivison Pinheiro Franco and
                  Felipe Dantas Barboza and
                  N{\'{a}}gila Magalh{\~{a}}es Cardoso},
  title        = {A Secure Method for Authenticity Verification of Handwritten Signatures
                  Through Digital Image Processing and Artificial Neural Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {2},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/382},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/FrancoBC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GhazviniMJ13,
  author       = {Mahdieh Ghazvini and
                  Naser Movahhedinia and
                  Kamal Jamshidi},
  title        = {A Game Theory based Contention Window Adjustment for {IEEE} 802.11
                  under Heavy Load},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {2},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/293},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GhazviniMJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GuerroumiPBM13,
  author       = {Mohamed Guerroumi and
                  Al{-}Sakib Khan Pathan and
                  Nadjib Badache and
                  Samira Moussaoui},
  title        = {Strengths and Weaknesses of Prominent Data Dissemination Techniques
                  in Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {3},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/509},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GuerroumiPBM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/HajlaouiJJ13,
  author       = {Nasreddine Hajlaoui and
                  Issam Jabri and
                  Maher Ben Jemaa},
  title        = {Experimental Performance Evaluation and Frame Aggregation Enhancement
                  in {IEEE} 802.11n WLANs},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {1},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/286},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/HajlaouiJJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/IqbalA13,
  author       = {Arif Iqbal and
                  Kazi M. Ahmed},
  title        = {Integrated Satellite-Terrestrial System Capacity Over Mix Shadowed
                  Rician and Nakagami Channels},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {2},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/325},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/IqbalA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/JeyanthiIKK13,
  author       = {N. Jeyanthi and
                  N. Ch. S. N. Iyengar and
                  P. C. Mogan Kumar and
                  A. Kannammal},
  title        = {An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {2},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/367},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/JeyanthiIKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KhalidM13,
  author       = {Shahrukh Khalid and
                  Athar Mahboob},
  title        = {Design and Implementation of {ID} Based {MANET} Autoconfiguration
                  Protocol},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {3},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/409},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KhalidM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KindyP13,
  author       = {Diallo Abdoulaye Kindy and
                  Al{-}Sakib Khan Pathan},
  title        = {A Detailed Survey on Various Aspects of {SQL} Injection in Web Applications:
                  Vulnerabilities, Innovative Attacks, and Remedies},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {2},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/364},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KindyP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Meghanathan13,
  author       = {Natarajan Meghanathan},
  title        = {A Survey on the Communication Protocols and Security in Cognitive
                  Radio Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {1},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/249},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Meghanathan13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MoussaKH13,
  author       = {Ali Cherif Moussa and
                  Kamel Mohamed Faraoun and
                  Sofiane Boukli Hacene},
  title        = {Link Quality and MAC-Overhead aware Predictive Preemptive Multipath
                  Routing Protocol for Mobile Ad hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {3},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/437},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MoussaKH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/NaderiSJ13,
  author       = {Hamid Naderi and
                  Hadi Shahosseini and
                  Amir Jafari},
  title        = {Evaluation {MCDM} Multi-disjoint Paths Selection Algorithms Using
                  Fuzzy-Copeland Ranking Method},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {1},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/288},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/NaderiSJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/NouhCB13,
  author       = {Sa{\"{\i}}d Nouh and
                  Idriss Chana and
                  Mostafa Belkasmi},
  title        = {Decoding of Block Codes by using Genetic Algorithms and Permutations
                  Set},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {3},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/428},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/NouhCB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RiazSRSI13,
  author       = {Faisal Riaz and
                  Syed Ismail Shah and
                  Muhammad Raees and
                  Imran Shafi and
                  Arslan Iqbal},
  title        = {Lateral Pre-crash Sensing and Avoidance in Emotion Enabled Cognitive
                  Agent based Vehicle-2-Vehicle Communication System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {2},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/355},
  timestamp    = {Wed, 23 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RiazSRSI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SahraouiB13,
  author       = {Somia Sahraoui and
                  Souheila Bouam},
  title        = {Secure Routing Optimization in Hierarchical Cluster-Based Wireless
                  Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {3},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/465},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SahraouiB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/WeiF0AP13,
