-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 1 (2014) - Research Articles
QoS-VNS-CS: QoS constraints Core Selection Algorithm based on Variable Neighborhood Search Algorithm
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 2 (2015) - Research Articles
Average Channel Capacity Evaluation for Selection Combining Diversity Schemes over Nakagami-0.5 fading Channels.
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 1 (2013) - Surveys/ Reviews
A Survey on the Communication Protocols and Security in Cognitive Radio Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 2 (2009) - Research Articles
Ant based Self-organized Routing Protocol for Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 3 (2018) - Research Articles
Node Activities Learning(NAL)Approach to Build Secure and Privacy-Preserving Routing in Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
Fuzzy Logic based Intrusion Detection System against Black Hole Attack in Mobile Ad Hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
NM-LEACH: A Novel Modified LEACH Protocol to Improve Performance in WSN
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 3 (2010) - Research Articles
Grid Block Energy Based Data Gathering Algorithms for Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
Statistical-Based Heuristic for Scheduling of Independent Tasks in Cloud Computing
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
Multi-Stage Protection Using Pixel Selection Technique for Enhancing Steganography
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Surveys/ Reviews
Review on Leakage Resilient Key Exchange Security Model
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Enhanced Home Energy Management Scheme (EHEM) in Smart Grids
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 2 (2016) - Research Articles
Live Migration of Virtualized Carrier Grade SIP Server
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 2 (2017) - Research Articles
Distributed Fault-Tolerant Algorithm for Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
Design of a Network Intrusion Detection System Using Complex Deep Neuronal Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 2 (2011) - Surveys/ Reviews
Survey of Topology-based Multicast Routing Protocols for Mobile Ad hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 1 (2014) - Research Articles
Securing Cluster Formation and Cluster Head Elections in Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 3 (2016) - Surveys/ Reviews
Security and Privacy Issues in IoT
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 2 (2017) - Research Articles
On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 3 (2016) - Research Articles
DPCA: Dual Phase Cloud Infrastructure Authentication
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
ZigBee Healthcare Monitoring System for Ambient Assisted Living Environments
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Surveys/ Reviews
WDM and DWDM based RoF system in Fiber Optic Communication Systems: A review
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 2 (2016) - Research Articles
Architecture for Fault Tolerance in Mobile Cloud Computing using Disease Resistance Approach
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 1 (2012) - Research Articles
Enhanced Clustering Routing Protocol for Power-Efficient Gathering in Wireless Sensor Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 3 (2019) - Research Articles
Exploiting Blockchains to improve Data Upload and Storage in the Cloud
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 2 (2020) - Research Articles
Image malware detection using deep learning
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
Introducing a Machine Learning Password Metric Based on EFKM Clustering Algorithm
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 1 (2010) - Research Articles
Implementation of Pseudo-Random Route-Driven ECDH Scheme for Heterogeneous Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Split and Merge LEACH Based Routing Algorithm for Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
PMSS: Producer Mobility Support Scheme Optimization with RWP Mobility Model in Named Data Networking
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 1 (2013) - Research Articles
SMART: A Subspace based Malicious Peers Detection algorithm for P2P Systems
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Surveys/ Reviews
Exploring Data Security and Privacy Issues in Internet of Things Based on Five-Layer Architecture
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 1 (2013) - Research Articles
Experimental Performance Evaluation and Frame Aggregation Enhancement in IEEE 802.11n WLANs
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 3 (2010) - Research Articles
A Sierpenski Slot Antenna as a TAG RFID Antenna
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
EVHS - Elastic Virtual Honeypot System for SDNFV-Based Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Research Articles
Chaotic-Based Encryption Algorithm using Henon and Logistic Maps for Fingerprint Template Protection
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 3 (2014) - Surveys/ Reviews
Ultralightweight Cryptography for passive RFID systems
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
Improved Deep Hiding/Extraction Algorithm to Enhance the Payload Capacity and Security Level of Hidden Information
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Surveys/ Reviews
Internet Voting Protocols: An Analysis of the Cryptographic Operations per Phase
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 2 (2020) - Research Articles
A Novel Design of Audio CAPTCHA for Visually Impaired Users
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 3 (2013) - Surveys/ Reviews
Strengths and Weaknesses of Prominent Data Dissemination Techniques in Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 1 (2012) - Surveys/ Reviews
Surveying Position Based Routing Protocols for Wireless Sensor and Ad-hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 2 (2014) - Research Articles
Capacity Dimensioning of HSDPA Urban Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Surveys/ Reviews
State of the Art in Biometric Key Binding and Key Generation Schemes
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Surveys/ Reviews
Urban Air Pollution Monitoring Using Wireless Sensor Networks: A Comprehensive Review
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 1 (2009) - Surveys/ Reviews
Optical Fiber Amplifiers-Review
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Node Density Performance Analysis on IEEE 802.11ah Standard for VoIP Service
