, International Islamic University Malaysia (IIUM), Malaysia
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 1 (2012) - Research Articles
Automated Intruder Detection from Image Sequences using Minimum Volume Sets
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 2 (2014) - Surveys/ Reviews
On the Medium Access Control Protocols Suitable for Wireless Sensor Networks – A Survey
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 3 (2013) - Surveys/ Reviews
Strengths and Weaknesses of Prominent Data Dissemination Techniques in Wireless Sensor Networks
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 1 (2013) - Research Articles
SMART: A Subspace based Malicious Peers Detection algorithm for P2P Systems
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 2 (2013) - Surveys/ Reviews
A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks, and Remedies
Abstract PDF