  author       = {Xianglin Wei and
                  Jianhua Fan and
                  Ming Chen and
                  Tarem Ahmed and
                  Al{-}Sakib Khan Pathan},
  title        = {{SMART:} {A} Subspace based Malicious Peers Detection algorithm for
                  {P2P} Systems},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {1},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/199},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/WeiF0AP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ZeeshanK13,
  author       = {Muhammad Zeeshan and
                  Shoab Ahmed Khan},
  title        = {Robust Sampling Clock Recovery Algorithm for Wideband Networking Waveform
                  of {SDR}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {5},
  number       = {1},
  year         = {2013},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/272},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ZeeshanK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AhmedWAP12,
  author       = {Tarem Ahmed and
                  Xianglin Wei and
                  Supriyo Ahmed and
                  Al{-}Sakib Khan Pathan},
  title        = {Automated Intruder Detection from Image Sequences using Minimum Volume
                  Sets},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {1},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/88},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AhmedWAP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BisengarRO12,
  author       = {Ahmed Bisengar and
                  Mohammed Rziza and
                  Mohamed Ouadou},
  title        = {Queue Length and Mobility aware Routing Protocol for Mobile Ad hoc
                  Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {3},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/232},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BisengarRO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/FdiliFA12,
  author       = {Othmane Alaoui Fdili and
                  Youssef Fakhri and
                  Driss Aboutajdine},
  title        = {Impact of queue buffer size awareness on single and multi service
                  real-time routing protocols for WSNs},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {2},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/164},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/FdiliFA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GrayeliSM12,
  author       = {Parisa Grayeli and
                  Shahram Sarkani and
                  Thomas A. Mazzuchi},
  title        = {Performance Analysis of IPv6 Transition Mechanisms over {MPLS}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {2},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/155},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GrayeliSM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/HussainBS12,
  author       = {Haider N. Hussain and
                  Kamalrulnizam Abu Bakar and
                  Shaharuddin Salleh},
  title        = {Using Media Independent Handover to Support PMIPv6 Inter-domain Mobility
                  Based Vehicular Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {3},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/210},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/HussainBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/HussainiBSAAI12,
  author       = {M. Hussaini and
                  Habeeb Bello{-}Salau and
                  Abdulazeez Femi Salami and
                  Farhat Anwar and
                  A. H. Abdalla and
                  Md. Rafiqul Islam},
  title        = {Enhanced Clustering Routing Protocol for Power-Efficient Gathering
                  in Wireless Sensor Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {1},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/101},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/HussainiBSAAI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/JalaliB12,
  author       = {Hanieh Jalali and
                  Ahmad Baraani},
  title        = {Process Aware Host-based Intrusion Detection Model},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {2},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/181},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/JalaliB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/JavedSM12,
  author       = {Farrukh Javed and
                  Imran Shafi and
                  Asad Mahmood},
  title        = {A Novel Radio Mode Identification Approach for Spectrum Sensing in
                  Cognitive Radios},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {2},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/145},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/JavedSM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/JeyanthiI12,
  author       = {N. Jeyanthi and
                  N. Ch. S. N. Iyengar},
  title        = {Packet Resonance Strategy: {A} Spoof Attack Detection and Prevention
                  Mechanism in Cloud Computing Environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {3},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/238},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/JeyanthiI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KesavanR12,
  author       = {V. Thiruppathy Kesavan and
                  S. Radhakrishnan},
  title        = {Multiple Secret Keys based Security for Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {1},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/136},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KesavanR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KhanDBA12,
  author       = {Shah Nawaz Khan and
                  Ali Diab and
                  Christian Brosch and
                  Mushtaq Ahmad},
  title        = {Self-Organized Disjoint Service Placement in Future Mobile Communication
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {2},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/169},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KhanDBA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Kim12,
  author       = {Pyung Soo Kim},
  title        = {Fair Packet Distribution on Multi-interfaced Mobile Router for Mobile
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {2},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/178},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Kim12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Meghanathan12,
  author       = {Natarajan Meghanathan},