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 1 (2017) - Surveys/ Reviews
Review on Radio Resource Allocation Optimization in LTE/LTE-Advanced using Game Theory
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
Machine Learning based Attacks Detection and Countermeasures in IoT
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 2 (2015) - Research Articles
A new Itinerary planning approach among multiple mobile agents in wireless sensor networks (WSN) to reduce energy consumption
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Biometric Face Recognition Based on Enhanced Histogram Approach
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 2 (2010) - Research Articles
QoS Provisioning in Three Layer MIPv6 Architecture using RSVP
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
A Study of Z-Transform Based Encryption Algorithm
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Coverage and Energy Efficiency Optimization for Randomly Deployed Multi-Tier Wireless Multimedia Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 1 (2014) - Research Articles
Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular-Femtocell Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
Untraceable Authentication Protocol for IEEE802.11s Standard
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
Modeling, Development and Analysis Performance of an Intelligent Control of Photovoltaic System by Fuzzy Logic approach for Maximum Power Point Tracking
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 1 (2011) - Surveys/ Reviews
Comparison of IEEE 802.11 and IEEE 802.15.4 for Future Green Multichannel Multi-radio Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
S-RLNC based MAC Optimization for Multimedia Data Transmission over LTE/LTE-A Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 1 (2014) - Surveys/ Reviews
Survey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Surveys/ Reviews
A Classification of non-Cryptographic Anonymization Techniques Ensuring Privacy in Big Data
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 1 (2017) - Research Articles
Performance Enhancement of Wearable Antenna Using High Impedance Surfaces
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
Experimental Performance Evaluation of NB-IOT Deployment Modes in Urban Area
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 3 (2018) - Surveys/ Reviews
State of the Art Intrusion Detection System for Cloud Computing
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 3 (2019) - Research Articles
Novel Method of Improving Quality of Service for Voice over Internet Protocol Traffic in Mobile Ad Hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Surveys/ Reviews
Decoding of Decode and Forward (DF) Relay Protocol using Min-Sum Based Low Density Parity Check (LDPC) System
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 2 (2019) - Surveys/ Reviews
Systematic Review of Internet of Things Security
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
An Energy-Efficient Scheme for IoT Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 3 (2015) - Surveys/ Reviews
Technology Implications of UWB on Wireless Sensor Network-A detailed Survey
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 1 (2016) - Research Articles
A energy-conserving predictive preemptive multipath routing protocol for adhoc networks: a lifetime improvement
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 1 (2016) - Research Articles
Filtering Dishonest Trust Recommendations in Trust Management Systems in Mobile Ad Hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 3 (2018) - Research Articles
MODIFIED MULTI-LEVEL STEGANOGRAPHY TO ENHANCE DATA SECURITY
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 3 (2009) - Research Articles
Link Lifetime Based Route Selection in Mobile Ad-Hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 2 (2015) - Research Articles
Cooperative Trust Framework for Cloud Computing Based on Mobile Agents
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 2 (2020) - Research Articles
MRGM: An Adaptive Mechanism for Congestion Control in Smart Vehicular Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Enhanced PF Scheduling Algorithm for LTE Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 2 (2014) - Surveys/ Reviews
On the Medium Access Control Protocols Suitable for Wireless Sensor Networks – A Survey
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 1 (2017) - Research Articles
IMPLEMENTATION AND OPTIMIZATION OF RWP MOBILITY MODEL IN WSNS UNDER TOSSIM SIMULATOR
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 3 (2010) - Research Articles
Handoff Management for Mobile Agents in High Speed Wireless Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 2 (2012) - Research Articles
A Novel Radio Mode Identification Approach for Spectrum Sensing in Cognitive Radios
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 2 (2013) - Research Articles
A Game Theory based Contention Window Adjustment for IEEE 802.11 under Heavy Load
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Surveys/ Reviews
ANONYMOUS AUTHENTICATION PROTOCOLS FOR IOT BASED HEALTHCARE: A SURVEY
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 3 (2019) - Research Articles
Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 2 (2013) - Research Articles
An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Capacity Enhancement of Multiuser Wireless Communication System through Adaptive Non-Linear Pre coding
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
Rapid Learning Optimization Approach for Battery Recovery-Aware Embedded System Communications
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 2 (2020) - Research Articles
Design of Lightweight Authentication Protocol for Fog enabled Internet of Things- A Centralized Authentication Framework
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
AARF-HT: Adaptive Auto Rate Fallback for High-Throughput IEEE 802.11n WLANs
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 3 (2014) - Research Articles
Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 1 (2009) - Research Articles
Energy Detection Based Spectrum Sensing for Sensing Error Minimization in Cognitive Radio Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 3 (2015) - Invited Paper(s)
Modeling of the PSK utilization at the signal transmission in the optical transmission medium
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 3 (2013) - Research Articles
Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Surveys/ Reviews
