Main Navigation
Main Content
Sidebar
Register
Login
Toggle navigation
About
Editorial List
Publisher information
Focus and Scope
Open Access Policy
Publication Ethics
Author Guidelines
Peer Review Process
Current
Archives
Copyrights Form
Announcements
Contacts
Privacy Statement
Abstracting/ Indexing
Article processing charge
Search
Home
Archives
Vol. 8 No. 3 (2016)
Published:
2016-12-05
Research Articles
A collaborative framework for intrusion detection (C-NIDS) in Cloud computing
zayed alhaddad, Mostafa Hanoune, Abdelaziz Mamouni
PDF
Calculating and Evaluating Trustworthiness of Certification Authority
Zakia EL UAHHABI, Hanan EL BAKKALI
PDF
Energy efficient multipath routing protocol for MANET for enhancing QoS and QoE in multimedia applications
vallala Sowmya Devi
PDF
Performance Evaluation of LTE Random Access Procedure under Distributed Location Data Mining for Road Traffic Monitoring
Ruki Harwahyu, Misbahuddin Misbahuddin, Riri Fitri Sari
PDF
MMEDD: Multithreading Model for an Efficient Data Delivery in wireless sensor networks
Blaise Omer YENKE, Damien WOHWE SAMBO, Ado Adamou ABBA ARI, Aldelhak GUEROUI
PDF
Energy Aware Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks
S. M. Kamruzzaman, Xavier Fernando, Mohammad Jaseemuddin
PDF
DPCA: Dual Phase Cloud Infrastructure Authentication
R Thandeeswaran, M A Saleem Durai
PDF
Detecting Zero-day Polymorphic Worms with Jaccard Similarity Algorithm
Malak Abdullah I. Almarshad, Mohssen M. Z. E. Mohammed, Al-Sakib Khan Pathan
PDF
Recommendations Based QoS Trust Aggregation and Routing in Mobile Adhoc Networks
NageswaraRao Sirisala, Shoba Bindu C
PDF
An Improved Solar Low Energy Adaptive Clustering Hierarchy (IS-LEACH) Technique
Khalid M. Al-Smoul, Thamer Alrwashdeh, Ali A. Al-Dahoud
PDF
Surveys/ Reviews
Security and Privacy Issues in IoT
Aqeel ur Rehman, Sadiq ur Rehman, Iqbal Uddin Khan, Muzaffar Moiz, Sarmad Hasan
PDF