Main Navigation
Main Content
Sidebar
Register
Login
Toggle navigation
About
Editorial List
Publisher information
Focus and Scope
Open Access Policy
Publication Ethics
Author Guidelines
Peer Review Process
Current
Archives
Copyrights Form
Announcements
Contacts
Privacy Statement
Abstracting/ Indexing
Article processing charge
Search
Home
Archives
Vol. 13 No. 2 (2021)
Published:
2021-08-26
Research Articles
Machine Learning based Attacks Detection and Countermeasures in IoT
Rachid Zagrouba, Reem AlHajri
PDF
Gaussian functional shapes-based type-II fuzzy membership-based cluster protocol for energy harvesting IoT networks
Vaneet Kaur Bhatia, AKSHAY GIRDHAR, SAWTANTAR SINGH KHURMI
PDF
Analysis of BGP4 Peering Establishment Time on IPv6 Connection over 6PE and 6VPE
Irwan Piesessa, Benfano Soewito
PDF
A Privacy by Design Methodology Application in Telecom Domain
siham arfaoui, Abdelhamid BELMEKKI, Abdellatif MEZRIOUI
PDF
An Energy-Efficient Scheme for IoT Networks
Thamer Alhussain
PDF
Effect of image degradation on performance of Convolutional Neural Networks
Inad A. Aljarrah
PDF
Methods for assessing the impact of bandwidth of control channels on the quality of telecommunications networks in the transmission of data packets of different types
Mohialdeen Mustafa Mohammed, Zaika Viktor, Khlaponin Yurii, Berkman Lyubov, Polonskyi Konstiantyn, Oleksandr Leonidovich Turovsky
PDF
Experimental Performance Evaluation of NB-IOT Deployment Modes in Urban Area
Karina Turzhanova, Valery Tikhvinskiy, Sergey Konshin, Alexandr Solochshenko
PDF
Ensemble Method for Mobile Malware Detection using N-Gram Sequences of System Calls
NOR AZMAN MAT ARIFF
PDF
Novel Approach for IP-PBX Denial of Service Intrusion Detection Using Support Vector Machine Algorithm.
Abdirisaq Jama, Othman O. Khalifa, Nantha Kumar Subramaniam
PDF
The method of spectral analysis of the determination of random digital signals
Oleksandr Laptiev, Volodymyr Tkachev, Oleksii Maystrov, Oleksandr Krasikov, Pavlo Open’ko, Volodimir Khoroshko, Lubomir Parkhuts
PDF
Protecting Ownership Rights of Videos Against Digital Piracy: An Efficient Digital Watermarking Scheme
Himanshu Agarwal, Dr. Farooq Husain
PDF
A Study of Z-Transform Based Encryption Algorithm
Mohammed N. Alenezi, Fawaz S. Al-Anzi
PDF
Matching Subcarrier Resource Allocation and Offloading Decision
Ahmad Y. Alhusenat, Abdallah Y. Alma'aitah, Khaled F. Hayajneh
PDF
Auto Signature Verification Using Line Projection Features Combined With Different Classifiers and Selection Methods
Mohammad Malkawi, Wail Mardini, Toqa Abu Zaitoun
PDF
A multi-agent Framework for dynamic traffic management Considering Priority Link
Abdelouafi IKIDID, Abdelaziz El Fazziki, Mohamed Sadgal
PDF
A New Data Deletion Scheme for a Blockchain-based De-duplication System in the Cloud
Yassine El Khanboubi, Mostafa Hanoune, Mohamed El Ghazouani
PDF
Surveys/ Reviews
Issues and Challenges for Network Virtualisation
Nikheel Tashvin Seechurn, Avinash Mungur, Sheeba Armoogum, Sameerchand Pudaruth
PDF
Defense in Depth: Multilayer of security
Raed Alsaqour, Ahmed Majrashi, Mohammed Alreedi, Khalid Alomar, Maha Abdelhaq
PDF
Machine Learning Techniques for Malware Detection with Challenges and Future Directions
Mohammed A Alqhatani
PDF
Security of IoT in 5G Cellular Networks: A Review of Current Status, Challenges and Future Directions
Hemangi Goswami, Hiten Choudhury
PDF