Vol 11, No 3 (2019)

Table of Contents

Research Articles

Novel Method of Improving Quality of Service for Voice over Internet Protocol Traffic in Mobile Ad Hoc Networks PDF
Abdullah Shakir, Raed Alsaqour, Maha Abdelhaq, Amal Alhussan, Mohd Othman, Ahmed Mahdi
Identity Verification through Face Recognition Implemented on Raspberry Pi Framework PDF
Alvin Jason Virata, Enrique Festijo
Exploiting Blockchains to improve Data Upload and Storage in the Cloud PDF
Yassine EL KHANBOUBI, Mostafa Hanoune
Mass Removal of Botnet Attacks Using Heterogeneous Ensemble Stacking PROSIMA classifier in IoT PDF
priyang prakashchandra Bhatt, Bhaskar V Thakker
An optimal clustering algorithm based distance-aware routing protocol for wireless sensor networks PDF
Salim EL KHEDIRI, Rehan Ullah Khan, Waleed Albattah
LOAD BALANCING-FAILOVER METHODS USING STATIC ROUTE WITH ADDRESS LIST, ECMP, PCC, AND NTH FOR OPTIMIZING LAN NETWORK : A COMPARISON PDF
Febrian Wahyu Christanto, Susanto Susanto, Agus Priyanto
Performance Evaluation of Soil Substance Measurement System in Garlic Plant based on Internet of Things with Mesh Topology Network Scenario PDF
Doan Perdana, Muhammad Imadudin, Gustommy Bisono
Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection PDF
May A. Alotaibi, Mohammed A. AlZain, Ben Soh, Mehedi Masud, Jehad Al-Amri

Surveys/ Reviews

IoT Security Evolution: Challenges and Countermeasures Review PDF
Ali M. A. Abuagoub
Security Aspects in Web of Data Based on Trust Principles. A brief of Literature Review PDF
Jhon Francined Herrera-Cubides, Paulo Alonso Gaona-García, Carlos Enrique Montenegro-Marín, Diego Mauricio Cataño, Rubén González-Crespo
A Survey of ARX-based Symmetric-key Primitives PDF
Nur Fasihah Mohd Esa, Shekh Faisal Abdul Latip, Mohd Rizuan Baharon


International Journal of Communication Networks and Information Security (IJCNIS)          ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)