  title        = {Link Expiration Time and Minimum Distance Spanning Trees based Distributed
                  Data Gathering Algorithms for Wireless Mobile Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {3},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/248},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Meghanathan12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PopescuTPK12,
  author       = {Ana{-}Maria Popescu and
                  Ion Gabriel Tudorache and
                  Bo Peng and
                  Andrew H. Kemp},
  title        = {Surveying Position Based Routing Protocols for Wireless Sensor and
                  Ad-hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {1},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/85},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PopescuTPK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RokaC12,
  author       = {Rastislav R{\'{o}}ka and
                  Filip Cert{\'{\i}}k},
  title        = {Modeling of Environmental Influences at the Signal Transmission in
                  the Optical Transmission Medium},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {3},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/233},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RokaC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SaadaneW12,
  author       = {Rachid Saadane and
                  Mohammed Wahbi},
  title        = {{UWB} Indoor Radio Propagation Modelling in Presence of Human Body
                  Shadowing Using Ray Tracing Technique},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {2},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/190},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SaadaneW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Sen12,
  author       = {Jaydip Sen},
  title        = {A Secure and User Privacy-Preserving Searching Protocol for Peer-to-Peer
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {1},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/139},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Sen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TangXTZ12,
  author       = {Shensheng Tang and
                  Yi Xie and
                  Chenghua Tang and
                  Jinwen Zhu},
  title        = {A Comparative Study of Power Line Communication Networks With and
                  Without Buffer},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {2},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/180},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TangXTZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ZafarHAHK12,
  author       = {Haseeb Zafar and
                  David Harle and
                  Ivan Andonovic and
                  Laiq Hasan and
                  Amjad Ullah Khattak},
  title        = {QoS-aware Multipath Routing Scheme for Mobile Ad Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {1},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/157},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ZafarHAHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ZeeshanK12,
  author       = {Muhammad Zeeshan and
                  Shoab Ahmed Khan},
  title        = {A Robust Carrier Frequency Offset Estimation Algorithm in Burst Mode
                  Multicarrier {CDMA} based Ad Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {3},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/221},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ZeeshanK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AcevedoCA11,
  author       = {Claudia Patricia Acevedo and
                  Gabriel El{\'{\i}}as Chanch{\'{\i}} and
                  Jos{\'{e}} L. Arciniegas},
  title        = {Surveying Mobile Television},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {1},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/69},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AcevedoCA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AkpojaroAO11,
  author       = {Jackson Akpojaro and
                  Princewill Aigbe and
                  David Oyemade},
  title        = {A Cost-Based Approach for Analysing the Overheads of Multicast Protocols
                  in Non-Strictly Hierarchical Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {1},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/71},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AkpojaroAO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BhuyanBK11,
  author       = {Monowar Hussain Bhuyan and
                  Dhruba K. Bhattacharyya and
                  Jugal K. Kalita},
  title        = {Survey on Incremental Approaches for Network Anomaly Detection},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {3},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/104},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BhuyanBK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BogdanoskiR11,
  author       = {Mitko Bogdanoski and
                  Aleksandar Risteski},
  title        = {Wireless Network Behavior under {ICMP} Ping Flood DoS Attack and Mitigation
                  Techniques},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {1},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/65},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BogdanoskiR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/CampbellLKK11,
  author       = {Carlene E.{-}A. Campbell and
                  Kok{-}Keong Loo and
                  Heba A. Kurdi and
                  Shafiullah Khan},
  title        = {Comparison of {IEEE} 802.11 and {IEEE} 802.15.4 for Future Green Multichannel
                  Multi-radio Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {1},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/75},
  timestamp    = {Tue, 29 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/CampbellLKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/El-BadawyMRT11,
  author       = {El{-}Sayed A. El{-}Badawy and
                  Abd El{-}Naser A. Mohamed and
                  Ahmed Nabih Zaki Rashed and
                  Mohamed Salah F. Tabbour},
  title        = {New Trends of Radio over Fiber Communication Systems for Ultra High
                  Transmission Capacity},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {3},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/103},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/El-BadawyMRT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/El-dokanyRE11,
  author       = {Ibrahim M. Eldokany and
                  Abd El{-}Naser A. Mohamed and