Issues and Challenges for Network Virtualisation
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 3 (2018) - Research Articles
BotCap: Machine Learning Approach for Botnet Detection Based on Statistical Features
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 1 (2010) - Research Articles
Electrical Characteristics of a Dual-Band Microstrip Patch Antenna for GSM/ UMTS / WLAN Operations
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 2 (2019) - Research Articles
Effective and Secure vWSN Applications in a Virtualized Cloud Computing Environment
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
Hybrid Approach for Botnet Detection Using K-Means and K-Medoids with Hopfield Neural Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
Security Improvements for Connected Vehicles Position-Based Routing
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 3 (2019) - Surveys/ Reviews
IoT Security Evolution: Challenges and Countermeasures Review
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 1 (2013) - Research Articles
Evaluation MCDM Multi-disjoint Paths Selection Algorithms Using Fuzzy-Copeland Ranking Method
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Surveys/ Reviews
A review on Precoding Techniques For mm-Wave Massive MIMO Wireless Systems
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 1 (2011) - Surveys/ Reviews
Surveying Mobile Television
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 3 (2018) - Research Articles
Security based partner selection in Inter-organizational workflow systems
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 2 (2020) - Research Articles
Vehicular Networking Road Weather Information System Tailored for Arctic Winter Conditions
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 2 (2015) - Research Articles
Full-length non-linear binary sequences with Zero Correlation Zone for multiuser communications
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Surveys/ Reviews
Evolution of Malware Threats and Techniques: a Review
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
Novel Approach for Intrusion Detection Using Simulated Annealing Algorithm Combined with Hopfield Neural Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
TiSEFE: Time Series Evolving Fuzzy Engine for Network Traffic Classification
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
An Adaptive FLV Steganography Approach Using Simulated Annealing
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 2 (2009) - Research Articles
An Approach against a Computer Worm Attack
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 2 (2013) - Surveys/ Reviews
A Survey on Dynamic Spectrum Access Techniques in Cognitive Radio Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 3 (2019) - Research Articles
LOAD BALANCING-FAILOVER METHODS USING STATIC ROUTE WITH ADDRESS LIST, ECMP, PCC, AND NTH FOR OPTIMIZING LAN NETWORK : A COMPARISON
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 3 (2010) - Research Articles
Securing Wireless Sensor Networks with An Efficient B+ Tree-Based Key Management Scheme
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 1 (2015) - Research Articles
Modeling Poisson Error Process on Wireless Channels
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 2 (2020) - Research Articles
Enhanced Dynamic Bandwidth Allocation Algorithm for Intelligent Home Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 2 (2011) - Research Articles
The Analysis and Identification of P2P Botnet’s Traffic Flows
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Securing One Time Password (OTP) for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
HP4 High-Performance Programmable Packet Parser
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
A Low Power Architectural Framework for Automated Surveillance System with Low Bit Rate Transmission
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
New Anomaly Network Intrusion Detection System in Cloud Environment Based on Optimized Back Propagation Neural Network Using Improved Genetic Algorithm
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 3 (2018) - Research Articles
A New Distributed Intrusion Detection System Based on Multi-Agent System for Cloud Environment
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 2 (2017) - Research Articles
Mobility Adaptive Density Connected Clustering Approach in Vehicular Ad Hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 1 (2010) - Research Articles
Secure Communications in Group-based Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Surveys/ Reviews
Machine Learning Techniques for Malware Detection with Challenges and Future Directions
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 3 (2016) - Research Articles
Performance Evaluation of LTE Random Access Procedure under Distributed Location Data Mining for Road Traffic Monitoring
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 3 (2014) - Research Articles
Mitigating External Threats in Wireless Local Area Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 3 (2010) - Surveys/ Reviews
Analyzing Routing Protocols for Underwater Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 2 (2016) - Research Articles
A Novel Access Control Model Based on the Structure of Applications
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
A NOVEL SIMPLE AND HIGHLY SECURE METHOD FOR DATA ENCRYPTION-DECRYPTION
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 3 (2018) - Research Articles
Enhancing the Performance of the Advanced Encryption Standard (AES) Algorithm Using Multiple Substitution Boxes
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 2 (2017) - Surveys/ Reviews
A Review on Features’ Robustness in High Diversity Mobile Traffic Classifications
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 2 (2017) - Research Articles
Discrete R-Contiguous bit Matching mechanism appropriateness for anomaly detection in Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 3 (2015) - Research Articles
Spectral Efficiency Evaluation for Selection Combining Diversity Schemes under Worst Case of Fading Scenario
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 2 (2020) - Research Articles
Efficient Load Balancing for Cloud Computing by Using Content Analysis
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 2 (2009) - Research Articles
Adaptive Modulation for OFDM Systems
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Research Articles
Acknowledge-Based Non-Congestion Estimation: An Indirect Queue Management Approach for Concurrent TCP and UDP-Like Flows
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 1 (2017) - Research Articles
