Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/journals/ijcnis:"
@article{DBLP:journals/ijcnis/AA23, author = {Suganya. A and S. L. Aarthy}, title = {Alzheimer's And Parkinson's Disease Classification Using Deep Learning Based On {MRI:} {A} Review}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1s}, pages = {9--21}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v14i1s.5588}, doi = {10.17762/IJCNIS.V14I1S.5588}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Aravindhan23, author = {M. R. Tamjis Surendar Aravindhan}, title = {Leaf Disease Detection by Using Convolutional Pretrained Model}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1s}, pages = {114--120}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v14i1s.5619}, doi = {10.17762/IJCNIS.V14I1S.5619}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Aravindhan23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BSD23, author = {Arulmozhi. B and J. I. Sheeba and S. Pradeep Devaneyan}, title = {A Review of Blockchain Technology Based Techniques to Preserve Privacy and to Secure for Electronic Health Records}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1s}, pages = {177--188}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v14i1s.5641}, doi = {10.17762/IJCNIS.V14I1S.5641}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/BSD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Ernawan23, author = {Chandra Wijaya Fibria Indriati Yana Ernawan}, title = {Application of Internet of Things to Ensure Improved Performance within the Internal Supply Chain Unit of an Organization}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1s}, pages = {121--135}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v14i1s.5620}, doi = {10.17762/IJCNIS.V14I1S.5620}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Ernawan23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GoparajuR23, author = {Bhargavi Goparaju and Bandla Sreenivasa Rao}, title = {A DDoS Attack Detection using {PCA} Dimensionality Reduction and Support Vector Machine}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1s}, pages = {1--8}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v14i1s.5586}, doi = {10.17762/IJCNIS.V14I1S.5586}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/GoparajuR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Kim23, author = {Deageon Kim}, title = {Research On Text Classification Based On Deep Neural Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1s}, pages = {100--113}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v14i1s.5618}, doi = {10.17762/IJCNIS.V14I1S.5618}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Kim23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KuAS23, author = {V. T. Ram Pavan Ku and M. Arulselvi and K. B. S. Sastry}, title = {An Optimized Deep Learning Based Optimization Algorithm for the Detection of Colon Cancer Using Deep Recurrent Neural Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1s}, pages = {22--36}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v14i1s.5589}, doi = {10.17762/IJCNIS.V14I1S.5589}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KuAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/NagalaxmiRC23, author = {T. Nagalaxmi and E. Sreenivasa Rao and P. Chandrasekhar}, title = {Design and Performance Analysis of Low Latency Routing Algorithm based NoC for MPSoC}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1s}, pages = {37--53}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v14i1s.5590}, doi = {10.17762/IJCNIS.V14I1S.5590}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/NagalaxmiRC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/NarayanaR23, author = {Ranga Narayana and G. Venkateswara Rao}, title = {A Grey Wolf Intelligence based Recognition of Human-Action in Low Resolution Videos with Minimal Processing Time}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1s}, pages = {91--99}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v14i1s.5597}, doi = {10.17762/IJCNIS.V14I1S.5597}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/NarayanaR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/RaoKRNB23, author = {Nelapati Ananda Rao and Lalitha Bhavani Konkyana and Vysyaraju Lokesh Raju and M. S. R. Naidu and Chukka Ramesh Babu}, title = {A Broadband Meta surface Based {MIMO} Antenna with High Gain and Isolation For 5G Millimeter Wave Applications}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1s}, pages = {54--66}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v14i1s.5592}, doi = {10.17762/IJCNIS.V14I1S.5592}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/RaoKRNB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SatyanarayanaDR23, author = {S. K. Satyanarayana and Lavadya Nirmala Devi and A. Nageswar Rao}, title = {{MPIGA} - Multipath Selection Using Improved Genetic Algorithm}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1s}, pages = {67--78}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v14i1s.5595}, doi = {10.17762/IJCNIS.V14I1S.5595}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SatyanarayanaDR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TejasreeC23, author = {S. Tejasree and B. Chandramohan}, title = {Hybrid Multi Attribute Relation Method for Document Clustering for Information Mining}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1s}, pages = {79--90}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v14i1s.5596}, doi = {10.17762/IJCNIS.V14I1S.5596}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/TejasreeC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/WarisK23, author = {Saiyed Faiayaz Waris and S. Koteeswaran}, title = {An Investigation on Disease Diagnosis and Prediction by Using Modified K-Mean clustering and Combined {CNN} and {ELM} Classification Techniques}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1s}, pages = {167--176}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v14i1s.5639}, doi = {10.17762/IJCNIS.V14I1S.5639}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/WarisK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbdulaalSP22, author = {Alaa Hussein Abdulaal and A. F. M. Shahen Shah and Al{-}Sakib Khan Pathan}, title = {{NM-LEACH:} {A} Novel Modified {LEACH} Protocol to Improve Performance in {WSN}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i1.5127}, doi = {10.17762/IJCNIS.V14I1.5127}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AbdulaalSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AgarwalH22, author = {Himanshu Agarwal and Farooq Husain}, title = {Protecting Ownership Rights of Videos Against Digital Piracy: An Efficient Digital Watermarking Scheme}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.4945}, doi = {10.17762/IJCNIS.V13I2.4945}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AgarwalH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlDaraisehCOTT22, author = {Ahmad A. Al{-}Daraiseh and Rasel Chowdhury and Hakima Ould{-}Slimane and Chamseddine Talhi and Mohammad Bany Taha}, title = {Lightweight Scheme for Smart Home Environments using Offloading Technique}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i1.5065}, doi = {10.17762/IJCNIS.V14I1.5065}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AlDaraisehCOTT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlShabi22, author = {Mohammed Al{-}Shabi}, title = {Performance Ameliorations of {AODV} by Black Hole Attack Detection Utilizing {IDSAODV} as Well as Reverse {AODV}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {99--110}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5483}, doi = {10.17762/IJCNIS.V14I2.5483}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AlShabi22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlabdulrazzaqA22, author = {Haneen Khalid Alabdulrazzaq and Mohammed N. Alenezi}, title = {Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i1.5262}, doi = {10.17762/IJCNIS.V14I1.5262}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AlabdulrazzaqA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AleneziA22, author = {Mohammed N. Alenezi and Fawaz S. Al{-}Anzi}, title = {A Study of Z-Transform Based Encryption Algorithm}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.5052}, doi = {10.17762/IJCNIS.V13I2.5052}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AleneziA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlhusenatAH22, author = {Ahmad Y. Alhusenat and Abdallah Y. Alma'aitah and Khaled F. Hayajneh}, title = {Matching Subcarrier Resource Allocation and Offloading Decision}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.4956}, doi = {10.17762/IJCNIS.V13I2.4956}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AlhusenatAH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Alhussain22, author = {Thamer Alhussain}, title = {An Energy-Efficient Scheme for IoT Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.4934}, doi = {10.17762/IJCNIS.V13I2.4934}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Alhussain22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Aljarrah22, author = {Inad A. Aljarrah}, title = {Effect of image degradation on performance of Convolutional Neural Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.4946}, doi = {10.17762/IJCNIS.V13I2.4946}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Aljarrah22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AljarrahA22, author = {Inad A. Aljarrah and Eman M. Alshare}, title = {Improved Residual Dense Network for Large Scale Super-Resolution via Generative Adversarial Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i1.5221}, doi = {10.17762/IJCNIS.V14I1.5221}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AljarrahA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlleemaRCRCAK22, author = {N. Noor Alleema and Ramakrishnan Raman and Fidel Castro{-}Cayllahua and Vinod Motiram Rathod and Juan Carlos Cotrina{-}Aliaga and Supriya Sanjay Ajagekar and Reshma Ramakant Kanse}, title = {Security of Big Data over IoT Environment by Integration of Deep Learning and Optimization}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {203--221}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5510}, doi = {10.17762/IJCNIS.V14I2.5510}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AlleemaRCRCAK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Alqhatani22, author = {Mohammed A Alqhatani}, title = {Machine Learning Techniques for Malware Detection with Challenges and Future Directions}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.5047}, doi = {10.17762/IJCNIS.V13I2.5047}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Alqhatani22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlsaqourMAAA22, author = {Raed A. Alsaqour and Ahmed Majrashi and Mohammed Alreedi and Khalid Alomar and Maha S. Abdelhaq}, title = {Defense in Depth: Multilayer of security}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.4951}, doi = {10.17762/IJCNIS.V13I2.4951}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AlsaqourMAAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AmudaOSA22, author = {Olarotimi Kabir Amuda and Akinyemi Bodunde Odunola and Mistura Laide Sanni and Ganiyu Adesola Aderounmu}, title = {A predictive User behaviour analytic Model for Insider Threats in Cyberspace}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i1.5208}, doi = {10.17762/IJCNIS.V14I1.5208}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AmudaOSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ArfaouiBM22, author = {Siham Arfaoui and Abdelhamid Belmekki and Abdellatif Mezrioui}, title = {A Privacy by Design Methodology Application in Telecom Domain}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.4926}, doi = {10.17762/IJCNIS.V13I2.4926}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ArfaouiBM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Ariff22, author = {Nor Azman Mat Ariff}, title = {Ensemble Method for Mobile Malware Detection using N-Gram Sequences of System Calls}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.4937}, doi = {10.17762/IJCNIS.V13I2.4937}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Ariff22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AroraSKPVT22, author = {Gopal Arora and Munish Sabharwal and Pooja Kapila and Divya Paikaray and Vipul Vekariya and Narmadha T}, title = {Deep Residual Adaptive Neural Network Based Feature Extraction for Cognitive Computing with Multimodal Sentiment Sensing and Emotion Recognition Process}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {189--202}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5507}, doi = {10.17762/IJCNIS.V14I2.5507}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AroraSKPVT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AwasthiMJPSG22, author = {Aishwary Awasthi and T. R. Mahesh and Rutvij Joshi and Arvind Kumar Pandey and Rini Saxena and Subhashish Goswami}, title = {Smart Grid Sensor Monitoring Based on Deep Learning Technique with Control System Management in Fault Detection}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {123--137}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5600}, doi = {10.17762/IJCNIS.V14I3.5600}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AwasthiMJPSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BatyhaJRLON22, author = {Radwan M. Batyha and S. Janani and S. G. Hymlin Rose and Yanina Gallardo Lolandes and Geovanny Genaro Reivan Ortiz and Shahista Navaz}, title = {Cyclostationary Algorithm for Signal Analysis in Cognitive 4G Networks with Spectral Sensing and Resource Allocation}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {47--58}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5570}, doi = {10.17762/IJCNIS.V14I3.5570}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/BatyhaJRLON22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BhatiaGK22, author = {Vaneet Kaur Bhatia and Akshay Girdhar and Sawtantar Singh Khurmi}, title = {Gaussian functional shapes-based type-II fuzzy membership-based cluster protocol for energy harvesting IoT networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.4901}, doi = {10.17762/IJCNIS.V13I2.4901}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/BhatiaGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BhattSRSPB22, author = {Rahul Bhatt and Rishi Shikka and Manjunath C. R and SSPM Sharma and Arvind Kumar Pandey and Kiran Bala}, title = {Centralized Cloud Service Providers in Improving Resource Allocation and Data Integrity by 4G IoT Paradigm}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {138--149}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5601}, doi = {10.17762/IJCNIS.V14I3.5601}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/BhattSRSPB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/CastroCayllahuaCDIRC22, author = {Fidel Castro{-}Cayllahua and Juan Luis Meza Carhuancho and Carlos Mario Fern{\'{a}}ndez D{\'{\i}}az and Zoila Mercedes Collantes Inga and Tariq Rasheed and Juan Carlos Cotrina{-}Aliaga}, title = {Autonomous Underwater Vehicle: 5G Network Design and Simulation Based on Mimetic Technique Control System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {1--15}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5566}, doi = {10.17762/IJCNIS.V14I3.5566}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/CastroCayllahuaCDIRC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Chandrakar22, author = {Ila Chandrakar}, title = {Improved Technique for Preserving Privacy while Mining Real Time Big Data}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i1.5187}, doi = {10.17762/IJCNIS.V14I1.5187}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Chandrakar22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ChenniappanadarSSK22, author = {Santhosh Kumar Chenniappanadar and Gnanamurthy Sundharamurthy and Vinoth Kumar Sakthivelu and Vishnu Kumar Kaliappan}, title = {A Supervised Machine Learning Based Intrusion Detection Model for Detecting Cyber-Attacks Against Computer System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {16--25}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5567}, doi = {10.17762/IJCNIS.V14I3.5567}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ChenniappanadarSSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ChibaAAM22, author = {Zouhair Chiba and Moulay Seddiq El Kasmi Alaoui and Noreddine Abghour and Khalid Moussaid}, title = {Automatic Building of a Powerful {IDS} for The Cloud Based on Deep Neural Network by Using a Novel Combination of Simulated Annealing Algorithm and Improved Self- Adaptive Genetic Algorithm}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i1.5264}, doi = {10.17762/IJCNIS.V14I1.5264}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ChibaAAM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/DeshmukhR22, author = {Sneha R. Deshmukh and Vijay T. Raisinghani}, title = {A Survey on Congestion Control Protocols for CoAP}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {111--123}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5484}, doi = {10.17762/IJCNIS.V14I2.5484}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/DeshmukhR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/DeviSLS22, author = {Lanka Madhavi Devi and C. Subbarao and Boppana Swathi Lakshmi and T. Sushma}, title = {Multiple Slot Fractal Structured Antenna for Wi-Fi and Radio Altimeter for uncertain Applications}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {1--14}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5456}, doi = {10.17762/IJCNIS.V14I2.5456}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/DeviSLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ElYahyaouiO22, author = {Ahmed El{-}Yahyaoui and Fouzia Omary}, title = {A Like {ELGAMAL} Cryptosystem But Resistant To Post-Quantum Attacks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i1.5180}, doi = {10.17762/IJCNIS.V14I1.5180}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ElYahyaouiO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/FirdausK22, author = {Muhammad Yus Firdaus and Mustofa Kamil}, title = {Climate Change Analysis Based on Satellite Multispectral Image Processing in Feature Selection Using Reinforcement Learning}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {261--272}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5520}, doi = {10.17762/IJCNIS.V14I2.5520}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/FirdausK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GargSBSBB22, author = {Meenakshi Garg and Sachin Sharma and Vincent Balu and Deepak K. Sinha and Pujita Bhatt and Akash Kumar Bhagat}, title = {Underwater Acoustic Sensor Network Data Optimization with Enhanced Void Avoidance and Routing Protocol}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {150--162}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5602}, doi = {10.17762/IJCNIS.V14I3.5602}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/GargSBSBB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GoswamiC22, author = {Hemangi Goswami and Hiten Choudhury}, title = {Security of IoT in 5G Cellular Networks: {A} Review of Current Status, Challenges and Future Directions}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.4955}, doi = {10.17762/IJCNIS.V13I2.4955}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/GoswamiC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GuptaJRHCG22, author = {Neeraj Gupta and S. Janani and Dilip R and Ravi Hosur and Abhay Chaturvedi and Ankur Gupta}, title = {Wearable Sensors for Evaluation Over Smart Home Using Sequential Minimization Optimization-based Random Forest}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {179--188}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5499}, doi = {10.17762/IJCNIS.V14I2.5499}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/GuptaJRHCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HamarshehDADB22, author = {Qadri Hamarsheh and Omar Rawhi Daoud and Marwan Al{-}Akaidi and Ahlam Damati and Mohammed Baniyounis}, title = {Robust Vehicular Communications Using the Fast-Frequency-Hopping-OFDM Technology and the {MIMO} Spatial Multiplexing}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i1.5216}, doi = {10.17762/IJCNIS.V14I1.5216}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/HamarshehDADB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HermawanPK22, author = {Dadang Hermawan and Ni Made Dewi Kansa Putri and Lucky Kartanto}, title = {Cyber Physical System Based Smart Healthcare System with Federated Deep Learning Architectures with Data Analytics}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {222--233}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5513}, doi = {10.17762/IJCNIS.V14I2.5513}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/HermawanPK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/IkididFS22, author = {Abdelouafi Ikidid and Abdelaziz El Fazziki and Mohamed Sadgal}, title = {A multi-agent Framework for dynamic traffic management Considering Priority Link}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.4977}, doi = {10.17762/IJCNIS.V13I2.4977}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/IkididFS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/JamaKS22, author = {Abdirisaq Jama and Othman O. Khalifa and Nantha Kumar Subramaniam}, title = {Novel Approach for {IP-PBX} Denial of Service Intrusion Detection Using Support Vector Machine Algorithm}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.4967}, doi = {10.17762/IJCNIS.V13I2.4967}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/JamaKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/JoshiPASSR22, author = {Rutvij Joshi and Arvind Kumar Pandey and Aarju and Arjun Singh and Pooran Singh and Chandramma R}, title = {Energy Aware Channel Allocation with Spectrum Sensing in Pilot Contamination Analysis for Cognitive Radio Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {226--238}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5608}, doi = {10.17762/IJCNIS.V14I3.5608}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/JoshiPASSR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KCSCVC22, author = {Priyadarsini K and Sri Lakshmi Chandana and Severo Sim{\'{o}}n Calder{\'{o}}n Samaniego and Megha Gupta Chaudhary and Vipul Vekariya and Abhay Chaturvedi}, title = {Intelligent Mobile Edge Computing Integrated with Blockchain Security Analysis for Millimetre-Wave Communication}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {100--122}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5577}, doi = {10.17762/IJCNIS.V14I3.5577}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KCSCVC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KeserwaniRKJRRG22, author = {Hitesh Keserwani and Himanshu Rastogi and Ardhariksa Zukhruf Kurniullah and Sushil Kumar Janardan and Ramakrishnan Raman and Vinod Motiram Rathod and Ankur Gupta}, title = {Security Enhancement by Identifying Attacks Using Machine Learning for 5G Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {124--141}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5494}, doi = {10.17762/IJCNIS.V14I2.5494}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KeserwaniRKJRRG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KhanboubiHG22, author = {Yassine El Khanboubi and Mostafa Hanoune and Mohamed El Ghazouani}, title = {A New Data Deletion Scheme for a Blockchain-based De-duplication System in the Cloud}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.4975}, doi = {10.17762/IJCNIS.V13I2.4975}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KhanboubiHG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KiranRR22, author = {K. Uday Kiran and K. S. Ramesh and S. Koteswara Rao}, title = {Adaptive And Reliable {GPS} Uncertain Position Estimation an Insightful Oceanography and Geography Applications}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {83--98}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5481}, doi = {10.17762/IJCNIS.V14I2.5481}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KiranRR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KourGSSVK22, author = {Kushnian Kour and Subhashish Goswami and Meenakshi Sharma and P. Thiruvannamalai SivaSankar and Vipul Vekariya and Alka Kumari}, title = {Honeynet Implementation in Cyber Security Attack Prevention with Data Monitoring System Using {AI} Technique and IoT 4G Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {163--175}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5603}, doi = {10.17762/IJCNIS.V14I3.5603}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KourGSSVK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/LaptievTMKOKP22, author = {Oleksandr Laptiev and Volodymyr Tkachev and Oleksii Maystrov and Oleksandr Krasikov and Pavlo Open'ko and Volodimir Khoroshko and Lubomir Parkhuts}, title = {The method of spectral analysis of the determination of random digital signals}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.5008}, doi = {10.17762/IJCNIS.V13I2.5008}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/LaptievTMKOKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/LiraKRKMC22, author = {Luis Alberto N{\'{u}}{\~{n}}ez Lira and Kukati Aruna Kumari and Ramakrishnan Raman and Ardhariksa Zukhruf Kurniullah and Santiago Aquiles Gallarday Morales and Tula Del Carmen Espinoza Cordero}, title = {Data Security Enhancement in 4G Vehicular Networks Based on Reinforcement Learning for Satellite Edge Computing}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {59--72}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5571}, doi = {10.17762/IJCNIS.V14I3.5571}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/LiraKRKMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MPSIK22, author = {Ranjani M and Unggul Priyadi and Anas A. Salameh and Mochamad Ali Imron and Kakarla Hari Kishore}, title = {Cloud Computing Based Computing System for Women's Higher Education in Isolated Areas}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {26--35}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5568}, doi = {10.17762/IJCNIS.V14I3.5568}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/MPSIK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MaheshGSSKK22, author = {T. R. Mahesh and Tanmay Goswami and Srinivasan Sriramulu and Neeraj Sharma and Alka Kumari and Ganesh Khekare}, title = {Cognitive Based Attention Deficit Hyperactivity Disorder Detection with Ability Assessment Using Auto Encoder Based Hidden Markov Model}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {53--65}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5464}, doi = {10.17762/IJCNIS.V14I2.5464}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/MaheshGSSKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MalkawiMZ22, author = {Mohammad Malkawi and Wail Mardini and Toqa' Abu Zaitoun}, title = {Auto Signature Verification Using Line Projection Features Combined With Different Classifiers and Selection Methods}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.5027}, doi = {10.17762/IJCNIS.V13I2.5027}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/MalkawiMZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MansouriC22, author = {Sofiene Mansouri and Souhir Chabchoub}, title = {Emotion Detection Based on {EEG} Signal Processing by Body Sensor 5G