                  Ahmed Nabih Zaki Rashed and
                  Amina E. M. El{-}Nabawy},
  title        = {Upgrading Efficiency and Improvement of the Performance of Broadband
                  Wireless Optical Access Communication Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/80},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/El-dokanyRE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/JaggiS11,
  author       = {Parmeet Kaur Jaggi and
                  Awadhesh Kumar Singh},
  title        = {Message efficient global snapshot recording using a self stabilizing
                  spanning tree in a {MANET}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {3},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/106},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/JaggiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KhamaysehBMY11,
  author       = {Yaser M. Khamayseh and
                  Abdulraheem Bader and
                  Wail Mardini and
                  Muneer O. Bani Yassein},
  title        = {A New Protocol for Detecting Black Hole Nodes in Ad Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {1},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/67},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KhamaysehBMY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Masria11,
  author       = {Ali El Masri and
                  Naceur Malouch and
                  Hicham Khalife},
  title        = {A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {1},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/72},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Masria11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Meghanathan11,
  author       = {Natarajan Meghanathan},
  title        = {Survey of Topology-based Multicast Routing Protocols for Mobile Ad
                  hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/78},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Meghanathan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MisurecO11,
  author       = {Jiri Misurec and
                  Milos Orgon},
  title        = {Modeling of Power Line Transfer of Data for Computer Simulation},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/76},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MisurecO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MustaphaJM11,
  author       = {Ibrahim Mustapha and
                  Jibrin J. Jiya and
                  Bukar U. Musa},
  title        = {Modeling and Analysis of Collision Avoidance {MAC} Protocol in Multi-Hop
                  Wireless Ad-Hoc Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {1},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/68},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MustaphaJM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PoctavekMK11,
  author       = {Jan Poctavek and
                  Naceur Malouch and
                  Hicham Khalife},
  title        = {Throughput Parameter Optimization of Adaptive {ARQ/HARQ} Scheme},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {1},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/74},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PoctavekMK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ShuaibuS11,
  author       = {Dahiru Sani Shu'aibu and
                  Sharifah Kamilah Syed Yusof},
  title        = {Link Aware Earliest Deadline Scheduling Algorithm for WiMAX},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {1},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/73},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ShuaibuS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ShuminoskiJ11,
  author       = {Tomislav Shuminoski and
                  Toni Janevski},
  title        = {Novel Adaptive QoS Provisioning in Heterogeneous Wireless Environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {1},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/63},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ShuminoskiJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SivridisWC11,
  author       = {Leonidas Sivridis and
                  Xinheng Wang and
                  Jinho Choi},
  title        = {Impact of Varying Channel Model Mixtures on Radio Resource Management
                  for the {OFDMA} Downlink},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/84},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SivridisWC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Tang11,
  author       = {Shensheng Tang},
  title        = {Traffic Flow Analysis of a Multi-hop Wireless Sensor Network Subject
                  to Node Failure},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/81},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Tang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Tang11a,
  author       = {Shensheng Tang},
  title        = {Performance Analysis of Two Case Studies for a Power Line Communication
                  Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/83},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Tang11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TangX11,
  author       = {Shensheng Tang and
                  Yi Xie},
  title        = {Performance Analysis of Unreliable Sensing for an Opportunistic Spectrum
                  Sharing System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {3},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/105},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TangX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TarngDOC11,
  author       = {Wernhuar Tarng and
                  Li{-}Zhong Deng and
                  Kuo{-}Liang Ou and
                  Mingteh Chen},
  title        = {The Analysis and Identification of {P2P} Botnet's Traffic Flows},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/79},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TarngDOC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TarngOHDLYHC11,
  author       = {Wernhuar Tarng and
                  Kuo{-}Liang Ou and
                  Kun{-}Jie Huang and
                  Li{-}Zhong Deng and
                  Hao{-}Wei Lin and
                  Chang Wu Yu and
                  Kuen{-}Rong Hsieh and
                  Mingteh Chen},
  title        = {Applying Cluster Merging and Dynamic Routing Mechanisms to Extend
                  the Lifetime of Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {1},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/64},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TarngOHDLYHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ThamilarasuMS11,