Cross Layered Network Condition Aware Mobile-Wireless Multimedia Sensor Network Routing Protocol for Mission Critical Communication
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 2 (2013) - Research Articles
Integrated Satellite-Terrestrial System Capacity Over Mix Shadowed Rician and Nakagami Channels
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 1 (2017) - Research Articles
A New Method of User Association in Wireless Mesh Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 3 (2014) - Research Articles
Low Complexity Joint Sub-Carrier Pairing, Allocation and Relay Selection in Cooperative Wireless Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 3 (2015) - Research Articles
Improved IDMA for Multiple Access of 5G
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
DESIGN OF A MINIMAL OVERHEAD CONTROL TRAFFIC TOPOLOGY DISCOVERY AND DATA FORWARDING PROTOCOL FOR SOFTWARE-DEFINED WIRELESS SENSOR NETWORKS
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 2 (2020) - Research Articles
An enhanced synchronized multi-channel MAC scheme to improve throughput in VANET
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 2 (2010) - Research Articles
Broadband cognitive radio transmission based on sub-channel sensing and NC-OFDM
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Research Articles
SecNetworkCloudSim: An Extensible Simulation Tool for Secure Distributed Mobile Applications
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 3 (2015) - Research Articles
Routing for capacity improvement in Multi-Channel-Width Multi-Radio Wireless Mesh Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 1 (2017) - Research Articles
Extending Monitoring Area of Production Plant Using Synchronized Relay Node Message Scheduling
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 3 (2012) - Research Articles
Using Media Independent Handover to Support PMIPv6 Inter-domain Mobility Based Vehicular Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 2 (2019) - Research Articles
Distance Based Power Control for D2D Communication in LTE-Advanced Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 3 (2018) - Surveys/ Reviews
Available Bandwidth Estimation Tools Metrics, Approaches and Performance
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Private and Mobile inter-network routing for Wireless Sensor Networks and Internet of Things
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
Dexterity for Channel Capacity Enhancement in MU-MIMO by Abrogating Interference
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 2 (2013) - Research Articles
A Secure Method for Authenticity Verification of Handwritten Signatures Through Digital Image Processing and Artificial Neural Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 2 (2012) - Surveys/ Reviews
A Comparative Study of Power Line Communication Networks With and Without Buffer
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 3 (2009) - Research Articles
Genetic Algorithm used in Search of good Tailbiting Codes
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
A STABLE CLUSTERING SCHEME WITH NODE PREDICTION IN MANET
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
Smart Relay Selection Scheme Based on Fuzzy Logic with Optimal Power Allocation and Adaptive Data Rate Assignment
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
Improved Intrusion Detection System using Quantal Response Equilibrium-based Game Model and Rule-based Classification
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 3 (2010) - Research Articles
LFSSR: Localised Frequency Scanning Short Range Estimation for Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
New Holes and Boundary Detection Algorithm for Heterogeneous Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 3 (2018) - Research Articles
A Routing Delay Predication Based on Packet Loss and Explicit Delay Acknowledgement for Congestion Control in MANET
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 1 (2017) - Research Articles
Impact of Environmental Influences on Multilevel Modulation Formats at the Signal Transmission in the Optical Transmission Medium
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
Design, optimization and Real Time implementation of a new Embedded Chien Search Block for Reed-Solomon (RS) and Bose-Chaudhuri-Hocquenghem (BCH) codes on FPGA Board
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 1 (2009) - Research Articles
Modeling of Environmental Influences at the Signal Transmission by means of VDSL and PLC Technologies
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
Economic Denial of Sustainability Attacks Mitigation in the Cloud
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
Application-based authentication on an inter-VM traffic in a Cloud environment
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
Improved Technique for Preserving Privacy while Mining Real Time Big Data
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 2 (2017) - Research Articles
PFPS: Priority-First Packet Scheduler for IEEE 802.15.4 Heterogeneous Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 1 (2010) - Research Articles
Tested Evaluation of Fast and Secure Handover in FMIPv6
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
Bandwidth Allocation Mechanism based on Users' Web Usage Patterns for Campus Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Performance Analysis of Mobility Impact on IEEE 802.11ah Standard with Traffic Pattern Scheme
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
Comprehensive Performance Analysis of RPL Objective Functions in IoT Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
Energy and Processing Time Efficiency for an Optimal Offloading in a Mobile Edge Computing Node
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
An improved Framework for Biometric Database’s privacy
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 3 (2015) - Research Articles
Coefficient of Restitution based Cross Layer Interference Aware Routing Protocol in Wireless Mesh Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 1 (2011) - Research Articles
Improving Reliability of Jamming Attack Detection in Ad hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
Lightweight Scheme for Smart Home Environments using Offloading Technique
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
Image Encryption and Decryption Using Chua’s Circuits
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
Novel Approach for IP-PBX Denial of Service Intrusion Detection Using Support Vector Machine Algorithm.