Networks Using Deep Learning Architectures}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {123--132}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5576}, doi = {10.17762/IJCNIS.V14I3.5576}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/MansouriC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MarandiDBGRB22, author = {Arun Kumar Marandi and Richa Dogra and Rahul Bhatt and Rajesh Gupta and Somashekar Reddy and Amit Barve}, title = {Generative Boltzmann Adversarial Network in Manet Attack Detection and {QOS} Enhancement with Latency}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {199--213}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5606}, doi = {10.17762/IJCNIS.V14I3.5606}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/MarandiDBGRB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MarandiJRGSS22, author = {Arun Kumar Marandi and Gordhan Jethava and A. Rajesh and Sachin Gupta and Shrddha Sagar and Sonia Sharma}, title = {Cognitive Computing for Multimodal Sentiment Sensing and Emotion Recognition Fusion Based on Machine Learning Techniques Implemented by Computer Interface System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {15--32}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5462}, doi = {10.17762/IJCNIS.V14I2.5462}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/MarandiJRGSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MohammedVYLKT22, author = {Mohialdeen Mustafa Mohammed and Zaika Viktor and Khlaponin Yurii and Berkman Lyubov and Polonskyi Konstiantyn and Oleksandr Leonidovich Turovsky}, title = {Methods for assessing the impact of bandwidth of control channels on the quality of telecommunications networks in the transmission of data packets of different types}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.5034}, doi = {10.17762/IJCNIS.V13I2.5034}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/MohammedVYLKT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MohanKK22, author = {C. Leela Mohan and K. Sarat Kumar and Korada Chinnari Sri Kavya}, title = {Performance Exploration of Uncertain {RF} {MEMS} Switch Design with Uniform Meanders}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {66--82}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5480}, doi = {10.17762/IJCNIS.V14I2.5480}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MohanKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MonirM22, author = {Marvy Badr Monir and Amr Ayman Mohamed}, title = {Energy Aware Routing for Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i1.5215}, doi = {10.17762/IJCNIS.V14I1.5215}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/MonirM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Monowar22, author = {Muhammad Mostafa Monowar}, title = {{TRW-MAC:} {A} thermal-aware receiver-driven wake-up radio enabled duty cycle {MAC} protocol for multi-hop implantable wireless body area networks in Internet of Things}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i1.5182}, doi = {10.17762/IJCNIS.V14I1.5182}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Monowar22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MubeenKTKND22, author = {Suraya Mubeen and Nandini Kulkarni and Manuel R. Tanpoco and R. Dinesh Kumar and M. Lakshmu Naidu and Tanuja Dhope}, title = {Linguistic Based Emotion Detection from Live Social Media Data Classification Using Metaheuristic Deep Learning Techniques}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {176--186}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5604}, doi = {10.17762/IJCNIS.V14I3.5604}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/MubeenKTKND22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/NaikwadiP22, author = {Mudassar H. Naikwadi and Kishor P. Patil}, title = {A Multi-dimensional Real World Spectrum Occupancy Data Measurement and Analysis for Spectrum Inference in Cognitive Radio Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {244--260}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5516}, doi = {10.17762/IJCNIS.V14I2.5516}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/NaikwadiP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/NamHL22, author = {Tran Sy Nam and Van{-}Thuc Hoang and Nguyen Van Long}, title = {A High-Throughput Hardware Implementation of {NAT} Traversal For {IPSEC} {VPN}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i1.5260}, doi = {10.17762/IJCNIS.V14I1.5260}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/NamHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/OsamaREEM22, author = {Islam Osama and Mohamed Rihan and Mohamed Elhefnawy and Sami A. El{-}Dolil and Hend Abd El{-}Azem Malhat}, title = {A review on Precoding Techniques For mm-Wave Massive {MIMO} Wireless Systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i1.5206}, doi = {10.17762/IJCNIS.V14I1.5206}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/OsamaREEM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PaikarayCSGKJ22, author = {Divya Paikaray and Divyanshi Chhabra and Sachin Sharma and Sachin Goswami and Shashikala H. K and Gordhan Jethava}, title = {Energy Efficiency Based Load Balancing Optimization Routing Protocol In 5G Wireless Communication Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {187--198}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5605}, doi = {10.17762/IJCNIS.V14I3.5605}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/PaikarayCSGKJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PasaniR22, author = {Chairil Faif Pasani and Euis Eti Rohaeti}, title = {Industrial Cyber Blockchain Physical System for Microgrid in Data Based Predictive Analysis for Automatic Control Analysis}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {234--243}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5514}, doi = {10.17762/IJCNIS.V14I2.5514}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/PasaniR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PiesessaS22, author = {Irwan Piesessa and Benfano Soewito}, title = {Analysis of {BGP4} Peering Establishment Time on IPv6 Connection over 6PE and 6VPE}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.4772}, doi = {10.17762/IJCNIS.V13I2.4772}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/PiesessaS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ReddyS22, author = {Dhoma Harshavardhan Reddy and N. Sirisha}, title = {Multifactor Authentication Key Management System based Security Model Using Effective Handover Tunnel with {IPV6}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {273--284}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5521}, doi = {10.17762/IJCNIS.V14I2.5521}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ReddyS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/RubaieiJS22, author = {Mazoon Hashil Al Rubaiei and Hothefa Shaker Jassim and Baraa T. Sharef}, title = {Performance analysis of black hole and worm hole attacks in MANETs}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i1.5078}, doi = {10.17762/IJCNIS.V14I1.5078}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/RubaieiJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SeechurnMAP22, author = {Nikheel Tashvin Seechurn and Avinash Mungur and Sheeba Armoogum and Sameerchand Pudaruth}, title = {Issues and Challenges for Network Virtualisation}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.4990}, doi = {10.17762/IJCNIS.V13I2.4990}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/SeechurnMAP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ShakirAH22, author = {Dhifaf Talal Shakir and Hassan Jassim Al{-}Qureshy and Saad S. Hreshee}, title = {Performance Analysis of {MEMS} Based Oscillator for High Frequency Wireless Communication Systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {86--98}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5574}, doi = {10.17762/IJCNIS.V14I3.5574}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ShakirAH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SharmaH22, author = {Anamika Shukla Sharma and H. S. Hota}, title = {{ECG} Analysis-Based Cardiac Disease Prediction Using Signal Feature Selection with Extraction Based on {AI} Techniques}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {73--85}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5573}, doi = {10.17762/IJCNIS.V14I3.5573}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/SharmaH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ShatnawiA22, author = {Mohammed Q. Shatnawi and Batool Alazzam}, title = {An Assessment of Eclipse Bugs' Priority and Severity Prediction Using Machine Learning}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i1.5266}, doi = {10.17762/IJCNIS.V14I1.5266}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ShatnawiA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Silva22, author = {Leandro Marcos da Silva}, title = {Early Identification of Abused Domains in {TLD} through Passive {DNS} Applying Machine Learning Techniques}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i1.5256}, doi = {10.17762/IJCNIS.V14I1.5256}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Silva22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SowmyaSBVVW22, author = {M. S. Sowmya and S. S. P. M. Sharma and Akash Kumar Bhagat and Pooja Verma and Sunny Verma and Durgesh Wadhwa}, title = {Construction of Data Driven Decomposition Based Soft Sensors with Auto Encoder Deep Neural Network for IoT Healthcare Applications}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {142--154}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5495}, doi = {10.17762/IJCNIS.V14I2.5495}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/SowmyaSBVVW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SuleimanSB22, author = {Sani Makusidi Suleiman and Dahiru Sani Shu'aibu and Suleiman Aliyu Babale}, title = {Investigating the effect of High Altitude Platform Positioning on Latency and Coverage of 4G Cellular Systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {1}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i1.5161}, doi = {10.17762/IJCNIS.V14I1.5161}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/SuleimanSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SuprajaSRAP22, author = {P. Supraja and Anas A. Salameh and Varadaraju H. R and M. Anand and Unggul Priyadi}, title = {An Optimal Routing Protocol Using a Multiverse Optimizer Algorithm for Wireless Mesh Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {36--46}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5569}, doi = {10.17762/IJCNIS.V14I3.5569}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/SuprajaSRAP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TelloJMMS22, author = {Alcides Bernardo Tello and Shi Jie and D. Manjunath and Kusuma Kumari B. M and Shabnam Sayyad}, title = {Cloud Computing Based Network Analysis in Smart Healthcare System with Neural Network Architecture}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {269--279}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5622}, doi = {10.17762/IJCNIS.V14I3.5622}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/TelloJMMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TelloXPPS22, author = {Alcides Bernardo Tello and Jiuhong Xing and Aparna Lalitkumar Patil and Lalitkumar Premchandra Patil and Shabnam Sayyad}, title = {Blockchain Technologies in Healthcare System for Real Time Applications Using IoT and Deep Learning Techniques}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {257--268}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5621}, doi = {10.17762/IJCNIS.V14I3.5621}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/TelloXPPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TodingR22, author = {Apriana Toding and Muhammad Resha and Askar Taliang and Charnia Iradat Rapa and Rismawaty Arunglabi}, title = {5G Technology in Smart Healthcare and Smart City Development Integration with Deep Learning Architectures}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {99--109}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5575}, doi = {10.17762/IJCNIS.V14I3.5575}, timestamp = {Wed, 31 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/TodingR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TurzhanovaTKS22, author = {Karina Turzhanova and Valery Tikhvinskiy and Sergey Konshin and Alexandr Solochshenko}, title = {Experimental Performance Evaluation of {NB-IOT} Deployment Modes in Urban Area}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.4969}, doi = {10.17762/IJCNIS.V13I2.4969}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/TurzhanovaTKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/VekariyaKGMMP22, author = {Daxa Vekariya and Mk Jayanthi Kannan and Sachin Gupta and P. Muthusamy and Rohini Mahajan and Arvind Kumar Pandey}, title = {Analysis of Computer Network Security Storage System Based on Cloud Computing Environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {33--52}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5463}, doi = {10.17762/IJCNIS.V14I2.5463}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/VekariyaKGMMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/VekariyaKGMMP22a, author = {Daxa Vekariya and Mk Jayanthi Kannan and Sachin Gupta and P. Muthusamy and Rohini Mahajan and Arvind Kumar Pandey}, title = {Recommendation Model-Based 5G Network and Cognitive System of Cloud Data with {AI} Technique in {IOMT} Applications}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {239--256}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5609}, doi = {10.17762/IJCNIS.V14I3.5609}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/VekariyaKGMMP22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/VermaBBKGS22, author = {Diksha Verma and Sweta Kumari Barnwal and Amit Barve and M. K. Jayanthi Kannan and Rajesh Gupta and R. Swaminathan}, title = {Multimodal Sentiment Sensing and Emotion Recognition Based on Cognitive Computing Using Hidden Markov Model with Extreme Learning Machine}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {155--167}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5496}, doi = {10.17762/IJCNIS.V14I2.5496}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/VermaBBKGS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/VictoriaMRWK22, author = {A. Helen Victoria and S. V. Manikanthan and Varadaraju H. R and Muhammad Alkirom Wildan and Kakarla Hari Kishore}, title = {Radar Based Activity Recognition using {CNN-LSTM} Network Architecture}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {303--312}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5630}, doi = {10.17762/IJCNIS.V14I3.5630}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/VictoriaMRWK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/YadavSBSMA22, author = {Ashok Kumar Yadav and Bhanu Sharma and Akash Kumar Bhagat and Harshal Shah and C. R. Manjunath and Aishwary Awasthi}, title = {Edge Computing in Centralized Data Server Deployment for Network Qos and Latency Improvement for Virtualization Environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {214--225}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5607}, doi = {10.17762/IJCNIS.V14I3.5607}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/YadavSBSMA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/YuwonoU22, author = {Imam Yuwono and Eviani Damastuti Utomo}, title = {Neurological Disorders Detection Based on Computer Brain Interface Using Centralized Blockchain with Intrusion System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {168--178}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5498}, doi = {10.17762/IJCNIS.V14I2.5498}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/YuwonoU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ZagroubaA22, author = {Rachid Zagrouba and Reem Alhajri}, title = {Machine Learning based Attacks Detection and Countermeasures in IoT}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {2}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v13i2.4943}, doi = {10.17762/IJCNIS.V13I2.4943}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ZagroubaA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbdellaouiF21, author = {Sa{\^{\i}}d El Abdellaoui and Youssef Fakhri}, title = {Power Management Strategies in Energy-Harvesting Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4827}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AbdellaouiF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Abouhogail21, author = {Reham Abdellatif Abouhogail}, title = {Untraceable Authentication Protocol for IEEE802.11s Standard}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.5090}, doi = {10.17762/IJCNIS.V13I3.5090}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Abouhogail21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Abouhogail21a, author = {Reham Abdellatif Abouhogail}, title = {Untraceable Authentication Protocol for IEEE802.11s Standard}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.5090}, doi = {10.54039/IJCNIS.V13I3.5090}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Abouhogail21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbuzanounehH21, author = {Khalil Ibrahim Mohammad Abuzanouneh and Mohammed Hadwan}, title = {Multi-Stage Protection Using Pixel Selection Technique for Enhancing Steganography}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4907}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AbuzanounehH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AhmadEA21, author = {Marwa Ahmad and Nameer N. El{-}Emam and Ali F. Al{-}Azawi}, title = {Improved Deep Hiding/Extraction Algorithm to Enhance the Payload Capacity and Security Level of Hidden Information}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.4759}, doi = {10.54039/IJCNIS.V13I3.4759}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AhmadEA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AhmadEA21a, author = {Marwa Ahmad and Nameer N. El{-}Emam and Ali F. Al{-}Azawi}, title = {Improved Deep Hiding/Extraction Algorithm to Enhance the Payload Capacity and Security Level of Hidden Information}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.4759}, doi = {10.17762/IJCNIS.V13I3.4759}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AhmadEA21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Al-AhmadAA21, author = {Alaa' Al{-}Ahmad and Omar Saad Almousa and Qusai Abuein}, title = {Enhancing Steganography by Image Segmentation and Multi-level Deep Hiding}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4869}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Al-AhmadAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Al-ShqeeratA21, author = {Khalil Al{-}Shqeerat and Khalil Ibrahim Abuzanouneh}, title = {A Hybrid Graphical User Authentication Scheme in Mobile Cloud Computing Environments}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4890}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Al-ShqeeratA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Al-ZubiAS21, author = {Hala Al{-}Zu'bi and Osama Daifallah Al{-}Khaleel and Ali M. Shatnawi}, title = {{FPGA} Implementation of Data Flow Graphs for Digital Signal Processing Applications}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4928}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Al-ZubiAS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlRawashdehAM21, author = {Rana Al{-}Rawashdeh and Mohammad Al{-}Fawa'reh and Wail Mardini}, title = {Enhanced Epileptic Seizure diagnosis using {EEG} Signals with Support vector machine and Bagging Classifiers}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.5114}, doi = {10.54039/IJCNIS.V13I3.5114}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AlRawashdehAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlRawashdehAM21a, author = {Rana Al{-}Rawashdeh and Mohammad Al{-}Fawa'reh and Wail Mardini}, title = {Enhanced Epileptic Seizure diagnosis using {EEG} Signals with Support vector machine and Bagging Classifiers}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.5114}, doi = {10.17762/IJCNIS.V13I3.5114}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AlRawashdehAM21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlSarairehJ21, author = {Ja'afer Al{-}Saraireh and Haya Joudeh}, title = {An Efficient Authentication Scheme for Internet of Things}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.3422}, doi = {10.17762/IJCNIS.V13I3.3422}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AlSarairehJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlShabi21, author = {Mohammed Abdulhameed Al{-}Shabi}, title = {Design of a Network Intrusion Detection System Using Complex Deep Neuronal Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.5148}, doi = {10.54039/IJCNIS.V13I3.5148}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AlShabi21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlShabi21a, author = {Mohammed Abdulhameed Al{-}Shabi}, title = {Design of a Network Intrusion Detection System Using Complex Deep Neuronal Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.5148}, doi = {10.17762/IJCNIS.V13I3.5148}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AlShabi21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlissaAADAAA21, author = {Khalid Adnan Alissa and Bashar A. Aldeeb and Hanan A. Alshehri and Shahad A. Dahdouh and Basstaa M. Alsubaie and Afnan M. Alghamdi and Mutasem Alsmadi}, title = {Developing a simulated intelligent instrument to measure user behavior toward cybersecurity policies}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4923}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AlissaAADAAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlzaqebahJMAA21, author = {Malek Alzaqebah and Sana Jawarneh and Rami Mustafa A. Mohammad and Mutasem K. Alsmadi and Ibrahim Almarashdeh}, title = {Improved Multi-Verse Optimizer Feature Selection Technique With Application To Phishing, Spam, and Denial Of Service Attacks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4929}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/AlzaqebahJMAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BarakateAWMHH21, author = {Ahmed Amine Barakate and Rida Abdelmoumene and Azeddine Wahbi and Mohamed Maddi and Laamari Hlou and Abdelkader Hadjoudja}, title = {Modeling, Development and Analysis Performance of an Intelligent Control of Photovoltaic System by Fuzzy Logic approach for Maximum Power Point Tracking}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4881}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/BarakateAWMHH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BelavagiM21, author = {Manjula C. Belavagi and Balachandra Muniyal}, title = {Improved Intrusion Detection System using Quantal Response Equilibrium-based Game Model and Rule-based Classification}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4875}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/BelavagiM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BorgohainBD21, author = {Utpala Borgohain and Surajit Borkotokey and S. K. Deka}, title = {A Coalition Formation Game for Cooperative Spectrum Sensing in Cognitive Radio Network under the Constraint of Overhead}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.5077}, doi = {10.17762/IJCNIS.V13I3.5077}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/BorgohainBD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BorgohainBD21a, author = {Utpala Borgohain and Surajit Borkotokey and S. K. Deka}, title = {A Coalition Formation Game for Cooperative Spectrum Sensing in Cognitive Radio Network under the Constraint of Overhead}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.5077}, doi = {10.54039/IJCNIS.V13I3.5077}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/BorgohainBD21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/CostaPG21, author = {Wanderson L. Costa and Ariel L. C. Portela and Rafael Lopes Gomes}, title = {Features-Aware DDoS Detection in Heterogeneous Smart Environments based on Fog and Cloud Computing}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.5080}, doi = {10.17762/IJCNIS.V13I3.5080}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/CostaPG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/CostaPG21a, author = {Wanderson L. Costa and Ariel L. C. Portela and Rafael Lopes Gomes}, title = {Features-Aware DDoS Detection in Heterogeneous Smart Environments based on Fog and Cloud Computing}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.5080}, doi = {10.54039/IJCNIS.V13I3.5080}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/CostaPG21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/DegamburMAP21, author = {Lavanya{-}Nehan Degambur and Avinash Mungur and Sheeba Armoogum and Sameerchand Pudaruth}, title = {Resource Allocation in 4G and 5G Networks: {A} Review}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.5116}, doi = {10.17762/IJCNIS.V13I3.5116}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/DegamburMAP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/DegamburMAP21a, author = {Lavanya{-}Nehan Degambur and Avinash Mungur and Sheeba Armoogum and Sameerchand Pudaruth}, title = {Resource Allocation in 4G and 5G Networks: {A} Review}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.5116}, doi = {10.54039/IJCNIS.V13I3.5116}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/DegamburMAP21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ElYahyaouiO21, author = {Ahmed El{-}Yahyaoui and Fouzia Omary}, title = {An improved Framework for Biometric Database's privacy}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.5143}, doi = {10.54039/IJCNIS.V13I3.5143}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ElYahyaouiO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ElYahyaouiO21a, author = {Ahmed El{-}Yahyaoui and Fouzia Omary}, title = {An improved Framework for Biometric Database's privacy}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.5143}, doi = {10.17762/IJCNIS.V13I3.5143}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ElYahyaouiO21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Husin21, author = {Husna Sarirah Husin}, title = {Preventing data leakage by securing chat session with randomized session {ID}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.5029}, doi = {10.54039/IJCNIS.V13I3.5029}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Husin21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Husin21a, author = {Husna Sarirah Husin}, title = {Preventing data leakage by securing chat session with randomized session {ID}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.5029}, doi = {10.17762/IJCNIS.V13I3.5029}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Husin21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KS21, author = {Srinivas K and Srinivasulu Tadisetty}, title = {Design and Development of Novel Hybrid Precoder for Millimeter-Wave {MIMO} System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.5096}, doi = {10.54039/IJCNIS.V13I3.5096}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KS21a, author = {Srinivas K and Srinivasulu Tadisetty}, title = {Design and Development of Novel Hybrid Precoder for Millimeter-Wave {MIMO} System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.5096}, doi = {10.17762/IJCNIS.V13I3.5096}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KS21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KatukC21, author = {Norliza Katuk and Ikenna Rene Chiadighikaobi}, title = {An Enhanced Block Pre-processing of {PRESENT} Algorithm for Fingerprint Template Encryption in the Internet of Things Environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.5101}, doi = {10.17762/IJCNIS.V13I3.5101}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KatukC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KatukC21a, author = {Norliza Katuk and Ikenna Rene Chiadighikaobi}, title = {An Enhanced Block Pre-processing of {PRESENT} Algorithm for Fingerprint Template Encryption in the Internet of Things Environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.5101}, doi = {10.54039/IJCNIS.V13I3.5101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KatukC21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KremenetskaMBLRV21, author = {Yana Kremenetska and Anatoliy Makarenko and Andrii Bereznyuk and Serhii Lazebnyi and Natalia Rudenko and Olexander Vlasov}, title = {High-Altitude Configuration of Non-Terrestrial Telecommunication Network using Optical Wireless Technologies}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.5263}, doi = {10.54039/IJCNIS.V13I3.5263}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KremenetskaMBLRV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KremenetskaMBLRV21a, author = {Yana Kremenetska and Anatoliy Makarenko and Andrii Bereznyuk and Serhii Lazebnyi and Natalia Rudenko and Olexander Vlasov}, title = {High-Altitude Configuration of Non-Terrestrial Telecommunication Network using Optical Wireless Technologies}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.5263}, doi = {10.17762/IJCNIS.V13I3.5263}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KremenetskaMBLRV21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/LaptievSKASSB21, author = {Oleksandr Laptiev and Vitalii Savchenko and Andrii Kotenko and Volodimir Akhramovych and Vladimir Samosyuk and German Shuklin and Anatjliy Biehun}, title = {Method of Determining Trust and Protection of Personal Data in Social Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4882}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/LaptievSKASSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/LaptievSPALKH21, author = {Oleksandr Laptiev and Vitalii Savchenko and Andrii Pravdyvyi and Ivan Ablazov and Rostyslav Lisnevsky and Oleksandr Koloss and Viktor Hudyma}, title = {Method of Detecting Radio Signals using Means of Covert by Obtaining Information on the basis of Random Signals Model}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4902}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/LaptievSPALKH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/LaptievYHDIFH21, author = {Oleksandr Laptiev and Serhii Yevseiev and Larysa Hatsenko and Olena Daki and Vitaliy Ivanenko and Valery Fedunov and Spartak Hohoniants}, title = {The method of discretization signals to minimize the fallibility of information recovery}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.5070}, doi = {10.17762/IJCNIS.V13I3.5070}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/LaptievYHDIFH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/LaptievYHDIFH21a, author = {Oleksandr Laptiev and Serhii Yevseiev and Larysa Hatsenko and Olena Daki and Vitaliy Ivanenko and Valery Fedunov and Spartak Hohoniants}, title = {The method of discretization signals to minimize the fallibility of information recovery}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.5070}, doi = {10.54039/IJCNIS.V13I3.5070}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/LaptievYHDIFH21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Mahmoud21, author = {Hanan A. Hosni Mahmoud}, title = {A Low Power Architectural Framework for Automated Surveillance System with Low Bit Rate Transmission}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4424}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Mahmoud21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MahmoudGES21, author = {Essraa Hesham Mahmoud and Mohammed S. Gadelrab and Khaled Elsayed and Abdel Rahman Sallam}, title = {Modelling Multilayer Communication Channel in Terahertz Band for Medical Applications}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.5041}, doi = {10.54039/IJCNIS.V13I3.5041}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/MahmoudGES21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MahmoudGES21a, author = {Essraa Hesham Mahmoud and Mohammed S. Gadelrab and Khaled Elsayed and Abdel Rahman Sallam}, title = {Modelling Multilayer Communication Channel in Terahertz Band for Medical Applications}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.5041}, doi = {10.17762/IJCNIS.V13I3.5041}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/MahmoudGES21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MalkawiAS21, author = {Mohammad Malkawi and Khaldoon Al{-}Zoubi and Ahmed Shatnawi}, title = {Quasi Real-Time Intermodulation Interference Method: Analysis and Performance}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4924}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/MalkawiAS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MeddebMA21, author = {Nesrine Meddeb and Amel Meddeb{-}Makhlouf and Mohamed Ali Ben Ayed}, title = {Secure and Efficient Video Transmission in {VANET}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4888}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/MeddebMA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MohsenHA21, author = {Duhaq Ehasn Mohsen and Ali Mehdi Hammadi and Ali J. Al{-}Askery}, title = {{WDM} and {DWDM} based RoF system in Fiber Optic Communication Systems: {A} review}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4887}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/MohsenHA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/RSV21, author = {Drishya S. R. and Renukadevi S. and Vaidehi V.}, title = {A Stable Clustering Scheme with Node Prediction in {MANET}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4746}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/RSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SarairehJ21, author = {Jaafer Saraireh and Haya Joudeh}, title = {An Efficient Authentication Scheme for Internet of Things}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.3422}, doi = {10.54039/IJCNIS.V13I3.3422}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/SarairehJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SerikbayevaTSYBT21, author = {Sandugash Serikbayeva and J. A. Tussupov and M. A. Sambetbayeva and A. S. Yerimbetova and Gauchar Borankulova and Aigul Tungatarova}, title = {A Model of a Distributed Information System based on the {Z39.50} Protocol}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.5122}, doi = {10.17762/IJCNIS.V13I3.5122}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/SerikbayevaTSYBT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SerikbayevaTSYBT21a, author = {Sandugash Serikbayeva and J. A. Tussupov and M. A. Sambetbayeva and A. S. Yerimbetova and Gauchar Borankulova and Aigul Tungatarova}, title = {A Model of a Distributed Information System based on the {Z39.50} Protocol}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.5122}, doi = {10.54039/IJCNIS.V13I3.5122}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/SerikbayevaTSYBT21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Silva21, author = {Andrey Silva}, title = {Security Improvements for Connected Vehicles Position-Based Routing}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.4953}, doi = {10.17762/IJCNIS.V13I3.4953}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Silva21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Silva21a, author = {Andrey Silva}, title = {Security Improvements for Connected Vehicles Position-Based Routing}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.4953}, doi = {10.54039/IJCNIS.V13I3.4953}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Silva21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Taleb21, author = {Anas Abu Taleb}, title = {Sink Mobility Model for Wireless Sensor Networks Using Kohonen Self-Organizing Map}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4813}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Taleb21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TawalbehMAA21, author = {Nabeel Tawalbeh and Mohammad Malkawi and Hanan M. Abusamaha and Sahban Alnaser}, title = {Demand Based Cost Optimization of Electric Bills for Household Users}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.5111}, doi = {10.54039/IJCNIS.V13I3.5111}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/TawalbehMAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TawalbehMAA21a, author = {Nabeel Tawalbeh and Mohammad Malkawi and Hanan M. Abusamaha and Sahban Alnaser}, title = {Demand Based Cost Optimization of Electric Bills for Household Users}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.5111}, doi = {10.17762/IJCNIS.V13I3.5111}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/TawalbehMAA21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Tawfeeq21, author = {Mohammed Ali Tawfeeq}, title = {Enhancing Route lifetime in Vehicular Ad Hoc ?Networks Based on Skellam Distribution Model}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.5028}, doi = {10.17762/IJCNIS.V13I3.5028}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Tawfeeq21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Tawfeeq21a, author = {Mohammed Ali Tawfeeq}, title = {Enhancing Route lifetime in Vehicular Ad Hoc {\unicode{8206}}Networks Based on Skellam Distribution Model}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.5028}, doi = {10.54039/IJCNIS.V13I3.5028}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/Tawfeeq21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TurovskyVRGKD21, author = {Oleksandr Leonidovich Turovsky and Vadym Vlasenko and Nataliia Rudenko and Oleksandr Golubenko and Oleh Kitura and Oleksandr Drobyk}, title = {Two-Time Procedure for Calculation of Carrier Frequency of Phasomodulated in Communication Systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.5165}, doi = {10.17762/IJCNIS.V13I3.5165}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/TurovskyVRGKD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TurovskyVRGKD21a, author = {Oleksandr Leonidovich Turovsky and Vadym Vlasenko and Nataliia Rudenko and Oleksandr Golubenko and Oleh Kitura and Oleksandr Drobyk}, title = {Two-Time Procedure for Calculation of Carrier Frequency of Phasomodulated in Communication Systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.5165}, doi = {10.54039/IJCNIS.V13I3.5165}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/TurovskyVRGKD21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/WahbiIRBH21, author = {Azeddine Wahbi and Anas el Habti el Idrissi and Ahmed Roukhe and Bahloul Bensassi and Laamari Hlou}, title = {Design, optimization and Real Time implementation of a new Embedded Chien Search Block for Reed-Solomon {(RS)} and Bose-Chaudhuri-Hocquenghem {(BCH)} codes on {FPGA} Board}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4889}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/WahbiIRBH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/YusufSB21, author = {Kabiru Yusuf and Dahiru Sani Shu'aibu and Suleiman Aliyu Babale}, title = {Channel Propagation Characteristics on the Performance of 4G Cellular Systems from High Altitude Platforms (HAPs)}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.5133}, doi = {10.17762/IJCNIS.V13I3.5133}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/YusufSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/YusufSB21a, author = {Kabiru Yusuf and Dahiru Sani Shu'aibu and Suleiman Aliyu Babale}, title = {Channel Propagation Characteristics on the Performance of 4G Cellular Systems from High Altitude Platforms (HAPs)}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.5133}, doi = {10.54039/IJCNIS.V13I3.5133}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/YusufSB21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbbasE20, author = {Sara Adel Abbas and Eman Mohamed El{-}Didamony}, title = {Reduction of secondary lobes in joint angle and delay estimation in angle of arrival localization to detect {MAC} address spoofing in wireless networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4353}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AbbasE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbdallahA20, author = {Hanaa A. Abdallah and Sara Alsodairi}, title = {A novel Watermarking Technique Based on Hybrid Transforms}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4321}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AbdallahA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbdelhaqAAAAAAA20, author = {Maha S. Abdelhaq and Raed A. Alsaqour and Noura Albrahim and Manar Alshehri and Maram Alshehri and Shehana Alserayee and Eatmad Almutairi and Farah Alnajjar}, title = {The Impact of selfishness Attack on Mobile Ad Hoc Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4444}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AbdelhaqAAAAAAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbdelkhalkiAB20, author = {Jamal El Abdelkhalki and Mohamed Ben Ahmed and Anouar Abdelhakim Boudhir}, title = {Image malware detection using deep learning}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4600}, timestamp = {Fri, 11 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AbdelkhalkiAB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlKhateeb20, author = {Jawad Hasan Yasin AlKhateeb}, title = {Handwritten Arabic Digit Recognition Using Convolutional Neural Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4807}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlKhateeb20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlamSMA20, author = {Sahirul Alam and Selo Sulistyo and I Wayan Mustika and Ronald Adrian}, title = {Fuzzy Adaptive Hysteresis of {RSS} for Handover Decision in {V2V} {VANET}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4859}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlamSMA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlbdourMS20, author = {Layla Albdour and Saher Manaseer and Ahmad Sharieh}, title = {IoT Crawler with Behavior Analyzer at Fog layer for Detecting Malicious Nodes}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4459}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlbdourMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AleneziAAA20, author = {Mohammad Nasser Alenezi and Haneen Khalid Alabdulrazzaq and Abdullah Abdulhai Alshaher and Mubarak Mohammad Alkharang}, title = {Evolution of Malware Threats and Techniques: a Review}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4723}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AleneziAAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AleneziAM20, author = {Mohammad Nasser Alenezi and Haneen Khalid Alabdulrazzaq and Nada Qasem Mohammad}, title = {Symmetric Encryption Algorithms: Review and Evaluation Study}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4698}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AleneziAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Allam20, author = {Ali Mohamed Nabil Allam}, title = {Cooperative Key Establishment Protocol for Full-Duplex Relay Systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4589}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Allam20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlmousaM20, author = {Omar Saad Almousa and Hazem Migdady}, title = {Introducing a Machine Learning Password Metric Based on {EFKM} Clustering Algorithm}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4795}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlmousaM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlmrezeqAAEN20, author = {Nourah Almrezeq and Lama Almadhoor and Thowg Alrasheed and A. A. Abd El{-}Aziz and Shadi Nashwan}, title = {Design a secure IoT Architecture using Smart Wireless Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4877}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlmrezeqAAEN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Alnfiai20, author = {Mrim Mhsn Alnfiai}, title = {A Novel Design of Audio {CAPTCHA} for Visually Impaired Users}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4529}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Alnfiai20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AnnaneAG20, author = {Boubakeur Annane and Adel Alti and Osman Ghazali}, title = {SecNetworkCloudSim: An Extensible Simulation Tool for Secure Distributed Mobile Applications}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4384}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AnnaneAG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AnuarMBA20, author = {Noor Azleen Anuar and Mohd Zaki Mas'ud and Nazrulazhar Bahamanan and Nor Azman Mat Ariff}, title = {Mobile Malware Behaviour through Opcode Analysis}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4732}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AnuarMBA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ArfaouiMB20, author = {Siham Arfaoui and Abdellatif Mezrioui and Abdelhamid Belmekki}, title = {A Methodology for Assuring Privacy by Design in Information Systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4852}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ArfaouiMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AsakipaamKAA20, author = {Simon Atuah Asakipaam and Jerry John Kponyo and Justice Owusu Agyemang and Fredrick Appiah{-}Twum}, title = {{AP} Design of a Minimal Overhead Control Traffic Topology Discovery and Data Forwarding Protocol for Software-Defined Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4803}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AsakipaamKAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AsassfehOA20, author = {Mahmoud Rajallah Asassfeh and Nadim Obeid and Wesam Almobaideen}, title = {Anonymous Authentication Protocols for IoT Based Healthcare: {A} Survey}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4713}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AsassfehOA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AssaouyZO20, author = {Mohammed Assaouy and Ouadoudi Zytoune and Mohamed Ouadou}, title = {Rapid Learning Optimization Approach for Battery Recovery-Aware Embedded System Communications}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4774}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AssaouyZO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Chandrakar20, author = {Ila Chandrakar}, title = {Articulation Point Based Quasi Identifier Detection for Privacy Preserving in Distributed Environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4426}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Chandrakar20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ElghayyatyMWBIH20, author = {Mohamed Elghayyaty and Omar Mouhib and Azeddine Wahbi and Ahmed Amine Barakate and Anas el Habti el Idrissi and Laamari Hlou and Abdelkader Hadjoudja}, title = {Performance Comparison of new Designs of Chien Search and Syndrome Blocks for {BCH} and Reed Solomon Codes}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4562}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ElghayyatyMWBIH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/FajriR20, author = {Misbahul Fajri and Kalamullah Ramli}, title = {Adaptive Active Queue Management based on Queue Ratio of Set-point Weighting}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4428}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/FajriR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GhmaryCHM20, author = {Mohamed El Ghmary and Tarik Chanyour and Youssef Hmimz and Mohammed Ou{\c{c}}amah Cherkaoui Malki}, title = {Offloading Decisions in a Mobile Edge Computing Node with Time and Energy Constraints}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4419}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/GhmaryCHM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GhmaryHCM20, author = {Mohamed El Ghmary and Youssef Hmimz and Tarik Chanyour and Mohammed Ou{\c{c}}amah Cherkaoui Malki}, title = {Energy and Processing Time Efficiency for an Optimal Offloading in a Mobile Edge Computing Node}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4750}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/GhmaryHCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HamidASP20, author = {Abdul Hamid and Monsur Alam and Hafsina Sheherin and Al{-}Sakib Khan Pathan}, title = {Cyber Security Concerns in Social Networking Service}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4634}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/HamidASP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HassaniSB20, author = {Abdelhadi Eloudrhiri Hassani and Aicha Sahel and Abdelmajid Badri}, title = {A New Objective Function Based on Additive Combination of Node and Link Metrics as a Mechanism Path Selection for {RPL} Protocol}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4446}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/HassaniSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Ibrahim20, author = {Amr Ibrahim}, title = {{HP4} High-Performance Programmable Packet Parser}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4734}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Ibrahim20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KarriT20, author = {Ganesh Reddy Karri and P. Santhi Thilagam}, title = {Na{\"{\i}}ve Bayes Classifier to Mitigate the DDoS Attacks Severity in Ad-Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4574}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KarriT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KponyoAK20, author = {Jerry John Kponyo and Justice Owusu Agyemang and Griffith Selorm Klogo}, title = {Detecting End-Point {(EP)} Man-In-The-Middle {(MITM)} Attack based on {ARP} Analysis: {A} Machine Learning Approach}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4735}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KponyoAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/NkosiMOM20, author = {Themba Lucky Nkosi and Maredi Mphahlele and Sunday Olusegun Ojo and Topside E. Mathonsi}, title = {Enhanced Dynamic Bandwidth Allocation Algorithm for Intelligent Home Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4196}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/NkosiMOM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Obeidat20, author = {Atef A. Obeidat}, title = {Novel Approach for Intrusion Detection Using Simulated Annealing Algorithm Combined with Hopfield Neural Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4665}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Obeidat20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/OuazzaniB20, author = {Zakariae El Ouazzani and Hanan El Bakkali}, title = {A Classification of non-Cryptographic Anonymization Techniques Ensuring Privacy in Big Data}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4401}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/OuazzaniB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PangAR20, author = {Kok{-}An Pang and Shekh Faisal Abdul{-}Latip and Hazlin Abdul Rani}, title = {Slid Pairs of the Fruit-80 Stream Cipher}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4382}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PangAR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PatchmuthuWS20, author = {Ravi Kumar Patchmuthu and Au Thien Wan and Wida Susanty Suhaili}, title = {Exploring Data Security and Privacy Issues in Internet of Things Based on Five-Layer Architecture}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4345}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PatchmuthuWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SaheedU20, author = {Kayode Yakub Saheed and Fatimah E. Usman{-}Hamza}, title = {Feature Selection with {IG-R} for Improving Performance of Intrusion Detection System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4569}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SaheedU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SalehDAA20, author = {Ma'en Saleh and Liang Dong and Ahmad Aljaafreh and Naeem Al{-}Oudat}, title = {Secure Location-Aided Routing Protocols With Wi-Fi Direct For Vehicular Ad Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4351}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SalehDAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SerhaneSBA20, author = {Yassine Serhane and Abderrahim Sekkaki and Karim Benzidane and Mehdi Abid}, title = {Cost Effective Cloud Storage Interoperability Between Public Cloud Platforms}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4822}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SerhaneSBA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ShahiBE20, author = {Gurpreet singh Shahi and Ranbir Singh Batth and Simon Egerton}, title = {{MRGM:} An Adaptive Mechanism for Congestion Control in Smart Vehicular Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4684}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ShahiBE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ShakerSS20, author = {Hothefa Shaker and Baraa T. Sharef and Zeyad T. Sharef}, title = {Fuzzy Logic-based Trusted and Power-aware Routing Protocol in Mobile Ad-hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4587}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ShakerSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Siswanto20, author = {Apri Siswanto}, title = {Chaotic-Based Encryption Algorithm using Henon and Logistic Maps for Fingerprint Template Protection}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4395}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Siswanto20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Somwang20, author = {Preecha Somwang}, title = {Efficient Load Balancing for Cloud Computing by Using Content Analysis}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4557}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Somwang20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Sone20, author = {Michael Ekonde Sone}, title = {Physical Layer Security for Wireless Networks Based on Coset Convolutional Coding}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4433}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Sone20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SukuvaaraMSK20, author = {Timo Sukuvaara and Kari M{\"{a}}enp{\"{a}}{\"{a}} and Daria Stepanova and Virve Karsisto}, title = {Vehicular Networking Road Weather Information System Tailored for Arctic Winter Conditions}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4595}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SukuvaaraMSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SupMB20, author = {Luciano Mauro Arley Sup and Renato Mariz de Moraes and Adolfo Bauchspiess}, title = {Acknowledge-Based Non-Congestion Estimation: An Indirect Queue Management Approach for Concurrent {TCP} and UDP-Like