  author       = {Geethapriya Thamilarasu and
                  Sumita Mishra and
                  Ramalingam Sridhar},
  title        = {Improving Reliability of Jamming Attack Detection in Ad hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {1},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/70},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ThamilarasuMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Trivino-Cabrera11,
  author       = {Alicia Trivi{\~{n}}o{-}Cabrera},
  title        = {Survey on Opportunistic Routing in Multihop Wireless Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/82},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Trivino-Cabrera11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TudzarovJ11,
  author       = {Aleksandar Tudzarov and
                  Toni Janevski},
  title        = {Design for 5G Mobile Network Architecture},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {2},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/77},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TudzarovJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ZafarAHA11,
  author       = {Haseeb Zafar and
                  Nancy Alhamahmy and
                  David Harle and
                  Ivan Andonovic},
  title        = {Survey of Reactive and Hybrid Routing Protocols for Mobile Ad Hoc
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {3},
  number       = {3},
  year         = {2011},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/102},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ZafarAHA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AbdelhakFA10,
  author       = {Ferchichi Abdelhak and
                  Najib Fadlallah and
                  Gharssallah Ali},
  title        = {A Sierpenski slot antenna as a {TAG} {RFID} antenna},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {3},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/61},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbdelhakFA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Abou-KhalilP10,
  author       = {Georges Abou{-}Khalil and
                  Samuel Pierre},
  title        = {Client-Based Network-Assisted Mobile IPv6},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {3},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/58},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Abou-KhalilP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Al-RodhaanMO10,
  author       = {Mznah Al{-}Rodhaan and
                  Lewis M. Mackenzie and
                  Mohamed Ould{-}Khaoua},
  title        = {Efficient Expanding Ring Search for MANETs},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {3},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/50},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Al-RodhaanMO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AyyashUA10,
  author       = {Moussa Ayyash and
                  Donald R. Ucci and
                  Khaled M. Alzoubi},
  title        = {A Proactively Maintained Quality of Service Infrastructure for Wireless
                  Mobile Ad Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {2},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/46},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AyyashUA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BrancoH10,
  author       = {Rodrigo Rubira Branco and
                  Celso Massaki Hirata},
  title        = {Streamed analysis of network files to avoid false positives and to
                  detect client-side attacks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {3},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/52},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BrancoH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/CardoteS10,
  author       = {Andr{\'{e}} Cardote and
                  Susana Sargento},
  title        = {Mesh Networks Planning: Optimization with Multi-Hop Interference},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {2},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/41},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/CardoteS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Chandran10,
  author       = {Sathish Chandran},
  title        = {Enhanced Wideband Adaptive Arrays with Different Length Quadrature
                  Mirror Filter Banks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/29},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Chandran10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Che10,
  author       = {Xianhui Che},
  title        = {Overview of Optical Local Access Networks Development and Design Challenges},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/35},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Che10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ChengS10,
  author       = {Lin Cheng and
                  Rahul Shakya},
  title        = {Worm Spreading and Patching in Inter-vehicle Communications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/32},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ChengS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ChromyK10,
  author       = {Erik Chrom{\'{y}} and
                  Matej Kavack{\'{y}}},
  title        = {Asynchronous Networks and Erlang Formulas},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {2},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/38},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ChromyK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Dutta10,
  author       = {Nitul Dutta},
  title        = {QoS provisioning in three layer MIPv6 Architecture using {RSVP}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {2},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/39},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Dutta10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GarciaLSG10,
  author       = {Miguel Garcia and
                  Jaime Lloret and
                  Sandra Sendra and
                  Raquel Lacuesta Gilaberte},
  title        = {Secure Communications in Group-based Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/27},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GarciaLSG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/IndumathiM10,
  author       = {G. Indumathi and
                  K. Murugesan},
  title        = {An Adaptive Time slot Allocation for Statistical QoS guarantees in
