Vol 12, No 1 (2020)

Table of Contents

Research Articles

Chaotic-Based Encryption Algorithm using Henon and Logistic Maps for Fingerprint Template Protection PDF
Apri Siswanto
Secure Location-Aided Routing Protocols With Wi-Fi Direct For Vehicular Ad Hoc Networks PDF
Ma'en Saleh, Liang Dong, Ahmad Aljaafreh, Naeem Al-Oudat
Acknowledge-Based Non-Congestion Estimation: An Indirect Queue Management Approach for Concurrent TCP and UDP-Like Flows PDF
Luciano Mauro Arley Sup, Renato Mariz de Moraes, Adolfo Bauchspiess
Reduction of secondary lobes in joint angle and delay estimation in angle of arrival localization to detect MAC address spoofing in wireless networks PDF
Sara Adel Abbas, Eman Mohamed El-Didamony
The Impact of selfishness Attack on Mobile Ad Hoc Network PDF
Maha Abdelhaq, Raed Alsaqour, Noura Albrahim, Manar Alshehri, Maram Alshehri, Shehana Alserayee, Eatmad Almutairi, Farah Alnajjar
SecNetworkCloudSim: An Extensible Simulation Tool for Secure Distributed Mobile Applications PDF
Boubakeur Annane, Adel ALTI, Osman Ghazali
A New Objective Function Based on Additive Combination of Node and Link Metrics as a Mechanism Path Selection for RPL Protocol PDF
Abdelhadi Eloudrhiri Hassani, Aicha Sahel, Abdelmajid Badri
Adaptive Active Queue Management based on Queue Ratio of Set-point Weighting PDF
Misbahul Fajri, Kalamullah Ramli
Articulation Point Based Quasi Identifier Detection for Privacy Preserving in Distributed Environment PDF
Ila Chandrakar
IoT Crawler with Behavior Analyzer at Fog layer for Detecting Malicious Nodes PDF
Layla Albdour, Saher Manaseer, Ahmad Sharieh
PHYSICAL LAYER SECURITY FOR WIRELESS NETWORKS BASED ON COSET CONVOLUTIONAL CODING PDF
Michael Ekonde Sone
Offloading Decisions in a Mobile Edge Computing Node with Time and Energy Constraints PDF
Mohamed EL GHMARY, Tarik CHANYOUR, Youssef HMIMZ, Mohammed Ouçamah CHERKAOUI MALKI
Slid Pairs of the Fruit-80 Stream Cipher PDF
Kok-An Pang, Shekh Faisal Abdul-Latip, Hazlin Abdul Rani

Surveys/ Reviews

Exploring Data Security and Privacy Issues in Internet of Things Based on Five-Layer Architecture PDF
Ravi Kumar Patchmuthu, Au Thien Wan, Wida Susanty Suhaili
A Study on Intrusion Detection System in Wireless Sensor Networks PDF
sravanthi godala, Rama Prasad V Vaddella
A Classification of non-Cryptographic Anonymization Techniques Ensuring Privacy in Big Data PDF
ZAKARIAE EL OUAZZANI, HANAN EL BAKKALI


International Journal of Communication Networks and Information Security (IJCNIS)          ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)