Flows}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4371}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SupMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SyafeiSP20, author = {Wahyul Amien Syafei and Yosua Alvin Adi Soetrisno and Agung Budi Prasetijo}, title = {Smart Agent and Modified Master-Backup Algorithm for Auto Switching Dynamic Host Configuration Protocol Relay through Wireless Router}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4478}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SyafeiSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SyafrizalSZ20, author = {Melwin Syafrizal and Siti Rahayu Selamat and Nurul Azma Zakaria}, title = {Analysis of Cybersecurity Standard and Framework Components}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4817}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SyafrizalSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ThangPJ20, author = {Nguyen Canh Thang and Minho Park and Yang{-}Ick Joo}, title = {{EVHS} - Elastic Virtual Honeypot System for SDNFV-Based Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4701}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ThangPJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TriptiJ20, author = {Tripti C and Jibukumar M G}, title = {An enhanced synchronized multi-channel {MAC} scheme to improve throughput in {VANET}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4566}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/TriptiJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/VermaB20, author = {Upendra Verma and Diwakar Bhardwaj}, title = {Design of Lightweight Authentication Protocol for Fog enabled Internet of Things- {A} Centralized Authentication Framework}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4464}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/VermaB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/godalaV20, author = {Sravanthi Godala and Rama Prasad V. Vaddella}, title = {A Study on Intrusion Detection System in Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4429}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/godalaV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Abouhogail19, author = {Reham Abdellatif Abouhogail}, title = {A New Secure Lightweight Authentication Protocol for {NFC} mobile Payment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {2}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4142}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Abouhogail19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Abuagoub19, author = {Ali M. A. Abuagoub}, title = {IoT Security Evolution: Challenges and Countermeasures Review}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {3}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4272}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Abuagoub19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Al-NusiratHKAA19, author = {Alaa Al{-}Nusirat and Feras Hanandeh and Mohammad Kamel Kharabsheh and Mahmoud Al{-}Ayyoub and Nahla Al{-}dhfairi}, title = {Dynamic Detection of Software Defects Using Supervised Learning Techniques}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3966}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Al-NusiratHKAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Al-ZubaidieZZ19, author = {Mishall Al{-}Zubaidie and Zhongwei Zhang and Ji Zhang}, title = {Efficient and Secure {ECDSA} Algorithm and its Applications: {A} Survey}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3827}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Al-ZubaidieZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlbaFM19, author = {Felomino Porras Alba and Enrique D. Festijo and Ruji P. Medina}, title = {A Distance-Based Data-Mule Scheduling Technique for Lesser Nodal Delay in Wireless Sensor Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3916}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlbaFM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlhananiAR19, author = {Rafat Ahmed Alhanani and Jaafar Abouchabaka and Najat Rafalia}, title = {{CDS-MIP:} CDS-based Multiple Itineraries Planning for mobile agents in wireless sensor network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4016}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlhananiAR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlotaibiASMA19, author = {May A. Alotaibi and Mohammed A. Alzain and Ben Soh and Mehedi Masud and Jehad F. Al{-}Amri}, title = {Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {3}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4407}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlotaibiASMA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Aloufi19, author = {Khalid Saleh Aloufi}, title = {6LoWPAN Stack Model Configuration for IoT Streaming Data Transmission over CoAP}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {2}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4034}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Aloufi19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Alsaedi19, author = {Mohammed Alsaedi}, title = {Image Encryption and Decryption Using Chua's Circuits}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3800}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Alsaedi19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AmiruddinRS19, author = {Amiruddin Amiruddin and Anak Agung Putri Ratna and Riri Fitri Sari}, title = {Systematic Review of Internet of Things Security}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {2}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3533}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AmiruddinRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BasnetAPAPE19, author = {A. Basnet and Abeer Alsadoon and P. W. C. Prasad and Omar Hisham Alsadoon and Linh Pham and Amr Elchouemi}, title = {A Novel Secure Patient Data Transmission through Wireless Body Area Network: Health Tele-Monitoring}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3801}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/BasnetAPAPE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BenzidaneKFJS19, author = {Karim Benzidane and Saad Khoudali and Leila Fetjah and Said Jai{-}Andaloussi and Abderrahim Sekkaki}, title = {Application-based authentication on an inter-VM traffic in a Cloud environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3841}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/BenzidaneKFJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BhattT19, author = {Priyang Prakashchandra Bhatt and Bhaskar V. Thakker}, title = {Mass Removal of Botnet Attacks Using Heterogeneous Ensemble Stacking {PROSIMA} classifier in IoT}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {3}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4275}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/BhattT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BukhariKM19, author = {Saufi Bukhari and Ku Ruhana Ku{-}Mahamud and Hiroaki Morino}, title = {Load Balancing Using Dynamic Ant Colony System Based Fault Tolerance in Grid Computing}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {2}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3861}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/BukhariKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ButheleziMPMM19, author = {Bongisizwe Erasmus Buthelezi and Maredi Mphahlele and Deon Du Plessis and Solly Maswikaneng and Topside E. Mathonsi}, title = {ZigBee Healthcare Monitoring System for Ambient Assisted Living Environments}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3677}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ButheleziMPMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ChanWA19, author = {Zheng Wei Clement Chan and Chuah Chai Wen and Janaka Alawatugoda}, title = {Review on Leakage Resilient Key Exchange Security Model}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3790}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ChanWA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Chiba19, author = {Zouhair Chiba}, title = {New Anomaly Network Intrusion Detection System in Cloud Environment Based on Optimized Back Propagation Neural Network Using Improved Genetic Algorithm}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3764}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Chiba19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ChibaAMOR19, author = {Zouhair Chiba and Noreddine Abghour and Khalid Moussaid and Amina El Omri and Mohammed Rida}, title = {Intelligent and Improved Self-Adaptive Anomaly based Intrusion Detection System for Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {2}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4144}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ChibaAMOR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ChristantoSP19, author = {Febrian Wahyu Christanto and Susanto and Agus Priyanto}, title = {{LOAD} {BALANCING-FAILOVER} {METHODS} {USING} {STATIC} {ROUTE} {WITH} {ADDRESS} LIST, ECMP, PCC, {AND} {NTH} {FOR} {OPTIMIZING} {LAN} {NETWORK} : {A} {COMPARISON}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {3}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4340}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ChristantoSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/CubidesGMCC19, author = {Jhon Francined Herrera Cubides and Paulo Alonso Gaona{-}Garc{\'{\i}}a and Carlos Enrique Montenegro Mar{\'{\i}}n and Diego Mauricio Cata{\~{n}}o and Rub{\'{e}}n Gonz{\'{a}}lez Crespo}, title = {Security Aspects in Web of Data Based on Trust Principles. {A} brief of Literature Review}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {3}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4334}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/CubidesGMCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/EsaAB19, author = {Nur Fasihah Mohd Esa and Shekh Faisal Abdul{-}Latip and Mohd Rizuan Baharon}, title = {A Survey of ARX-based Symmetric-key Primitives}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {3}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4258}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/EsaAB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GhazouaniKL19, author = {Mohamed El Ghazouani and Moulay Ahmed El Kiram and Latifa Er{-}Rajy}, title = {Blockchain {\&} Multi-Agent System: {A} New Promising Approach for Cloud Data Integrity Auditing with Deduplication}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3880}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/GhazouaniKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HendiDAS19, author = {Amjad Yosef Hendi and Majed O. Dwairi and Ziad Abdulkareem Al{-}Qadi and Mohamed S. Soliman}, title = {A {NOVEL} {SIMPLE} {AND} {HIGHLY} {SECURE} {METHOD} {FOR} {DATA} {ENCRYPTION-DECRYPTION}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3999}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/HendiDAS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HussainQHH19, author = {Mohammad Equebal Hussain and Mohammed Qayyum and Mohammad Rashid Hussain and Rashid Hussain}, title = {Effective and Secure vWSN Applications in a Virtualized Cloud Computing Environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {2}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3920}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/HussainQHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Jedidi19, author = {Ahmed Jedidi}, title = {Workload Cluster Balance Algorithm to Improve Wireless Sensor Network Performance}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3901}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Jedidi19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KaduA19, author = {Rakesh K. Kadu and Dattatraya S. Adane}, title = {Hardware Implementation of Efficient Elliptic Curve Scalar Multiplication using Vedic Multiplier}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {2}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3763}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KaduA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KaurK19, author = {Dalveer Kaur and Neeraj Kumar}, title = {Dexterity for Channel Capacity Enhancement in {MU-MIMO} by Abrogating Interference}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3753}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KaurK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KhanboubiH19, author = {Yassine El Khanboubi and Mostafa Hanoune}, title = {Exploiting Blockchains to improve Data Upload and Storage in the Cloud}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {3}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4237}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KhanboubiH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KhediriKA19, author = {Salim El Khediri and Rehan Ullah Khan and Waleed Albattah}, title = {An optimal clustering algorithm based distance-aware routing protocol for wireless sensor networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {3}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3939}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KhediriKA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/LavanyaBK19, author = {Muni Lavanya and Chigarapalle Shoba Bindu and Vijay Kumar}, title = {Internet Traffic based Channel Selection in Multi-Radio Multi-Channel Wireless Mesh Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {2}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4110}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/LavanyaBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Maliberan19, author = {Esmael Verano Maliberan}, title = {Modified {SHA1:} {A} Hashing Solution to Secure Web Applications through Login Authentication}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3726}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Maliberan19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MuruganP19, author = {Kalpana Murugan and Al{-}Sakib Khan Pathan}, title = {A Routing Algorithm for Extending Mobile Sensor Network's Lifetime using Connectivity and Target Coverage}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {2}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4102}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MuruganP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/OmarK19, author = {Dina M. Omar and Ahmed Khedr}, title = {{SEPCS:} Prolonging Stability Period of Wireless Sensor Networks using Compressive Sensing}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3775}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/OmarK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PerdanaIB19, author = {Doan Perdana and Muhammad Imadudin and Gustommy Bisono}, title = {Performance Evaluation of Soil Substance Measurement System in Garlic Plant based on Internet of Things with Mesh Topology Network Scenario}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {3}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4378}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PerdanaIB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SK19, author = {Ravindra S and Siddesh G. K}, title = {Distance Based Power Control for {D2D} Communication in LTE-Advanced Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {2}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4057}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SaberRSAW19, author = {Mohammed Saber and Abdessamad El Rharras and Rachid Saadane and Hatim Kharraz Aroussi and Mohamed Wahbi}, title = {Artificial Neural Networks, Support Vector Machine And Energy Detection For Spectrum Sensing Based On Real Signals}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3718}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SaberRSAW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SalmanF19, author = {Mohammed Falah Abood Salman and Leili Farzinvash}, title = {A Hybrid Algorithm for Reliable and Energy-efficient Data Gathering in Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3663}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SalmanF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ShakirAAAOM19, author = {Abdullah Shakir and Raed A. Alsaqour and Maha S. Abdelhaq and Amal Alhussan and Mohd Othman and Ahmed Mahdi}, title = {Novel Method of Improving Quality of Service for Voice over Internet Protocol Traffic in Mobile Ad Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {3}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4235}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ShakirAAAOM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/StiawanAHSMIB19, author = {Deris Stiawan and Diky Aryandi and Ahmad Heryanto and Tri Wanda Septian and Farkhana Muchtar and Mohd Yazid Idris and Rahmat Budiarto}, title = {Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3789}, timestamp = {Fri, 04 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/StiawanAHSMIB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TajZWRAK19, author = {Nayab Taj and Mohammad Haseeb Zafar and Shakeel Ahmad Waqas and Humaira Rehman and Madini O. Alassafi and Imran Khan}, title = {Smart Relay Selection Scheme Based on Fuzzy Logic with Optimal Power Allocation and Adaptive Data Rate Assignment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4049}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/TajZWRAK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ToulniMNB19, author = {Hamza Toulni and Mounia Miyara and Benayad Nsiri and Mohcine Boudhane}, title = {Traffic congestion prevention system}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3485}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ToulniMNB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TriadiPML19, author = {Muhammad Biben Triadi and Doan Perdana and Rendy Munadi and Wenzao Li}, title = {A New Variant of Game Theory Based Decision Making {(GTDM)} Algorithm Routing Protocols to Improve Energy Efficiency on Vehicular Delay Tolerant Network {(VDTN)}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4078}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/TriadiPML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/VasconcelosMGS19, author = {Gabriel Vasconcelos and Rodrigo Sanches Miani and Vitor Guizlini and Jefferson R. Souza}, title = {Evaluation of DoS attacks on Commercial Wi-Fi-Based UAVs}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3969}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/VasconcelosMGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/VirataF19, author = {Alvin Jason A. Virata and Enrique Festijo}, title = {Identity Verification through Face Recognition Implemented on Raspberry Pi Framework}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {3}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4254}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/VirataF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Yunus19, author = {Farizah Yunus}, title = {A Rate Control Model of {MPEG-4} Encoder for Video Transmission over Wireless Sensor Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3710}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Yunus19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AN18, author = {A. Ajina and Mydhili K. Nair}, title = {Dynamic Network State Learning Model for Mobility Based {WMSN} Routing Protocol}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3183}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbdellaouiEB18, author = {Ayoub Abdellaoui and Jamal Elmhamdi and Halim Berradi}, title = {Multipoint Relay Selection based on Stability of Spatial Relation in Mobile Ad hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3132}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AbdellaouiEB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbdullaH18, author = {Shubair Abdulla and Amaal Saleh Al Hashimy}, title = {TiSEFE: Time Series Evolving Fuzzy Engine for Network Traffic Classification}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3125}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AbdullaH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Achbarou18, author = {Omar Achbarou}, title = {A New Distributed Intrusion Detection System Based on Multi-Agent System for Cloud Environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3546}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Achbarou18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Ahanger18, author = {Tariq Ahamed Ahanger}, title = {Mobility of Internet of Things and Fog Computing: Serious Concerns and Future Directions}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3706}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Ahanger18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AhmadZKISZ18, author = {Azuan Ahmad and Wan Shafiuddin Zainudin and Mohd Nazri Kama and Norbik Bashah Idris and Madihah Mohd Saudi and Nur Hafiza Zakaria}, title = {State of the Art Intrusion Detection System for Cloud Computing}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3590}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AhmadZKISZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AjinegoroPN18, author = {Riski Muktiarto Nugroho Ajinegoro and Doan Perdana and Ridha Muldina Negara}, title = {Performance Analysis of Mobility Impact on {IEEE} 802.11ah Standard with Traffic Pattern Scheme}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3212}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AjinegoroPN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Al-AzzehMZOGA18, author = {Jamil Al{-}Azzeh and Abdelwadood Mesleh and Zhengbing Hu and Roman Odarchenko and Sergiy Gnatyuk and Anastasiia Abakumova}, title = {Evaluation Method for {SDN} Network Effectiveness in Next Generation Cellular Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3605}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Al-AzzehMZOGA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Al-FayoumiN18, author = {Mustafa Al{-}Fayoumi and Shadi Nashwan}, title = {Performance Analysis of {SAP-NFC} Protocol}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3237}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Al-FayoumiN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Al-MutiriAT18, author = {Rasha Al{-}Mutiri and Mznah Al{-}Rodhaan and Yuan Tian}, title = {Improving Vehicular Authentication in {VANET} Using}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3124}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Al-MutiriAT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Al-ShayeaA18, author = {Qeethara Al{-}Shayea and Muzhir Al{-}Ani}, title = {Biometric Face Recognition Based on Enhanced Histogram Approach}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3142}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Al-ShayeaA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlqeremH18, author = {Ahmad Alqerem and Ala Hamarsheh}, title = {Statistical-Based Heuristic for Scheduling of Independent Tasks in Cloud Computing}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3406}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlqeremH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Ara18, author = {Tabassum Ara}, title = {Energy efficient secured cluster based distributed fault diagnosis protocol for IoT}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3586}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Ara18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BaharonSAYI18, author = {Mohd Rizuan Baharon and Qi Shi and Mohd Faizal Abdollah and S. M. Warusia Mohamed S. M. M. Yassin and Ariff Idris}, title = {An Improved Fully Homomorphic Encryption Scheme for Cloud Computing}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3573}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/BaharonSAYI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BawanehOA18, author = {Mohammad Jazi Bawaneh and Atef A. Obeidat and Majd M. Al{-}Kofahi}, title = {An Adaptive {FLV} Steganography Approach Using Simulated Annealing}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3072}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/BawanehOA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BiradarS18, author = {Shobha Biradar and P. M. Mallikarjuna Shastry}, title = {Redundancy Elimination with Coverage Preserving algorithm in Wireless Sensor Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3576}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/BiradarS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/CevikG18, author = {Taner {\c{C}}evik and Alex Gunagwera}, title = {Coverage and Energy Efficiency Optimization for Randomly Deployed Multi-Tier Wireless Multimedia Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3032}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/CevikG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Do18, author = {Dinh{-}Thuan Do}, title = {Performance Analysis In Wireless Powered D2D-Aided Non-Orthogonal Multiple Access Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3312}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Do18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ElSharkawy18, author = {Magdy Ibrahim ElSharkawy}, title = {A New Scheme for Spreading {\&} De-spreading in the Direct Sequence Spread Spectrum Mechanism}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3253}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ElSharkawy18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ElSharkawy18a, author = {Magdy Ibrahim ElSharkawy}, title = {Using Quaternion Fourier Transform in Steganography Systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3266}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ElSharkawy18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ElshareE18, author = {Shadi Elshare and Nameer N. El{-}Emam}, title = {Modified Multi-Level Steganography to Enhance Data Security}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3614}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ElshareE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/EyadehA18, author = {Ali Ahmad Eyadeh and Mohammad Bani Amerah}, title = {Ferry-Based Directional Forwarding Mechanism for Improved Network Life-Time in Cluster-Based Wireless Sensor Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2776}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/EyadehA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Frattolillo18, author = {Franco Frattolillo}, title = {Assisted Navigation Algorithm for Wireless Sensor Actuator and Robot Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3429}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Frattolillo18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GadelrabEGR18, author = {Mohammed S. Gadelrab and Muhammad H. ElSheikh and Mahmoud A. Ghoneim and Mohsen A. Rashwan}, title = {BotCap: Machine Learning Approach for Botnet Detection Based on Statistical Features}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3624}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/GadelrabEGR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HindumathiR18, author = {Voruganti Hindumathi and Katta Rama Linga Reddy}, title = {Delay aware optimal resource allocation in {MU} {MIMO-OFDM} using enhanced spider monkey