                  Wireless Networks using Cross-layer approach},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/30},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/IndumathiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/IslamI10,
  author       = {Md. Jahedul Islam and
                  Md. Rafiqul Islam},
  title        = {Impact of Chip Shape on the Performance of {DS-OCDMA} in Presence
                  of {GVD} and {SPM}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {3},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/51},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/IslamI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Kamruzzaman10,
  author       = {S. M. Kamruzzaman},
  title        = {An Energy Efficient Multichannel {MAC} Protocol for Cognitive Radio
                  Ad Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {2},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/45},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Kamruzzaman10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Kathirvel10,
  author       = {Ayyaswamy Kathirvel},
  title        = {Enhanced Triple Umpiring System for Security and Performance Improvement
                  in Wireless {MANETS}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {2},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/37},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Kathirvel10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KhanLK10,
  author       = {Shoaib Khan and
                  Kok{-}Keong Loo and
                  Adnan K. Kiani},
  title        = {Tested Evaluation of Fast and Secure Handover in FMIPv6},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/34},
  timestamp    = {Tue, 29 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KhanLK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KhanMF10,
  author       = {Y. A. Khan and
                  Mohammad Abdul Matin and
                  S. I. Ferdous},
  title        = {{PAPR} Reduction in {MIMO-OFDM} Systems using Modified {PTS} and {SLM}
                  without Side Information},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {3},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/60},
  timestamp    = {Mon, 21 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KhanMF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/LuCA10,
  author       = {Jun Lu and
                  Te{-}Shun Chou and
                  Jean H. Andrian},
  title        = {Semi-Blind Channel Estimation and Multi-User Data Detection for Downlink
                  {MC-CDMA}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {3},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/54},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/LuCA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Meghanathan10,
  author       = {Natarajan Meghanathan},
  title        = {Grid Block Energy Based Data Gathering Algorithms for Wireless Sensor
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {3},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/48},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Meghanathan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MusaM10,
  author       = {Sarhan M. Musa and
                  Nader F. Mir},
  title        = {Handoff Management for Mobile Agents in High Speed Wireless Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {3},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/55},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MusaM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PadmavathyC10,
  author       = {T. V. Padmavathy and
                  M. Chitra},
  title        = {Performance Evaluation of Energy Efficient Modulation Scheme and Hop
                  Distance Estimation for {WSN}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/31},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PadmavathyC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Pathan10,
  author       = {Al{-}Sakib Khan Pathan},
  title        = {A Review and Cryptanalysis of Similar Timestamp-Based Password Authentication
                  Schemes Using Smart Cards},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/28},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Pathan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PradheepkumarVZ10,
  author       = {S. Pradheepkumar and
                  V. Vijayalakshmi and
                  G. Zayaraz},
  title        = {Implementation of Pseudo-Random Route-Driven {ECDH} Scheme for Heterogeneous
                  Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/26},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PradheepkumarVZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RajhiGG10,
  author       = {Adnen Rajhi and
                  Said Ghnimi and
                  Ali Garssallah},
  title        = {Electrical Characteristics of a Dual-Band Microstrip Patch Antenna
                  for {GSM/} {UMTS} / {WLAN} Operations},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/33},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RajhiGG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RasulNP10,
  author       = {Khadija Rasul and
                  Nujhat Nuerie and
                  Al{-}Sakib Khan Pathan},
  title        = {Securing Wireless Sensor Networks with An Efficient {B+} Tree-Based
                  Key Management Scheme},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {3},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/49},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RasulNP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Sen10,
  author       = {Jaydip Sen},
  title        = {An Agent-Based Intrusion Detection System for Local Area Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {2},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/44},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Sen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TarngCDOHC10,
  author       = {Wernhuar Tarng and
                  Nai{-}Wei Chen and
                  Li{-}Zhong Deng and
                  Kuo{-}Liang Ou and
                  Kun{-}Rong Hsie and
                  Mingteh Chen},
  title        = {The Integration of Heterogeneous Wireless Networks {(IEEE} 802.11/IEEE
                  802.16) and its QoS Analysis},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {3},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/53},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TarngCDOHC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/VidhyaP10,
  author       = {J. Vidhya and
                  Perumal Dananjayan},
