Main Navigation
Main Content
Sidebar
Register
Login
International Journal of Communication Networks and Information Security (IJCNIS)
Toggle navigation
Current
Editorial Board
About the Journal
Archives
Announcements
Privacy Statement
Contact
Search
Home
Archives
Vol. 8 No. 3 (2016)
Published:
2016-12-05
Research Articles
A collaborative framework for intrusion detection (C-NIDS) in Cloud computing
zayed alhaddad, Mostafa Hanoune, Abdelaziz Mamouni
PDF
Calculating and Evaluating Trustworthiness of Certification Authority
Zakia EL UAHHABI, Hanan EL BAKKALI
PDF
Energy efficient multipath routing protocol for MANET for enhancing QoS and QoE in multimedia applications
vallala Sowmya Devi
PDF
Performance Evaluation of LTE Random Access Procedure under Distributed Location Data Mining for Road Traffic Monitoring
Ruki Harwahyu, Misbahuddin Misbahuddin, Riri Fitri Sari
PDF
MMEDD: Multithreading Model for an Efficient Data Delivery in wireless sensor networks
Blaise Omer YENKE, Damien WOHWE SAMBO, Ado Adamou ABBA ARI, Aldelhak GUEROUI
PDF
Energy Aware Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks
S. M. Kamruzzaman, Xavier Fernando, Mohammad Jaseemuddin
PDF
DPCA: Dual Phase Cloud Infrastructure Authentication
R Thandeeswaran, M A Saleem Durai
PDF
Detecting Zero-day Polymorphic Worms with Jaccard Similarity Algorithm
Malak Abdullah I. Almarshad, Mohssen M. Z. E. Mohammed, Al-Sakib Khan Pathan
PDF
Recommendations Based QoS Trust Aggregation and Routing in Mobile Adhoc Networks
NageswaraRao Sirisala, Shoba Bindu C
PDF
An Improved Solar Low Energy Adaptive Clustering Hierarchy (IS-LEACH) Technique
Khalid M. Al-Smoul, Thamer Alrwashdeh, Ali A. Al-Dahoud
PDF
Surveys/ Reviews
Security and Privacy Issues in IoT
Aqeel ur Rehman, Sadiq ur Rehman, Iqbal Uddin Khan, Muzaffar Moiz, Sarmad Hasan
PDF