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
Ferry–Based Directional Forwarding Mechanism for Improved Network Life-Time in Cluster-Based Wireless Sensor Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
Enhanced Epileptic Seizure diagnosis using EEG Signals with Support vector machine and Bagging Classifiers
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
PERFORMANCE ANALYSIS IN WIRELESS POWERED D2D- AIDED NON-ORTHOGONAL MULTIPLE ACCESS NETWORKS
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Surveys/ Reviews
Efficient and Secure ECDSA Algorithm and its Applications: A Survey
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
Performance Analysis of 5G Cooperative-NOMA for IoT-Intermittent Communication
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Multipoint Relay Selection based on Stability of Spatial Relation in Mobile Ad hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
A Like ELGAMAL Cryptosystem But Resistant To Post-Quantum Attacks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 2 (2009) - Research Articles
Chaotic Maps: A Tool to Enhance the Performance of OFDM Systems
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
A Distance-Based Data-Mule Scheduling Technique for Lesser Nodal Delay in Wireless Sensor Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 3 (2014) - Research Articles
Joint Link Scheduling and Routing for Load Balancing in STDMA Wireless Mesh Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
Features-Aware DDoS Detection in Heterogeneous Smart Environments based on Fog and Cloud Computing
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
Effect of image degradation on performance of Convolutional Neural Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 3 (2019) - Surveys/ Reviews
A Survey of ARX-based Symmetric-key Primitives
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
Feature Selection with IG-R for Improving Performance of Intrusion Detection System
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 3 (2010) - Research Articles
Efficient Expanding Ring Search for MANETs
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Research Articles
A New Objective Function Based on Additive Combination of Node and Link Metrics as a Mechanism Path Selection for RPL Protocol
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 2 (2017) - Research Articles
Black Hole attack Detection using fuzzy based IDS
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
A Novel and Low Processing Time ECG Security Method Suitable for Sensor Node Platforms
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 2 (2011) - Research Articles
Upgrading Efficiency and Improvement of the Performance of Broadband Wireless Optical Access Communication Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
Designing an Energy Efficient Network Using Integration of KSOM, ANN and Data Fusion Techniques
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 2 (2012) - Research Articles
Impact of queue buffer size awareness on single and multi service real-time routing protocols for WSNs
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
Enhancing Route lifetime in Vehicular Ad Hoc ?Networks Based on Skellam Distribution Model
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
Secure and Efficient Video Transmission in VANET
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 3 (2011) - Surveys/ Reviews
Survey of Reactive and Hybrid Routing Protocols for Mobile Ad Hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 1 (2017) - Research Articles
ADVANCED RANDOM TIME QUEUE BLOCKING WITH TRAFFIC PREDICTION FOR DEFENSE OF LOW-RATE DOS ATTACKS AGAINST APPLICATION SERVERS
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
TRW-MAC: A thermal-aware receiver-driven wake-up radio enabled duty cycle MAC protocol for multi-hop implantable wireless body area networks in Internet of Things
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 1 (2010) - Research Articles
A Review and Cryptanalysis of Similar Timestamp-Based Password Authentication Schemes Using Smart Cards
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 3 (2018) - Research Articles
An Improved Fully Homomorphic Encryption Scheme for Cloud Computing
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 1 (2011) - Research Articles
Novel Adaptive QoS Provisioning in Heterogeneous Wireless Environment
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
Modified SHA1: A Hashing Solution to Secure Web Applications through Login Authentication
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 2 (2014) - Research Articles
Overhead-controlled contention-based routing for VANETs
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
Blockchain & Multi-Agent System: A New Promising Approach for Cloud Data Integrity Auditing with Deduplication
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 1 (2017) - Research Articles
CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 2 (2017) - Research Articles
CALAR: Community Aware Location Assisted Routing Framework for Delay Tolerant Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Improving Vehicular Authentication in VANET Using
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
Fuzzy Adaptive Hysteresis of RSS for Handover Decision in V2V VANET
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 2 (2009) - Research Articles
A Secured Service Level Negotiation In Ubiquitous Environments
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
SEPCS: Prolonging Stability Period of Wireless Sensor Networks using Compressive Sensing
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 2 (2012) - Research Articles
UWB Indoor Radio Propagation Modelling in Presence of Human Body Shadowing Using Ray Tracing Technique
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Balanced Multi-Channel Data Collection in Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
Performance Analysis of User Speed Impact on IEEE 802.11ah Standard affected by Doppler Effect
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 2 (2010) - Research Articles
Mesh Networks Planning: Optimization with Multi-Hop Interference
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
Artificial Neural Networks, Support Vector Machine And Energy Detection For Spectrum Sensing Based On Real Signals
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 3 (2016) - Research Articles
Energy Aware Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
Matching Subcarrier Resource Allocation and Offloading Decision
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
Cost Effective Cloud Storage Interoperability Between Public Cloud Platforms
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
A PREDICTIVE USER BEHAVIOUR ANALYTIC MODEL FOR INSIDER THREATS IN CYBERSPACE
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
Auto Signature Verification Using Line Projection Features Combined With Different Classifiers and Selection Methods
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Research Articles
Offloading Decisions in a Mobile Edge Computing Node with Time and Energy Constraints
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
Resource Allocation in 4G and 5G Networks: A Review
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 2 (2016) - Surveys/ Reviews