  title        = {Energy Efficient {STBC} -Encoded Cooperative {MIMO} Routing Scheme
                  for Cluster Based wireless sensor networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {3},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/57},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/VidhyaP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/WadeFCFH10,
  author       = {Joshua B. Wade and
                  Hiroshi Fujinoki and
                  Adam Coffman and
                  Delia M. Feerer and
                  Andrew G. Hauck},
  title        = {A Cross-Layer Approach for Mitigating Denial of Service Attacks: Device-Driver
                  Packet Filter and Remote Firewalling},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {3},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/59},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/WadeFCFH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/WahidK10,
  author       = {Abdul Wahid and
                  Dongkyun Kim},
  title        = {Analyzing Routing Protocols for Underwater Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {3},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/62},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/WahidK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/XuZH10,
  author       = {Gang Xu and
                  Yiwen Zhu and
                  Meng Han},
  title        = {Broadband cognitive radio transmission based on sub-channel sensing
                  and {NC-OFDM}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {2},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/40},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/XuZH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/YangW10,
  author       = {Shun{-}Fang Yang and
                  Jung{-}Shyr Wu},
  title        = {Guard Channel based Call Admission Control Schemes in Hierarchical
                  Mobile IPv6 Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {2},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/36},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/YangW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/YusofWF10,
  author       = {Kamaludin Mohamad Yusof and
                  John Woods and
                  Steve Fitz},
  title        = {{LFSSR:} Localised Frequency Scanning Short Range Estimation for Wireless
                  Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {3},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/56},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/YusofWF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AbdelhakFNA09,
  author       = {Ferchichi Abdelhak and
                  Najib Fadlallah and
                  Sboui Noureddine and
                  Gharssallah Ali},
  title        = {Analysis and Design of Printed Fractal Antennas by Using an Adequate
                  Electrical Model},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {3},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/24},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbdelhakFNA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Al-KhateebH09,
  author       = {Mohammed K. Al{-}Khateeb and
                  Aisha{-}Hassan A. Hashim},
  title        = {A Fuzzy-based Mobility Prediction in the {IEEE} 802.16e},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Al-KhateebH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ChaloufK09,
  author       = {Mohamed Aymen Chalouf and
                  Francine Krief},
  title        = {A Secured Service Level Negotiation In Ubiquitous Environments},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {2},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/9},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ChaloufK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/CheC09,
  author       = {Xianhui Che and
                  Lee J. Cobley},
  title        = {VoIP Performance over Different Interior Gateway Protocols},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/6},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/CheC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/DriniS09,
  author       = {Merlinda Drini and
                  Tarek N. Saadawi},
  title        = {Link Lifetime Based Route Selection in Mobile Ad-Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {3},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/20},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/DriniS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/El-BakaryZEE09,
  author       = {Eman M. El{-}Bakary and
                  Osama Zahran and
                  Sami A. El{-}Dolil and
                  Fathi E. Abd El{-}Samie},
  title        = {Chaotic Maps: {A} Tool to Enhance the Performance of {OFDM} Systems},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {2},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/15},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/El-BakaryZEE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/IbanezMCGA09,
  author       = {Guillermo Ib{\'{a}}{\~{n}}ez and
                  Eva Manzanedo and
                  Juan A. Carral and
                  Antonio Gracia and
                  Jose Mannuel Acro},
  title        = {A Performance Comparison of Virtual Backbone Formation Algorithms
                  for Wireless Mesh Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {2},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/10},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/IbanezMCGA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/JasmanK09,
  author       = {Faezah Jasman and
                  Sabira Khatun},
  title        = {Adaptive Modulation for {OFDM} Systems},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {2},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/8},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/JasmanK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KadhumH09,
  author       = {Mohammed M. Kadhum and
                  Suhaidi Hassan},
  title        = {The Drop Activation Function of the Fast Congestion Notification {(FN)}
                  Mechanism},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {3},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/22},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KadhumH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/LinQF09,
  author       = {Chuan Lin and
                  Anyong Qing and
                  Quanyuan Feng},
  title        = {Synthesis of unequally Spaced Antenna Arrays by a new Differential
