


default search action
International Journal of Communication Networks and Information Security (IJCNIS), Volume 10
Volume 10, Number 1, 2018
- Walid Osamy, Ahmed M. Khedr:
An algorithm for enhancing coverage and network lifetime in cluster-based Wireless Sensor Networks. - Zahra Adelani, Ghasem Mirjalily, Milad HajMirzaei:
Balanced Multi-Channel Data Collection in Wireless Sensor Networks. - Kutub Thakur, Juan Shan, Al-Sakib Khan Pathan:
Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies. - Taner Çevik, Alex Gunagwera:
Coverage and Energy Efficiency Optimization for Randomly Deployed Multi-Tier Wireless Multimedia Sensor Networks. - Veeresh Patil, Sanjeev Gupta, C. Keshavamurthy:
S-RLNC based MAC Optimization for Multimedia Data Transmission over LTE/LTE-A Network. - Renê Pomilio de Oliveira, Lourival Aparecido de Góis, Augusto Foronda:
Enhanced PF Scheduling Algorithm for LTE Networks. - Mohammad Jazi Bawaneh, Atef A. Obeidat, Majd M. Al-Kofahi:
An Adaptive FLV Steganography Approach Using Simulated Annealing. - Neeraj Kumar, Dalveer Kaur:
Capacity Enhancement of Multiuser Wireless Communication System through Adaptive Non-Linear Pre coding. - Triani Wulandari, Doan Perdana, Ridha Muldina Negara:
Node Density Performance Analysis on IEEE 802.11ah Standard for VoIP Service. - Muneer O. Bani Yassein:
Enhanced Home Energy Management Scheme (EHEM) in Smart Grids. - Annop Monsakul:
SRAD: Smart Routing Algorithm Design for Supporting IoT Network Architecture. - Amine Rais, Khalid Bouragba, Mohamed Ouzzif:
Determination of Itinerary Planning for Multiple Agents in Wireless Sensor Networks. - Magdy Ibrahim ElSharkawy:
A New Scheme for Spreading & De-spreading in the Direct Sequence Spread Spectrum Mechanism. - Shubair Abdulla, Amaal Saleh Al Hashimy:
TiSEFE: Time Series Evolving Fuzzy Engine for Network Traffic Classification. - Mustafa Al-Fayoumi, Shadi Nashwan:
Performance Analysis of SAP-NFC Protocol. - Mohsen Saberi:
Private and Mobile inter-network routing for Wireless Sensor Networks and Internet of Things. - Riski Muktiarto Nugroho Ajinegoro, Doan Perdana, Ridha Muldina Negara:
Performance Analysis of Mobility Impact on IEEE 802.11ah Standard with Traffic Pattern Scheme. - Qeethara Al-Shayea, Muzhir Al-Ani:
Biometric Face Recognition Based on Enhanced Histogram Approach. - Maha Zayoud, Hanady M. Abdulsalam, A. Al-Yatama, Seifedine Nimer Kadry:
Split and Merge LEACH Based Routing Algorithm for Wireless Sensor Networks. - Ahmed Khedr, Arwa Attia:
New Holes and Boundary Detection Algorithm for Heterogeneous Wireless Sensor Networks. - Hery Munanzar, Teuku Yuliar Arif, Syahrial:
AARF-HT: Adaptive Auto Rate Fallback for High-Throughput IEEE 802.11n WLANs. - Ayoub Abdellaoui, Jamal Elmhamdi, Halim Berradi:
Multipoint Relay Selection based on Stability of Spatial Relation in Mobile Ad hoc Networks. - Omnia Mezghani, Pr. Mahmoud Abdellaoui:
Efficient Clustering Protocol Based on Stochastic Matrix & MCL and Data Routing for Mobile Wireless Sensors Network. - Jusak Jusak, Seedahmed Sharif Mahmoud:
A Novel and Low Processing Time ECG Security Method Suitable for Sensor Node Platforms. - Ariel Roy L. Reyes, Enrique D. Festijo, Ruji P. Medina:
Securing One Time Password (OTP) for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm. - Rasha Al-Mutiri, Mznah Al-Rodhaan, Yuan Tian:
Improving Vehicular Authentication in VANET Using.
- Jamaah Binti Suud, Hushairi Zen, Al-Khalid Othman, Khairuddin Abdul Hamid:
Decoding of Decode and Forward (DF) Relay Protocol using Min-Sum Based Low Density Parity Check (LDPC) System. - Anand Nayyar, Ranbir Singh Batth, Dac-Binh Ha, G. Sussendran:
Opportunistic Networks: Present Scenario- A Mirror Review.