Energy Efficiency Metrics in Cognitive Radio Networks: A Hollistic Overview
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 3 (2009) - Research Articles
The Drop Activation Function of the Fast Congestion Notification (FN) Mechanism
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 3 (2019) - Research Articles
Performance Evaluation of Soil Substance Measurement System in Garlic Plant based on Internet of Things with Mesh Topology Network Scenario
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
A New Multi-threaded and Interleaving Approach to Enhance String Matching for Intrusion Detection Systems
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 1 (2015) - Research Articles
A dynamic study with side channel against An Identification Based Encryption
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
Method of Detecting Radio Signals using Means of Covert by Obtaining Information on the basis of Random Signals Model
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 3 (2013) - Research Articles
An electrical model to design a Metamaterial Left Hand Antenna
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 2 (2017) - Research Articles
Detection of illegal traffic pattern using Hybrid Improved CART and Multiple Extreme Learning Machine Approach
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 2 (2020) - Research Articles
Naïve Bayes Classifier to Mitigate the DDoS Attacks Severity in Ad-Hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 3 (2010) - Research Articles
Energy Efficient STBC –Encoded Cooperative MIMO Routing Scheme for Cluster Based Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 2 (2020) - Surveys/ Reviews
Cyber Security Concerns in Social Networking Service
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 2 (2017) - Research Articles
Optimized Job Scheduling approach based on Genetic algorithms in smart Grid environment
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
A Hybrid Algorithm for Reliable and Energy-efficient Data Gathering in Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 2 (2019) - Research Articles
Intelligent and Improved Self-Adaptive Anomaly based Intrusion Detection System for Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Performance Analysis of SAP-NFC Protocol
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
Demand Based Cost Optimization of Electric Bills for Household Users
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 3 (2012) - Research Articles
Modeling of Environmental Influences at the Signal Transmission in the Optical Transmission Medium
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
Workload Cluster Balance Algorithm to Improve Wireless Sensor Network Performance
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 1 (2009) - Research Articles
A Fuzzy-based Mobility Prediction in the IEEE 802.16e
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
Evaluation of DoS attacks on Commercial Wi-Fi-Based UAVs
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Surveys/ Reviews
A Study on Intrusion Detection System in Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
Performance Improvement of Secret Key Generation Scheme in Wireless Indoor Environment
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 1 (2010) - Surveys/ Reviews
Overview of Optical Local Access Networks Development and Design Challenges
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Surveys/ Reviews
Analysis of Cybersecurity Standard and Framework Components
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 1 (2011) - Research Articles
A Cost-Based Approach for Analysing the Overheads of Multicast Protocols in Non-Strictly Hierarchical Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
CDS-MIP: CDS-based Multiple Itineraries Planning for mobile agents in wireless sensor network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
Integrating and Securing Video, Audio and Text Using Quaternion Fourier Transform
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 2 (2009) - Surveys/ Reviews
A Survey on Wireless Sensor Network Security
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
Modelling Multilayer Communication Channel in Terahertz Band for Medical Applications
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
Gaussian functional shapes-based type-II fuzzy membership-based cluster protocol for energy harvesting IoT networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 3 (2013) - Research Articles
Design and Implementation of ID Based MANET Autoconfiguration Protocol
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 2 (2017) - Research Articles
Digital Copyright Protection: Focus on Some Relevant Solutions
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 3 (2010) - Research Articles
Impact of Chip Shape on the Performance of DS-OCDMA in Presence of GVD and SPM
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 2 (2011) - Research Articles
Traffic Flow Analysis of a Multi-hop Wireless Sensor Network Subject to Node Failure
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 2 (2013) - Surveys/ Reviews
A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks, and Remedies
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
Analysis of BGP4 Peering Establishment Time on IPv6 Connection over 6PE and 6VPE
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 3 (2012) - Research Articles
Queue Length and Mobility aware Routing Protocol for Mobile Ad hoc Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 2 (2017) - Research Articles
Quaternion-based Encryption/Decryption of Audio Signal Using Digital Image as Variable Key
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 3 (2011) - Research Articles
New Trends of Radio over Fiber Communication Systems for Ultra High Transmission Capacity
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Research Articles
Articulation Point Based Quasi Identifier Detection for Privacy Preserving in Distributed Environment
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Determination of Itinerary Planning for Multiple Agents in Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 3 (2019) - Surveys/ Reviews
Security Aspects in Web of Data Based on Trust Principles. A brief of Literature Review
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 1 (2010) - Research Articles
Enhanced Wideband Adaptive Arrays with Different Length Quadrature Mirror Filter Banks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 3 (2014) - Research Articles
A Fuzzy Logic Based Defense Mechanism against Distributed Denial of Services Attack in Cloud Environment
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Research Articles
The Impact of selfishness Attack on Mobile Ad Hoc Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 2 (2017) - Research Articles
A parallel implementation on a multi-core architecture of a dynamic programming algorithm applied in cognitive radio ad hoc networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
The method of spectral analysis of the determination of random digital signals
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 1 (2011) - Research Articles
Applying Cluster Merging and Dynamic Routing Mechanisms to Extend the Lifetime of Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
