Main Navigation
Main Content
Sidebar
Register
Login
Toggle navigation
About
Editorial List
Publisher information
Focus and Scope
Open Access Policy
Publication Ethics
Author Guidelines
Peer Review Process
Current
Archives
Copyrights Form
Announcements
Contacts
Privacy Statement
Abstracting/ Indexing
Article processing charge
Search
Home
Archives
Vol. 12 No. 1 (2020)
Published:
2020-04-26
Research Articles
Chaotic-Based Encryption Algorithm using Henon and Logistic Maps for Fingerprint Template Protection
Apri Siswanto
PDF
Secure Location-Aided Routing Protocols With Wi-Fi Direct For Vehicular Ad Hoc Networks
Ma'en Saleh, Liang Dong, Ahmad Aljaafreh, Naeem Al-Oudat
PDF
Acknowledge-Based Non-Congestion Estimation: An Indirect Queue Management Approach for Concurrent TCP and UDP-Like Flows
Luciano Mauro Arley Sup, Renato Mariz de Moraes, Adolfo Bauchspiess
PDF
Reduction of secondary lobes in joint angle and delay estimation in angle of arrival localization to detect MAC address spoofing in wireless networks
Sara Adel Abbas, Eman Mohamed El-Didamony
PDF
The Impact of selfishness Attack on Mobile Ad Hoc Network
Maha Abdelhaq, Raed Alsaqour, Noura Albrahim, Manar Alshehri, Maram Alshehri, Shehana Alserayee, Eatmad Almutairi, Farah Alnajjar
PDF
SecNetworkCloudSim: An Extensible Simulation Tool for Secure Distributed Mobile Applications
Boubakeur Annane, Adel ALTI, Osman Ghazali
PDF
A New Objective Function Based on Additive Combination of Node and Link Metrics as a Mechanism Path Selection for RPL Protocol
Abdelhadi Eloudrhiri Hassani, Aicha Sahel, Abdelmajid Badri
PDF
Adaptive Active Queue Management based on Queue Ratio of Set-point Weighting
Misbahul Fajri, Kalamullah Ramli
PDF
Articulation Point Based Quasi Identifier Detection for Privacy Preserving in Distributed Environment
Ila Chandrakar
PDF
IoT Crawler with Behavior Analyzer at Fog layer for Detecting Malicious Nodes
Layla Albdour, Saher Manaseer, Ahmad Sharieh
PDF
PHYSICAL LAYER SECURITY FOR WIRELESS NETWORKS BASED ON COSET CONVOLUTIONAL CODING
Michael Ekonde Sone
PDF
Offloading Decisions in a Mobile Edge Computing Node with Time and Energy Constraints
Mohamed EL GHMARY, Tarik CHANYOUR, Youssef HMIMZ, Mohammed Ouçamah CHERKAOUI MALKI
PDF
Slid Pairs of the Fruit-80 Stream Cipher
Kok-An Pang, Shekh Faisal Abdul-Latip, Hazlin Abdul Rani
PDF
Surveys/ Reviews
Exploring Data Security and Privacy Issues in Internet of Things Based on Five-Layer Architecture
Ravi Kumar Patchmuthu, Au Thien Wan, Wida Susanty Suhaili
PDF
A Study on Intrusion Detection System in Wireless Sensor Networks
sravanthi godala, Rama Prasad V Vaddella
PDF
A Classification of non-Cryptographic Anonymization Techniques Ensuring Privacy in Big Data
ZAKARIAE EL OUAZZANI, HANAN EL BAKKALI
PDF