Volume 10, Number 2, 2018
- Ali Ahmad Eyadeh, Mohammad Bani Amerah:
Ferry-Based Directional Forwarding Mechanism for Improved Network Life-Time in Cluster-Based Wireless Sensor Network. - A. Ajina, Mydhili K. Nair:
Dynamic Network State Learning Model for Mobility Based WMSN Routing Protocol. - Ali M. Shatnawi, Bushra AlHajouj, Moath H. A. Jarrah:
A New Multi-threaded and Interleaving Approach to Enhance String Matching for Intrusion Detection Systems. - Abdul Aziz Marwan, Doan Perdana, Danu Dwi Sanjoyo:
Performance Analysis of User Speed Impact on IEEE 802.11ah Standard affected by Doppler Effect. - Bisyron Wahyudi Masduki, Kalamullah Ramli, Hendri Murfi:
Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System. - Dinh-Thuan Do:
Performance Analysis In Wireless Powered D2D-Aided Non-Orthogonal Multiple Access Networks. - Muktar Hussaini, Shahrudin Awang Nor, Amran Ahmad:
PMSS: Producer Mobility Support Scheme Optimization with RWP Mobility Model in Named Data Networking. - Franco Frattolillo:
Assisted Navigation Algorithm for Wireless Sensor Actuator and Robot Networks. - Jonier Porras, Daniel Ducuara, Gustavo Puerto:
OpenDaylight vs. Floodlight: Comparative Analysis of a Load Balancing Algorithm for Software Defined Networking. - Ahmad Alqerem, Ala Hamarsheh:
Statistical-Based Heuristic for Scheduling of Independent Tasks in Cloud Computing. - Houda Moudni, Mohamed Er-rouidi, Hicham Mouncif, Benachir El Hadadi:
Fuzzy Logic based Intrusion Detection System against Black Hole Attack in Mobile Ad Hoc Networks. - Esmael Verano Maliberan, Ariel M. Sison, Ruji P. Medina:
A New Approach in Expanding the Hash Size of MD5. - Rolysent Paredes, Ariel M. Sison, Ruji P. Medina:
Bandwidth Allocation Mechanism based on Users' Web Usage Patterns for Campus Networks. - Septafiansyah Dwi Putra, Adang Suwandi Ahmad, Sarwono Sutikno, Yusuf Kurniawan:
Attacking AES-Masking Encryption Device with Correlation Power Analysis. - Tariqullah Jan:
Implementing Enhanced MIMO with F-OFDM to Increase System Efficiency for Future 5G Cellular Networks. - Voruganti Hindumathi, Katta Rama Linga Reddy:
Delay aware optimal resource allocation in MU MIMO-OFDM using enhanced spider monkey optimization. - Yaser M. Khamayseh, Rabiah Al-qudah:
Resource Allocation using Genetic Algorithm in Multimedia Wireless Networks. - Magdy Ibrahim ElSharkawy:
Using Quaternion Fourier Transform in Steganography Systems. - Imad I. H. Nashwan:
Reliability and Failure Functions of the Consecutive k-out-of-m-from-n: F Linear and Circular System. - Sri Lekha:
A Multilevel Scheduling MAC Protocol for Underwater Acoustic Sensor Networks(UASN).
- Cristina Satizábal, Rafael Páez:
Internet Voting Protocols: An Analysis of the Cryptographic Operations per Phase. - V. Venkataramanan, S. Lakshmi:
A Case Study of Various Wireless Network Simulation Tools.
Volume 10, Number 3, 2018
- Y. Narasimha Reddy, P. V. S. Srinivas:
A Routing Delay Predication Based on Packet Loss and Explicit Delay Acknowledgement for Congestion Control in MANET. - Shobha Biradar, P. M. Mallikarjuna Shastry:
Redundancy Elimination with Coverage Preserving algorithm in Wireless Sensor Network. - Asmaa El Kandoussi, Hanan El Bakkali:
Security based partner selection in Inter-organizational workflow systems. - Jamil Al-Azzeh, Abdelwadood Mesleh, Zhengbing Hu, Roman Odarchenko, Sergiy Gnatyuk, Anastasiia Abakumova:
Evaluation Method for SDN Network Effectiveness in Next Generation Cellular Networks. - Felicisimo Villarico Wenceslao Jr.:
Enhancing the Performance of the Advanced Encryption Standard (AES) Algorithm Using Multiple Substitution Boxes. - Mohd Rizuan Baharon, Qi Shi, Mohd Faizal Abdollah, S. M. Warusia Mohamed S. M. M. Yassin, Ariff Idris:
An Improved Fully Homomorphic Encryption Scheme for Cloud Computing. - Omar Achbarou:
A New Distributed Intrusion Detection System Based on Multi-Agent System for Cloud Environment. - Tariq Ahamed Ahanger:
Mobility of Internet of Things and Fog Computing: Serious Concerns and Future Directions. - Tabassum Ara:
Energy efficient secured cluster based distributed fault diagnosis protocol for IoT. - Ramesh Rao Karanam:
Node Activities Learning(NAL)Approach to Build Secure and Privacy-Preserving Routing in Wireless Sensor Networks. - Vijaya Saraswathi R:
Muti-stage Key Management Scheme for Cluster based WSN. - Mohammed S. Gadelrab, Muhammad ElSheikh, Mahmoud A. Ghoneim, Mohsen A. Rashwan:
BotCap: Machine Learning Approach for Botnet Detection Based on Statistical Features.
- Azuan Ahmad, Wan Shafiuddin Zainudin, Mohd Nazri Kama, Norbik Bashah Idris, Madihah Mohd Saudi, Nur Hafiza Zakaria:
State of the Art Intrusion Detection System for Cloud Computing. - Dixon Salcedo Morillo, César D. Guerrero, Roberto Martínez:
Available Bandwidth Estimation Tools Metrics, Approaches and Performance.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.