An Enhanced Block Pre-processing of PRESENT Algorithm for Fingerprint Template Encryption in the Internet of Things Environment
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
Deployment of Multi-Fuzzy Model Based Routing in RPL to Support Efficient IoT
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Research Articles
Reduction of secondary lobes in joint angle and delay estimation in angle of arrival localization to detect MAC address spoofing in wireless networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
Robust Vehicular Communications Using the Fast-Frequency-Hopping-OFDM Technology and the MIMO Spatial Multiplexing
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
Automatic Building of a Powerful IDS for The Cloud Based on Deep Neural Network by Using a Novel Combination of Simulated Annealing Algorithm and Improved Self- Adaptive Genetic Algorithm
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 2 (2016) - Research Articles
Study of Multi-Classification of Advanced Daily Life Activities on SHIMMER Sensor Dataset
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
A novel Watermarking Technique Based on Hybrid Transforms
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 3 (2012) - Research Articles
Link Expiration Time and Minimum Distance Spanning Trees based Distributed Data Gathering Algorithms for Wireless Mobile Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 2 (2009) - Research Articles
A Performance Comparison of Virtual Backbone Formation Algorithms for Wireless Mesh Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 2 (2010) - Research Articles
An Agent-Based Intrusion Detection System for Local Area Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 3 (2013) - Research Articles
Deterministic Static Sensor Node Placement in Wireless Sensor Network based on Territorial Predator Scent Marking Behaviour
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 2 (2014) - Research Articles
WSN Location Privacy Scheme Enhancement through Epidemical Information Dissemination
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 1 (2014) - Research Articles
An Efficient Interference Aware Partially Overlapping Channel Assignment and Routing in Wireless Mesh Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 1 (2016) - Research Articles
Cross-Layer Routing Based on Semantic Web Services Discovery with Energy Evaluation and Optimization in MANET
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
A New Variant of Game Theory Based Decision Making (GTDM) Algorithm Routing Protocols to Improve Energy Efficiency on Vehicular Delay Tolerant Network (VDTN)
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
Revealing Influenced Selected Feature for P2P Botnet Detection
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 2 (2012) - Research Articles
Fair Packet Distribution on Multi-interfaced Mobile Router for Mobile Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 2 (2019) - Research Articles
Hardware Implementation of Efficient Elliptic Curve Scalar Multiplication using Vedic Multiplier
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
A MODEL OF A DISTRIBUTED INFORMATION SYSTEM BASED ON THE Z39.50 PROTOCOL
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 2 (2020) - Research Articles
PERFORMANCE COMPARISON OF NEW DESIGNS OF CHIEN SEARCH AND SYNDROME BLOCKS FOR BCH AND REED SOLOMON CODES
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 3 (2009) - Research Articles
A Wavelet Based Approach for Speaker Identification from Degraded Speech
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Surveys/ Reviews
Defense in Depth: Multilayer of security
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 3 (2010) - Research Articles
Client-Based Network-Assisted Mobile IPv6
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 2 (2013) - Research Articles
Lateral Pre-crash Sensing and Avoidance in Emotion Enabled Cognitive Agent based Vehicle-2-Vehicle Communication System
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
Implementing Enhanced MIMO with F-OFDM to Increase System Efficiency for Future 5G Cellular Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
Enhanced Ant-Based Routing for Improving Performance of Wireless Sensor Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
A New Data Deletion Scheme for a Blockchain-based De-duplication System in the Cloud
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 3 (2016) - Research Articles
A collaborative framework for intrusion detection (C-NIDS) in Cloud computing
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
Overhead in Available Bandwidth Estimation Tools: Evaluation and Analysis
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 1 (2009) - Research Articles
Synthesis of unequally Spaced Antenna Arrays by a new Differential Evolutionary Algorithm
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 2 (2010) - Research Articles
Guard Channel based Call Admission Control Schemes in Hierarchical Mobile IPv6 Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 3 (2019) - Research Articles
Mass Removal of Botnet Attacks Using Heterogeneous Ensemble Stacking PROSIMA classifier in IoT
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 2 (2014) - Research Articles
Effects of ASE noise and dispersion chromatic on performance of DWDM networks using distributed Raman amplifiers
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 1 (2011) - Research Articles
A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
An Efficient Authentication Scheme for Internet of Things
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 2 (2017) - Research Articles
A Comprehensive Cloud Security Model with Enhanced Key Management, Access Control and Data Anonymization Features
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 2 (2016) - Research Articles
Smart Algorithms for Hierarchical Clustering in Optical Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 2 (2014) - Surveys/ Reviews
Classification of Routing Algorithms in Volatile Environment of Underwater Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
Attacking AES-Masking Encryption Device with Correlation Power Analysis
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 3 (2014) - Research Articles
A fuzzy-based QoS Maximization protocol for WiFi Multimedia (IEEE 802.11e) Ad hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 2 (2019) - Research Articles
A Routing Algorithm for Extending Mobile Sensor Network’s Lifetime using Connectivity and Target Coverage
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 3 (2009) - Research Articles
Vehicular Networking Pilot System for Vehicle-to-Infrastructure and Vehicle-to-Vehicle Communications
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 1 (2016) - Research Articles
A fair access mechanism based on TXOP in IEEE 802.11e wireless networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
Distributed Channel and Power Level Selection in VANET Based on SINR using Game Model
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 3 (2010) - Research Articles
Streamed Analysis of Network Files to avoid False Positives and to Detect Client-side Attacks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
Early Identification of Abused Domains in TLD through Passive DNS Applying Machine Learning Techniques