optimization}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3102}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/HindumathiR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HussainiNA18, author = {Muktar Hussaini and Shahrudin Awang Nor and Amran Ahmad}, title = {{PMSS:} Producer Mobility Support Scheme Optimization with {RWP} Mobility Model in Named Data Networking}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3272}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/HussainiNA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Jan18, author = {Tariqullah Jan}, title = {Implementing Enhanced {MIMO} with {F-OFDM} to Increase System Efficiency for Future 5G Cellular Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3286}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Jan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/JusakM18, author = {Jusak Jusak and Seedahmed Sharif Mahmoud}, title = {A Novel and Low Processing Time {ECG} Security Method Suitable for Sensor Node Platforms}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3169}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/JusakM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KandoussiB18, author = {Asmaa El Kandoussi and Hanan El Bakkali}, title = {Security based partner selection in Inter-organizational workflow systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3670}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KandoussiB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Karanam18, author = {Ramesh Rao Karanam}, title = {Node Activities Learning(NAL)Approach to Build Secure and Privacy-Preserving Routing in Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3699}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Karanam18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KhamaysehA18, author = {Yaser M. Khamayseh and Rabiah Al{-}qudah}, title = {Resource Allocation using Genetic Algorithm in Multimedia Wireless Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3280}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KhamaysehA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KhedrA18, author = {Ahmed Khedr and Arwa Attia}, title = {New Holes and Boundary Detection Algorithm for Heterogeneous Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2973}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KhedrA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KumarK18, author = {Neeraj Kumar and Dalveer Kaur}, title = {Capacity Enhancement of Multiuser Wireless Communication System through Adaptive Non-Linear Pre coding}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3056}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KumarK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Lekha18, author = {Sri Lekha}, title = {A Multilevel Scheduling {MAC} Protocol for Underwater Acoustic Sensor Networks(UASN)}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3420}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Lekha18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MaliberanSM18, author = {Esmael Verano Maliberan and Ariel M. Sison and Ruji P. Medina}, title = {A New Approach in Expanding the Hash Size of {MD5}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3292}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MaliberanSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MarwanPS18, author = {Abdul Aziz Marwan and Doan Perdana and Danu Dwi Sanjoyo}, title = {Performance Analysis of User Speed Impact on {IEEE} 802.11ah Standard affected by Doppler Effect}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3334}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MarwanPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MasdukiRM18, author = {Bisyron Wahyudi Masduki and Kalamullah Ramli and Hendri Murfi}, title = {Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3375}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MasdukiRM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MezghaniA18, author = {Omnia Mezghani and Pr. Mahmoud Abdellaoui}, title = {Efficient Clustering Protocol Based on Stochastic Matrix {\&} {MCL} and Data Routing for Mobile Wireless Sensors Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3208}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MezghaniA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Monsakul18, author = {Annop Monsakul}, title = {{SRAD:} Smart Routing Algorithm Design for Supporting IoT Network Architecture}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3121}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Monsakul18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MorilloGM18, author = {Dixon Salcedo Morillo and C{\'{e}}sar D. Guerrero and Roberto Mart{\'{\i}}nez}, title = {Available Bandwidth Estimation Tools Metrics, Approaches and Performance}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3516}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/MorilloGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MoudniEMH18, author = {Houda Moudni and Mohamed Er{-}rouidi and Hicham Mouncif and Benachir El Hadadi}, title = {Fuzzy Logic based Intrusion Detection System against Black Hole Attack in Mobile Ad Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3267}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MoudniEMH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MunanzarAS18, author = {Hery Munanzar and Teuku Yuliar Arif and Syahrial}, title = {{AARF-HT:} Adaptive Auto Rate Fallback for High-Throughput {IEEE} 802.11n WLANs}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3122}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MunanzarAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Nashwan18, author = {Imad I. H. Nashwan}, title = {Reliability and Failure Functions of the Consecutive k-out-of-m-from-n: {F} Linear and Circular System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3449}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Nashwan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/NayyarBHS18, author = {Anand Nayyar and Ranbir Singh Batth and Dac{-}Binh Ha and G. Sussendran}, title = {Opportunistic Networks: Present Scenario- {A} Mirror Review}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3283}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/NayyarBHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/OliveiraGF18, author = {Ren{\^{e}} Pomilio de Oliveira and Lourival Aparecido de G{\'{o}}is and Augusto Foronda}, title = {Enhanced {PF} Scheduling Algorithm for {LTE} Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3026}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/OliveiraGF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/OsamyK18, author = {Walid Osamy and Ahmed M. Khedr}, title = {An algorithm for enhancing coverage and network lifetime in cluster-based Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2849}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/OsamyK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ParedesSM18, author = {Rolysent Paredes and Ariel M. Sison and Ruji P. Medina}, title = {Bandwidth Allocation Mechanism based on Users' Web Usage Patterns for Campus Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3400}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ParedesSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PatilGK18, author = {Veeresh Patil and Sanjeev Gupta and C. Keshavamurthy}, title = {{S-RLNC} based {MAC} Optimization for Multimedia Data Transmission over {LTE/LTE-A} Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2984}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PatilGK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PorrasDP18, author = {Jonier Porras and Daniel Ducuara and Gustavo Puerto}, title = {OpenDaylight vs. Floodlight: Comparative Analysis of a Load Balancing Algorithm for Software Defined Networking}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3178}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PorrasDP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PutraASK18, author = {Septafiansyah Dwi Putra and Adang Suwandi Ahmad and Sarwono Sutikno and Yusuf Kurniawan}, title = {Attacking AES-Masking Encryption Device with Correlation Power Analysis}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2884}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PutraASK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/R18, author = {Vijaya Saraswathi R}, title = {Muti-stage Key Management Scheme for Cluster based {WSN}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3650}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/R18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/RaisBO18, author = {Amine Rais and Khalid Bouragba and Mohamed Ouzzif}, title = {Determination of Itinerary Planning for Multiple Agents in Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3081}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/RaisBO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ReddyS18, author = {Y. Narasimha Reddy and P. V. S. Srinivas}, title = {A Routing Delay Predication Based on Packet Loss and Explicit Delay Acknowledgement for Congestion Control in {MANET}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3582}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ReddyS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ReyesFM18, author = {Ariel Roy L. Reyes and Enrique D. Festijo and Ruji P. Medina}, title = {Securing One Time Password {(OTP)} for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3188}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ReyesFM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Saberi18, author = {Mohsen Saberi}, title = {Private and Mobile inter-network routing for Wireless Sensor Networks and Internet of Things}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3003}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Saberi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SatizabalP18, author = {Cristina Satiz{\'{a}}bal and Rafael P{\'{a}}ez}, title = {Internet Voting Protocols: An Analysis of the Cryptographic Operations per Phase}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3112}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SatizabalP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ShatnawiAJ18, author = {Ali M. Shatnawi and Bushra AlHajouj and Moath H. A. Jarrah}, title = {A New Multi-threaded and Interleaving Approach to Enhance String Matching for Intrusion Detection Systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3209}, timestamp = {Wed, 26 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ShatnawiAJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SuudZOH18, author = {Jamaah Binti Suud and Hushairi Zen and Al{-}Khalid Othman and Khairuddin Abdul Hamid}, title = {Decoding of Decode and Forward {(DF)} Relay Protocol using Min-Sum Based Low Density Parity Check {(LDPC)} System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3066}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SuudZOH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ThakurSP18, author = {Kutub Thakur and Juan Shan and Al{-}Sakib Khan Pathan}, title = {Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2991}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ThakurSP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/VenkataramananL18, author = {V. Venkataramanan and S. Lakshmi}, title = {A Case Study of Various Wireless Network Simulation Tools}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3261}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/VenkataramananL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Wenceslao18, author = {Felicisimo Villarico Wenceslao Jr.}, title = {Enhancing the Performance of the Advanced Encryption Standard {(AES)} Algorithm Using Multiple Substitution Boxes}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3589}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Wenceslao18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/WulandariPN18, author = {Triani Wulandari and Doan Perdana and Ridha Muldina Negara}, title = {Node Density Performance Analysis on {IEEE} 802.11ah Standard for VoIP Service}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3023}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/WulandariPN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Yassein18, author = {Muneer O. Bani Yassein}, title = {Enhanced Home Energy Management Scheme {(EHEM)} in Smart Grids}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3109}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Yassein18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ZayoudAAK18, author = {Maha Zayoud and Hanady M. Abdulsalam and A. Al{-}Yatama and Seifedine Nimer Kadry}, title = {Split and Merge {LEACH} Based Routing Algorithm for Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3028}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ZayoudAAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/adelaniMH18, author = {Zahra Adelani and Ghasem Mirjalily and Milad HajMirzaei}, title = {Balanced Multi-Channel Data Collection in Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2893}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/adelaniMH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AN17, author = {A. Ajina and Mydhili K. Nair}, title = {Cross Layered Network Condition Aware Mobile-Wireless Multimedia Sensor Network Routing Protocol for Mission Critical Communication}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {1}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2174}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Abdel-AzimSe17, author = {Mohammed Abdel{-}Azim and Hossam El{-}Din Salah and Menas Ebrahim Eissa}, title = {Black Hole attack Detection using fuzzy based {IDS}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {2}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2281}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Abdel-AzimSe17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AhmadIK17, author = {Azuan Ahmad and Norbik Bashah Idris and Mohd Nazri Kama}, title = {CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {1}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2233}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AhmadIK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlBalasMB17, author = {Firas AlBalas and Wail Mardini and Dua'a Bani{-}salameh}, title = {Optimized Job Scheduling approach based on Genetic algorithms in smart Grid environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {2}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2285}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlBalasMB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Aljarrah17, author = {Emran Aljarrah}, title = {Deployment of Multi-Fuzzy Model Based Routing in {RPL} to Support Efficient IoT}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2918}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Aljarrah17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlosaimiZAAM17, author = {Wael Alosaimi and Michal Z{\'{a}}k and Khalid Al{-}Begain and Roobaea Alroobaea and Mehedi Masud}, title = {Economic Denial of Sustainability Attacks Mitigation in the Cloud}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2798}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlosaimiZAAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AmiruddinRS17, author = {Amiruddin Amiruddin and Anak Agung Putri Ratna and Riri Fitri Sari}, title = {New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2307}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AmiruddinRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BashirKJU17, author = {Shahid Bashir and M. Salman Khan and Khadim Ullah Jan and Sadiq Ullah}, title = {Performance Enhancement of Wearable Antenna Using High Impedance Surfaces}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {1}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2220}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/BashirKJU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BenmammarBAK17, author = {Badr Benmammar and Youcef Benmouna and Asma Amraoui and Francine Krief}, title = {A parallel implementation on a multi-core architecture of a dynamic programming algorithm applied in cognitive radio ad hoc networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {2}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2354}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/BenmammarBAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ES17, author = {Selvi E and Shashidhara M. S}, title = {Quantum Phase Shift For Energy Conserved Secured Data Communication In Manet}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {2}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2365}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ES17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ElSharkawy17, author = {Magdy Ibrahim ElSharkawy}, title = {Quaternion-based Encryption/Decryption of Audio Signal Using Digital Image as Variable Key}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {2}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2379}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ElSharkawy17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ElSharkawy17a, author = {Magdy Ibrahim ElSharkawy}, title = {Integrating and Securing Video, Audio and Text Using Quaternion Fourier Transform}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2634}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ElSharkawy17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ElmirMHHK17, author = {Iman El Mir and Kandoussi el Mehdi and Mohamed Hanini and Abdelkrim Haqiq and Dong Seong Kim}, title = {A Game Theoretic approach based virtual machine migration for cloud environment security}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2579}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ElmirMHHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Frattolillo17, author = {Franco Frattolillo}, title = {Digital Copyright Protection: Focus on Some Relevant Solutions}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {2}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2425}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Frattolillo17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GV17, author = {Venifa Mini G and K. S. Angel Viji}, title = {A Comprehensive Cloud Security Model with Enhanced Key Management, Access Control and Data Anonymization Features}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {2}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2372}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/GV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GuezouliBBZ17, author = {Lyamine Guezouli and Kamel Barka and Souheila Bouam and Abdelmadjid Zidani}, title = {Implementation and Optimization of {RWP} Mobility Model in {WSNS} under Tossim Simulator}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {1}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2116}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/GuezouliBBZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GunantaraD17, author = {Nyoman Gunantara and Agus Dharma}, title = {Optimal Path Pair Routes through Multi-Criteria Weights in Ad Hoc Network Using the Genetic Algorithm}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {1}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2037}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/GunantaraD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GuptaPNM17, author = {Bhupendra Kumar Gupta and Srikanta Patnaik and Ajit Kumar Nayak and Manas Kumar Mallick}, title = {Congestion Managed Multicast Routing in Wireless Mesh Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2643}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/GuptaPNM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GurramB17, author = {Vijaya Kumar Gurram and Shoba Bindu Chigarepalli}, title = {A New Method of User Association in Wireless Mesh Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {1}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1960}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/GurramB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/IrawatiSE17, author = {Indrarini Dyah Irawati and Andriyan Bayu Suksmono and Ian Yosef Matheus Edward}, title = {Missing Internet Traffic Reconstruction using Compressive Sampling}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {1}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2249}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/IrawatiSE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/IsnawatiHSM17, author = {Anggun Fitrian Isnawati and Risanuri Hidayat and Selo Sulistyo and I Wayan Mustika}, title = {A Novel Utility Function of Power Control Game in Multi-Channel Cognitive Femtocell Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2770}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/IsnawatiHSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/JG17, author = {Lekha J and Ganapathi Padmavathi}, title = {Detection of illegal traffic pattern using Hybrid Improved {CART} and Multiple Extreme Learning Machine Approach}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {2}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2053}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/JG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/JainR17, author = {Sweta Jain and Vinuraj R}, title = {{CALAR:} Community Aware Location Assisted Routing Framework for Delay Tolerant Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {2}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2082}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/JainR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/JegedeUAM17, author = {Abayomi Jegede and Nur Izura Udzir and Azizol Abdullah and Ramlan Mahmod}, title = {State of the Art in Biometric Key Binding and Key Generation Schemes}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2388}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/JegedeUAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Khan17, author = {Imran Khan}, title = {Performance Analysis of 5G Cooperative-NOMA for IoT-Intermittent Communication}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2641}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Khan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KhanAZA17, author = {Mohsin Khan and Majid Ashraf and Haseeb Zafar and Tufail Ahmad}, title = {Enhanced Handover Mechanism in Long Term Evolution {(LTE)} Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {1}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2219}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KhanAZA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KumarHAJ17, author = {Ramesh Kumar and Ayaz Hussain and Abdul Aziz and Inwhee Joe}, title = {Wireless {DF} Relaying with Beamforming for an Unmanned Aircraft System over {\(\kappa\)}-{\(\mu\)} Fading Channels}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {1}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2275}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KumarHAJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MardiniEA17, author = {Wail Mardini and Maad Ebrahim and Mohammed Al{-}Rudaini}, title = {Comprehensive Performance Analysis of {RPL} Objective Functions in IoT Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2515}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MardiniEA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Nashwan17, author = {Shadi Ismail Nashwan}, title = {{SE-H:} {A} Secure and Efficient Hash Protocol for {RFID} System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2728}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Nashwan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/NasirKK17, author = {Husna Jamal Abdul Nasir and Ku Ruhana Ku{-}Mahamud and Eiji Kamioka}, title = {Enhanced Ant-Based Routing for Improving Performance of Wireless Sensor Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2611}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/NasirKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Obeidat17, author = {Atef A. Obeidat}, title = {Hybrid Approach for Botnet Detection Using K-Means and K-Medoids with Hopfield Neural Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2514}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Obeidat17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/OmarK17, author = {Dina M. Omar and Ahmed M. Khedr}, title = {Optimized Clustering Protocol for Balancing Energy in Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2607}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/OmarK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/OulaourfHAO17, author = {Sanaa Oulaourf and Abdelfatteh Haidine and Abdelhak Aqqal and Hassan Ouahmane}, title = {Review on Radio Resource Allocation Optimization in LTE/LTE-Advanced using Game Theory}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {1}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2257}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/OulaourfHAO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PavaniR17, author = {Movva Pavani and Polipalli Trinatha Rao}, title = {Urban Air Pollution Monitoring Using Wireless Sensor Networks: {A} Comprehensive Review}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2708}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PavaniR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PerdanaDW17, author = {Doan Perdana and Favian Dewanta and Ig Prasetya Dwi Wibawa}, title = {Extending Monitoring Area of Production Plant Using Synchronized Relay Node Message Scheduling}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {1}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2280}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PerdanaDW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PoolaSC17, author = {Veeresh Poola and R. Praveen Sam and Shoba Bindhu C}, title = {Fuzzy Based Optimal QoS Constraint Services Composition in Mobile Ad Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2525}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PoolaSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/RG17, author = {Kavitha R and Padmavathi G}, title = {Advanced Random Time Queue Blocking With Traffic Prediction For Defense Of Low-Rate Dos Attacks Against Application Servers}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {1}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2253}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/RG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/RamM17, author = {Anant Ram and Manas Kumar Mishra}, title = {Mobility Adaptive Density Connected Clustering Approach in Vehicular Ad Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {2}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2325}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/RamM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/RokaS17, author = {Rastislav R{\'{o}}ka and Pavol Sal{\'{\i}}k}, title = {Impact of Environmental Influences on Multilevel Modulation Formats at the Signal Transmission in the Optical Transmission Medium}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {1}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2134}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/RokaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SahnounHA17, author = {Abdelkabir Sahnoun and Ahmed Habbani and Jamal El Abbadi}, title = {{EEPR-OLSR:} an Energy Efficient and Path Reliability protocol for proactive {MANET} routing}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {1}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2215}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SahnounHA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SalcedoGG17, author = {Dixon Salcedo Morillo and C{\'{e}}sar D. Guerrero and Julian Guerrero}, title = {Overhead in Available Bandwidth Estimation Tools: Evaluation and Analysis}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2475}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/SalcedoGG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Saleh17, author = {Ahmed M. Shamsan Saleh}, title = {Bio-Inspired Technique: An Adaptive Routing for Reliability and Energy Efficiency Method in Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {2}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2326}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Saleh17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SarodeB17, author = {Sambhaji Sarode and Jagdish W. Bakal}, title = {{PFPS:} Priority-First Packet Scheduler for {IEEE} 802.15.4 Heterogeneous Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {2}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2419}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SarodeB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SaudiFSDY17, author = {Nur Hidayah Mohd Saudi and M. A. Faizal and Siti Rahayu Selamat and Rudy Fadhlee M. D and Wan Ahmad Ramzi W. Y.