                  Evolutionary Algorithm},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/LinQF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MohammadRAS09,
  author       = {Abd El{-}Naser A. Mohammad and
                  Ahmed Nabih Zaki Rashed and
                  Gaber E. S. M. El Abyad and
                  Abd El Fattah A. Saad},
  title        = {Low Loss a thermal Arrayed Waveguide Grating {(AWG)} Module for Passive
                  and Active Optical Network Applications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {2},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/11},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MohammadRAS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/OhL09,
  author       = {Dong{-}Chan Oh and
                  Yong{-}Hwan Lee},
  title        = {Energy Detection Based Spectrum Sensing for Sensing Error Minimization
                  in Cognitive Radio Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/OhL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PatrikakisMV09,
  author       = {Charalampos Z. Patrikakis and
                  Michalis N. Masikos and
                  Athanasios Voulodimos},
  title        = {A Framework for Preserving User Privacy and Ensuring QoS in Location
                  Based Services using Non-irreversible Algorithm},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/5},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PatrikakisMV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RakotondrainibeKZZ09,
  author       = {Lahatra Rakotondrainibe and
                  Yvan Kokar and
                  Gheorghe Zahira and
                  Gha{\"{\i}}s El Zein},
  title        = {Towards a Gigabit Wireless Communications System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {2},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/12},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RakotondrainibeKZZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RasheedGNK09,
  author       = {Mohammad M. Rasheed and
                  Osman Ghazali and
                  Norita Md Norwawi and
                  Mohammed M. Kadhum},
  title        = {A Traffic Signature-based Algorithm for Detecting Scanning Internet
                  Worms},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {3},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/19},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RasheedGNK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RemleinS09,
  author       = {Piotr Remlein and
                  Dawid Szlapka},
  title        = {Genetic Algorithm used in Search of good Tailbiting Codes},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {3},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/21},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RemleinS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Roka09,
  author       = {Rastislav R{\'{o}}ka},
  title        = {Modeling of Environmental Influences at the Signal Transmission by
                  means of {VDSL} and {PLC} Technologies},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Roka09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SaleemFAYR09,
  author       = {Kashif Saleem and
                  Norsheila Fisal and
                  Sharifah Hafizah Syed Ariffin and
                  Sharifah Kamilah Syed Yusof and
                  Rozeha A. Rashid},
  title        = {Ant based Self-organized Routing Protocol for Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {2},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/13},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SaleemFAYR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Sen09,
  author       = {Jaydip Sen},
  title        = {A Survey on Wireless Sensor Network Security},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {2},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/16},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Sen09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ShafikEDSE09,
  author       = {Amira Shafik and
                  Said M. Elhalafawy and
                  Salah Eldeen M. Diab and
                  Bassiuny M. Sallam and
                  Fathi E. Abd El{-}Samie},
  title        = {A Wavelet Based Approach for Speaker Identification from Degraded
                  Speech},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {3},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/23},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ShafikEDSE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SilvaAL09,
  author       = {Aline Lopes da Silva and
                  Zair Abdelouahab and
                  Denivaldo Lopes},
  title        = {Intelligent {IDS} for Mobile Devices: Modeling and Prototyping},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {3},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/18},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SilvaAL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SukuvaaraP09,
  author       = {Timo Sukuvaara and
                  Carlos A. Pomalaza{-}Raez},
  title        = {Vehicular Networking Pilot System for Vehicle-to-Infrastructure and
                  Vehicle-to-Vehicle Communications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {3},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/17},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SukuvaaraP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SurenderSD09,
  author       = {R. Surender and
                  G. Sivaradje and
                  Perumal Dananjayan},
  title        = {Performance Comparison of {UMTS/WLAN} Integrated Architectures with
                  Dynamic Home Agent Assignments},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {3},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/25},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SurenderSD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ToutonjiY09,
  author       = {Ossama Toutonji and
                  Seong{-}Moo Yoo},
  title        = {An Approach against a Computer Worm Attack},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {2},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/14},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ToutonjiY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Wasfi09,
  author       = {Mahmud Wasfi},
  title        = {Optical Fiber Amplifiers-Review},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/7},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Wasfi09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics