Vol 8, No 3 (2016)

Table of Contents

Research Articles

A collaborative framework for intrusion detection (C-NIDS) in Cloud computing PDF
zayed alhaddad, Mostafa Hanoune, Abdelaziz Mamouni
Calculating and Evaluating Trustworthiness of Certification Authority PDF
Zakia EL UAHHABI, Hanan EL BAKKALI
Energy efficient multipath routing protocol for MANET for enhancing QoS and QoE in multimedia applications PDF
vallala Sowmya Devi
Performance Evaluation of LTE Random Access Procedure under Distributed Location Data Mining for Road Traffic Monitoring PDF
Ruki Harwahyu, Misbahuddin Misbahuddin, Riri Fitri Sari
MMEDD: Multithreading Model for an Efficient Data Delivery in wireless sensor networks PDF
Blaise Omer YENKE, Damien WOHWE SAMBO, Ado Adamou ABBA ARI, Aldelhak GUEROUI
Energy Aware Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks PDF
S. M. Kamruzzaman, Xavier Fernando, Mohammad Jaseemuddin
DPCA: Dual Phase Cloud Infrastructure Authentication PDF
R Thandeeswaran, M A Saleem Durai
Detecting Zero-day Polymorphic Worms with Jaccard Similarity Algorithm PDF
Malak Abdullah I. Almarshad, Mohssen M. Z. E. Mohammed, Al-Sakib Khan Pathan
Recommendations Based QoS Trust Aggregation and Routing in Mobile Adhoc Networks PDF
NageswaraRao Sirisala, Shoba Bindu C
An Improved Solar Low Energy Adaptive Clustering Hierarchy (IS-LEACH) Technique PDF
Khalid M. Al-Smoul, Thamer Alrwashdeh, Ali A. Al-Dahoud

Surveys/ Reviews

Security and Privacy Issues in IoT PDF
Aqeel ur Rehman, Sadiq ur Rehman, Iqbal Uddin Khan, Muzaffar Moiz, Sarmad Hasan


International Journal of Communication Networks and Information Security (IJCNIS)          ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)