}, title = {Revealing the Feature Influence in {HTTP} Botnet Detection}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {2}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2391}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SaudiFSDY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SinghPA17, author = {Pooja Singh and Vikas Pareek and Anil K. Ahlawat}, title = {Designing an Energy Efficient Network Using Integration of KSOM, {ANN} and Data Fusion Techniques}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2769}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SinghPA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SulistyoA17, author = {Selo Sulistyo and Sahirul Alam}, title = {Distributed Channel and Power Level Selection in {VANET} Based on {SINR} using Game Model}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2896}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SulistyoA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SwainPP17, author = {Jhum Swain and Binod Kumar Pattanayak and Bibudhendu Pati}, title = {A New Approach for DDoS attacks to discriminate the attack level and provide security for DDoS nodes in {MANET}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2903}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SwainPP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Taqieddin17, author = {Eyad Salah Taqieddin}, title = {On the Improper Use of {CRC} for Cryptographic Purposes in {RFID} Mutual Authentication Protocols}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {2}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2376}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Taqieddin17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TitounaGAAA17, author = {Chafiq Titouna and Abdelhak Mourad Gu{\'{e}}roui and Makhlouf Aliouat and Ado Adamou Abba Ari and Amine Adouane}, title = {Distributed Fault-Tolerant Algorithm for Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {2}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1848}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/TitounaGAAA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/YFDS17, author = {Wan Ahmad Ramzi W. Y. and M. A. Faizal and Rudy Fadhlee M. D and Nur Hidayah Mohd Saudi}, title = {Revealing Influenced Selected Feature for {P2P} Botnet Detection}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2927}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/YFDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/YichietMK17, author = {Aun Yichiet and Selvakumar Manickam and Shankar Karuppayah}, title = {A Review on Features' Robustness in High Diversity Mobile Traffic Classifications}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {2}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2368}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/YichietMK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/YulianaWS17, author = {Mike Yuliana and Wirawan and Suwadi}, title = {Performance Improvement of Secret Key Generation Scheme in Wireless Indoor Environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2890}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/YulianaWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ZeeshanJU17, author = {Muhammad Zeeshan and Huma Javed and Sifat Ullah}, title = {Discrete R-Contiguous bit Matching mechanism appropriateness for anomaly detection in Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {2}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2456}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ZeeshanJU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Al-SmoulAA16, author = {Khalid M. Al{-}Smoul and Thamer Alrwashdeh and Ali A. Al{-}Dahoud}, title = {An Improved Solar Low Energy Adaptive Clustering Hierarchy {(IS-LEACH)} Technique}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {3}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2070}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Al-SmoulAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlmarshadMP16, author = {Malak Abdullah I. Almarshad and Mohssen M. Z. E. Mohammed and Al{-}Sakib Khan Pathan}, title = {Detecting Zero-day Polymorphic Worms with Jaccard Similarity Algorithm}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {3}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2128}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlmarshadMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ArbiAHQ16, author = {Abdellaoui Alaoui El Arbi and Said Agoujil and Moha Hajar and Youssef Qaraai}, title = {Optimal Cluster Head in {DTN} Routing Hierarchical Topology {(DRHT)}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {2}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1642}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ArbiAHQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AtallaTHH16, author = {Shadi Atalla and Saed Tarapiah and Mahmoud El Hendy and Kamarul Faizal Bin Hashim}, title = {Smart Algorithms for Hierarchical Clustering in Optical Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {2}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1943}, timestamp = {Mon, 01 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AtallaTHH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AyadKBT16, author = {Soheyb Ayad and Okba Kazar and A{\"{\i}}cha{-}Nabila Benharkat and Labib Sadek Terrissa}, title = {Cross-Layer Routing Based on Semantic Web Services Discovery with Energy Evaluation and Optimization in {MANET}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {1}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1698}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AyadKBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AyubZ16, author = {Kamran Ayub and Valerijs Zagurskis}, title = {Adoption features and approach for {UWB} Wireless Sensor Network based on Pilot Signal assisted {MAC}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {1}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1574}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AyubZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AzhariTLM16, author = {Maryam el Azhari and Ahmed Toumanari and Rachid Latif and Nadya el Moussaid}, title = {Relay based thermal aware and mobility support routing protocol for wireless body sensor networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {2}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1718}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AzhariTLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/DasariV16, author = {Naga Raju Dasari and Vankadara Saritha}, title = {Architecture for Fault Tolerance in Mobile Cloud Computing using Disease Resistance Approach}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {2}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1945}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/DasariV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Devi16, author = {Vallala Sowmya Devi}, title = {Energy efficient multipath routing protocol for {MANET} for enhancing QoS and QoE in multimedia applications}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {3}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2073}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Devi16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Frattolillo16, author = {Franco Frattolillo}, title = {A Deterministic Algorithm for the Deployment of Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {1}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1476}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Frattolillo16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HarwahyuMS16, author = {Ruki Harwahyu and Misbahuddin and Riri Fitri Sari}, title = {Performance Evaluation of {LTE} Random Access Procedure under Distributed Location Data Mining for Road Traffic Monitoring}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {3}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2055}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/HarwahyuMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Kamruzzaman16, author = {S. M. Kamruzzaman and Xavier N. Fernando and Mohammad Jaseemuddin}, title = {Energy Aware Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {3}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1420}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Kamruzzaman16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MehmoodRNS16, author = {Amir Mehmood and Akhter Raza and Adnan Nadeem and Umair Saeed}, title = {Study of Multi-Classification of Advanced Daily Life Activities on {SHIMMER} Sensor Dataset}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {2}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1793}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MehmoodRNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MoussaH16, author = {Ali Cherif Moussa and Sofiane Boukli Hacene}, title = {A energy-conserving predictive preemptive multipath routing protocol for adhoc networks: a lifetime improvement}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {1}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1009}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MoussaH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/NozoeNSI16, author = {Tadasuke Nozoe and Masahiko Noguchi and Minoru Sakuma and Mikio Isawa}, title = {Live Migration of Virtualized Carrier Grade {SIP} Server}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {2}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1297}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/NozoeNSI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/OrumwenseAS16, author = {Efe Francis Orumwense and Thomas Joachim Odhiambo Afullo and Viranjay M. Srivastava}, title = {Energy Efficiency Metrics in Cognitive Radio Networks: {A} Hollistic Overview}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {2}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1805}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/OrumwenseAS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/RehmanRKMH16, author = {Aqeel{-}ur Rehman and Sadiq ur Rehman and Iqbal Uddin Khan and Muzaffar Moiz and Sarmad Hasan}, title = {Security and Privacy Issues in IoT}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {3}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2074}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/RehmanRKMH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/RezakhaniSM16, author = {Afshin Rezakhani and Hossein Shirazi and Nasser Modiri}, title = {A Novel Access Control Model Based on the Structure of Applications}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {2}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1994}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/RezakhaniSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SirisalaB16, author = {Nageswararao Sirisala and Shoba Bindu Chigarepalli}, title = {Recommendations Based QoS Trust Aggregation and Routing in Mobile Adhoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {3}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2065}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SirisalaB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ThandeeswaranD16, author = {R. Thandeeswaran and M. A. Saleem Durai}, title = {{DPCA:} Dual Phase Cloud Infrastructure Authentication}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {3}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2158}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ThandeeswaranD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/UahhabiB16, author = {Zakia El Uahhabi and Hanan El Bakkali}, title = {Calculating and Evaluating Trustworthiness of Certification Authority}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {3}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1850}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/UahhabiB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/UllahIKS16, author = {Zakir Ullah and Muhammad Hasan Islam and Adnan Ahmed Khan and Sohail Sarwar}, title = {Filtering Dishonest Trust Recommendations in Trust Management Systems in Mobile Ad Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {1}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1568}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/UllahIKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/YazdaniKMG16, author = {Marjan Yazdani and Maryam Kamali and Neda Moghim and Mahdieh Ghazvini}, title = {A fair access mechanism based on {TXOP} in {IEEE} 802.11e wireless networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {1}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1278}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/YazdaniKMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/YenkySAG16, author = {Blaise Omer Yenke and Damien Wohwe Sambo and Ado Adamou Abba Ari and Abdelhak Gu{\'{e}}roui}, title = {{MMEDD:} Multithreading Model for an Efficient Data Delivery in wireless sensor networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {3}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1787}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/YenkySAG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/alhaddadHM16, author = {Zayed Alhaddad and Mostafa Hanoune and Abdelaziz Mamouni}, title = {A collaborative framework for intrusion detection {(C-NIDS)} in Cloud computing}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {3}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1950}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/alhaddadHM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AkbilA15, author = {Brahim Akbil and Driss Aboutajdine}, title = {Improved {IDMA} for Multiple Access of 5G}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {3}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/940}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AkbilA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlouiKKS15, author = {Imene Aloui and Okba Kazar and La{\"{\i}}d Kahloul and Sylvie Servigne}, title = {A new Itinerary planning approach among multiple mobile agents in wireless sensor networks {(WSN)} to reduce energy consumption}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {2}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1276}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlouiKKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AouinatouBA15, author = {Rkia Aouinatou and Mostafa Belkasmi and Mohamed Askali}, title = {A dynamic study with side channel against An Identification Based Encryption}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {1}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/860}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AouinatouBA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AraujoRMAL15, author = {Josenilson Dias Ara{\'{u}}jo and Dhileane Andrade Rodrigues and Leonardo Silva Melo and Zair Abdelouahab and Denivaldo Cicero Pav{\~{a}}o Lopes}, title = {EICIDS-Elastic and Internal Cloud-based Intrusion Detection System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {1}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1031}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AraujoRMAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AyubZ15, author = {Kamran Ayub and Valerijs Zagurskis}, title = {Technology Implications of {UWB} on Wireless Sensor Network-A detailed Survey}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {3}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1261}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AyubZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/CarvalhoR15, author = {Celso Barbosa Carvalho and Jos{\'{e}} Ferreira de Rezende}, title = {Routing for capacity improvement in Multi-Channel-Width Multi-Radio Wireless Mesh Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {3}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1201}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/CarvalhoR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/CsokaP15, author = {Tibor Cs{\'{o}}ka and Jaroslav Polec}, title = {Modeling Poisson Error Process on Wireless Channels}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {1}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/874}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/CsokaP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HaKPYR15, author = {Tran Thi Thu Ha and Jinsul Kim and Jaehyung Park and Sunghyun Yoon and HoYong Ryu}, title = {Topology Optimization in Hybrid Tree/Mesh-based Peer-to-Peer Streaming System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {2}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1306}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/HaKPYR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HasanK15, author = {Mohammad Irfanul Hasan and Sanjay Kumar}, title = {Average Channel Capacity Evaluation for Selection Combining Diversity Schemes over Nakagami-0.5 fading Channels}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {2}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1004}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/HasanK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HasanK15a, author = {Mohammad Irfanul Hasan and Sanjay Kumar}, title = {Spectral Efficiency Evaluation for Selection Combining Diversity Schemes under Worst Case of Fading Scenario}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {3}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1314}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/HasanK15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KhalidMAR15, author = {Shahrukh Khalid and Athar Mahboob and Choudhry Fahad Azim and Aqeel{-}ur Rehman}, title = {{IDHOCNET-A} Novel Protocol Stack and Architecture for Ad hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {1}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/975}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KhalidMAR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KhokharN15, author = {Umar Mujahid Khokhar and Muhammad Najam{-}ul{-}Islam}, title = {Pitfalls in Ultralightweight {RFID} Authentication Protocol}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {3}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1357}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KhokharN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/LavrovaP15, author = {Daria S. Lavrova and Alexander I. Pechenkin}, title = {Applying Correlation and Regression Analysis Methods for Security Incidents Detection in the Internet of Things}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {3}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1375}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/LavrovaP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MirjazaeeM15, author = {Nassim Mirjazaee and Neda Moghim}, title = {A Driving Path Based Opportunistic Routing in Vehicular Ad Hoc Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {3}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1292}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MirjazaeeM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PrakashP15, author = {Maria Johan Viju Prakash and Balasubramanian Paramasivan}, title = {An Individual Node Delay Based Efficient Power Aware Routing Protocol for Wireless Heterogeneous Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {1}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/998}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PrakashP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/RokaM15, author = {Rastislav R{\'{o}}ka and Martin Mokr{\'{a}}n}, title = {Modeling of the {PSK} utilization at the signal transmission in the optical transmission medium}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {3}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1471}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/RokaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SaraylooGS15, author = {Mahdiyar Sarayloo and Ennio Gambi and Susanna Spinsante}, title = {Full-length non-linear binary sequences with Zero Correlation Zone for multiuser communications}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {2}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1143}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SaraylooGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ShobanaP15, author = {Jeya Shobana and Balasubramanian Paramasivan}, title = {{GCCP} - {NS:} Grid based Congestion Control protocol with N-Sinks in a Wireless Sensor Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {2}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1085}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ShobanaP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SukuvaaraMYKPVA15, author = {Timo Sukuvaara and Kari M{\"{a}}enp{\"{a}}{\"{a}} and Riika Ylitalo and Heikki Konttaniemi and Juha Pet{\"{a}}j{\"{a}}j{\"{a}}rvi and Juho Veskoniemi and Matti Autioniemi}, title = {Vehicular Networking Road Weather Information System Tailored for Arctic Winter Conditions}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {1}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1043}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SukuvaaraMYKPVA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ToumiTMET15, author = {Hicham Toumi and Amal Talea and Bouchra Marzak and Ahmed Eddaoui and Mohamed Talea}, title = {Cooperative Trust Framework for Cloud Computing Based on Mobile Agents}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {2}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1094}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ToumiTMET15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/VSIK15, author = {Sarasvathi V. and Snehanshu Saha and N. Ch. S. N. Iyengar and Mahalaxmi Koti}, title = {Coefficient of Restitution based Cross Layer Interference Aware Routing Protocol in Wireless Mesh Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {3}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1358}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/VSIK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/YangKC15, author = {Hongsun Yang and Seungcheon Kim and Soon{-}Yong Chun}, title = {Bearing Accuracy Improvement of the Amplitude Comparison Direction Finding Equipment by Analyzing the Error}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {7}, number = {2}, year = {2015}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1309}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/YangKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbrarGP14, author = {Muhammad Abrar and Xiang Gui and Amal Punchihewa}, title = {Low Complexity Joint Sub-Carrier Pairing, Allocation and Relay Selection in Cooperative Wireless Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {3}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/608}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AbrarGP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AliJF14, author = {Tariq Ali and Low Tang Jung and Ibrahima Faye}, title = {Classification of Routing Algorithms in Volatile Environment of Underwater Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {2}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/670}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AliJF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BaddiK14, author = {Youssef Baddi and Mohamed D{\^{a}}fir Ech{-}Cherif El Kettani}, title = {QoS-VNS-CS: QoS constraints Core Selection Algorithm based on Variable Neighborhood Search Algorithm}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {1}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/454}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/BaddiK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BuiNP14, author = {Ninh Trung Bui and Tuan Q. Nguyen and Hoi V. Pham}, title = {Effects of {ASE} noise and dispersion chromatic on performance of {DWDM} networks using distributed Raman amplifiers}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {2}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/716}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/BuiNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/EbrahimC14, author = {Mansoor Ebrahim and Chai Wai Chong}, title = {A Comprehensive Review of Distributed Coding Algorithms for Visual Sensor Network {(VSN)}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {2}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/587}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/EbrahimC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GuerroumiPBM14, author = {Mohamed Guerroumi and Al{-}Sakib Khan Pathan and Nadjib Badache and Samira Moussaoui}, title = {On the Medium Access Control Protocols Suitable for Wireless Sensor Networks - {A} Survey}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {2}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/611}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/GuerroumiPBM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HaceneOB14, author = {Sofiane Boukli Hacene and Abdelkader Ouali and Asmaa Bassou}, title = {Predictive preemptive certificate transfer in Cluster-Based Certificate Chain}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {1}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/579}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/HaceneOB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ImtiazA14, author = {Waqas Ahmed Imtiaz and Nasim Ahmed}, title = {Cardinality Enhancement of {SAC-OCDMA} Systems Using New Diagonal Double Weight Code}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {3}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/852}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ImtiazA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/IyengarBG14, author = {N. Ch. S. N. Iyengar and Arindam Banerjee and Gopinath Ganapathy}, title = {A Fuzzy Logic Based Defense Mechanism against Distributed Denial of Services Attack in Cloud Environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {3}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/864}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/IyengarBG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/JavedSM14, author = {Farrukh Javed and Imran Shafi and Asad Mahmood}, title = {Optimal Spectrum Sensing Threshold for Unequal Priors Case}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {1}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/546}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/JavedSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/JungLK14, author = {Whoi Jin Jung and Jae Yong Lee and Byung{-}Chul Kim}, title = {Joint Link Scheduling and Routing for Load Balancing in {STDMA} Wireless Mesh Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {3}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/857}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/JungLK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KazatzopoulosDA14, author = {Leonidas Kazatzopoulos and Costas Delakouridis and Christos Anagnostopoulos}, title = {{WSN} Location Privacy Scheme Enhancement through Epidemical Information Dissemination}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {2}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/717}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KazatzopoulosDA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Khan14, author = {Adnan Shahid Khan}, title = {Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {3}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/745}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Khan14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KhokharN14, author = {Umar Mujahid Khokhar and Muhammad Najam{-}ul{-}Islam}, title = {Ultralightweight Cryptography for passive {RFID} systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {3}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/630}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KhokharN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/LataK14, author = {Manju Lata and Adarsh Kumar}, title = {Survey on Lightweight Primitives and Protocols for {RFID} in Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {1}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/572}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/LataK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MuthumeenakshiR14, author = {K. Muthumeenakshi and S. Radha}, title = {Improved Sensing Accuracy using Enhanced Energy Detection Algorithm with Secondary User Cooperation in Cognitive Radios}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {1}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/533}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MuthumeenakshiR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/NguyenNMS14, author = {Duc Kien Nguyen and Hoang Nam Nguyen and Hiroaki Morino and Iwao Sasase}, title = {Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular-Femtocell Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {1}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/624}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/NguyenNMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/OlufonCHRS14, author = {Tope Olufon and Carlene E.{-}A. Campbell and Stephen Hole and Kapilan Radhakrishnan and Arya Sedigh}, title = {Mitigating External Threats in Wireless Local Area Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {3}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/797}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/OlufonCHRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SadeghianFA14, author = {Hooman Sadeghian and Ali Farahani and Maghsoud Abbaspour}, title = {Overhead-controlled contention-based routing for VANETs}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {2}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/631}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SadeghianFA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SaeedKSY14, author = {Awais Saeed and Adnan Ahmed Khan and Syed Ismail Shah and Shariq Yasin}, title = {Capacity Dimensioning of {HSDPA} Urban Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {2}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/651}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SaeedKSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TouilF14, author = {Hicham Touil and Youssef Fakhri}, title = {A fuzzy-based QoS Maximization protocol for WiFi Multimedia {(IEEE} 802.11e) Ad hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {3}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/767}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/TouilF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/VIS14, author = {Sarasvathi V. and N. Ch. S. N. Iyengar and Snehanshu Saha}, title = {An Efficient Interference Aware Partially Overlapping Channel Assignment and Routing in Wireless Mesh Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {1}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/574}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/VIS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/WangC14, author = {Gicheol Wang and Gihwan Cho}, title = {Securing Cluster Formation and Cluster Head Elections in Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {6}, number = {1}, year = {2014}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/643}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/WangC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbdelhakBG13, author = {Ferchichi Abdelhak and Sabri Beldi and Ali Gharsallah}, title = {An electrical model to design a Metamaterial Left Hand Antenna}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {3}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/413}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AbdelhakBG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbidinDR13, author = {Husna Zainol Abidin and Norashidah Md Din and Nurul Asyikin Mohamed Radzi}, title = {Deterministic Static Sensor Node Placement in Wireless Sensor Network based on Territorial Predator Scent Marking Behaviour}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {3}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/426}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AbidinDR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BenmammarAK13, author = {Badr Benmammar and Asma Amraoui and Francine Krief}, title = {A Survey on Dynamic Spectrum Access Techniques in Cognitive Radio Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {2}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/327}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/BenmammarAK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/DehbiBM13, author = {Youssef Dehbi and Hafssa Benaboud and Noufissa Mikou}, title = {A Geometric Backoff Time Distribution of {IEEE} 802.11 {DCF:} An Analytical Study}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {3}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/453}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/DehbiBM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/FahmiAG13, author = {Arfianto Fahmi and Muhamad Asvial and Dadang Gunawan}, title = {Combined-order Algorithm using Promethee Method Approach and Analytic Hierarchy Decision for Chunk Allocation in {LTE} Uplink Systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {1}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/291}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/FahmiAG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/FrancoBC13, author = {Deivison Pinheiro Franco and Felipe Dantas Barboza and N{\'{a}}gila Magalh{\~{a}}es Cardoso}, title = {A Secure Method for Authenticity Verification of Handwritten Signatures Through Digital Image Processing and Artificial Neural Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {2}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/382}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/FrancoBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GhazviniMJ13, author = {Mahdieh Ghazvini and Naser Movahhedinia and Kamal Jamshidi}, title = {A Game Theory based Contention Window Adjustment for {IEEE} 802.11 under Heavy Load}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {2}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/293}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/GhazviniMJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GuerroumiPBM13, author = {Mohamed Guerroumi and Al{-}Sakib Khan Pathan and Nadjib Badache and Samira Moussaoui}, title = {Strengths and Weaknesses of Prominent Data Dissemination Techniques in Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {3}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/509}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/GuerroumiPBM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HajlaouiJJ13, author = {Nasreddine Hajlaoui and Issam Jabri and Maher Ben Jemaa}, title = {Experimental Performance Evaluation and Frame Aggregation Enhancement in {IEEE} 802.11n WLANs}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {1}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/286}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/HajlaouiJJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/IqbalA13, author = {Arif Iqbal and Kazi M. Ahmed}, title = {Integrated Satellite-Terrestrial System Capacity Over Mix Shadowed Rician and Nakagami Channels}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {2}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/325}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/IqbalA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/JeyanthiIKK13, author = {N. Jeyanthi and N. Ch. S. N. Iyengar and P. C. Mogan Kumar and A. Kannammal}, title = {An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {2}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/367}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/JeyanthiIKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KhalidM13, author = {Shahrukh Khalid and Athar Mahboob}, title = {Design and Implementation of {ID} Based {MANET} Autoconfiguration Protocol}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {3}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/409}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KhalidM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KindyP13, author = {Diallo Abdoulaye Kindy and Al{-}Sakib Khan Pathan}, title = {A Detailed Survey on Various Aspects of {SQL} Injection in Web Applications: Vulnerabilities, Innovative Attacks, and Remedies}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {2}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/364}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KindyP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Meghanathan13, author = {Natarajan Meghanathan}, title = {A Survey on the Communication Protocols and Security in Cognitive Radio Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {1}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/249}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Meghanathan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MoussaKH13, author = {Ali Cherif Moussa and Kamel Mohamed Faraoun and Sofiane Boukli Hacene}, title = {Link Quality and MAC-Overhead aware Predictive Preemptive Multipath Routing Protocol for Mobile Ad hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {3}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/437}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MoussaKH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/NaderiSJ13, author = {Hamid Naderi and Hadi Shahosseini and Amir Jafari}, title = {Evaluation {MCDM} Multi-disjoint Paths Selection Algorithms Using Fuzzy-Copeland Ranking Method}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {1}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/288}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/NaderiSJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/NouhCB13, author = {Sa{\"{\i}}d Nouh and Idriss Chana and Mostafa Belkasmi}, title = {Decoding of Block Codes by using Genetic Algorithms and Permutations Set}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {3}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/428}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/NouhCB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/RiazSRSI13, author = {Faisal Riaz and Syed Ismail Shah and Muhammad Raees and Imran Shafi and Arslan Iqbal}, title = {Lateral Pre-crash Sensing and Avoidance in Emotion Enabled Cognitive Agent based Vehicle-2-Vehicle Communication System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {2}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/355}, timestamp = {Wed, 23 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/RiazSRSI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SahraouiB13, author = {Somia Sahraoui and Souheila Bouam}, title = {Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {3}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/465}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SahraouiB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/WeiF0AP13, author = {Xianglin Wei and Jianhua Fan and Ming Chen and Tarem Ahmed and Al{-}Sakib Khan Pathan}, title = {{SMART:} {A} Subspace based Malicious Peers Detection algorithm for {P2P} Systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {1}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/199}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/WeiF0AP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ZeeshanK13, author = {Muhammad Zeeshan and Shoab Ahmed Khan}, title = {Robust Sampling Clock Recovery Algorithm for Wideband Networking Waveform of {SDR}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {5}, number = {1}, year = {2013}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/272}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ZeeshanK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AhmedWAP12, author = {Tarem Ahmed and Xianglin Wei and Supriyo Ahmed and Al{-}Sakib Khan Pathan}, title = {Automated Intruder Detection from Image Sequences using Minimum Volume Sets}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {1}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/88}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AhmedWAP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BisengarRO12, author = {Ahmed Bisengar and Mohammed Rziza and Mohamed Ouadou}, title = {Queue Length and Mobility aware Routing Protocol for Mobile Ad hoc Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {3}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/232}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/BisengarRO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/FdiliFA12, author = {Othmane Alaoui Fdili and Youssef Fakhri and Driss Aboutajdine}, title = {Impact of queue buffer size awareness on single and multi service real-time routing protocols for WSNs}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {2}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/164}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/FdiliFA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GrayeliSM12, author = {Parisa Grayeli and Shahram Sarkani and Thomas A. Mazzuchi}, title = {Performance Analysis of IPv6 Transition Mechanisms over {MPLS}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {2}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/155}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/GrayeliSM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HussainBS12, author = {Haider N. Hussain and Kamalrulnizam Abu Bakar and Shaharuddin Salleh}, title = {Using Media Independent Handover to Support PMIPv6 Inter-domain Mobility Based Vehicular Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {3}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/210}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/HussainBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HussainiBSAAI12, author = {M. Hussaini and Habeeb Bello{-}Salau and Abdulazeez Femi Salami and Farhat Anwar and A. H. Abdalla and Md. Rafiqul Islam}, title = {Enhanced Clustering Routing Protocol for Power-Efficient Gathering in Wireless Sensor Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {1}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/101}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/HussainiBSAAI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/JalaliB12, author = {Hanieh Jalali and Ahmad Baraani}, title = {Process Aware Host-based Intrusion Detection Model}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {2}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/181}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/JalaliB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/JavedSM12, author = {Farrukh Javed and Imran Shafi and Asad Mahmood}, title = {A Novel Radio Mode Identification Approach for Spectrum Sensing in Cognitive Radios}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {2}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/145}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/JavedSM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/JeyanthiI12, author = {N. Jeyanthi and N. Ch. S. N. Iyengar}, title = {Packet Resonance Strategy: {A} Spoof Attack Detection and Prevention Mechanism in Cloud Computing Environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {3}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/238}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/JeyanthiI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KesavanR12, author = {V. Thiruppathy Kesavan and S. Radhakrishnan}, title = {Multiple Secret Keys based Security for Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {1}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/136}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KesavanR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KhanDBA12, author = {Shah Nawaz Khan and Ali Diab and Christian Brosch and Mushtaq Ahmad}, title = {Self-Organized Disjoint Service Placement in Future Mobile Communication Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {2}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/169}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KhanDBA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Kim12, author = {Pyung Soo Kim}, title = {Fair Packet Distribution on Multi-interfaced Mobile Router for Mobile Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {2}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/178}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Kim12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Meghanathan12, author = {Natarajan Meghanathan}, title = {Link Expiration Time and Minimum Distance Spanning Trees based Distributed Data Gathering Algorithms for Wireless Mobile Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {3}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/248}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Meghanathan12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PopescuTPK12, author = {Ana{-}Maria Popescu and Ion Gabriel Tudorache and Bo Peng and Andrew H. Kemp}, title = {Surveying Position Based Routing Protocols for Wireless Sensor and Ad-hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {1}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/85}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PopescuTPK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/RokaC12, author = {Rastislav R{\'{o}}ka and Filip Cert{\'{\i}}k}, title = {Modeling of Environmental Influences at the Signal Transmission in the Optical Transmission Medium}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {3}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/233}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/RokaC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SaadaneW12, author = {Rachid Saadane and Mohammed Wahbi}, title = {{UWB} Indoor Radio Propagation Modelling in Presence of Human Body Shadowing Using Ray Tracing Technique}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {2}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/190}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SaadaneW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Sen12, author = {Jaydip Sen}, title = {A Secure and User Privacy-Preserving Searching Protocol for Peer-to-Peer Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {1}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/139}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Sen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TangXTZ12, author = {Shensheng Tang and Yi Xie and Chenghua Tang and Jinwen Zhu}, title = {A Comparative Study of Power Line Communication Networks With and Without Buffer}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {2}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/180}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/TangXTZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ZafarHAHK12, author = {Haseeb Zafar and David Harle and Ivan Andonovic and Laiq Hasan and Amjad Ullah Khattak}, title = {QoS-aware Multipath Routing Scheme for Mobile Ad Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {1}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/157}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ZafarHAHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ZeeshanK12, author = {Muhammad Zeeshan and Shoab Ahmed Khan}, title = {A Robust Carrier Frequency Offset Estimation Algorithm in Burst Mode Multicarrier {CDMA} based Ad Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {3}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/221}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ZeeshanK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AcevedoCA11, author = {Claudia Patricia Acevedo and Gabriel El{\'{\i}}as Chanch{\'{\i}} and Jos{\'{e}} L. Arciniegas}, title = {Surveying Mobile Television}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {1}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/69}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AcevedoCA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AkpojaroAO11, author = {Jackson Akpojaro and Princewill Aigbe and David Oyemade}, title = {A Cost-Based Approach for Analysing the Overheads of Multicast Protocols in Non-Strictly Hierarchical Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {1}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/71}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AkpojaroAO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BhuyanBK11, author = {Monowar Hussain Bhuyan and Dhruba K. Bhattacharyya and Jugal K. Kalita}, title = {Survey on Incremental Approaches for Network Anomaly Detection}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {3}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/104}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/BhuyanBK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BogdanoskiR11, author = {Mitko Bogdanoski and Aleksandar Risteski}, title = {Wireless Network Behavior under {ICMP} Ping Flood DoS Attack and Mitigation Techniques}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {1}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/65}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/BogdanoskiR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/CampbellLKK11, author = {Carlene E.{-}A. Campbell and Kok{-}Keong Loo and Heba A. Kurdi and Shafiullah Khan}, title = {Comparison of {IEEE} 802.11 and {IEEE} 802.15.4 for Future Green Multichannel Multi-radio Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {1}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/75}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/CampbellLKK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/El-BadawyMRT11, author = {El{-}Sayed A. El{-}Badawy and Abd El{-}Naser A. Mohamed and Ahmed Nabih Zaki Rashed and Mohamed Salah F. Tabbour}, title = {New Trends of Radio over Fiber Communication Systems for Ultra High Transmission Capacity}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {3}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/103}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/El-BadawyMRT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/El-dokanyRE11, author = {Ibrahim M. Eldokany and Abd El{-}Naser A. Mohamed and Ahmed Nabih Zaki Rashed and Amina E. M. El{-}Nabawy}, title = {Upgrading Efficiency and Improvement of the Performance of Broadband Wireless Optical Access Communication Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {2}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/80}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/El-dokanyRE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/JaggiS11, author = {Parmeet Kaur Jaggi and Awadhesh Kumar Singh}, title = {Message efficient global snapshot recording using a self stabilizing spanning tree in a {MANET}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {3}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/106}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/JaggiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KhamaysehBMY11, author = {Yaser M. Khamayseh and Abdulraheem Bader and Wail Mardini and Muneer O. Bani Yassein}, title = {A New Protocol for Detecting Black Hole Nodes in Ad Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {1}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/67}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KhamaysehBMY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Masria11, author = {Ali El Masri and Naceur Malouch and Hicham Khalife}, title = {A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {1}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/72}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Masria11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Meghanathan11, author = {Natarajan Meghanathan}, title = {Survey of Topology-based Multicast Routing Protocols for Mobile Ad hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {2}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/78}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Meghanathan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MisurecO11, author = {Jiri Misurec and Milos Orgon}, title = {Modeling of Power Line Transfer of Data for Computer Simulation}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {2}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/76}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MisurecO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MustaphaJM11, author = {Ibrahim Mustapha and Jibrin J. Jiya and Bukar U. Musa}, title = {Modeling and Analysis of Collision Avoidance {MAC} Protocol in Multi-Hop Wireless Ad-Hoc Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {1}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/68}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MustaphaJM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PoctavekMK11, author = {Jan Poctavek and Naceur Malouch and Hicham Khalife}, title = {Throughput Parameter Optimization of Adaptive {ARQ/HARQ} Scheme}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {1}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/74}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PoctavekMK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ShuaibuS11, author = {Dahiru Sani Shu'aibu and Sharifah Kamilah Syed Yusof}, title = {Link Aware Earliest Deadline Scheduling Algorithm for WiMAX}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {1}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/73}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ShuaibuS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ShuminoskiJ11, author = {Tomislav Shuminoski and Toni Janevski}, title = {Novel Adaptive QoS Provisioning in Heterogeneous Wireless Environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {1}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/63}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ShuminoskiJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SivridisWC11, author = {Leonidas Sivridis and Xinheng Wang and Jinho Choi}, title = {Impact of Varying Channel Model Mixtures on Radio Resource Management for the {OFDMA} Downlink}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {2}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/84}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SivridisWC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Tang11, author = {Shensheng Tang}, title = {Traffic Flow Analysis of a Multi-hop Wireless Sensor Network Subject to Node Failure}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {2}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/81}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Tang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Tang11a, author = {Shensheng Tang}, title = {Performance Analysis of Two Case Studies for a Power Line Communication Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {2}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/83}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Tang11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TangX11, author = {Shensheng Tang and Yi Xie}, title = {Performance Analysis of Unreliable Sensing for an Opportunistic Spectrum Sharing System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {3}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/105}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/TangX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TarngDOC11, author = {Wernhuar Tarng and Li{-}Zhong Deng and Kuo{-}Liang Ou and Mingteh Chen}, title = {The Analysis and Identification of {P2P} Botnet's Traffic Flows}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {2}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/79}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/TarngDOC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TarngOHDLYHC11, author = {Wernhuar Tarng and Kuo{-}Liang Ou and Kun{-}Jie Huang and Li{-}Zhong Deng and Hao{-}Wei Lin and Chang Wu Yu and Kuen{-}Rong Hsieh and Mingteh Chen}, title = {Applying Cluster Merging and Dynamic Routing Mechanisms to Extend the Lifetime of Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {1}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/64}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/TarngOHDLYHC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ThamilarasuMS11, author = {Geethapriya Thamilarasu and Sumita Mishra and Ramalingam Sridhar}, title = {Improving Reliability of Jamming Attack Detection in Ad hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {1}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/70}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ThamilarasuMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Trivino-Cabrera11, author = {Alicia Trivi{\~{n}}o{-}Cabrera}, title = {Survey on Opportunistic Routing in Multihop Wireless Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {2}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/82}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Trivino-Cabrera11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TudzarovJ11, author = {Aleksandar Tudzarov and Toni Janevski}, title = {Design for 5G Mobile Network Architecture}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {2}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/77}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/TudzarovJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ZafarAHA11, author = {Haseeb Zafar and Nancy Alhamahmy and David Harle and Ivan Andonovic}, title = {Survey of Reactive and Hybrid Routing Protocols for Mobile Ad Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {3}, number = {3}, year = {2011}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/102}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ZafarAHA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbdelhakFA10, author = {Ferchichi Abdelhak and Najib Fadlallah and Gharssallah Ali}, title = {A Sierpenski slot antenna as a {TAG} {RFID} antenna}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {3}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/61}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AbdelhakFA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Abou-KhalilP10, author = {Georges Abou{-}Khalil and Samuel Pierre}, title = {Client-Based Network-Assisted Mobile IPv6}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {3}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/58}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Abou-KhalilP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Al-RodhaanMO10, author = {Mznah Al{-}Rodhaan and Lewis M. Mackenzie and Mohamed Ould{-}Khaoua}, title = {Efficient Expanding Ring Search for MANETs}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {3}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/50}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Al-RodhaanMO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AyyashUA10, author = {Moussa Ayyash and Donald R. Ucci and Khaled M. Alzoubi}, title = {A Proactively Maintained Quality of Service Infrastructure for Wireless Mobile Ad Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {2}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/46}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AyyashUA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BrancoH10, author = {Rodrigo Rubira Branco and Celso Massaki Hirata}, title = {Streamed analysis of network files to avoid false positives and to detect client-side attacks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {3}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/52}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/BrancoH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/CardoteS10, author = {Andr{\'{e}} Cardote and Susana Sargento}, title = {Mesh Networks Planning: Optimization with Multi-Hop Interference}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {2}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/41}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/CardoteS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Chandran10, author = {Sathish Chandran}, title = {Enhanced Wideband Adaptive Arrays with Different Length Quadrature Mirror Filter Banks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {1}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/29}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Chandran10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Che10, author = {Xianhui Che}, title = {Overview of Optical Local Access Networks Development and Design Challenges}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {1}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/35}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Che10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ChengS10, author = {Lin Cheng and Rahul Shakya}, title = {Worm Spreading and Patching in Inter-vehicle Communications}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {1}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/32}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ChengS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ChromyK10, author = {Erik Chrom{\'{y}} and Matej Kavack{\'{y}}}, title = {Asynchronous Networks and Erlang Formulas}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {2}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/38}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ChromyK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Dutta10, author = {Nitul Dutta}, title = {QoS provisioning in three layer MIPv6 Architecture using {RSVP}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {2}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/39}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Dutta10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GarciaLSG10, author = {Miguel Garcia and Jaime Lloret and Sandra Sendra and Raquel Lacuesta Gilaberte}, title = {Secure Communications in Group-based Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {1}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/27}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/GarciaLSG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/IndumathiM10, author = {G. Indumathi and K. Murugesan}, title = {An Adaptive Time slot Allocation for Statistical QoS guarantees in Wireless Networks using Cross-layer approach}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {1}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/30}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/IndumathiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/IslamI10, author = {Md. Jahedul Islam and Md. Rafiqul Islam}, title = {Impact of Chip Shape on the Performance of {DS-OCDMA} in Presence of {GVD} and {SPM}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {3}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/51}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/IslamI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Kamruzzaman10, author = {S. M. Kamruzzaman}, title = {An Energy Efficient Multichannel {MAC} Protocol for Cognitive Radio Ad Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {2}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/45}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Kamruzzaman10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Kathirvel10, author = {Ayyaswamy Kathirvel}, title = {Enhanced Triple Umpiring System for Security and Performance Improvement in Wireless {MANETS}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {2}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/37}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Kathirvel10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KhanLK10, author = {Shoaib Khan and Kok{-}Keong Loo and Adnan K. Kiani}, title = {Tested Evaluation of Fast and Secure Handover in FMIPv6}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {1}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/34}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KhanLK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KhanMF10, author = {Y. A. Khan and Mohammad Abdul Matin and S. I. Ferdous}, title = {{PAPR} Reduction in {MIMO-OFDM} Systems using Modified {PTS} and {SLM} without Side Information}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {3}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/60}, timestamp = {Mon, 21 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KhanMF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/LuCA10, author = {Jun Lu and Te{-}Shun Chou and Jean H. Andrian}, title = {Semi-Blind Channel Estimation and Multi-User Data Detection for Downlink {MC-CDMA}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {3}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/54}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/LuCA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Meghanathan10, author = {Natarajan Meghanathan}, title = {Grid Block Energy Based Data Gathering Algorithms for Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {3}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/48}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Meghanathan10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MusaM10, author = {Sarhan M. Musa and Nader F. Mir}, title = {Handoff Management for Mobile Agents in High Speed Wireless Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {3}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/55}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MusaM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PadmavathyC10, author = {T. V. Padmavathy and M. Chitra}, title = {Performance Evaluation of Energy Efficient Modulation Scheme and Hop Distance Estimation for {WSN}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {1}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/31}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PadmavathyC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Pathan10, author = {Al{-}Sakib Khan Pathan}, title = {A Review and Cryptanalysis of Similar Timestamp-Based Password Authentication Schemes Using Smart Cards}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {1}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/28}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Pathan10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PradheepkumarVZ10, author = {S. Pradheepkumar and V. Vijayalakshmi and G. Zayaraz}, title = {Implementation of Pseudo-Random Route-Driven {ECDH} Scheme for Heterogeneous Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {1}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/26}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PradheepkumarVZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/RajhiGG10, author = {Adnen Rajhi and Said Ghnimi and Ali Garssallah}, title = {Electrical Characteristics of a Dual-Band Microstrip Patch Antenna for {GSM/} {UMTS} / {WLAN} Operations}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {1}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/33}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/RajhiGG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/RasulNP10, author = {Khadija Rasul and Nujhat Nuerie and Al{-}Sakib Khan Pathan}, title = {Securing Wireless Sensor Networks with An Efficient {B+} Tree-Based Key Management Scheme}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {3}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/49}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/RasulNP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Sen10, author = {Jaydip Sen}, title = {An Agent-Based Intrusion Detection System for Local Area Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {2}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/44}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Sen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TarngCDOHC10, author = {Wernhuar Tarng and Nai{-}Wei Chen and Li{-}Zhong Deng and Kuo{-}Liang Ou and Kun{-}Rong Hsie and Mingteh Chen}, title = {The Integration of Heterogeneous Wireless Networks {(IEEE} 802.11/IEEE 802.16) and its QoS Analysis}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {3}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/53}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/TarngCDOHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/VidhyaP10, author = {J. Vidhya and Perumal Dananjayan}, title = {Energy Efficient {STBC} -Encoded Cooperative {MIMO} Routing Scheme for Cluster Based wireless sensor networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {3}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/57}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/VidhyaP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/WadeFCFH10, author = {Joshua B. Wade and Hiroshi Fujinoki and Adam Coffman and Delia M. Feerer and Andrew G. Hauck}, title = {A Cross-Layer Approach for Mitigating Denial of Service Attacks: Device-Driver Packet Filter and Remote Firewalling}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {3}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/59}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/WadeFCFH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/WahidK10, author = {Abdul Wahid and Dongkyun Kim}, title = {Analyzing Routing Protocols for Underwater Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {3}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/62}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/WahidK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/XuZH10, author = {Gang Xu and Yiwen Zhu and Meng Han}, title = {Broadband cognitive radio transmission based on sub-channel sensing and {NC-OFDM}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {2}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/40}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/XuZH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/YangW10, author = {Shun{-}Fang Yang and Jung{-}Shyr Wu}, title = {Guard Channel based Call Admission Control Schemes in Hierarchical Mobile IPv6 Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {2}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/36}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/YangW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/YusofWF10, author = {Kamaludin Mohamad Yusof and John Woods and Steve Fitz}, title = {{LFSSR:} Localised Frequency Scanning Short Range Estimation for Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {3}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/56}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/YusofWF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbdelhakFNA09, author = {Ferchichi Abdelhak and Najib Fadlallah and Sboui Noureddine and Gharssallah Ali}, title = {Analysis and Design of Printed Fractal Antennas by Using an Adequate Electrical Model}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {3}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/24}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AbdelhakFNA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Al-KhateebH09, author = {Mohammed K. Al{-}Khateeb and Aisha{-}Hassan A. Hashim}, title = {A Fuzzy-based Mobility Prediction in the {IEEE} 802.16e}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {1}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Al-KhateebH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ChaloufK09, author = {Mohamed Aymen Chalouf and Francine Krief}, title = {A Secured Service Level Negotiation In Ubiquitous Environments}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {2}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/9}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ChaloufK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/CheC09, author = {Xianhui Che and Lee J. Cobley}, title = {VoIP Performance over Different Interior Gateway Protocols}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {1}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/6}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/CheC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/DriniS09, author = {Merlinda Drini and Tarek N. Saadawi}, title = {Link Lifetime Based Route Selection in Mobile Ad-Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {3}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/20}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/DriniS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/El-BakaryZEE09, author = {Eman M. El{-}Bakary and Osama Zahran and Sami A. El{-}Dolil and Fathi E. Abd El{-}Samie}, title = {Chaotic Maps: {A} Tool to Enhance the Performance of {OFDM} Systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {2}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/15}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/El-BakaryZEE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/IbanezMCGA09, author = {Guillermo Ib{\'{a}}{\~{n}}ez and Eva Manzanedo and Juan A. Carral and Antonio Gracia and Jose Mannuel Acro}, title = {A Performance Comparison of Virtual Backbone Formation Algorithms for Wireless Mesh Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {2}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/10}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/IbanezMCGA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/JasmanK09, author = {Faezah Jasman and Sabira Khatun}, title = {Adaptive Modulation for {OFDM} Systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {2}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/8}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/JasmanK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KadhumH09, author = {Mohammed M. Kadhum and Suhaidi Hassan}, title = {The Drop Activation Function of the Fast Congestion Notification {(FN)} Mechanism}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {3}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/22}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KadhumH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/LinQF09, author = {Chuan Lin and Anyong Qing and Quanyuan Feng}, title = {Synthesis of unequally Spaced Antenna Arrays by a new Differential Evolutionary Algorithm}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {1}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/LinQF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MohammadRAS09, author = {Abd El{-}Naser A. Mohammad and Ahmed Nabih Zaki Rashed and Gaber E. S. M. El Abyad and Abd El Fattah A. Saad}, title = {Low Loss a thermal Arrayed Waveguide Grating {(AWG)} Module for Passive and Active Optical Network Applications}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {2}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/11}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MohammadRAS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/OhL09, author = {Dong{-}Chan Oh and Yong{-}Hwan Lee}, title = {Energy Detection Based Spectrum Sensing for Sensing Error Minimization in Cognitive Radio Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {1}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/1}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/OhL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PatrikakisMV09, author = {Charalampos Z. Patrikakis and Michalis N. Masikos and Athanasios Voulodimos}, title = {A Framework for Preserving User Privacy and Ensuring QoS in Location Based Services using Non-irreversible Algorithm}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {1}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/5}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PatrikakisMV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/RakotondrainibeKZZ09, author = {Lahatra Rakotondrainibe and Yvan Kokar and Gheorghe Zahira and Gha{\"{\i}}s El Zein}, title = {Towards a Gigabit Wireless Communications System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {2}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/12}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/RakotondrainibeKZZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/RasheedGNK09, author = {Mohammad M. Rasheed and Osman Ghazali and Norita Md Norwawi and Mohammed M. Kadhum}, title = {A Traffic Signature-based Algorithm for Detecting Scanning Internet Worms}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {3}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/19}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/RasheedGNK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/RemleinS09, author = {Piotr Remlein and Dawid Szlapka}, title = {Genetic Algorithm used in Search of good Tailbiting Codes}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {3}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/21}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/RemleinS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Roka09, author = {Rastislav R{\'{o}}ka}, title = {Modeling of Environmental Influences at the Signal Transmission by means of {VDSL} and {PLC} Technologies}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {1}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Roka09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SaleemFAYR09, author = {Kashif Saleem and Norsheila Fisal and Sharifah Hafizah Syed Ariffin and Sharifah Kamilah Syed Yusof and Rozeha A. Rashid}, title = {Ant based Self-organized Routing Protocol for Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {2}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/13}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SaleemFAYR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Sen09, author = {Jaydip Sen}, title = {A Survey on Wireless Sensor Network Security}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {2}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/16}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Sen09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ShafikEDSE09, author = {Amira Shafik and Said M. Elhalafawy and Salah Eldeen M. Diab and Bassiuny M. Sallam and Fathi E. Abd El{-}Samie}, title = {A Wavelet Based Approach for Speaker Identification from Degraded Speech}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {3}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/23}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ShafikEDSE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SilvaAL09, author = {Aline Lopes da Silva and Zair Abdelouahab and Denivaldo Lopes}, title = {Intelligent {IDS} for Mobile Devices: Modeling and Prototyping}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {3}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/18}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SilvaAL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SukuvaaraP09, author = {Timo Sukuvaara and Carlos A. Pomalaza{-}Raez}, title = {Vehicular Networking Pilot System for Vehicle-to-Infrastructure and Vehicle-to-Vehicle Communications}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {3}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/17}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SukuvaaraP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SurenderSD09, author = {R. Surender and G. Sivaradje and Perumal Dananjayan}, title = {Performance Comparison of {UMTS/WLAN} Integrated Architectures with Dynamic Home Agent Assignments}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {3}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/25}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SurenderSD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ToutonjiY09, author = {Ossama Toutonji and Seong{-}Moo Yoo}, title = {An Approach against a Computer Worm Attack}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {2}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/14}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ToutonjiY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Wasfi09, author = {Mahmud Wasfi}, title = {Optical Fiber Amplifiers-Review}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {1}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/7}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Wasfi09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.