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 3 (2016) - Research Articles
Recommendations Based QoS Trust Aggregation and Routing in Mobile Adhoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Research Articles
Secure Location-Aided Routing Protocols With Wi-Fi Direct For Vehicular Ad Hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 2 (2011) - Surveys/ Reviews
Survey on Opportunistic Routing in Multihop Wireless Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
SRAD: Smart Routing Algorithm Design for Supporting IoT Network Architecture
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
Preventing data leakage by securing chat session with randomized session ID
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 3 (2011) - Surveys/ Reviews
Survey on Incremental Approaches for Network Anomaly Detection
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
Detecting End-Point (EP) Man-In-The-Middle (MITM) Attack based on ARP Analysis: A Machine Learning Approach
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 1 (2017) - Research Articles
Optimal Path Pair Routes through Multi-Criteria Weights in Ad Hoc Network Using the Genetic Algorithm
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 1 (2010) - Research Articles
An Adaptive Time slot Allocation for Statistical QoS guarantees in Wireless Networks using cross layer approach
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 1 (2012) - Research Articles
Multiple Secret Keys based Security for Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 3 (2015) - Surveys/ Reviews
Pitfalls in Ultralightweight RFID Authentication Protocol
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 1 (2011) - Research Articles
Wireless Network Behavior under ICMP Ping Flood DoS Attack and Mitigation Techniques
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 2 (2012) - Surveys/ Reviews
Performance Analysis of IPv6 Transition Mechanisms over MPLS
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
An algorithm for enhancing coverage and network lifetime in cluster-based Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 1 (2015) - Research Articles
IDHOCNET-A Novel Protocol Stack and Architecture for Ad hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 3 (2016) - Research Articles
An Improved Solar Low Energy Adaptive Clustering Hierarchy (IS-LEACH) Technique
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
OpenDaylight vs. Floodlight: Comparative Analysis of a Load Balancing Algorithm for Software Defined Networking
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 1 (2012) - Research Articles
Automated Intruder Detection from Image Sequences using Minimum Volume Sets
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
A multi-agent Framework for dynamic traffic management Considering Priority Link
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 3 (2018) - Research Articles
Evaluation Method for SDN Network Effectiveness in Next Generation Cellular Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
Methods for assessing the impact of bandwidth of control channels on the quality of telecommunications networks in the transmission of data packets of different types
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 2 (2009) - Research Articles
Low Loss a thermal Arrayed Waveguide Grating (AWG) Module for Passive and Active Optical Network Applications
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Research Articles
PHYSICAL LAYER SECURITY FOR WIRELESS NETWORKS BASED ON COSET CONVOLUTIONAL CODING
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
Using Quaternion Fourier Transform in Steganography Systems
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
Protecting Ownership Rights of Videos Against Digital Piracy: An Efficient Digital Watermarking Scheme
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 2 (2010) - Research Articles
An Energy Efficient Multichannel MAC Protocol for Cognitive Radio Ad Hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
Optimized Clustering Protocol for Balancing Energy in Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 3 (2018) - Research Articles
Redundancy Elimination with Coverage Preserving algorithm in Wireless Sensor Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 3 (2016) - Research Articles
Detecting Zero-day Polymorphic Worms with Jaccard Similarity Algorithm
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 1 (2013) - Research Articles
Combined-order Algorithm using Promethee Method Approach and Analytic Hierarchy Decision for Chunk Allocation in LTE Uplink Systems
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 2 (2011) - Research Articles
Modeling of Power Line Transfer of Data for Computer Simulation
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Research Articles
IoT Crawler with Behavior Analyzer at Fog layer for Detecting Malicious Nodes
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 2 (2016) - Research Articles
Relay based thermal aware and mobility support routing protocol for wireless body sensor networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 2 (2020) - Research Articles
Smart Agent and Modified Master-Backup Algorithm for Auto Switching Dynamic Host Configuration Protocol Relay through Wireless Router
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 3 (2009) - Research Articles
Analysis and Design of Printed Fractal Antennas by Using an Adequate Electrical Model
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 1 (2014) - Research Articles
Optimal Spectrum Sensing Threshold for Unequal Priors Case
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 3 (2018) - Research Articles
Mobility of Internet of Things and Fog Computing: Serious Concerns and Future Directions
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
Traffic congestion prevention system
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 3 (2010) - Research Articles
A Cross-Layer Approach for Mitigating Denial of Service Attacks: Device-Driver Packet Filter and Remote Firewalling
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 3 (2016) - Research Articles
Calculating and Evaluating Trustworthiness of Certification Authority
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 1 (2015) - Research Articles
Vehicular Networking Road Weather Information System Tailored for Arctic Winter Conditions
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
ENERGY AWARE ROUTING FOR WIRELESS SENSOR NETWORKS
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
A Privacy by Design Methodology Application in Telecom Domain
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 1 (2009) - Research Articles
A Framework for Preserving User Privacy and Ensuring QoS in Location Based Services using Non-irreversible Algorithm
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 1 (2016) - Research Articles
A Deterministic Algorithm for the Deployment of Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 3 (2019) - Research Articles
Identity Verification through Face Recognition Implemented on Raspberry Pi Framework
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 1 (2016) - Research Articles
Adoption features and approach for UWB Wireless Sensor Network based on Pilot Signal assisted MAC
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 2 (2010) - Research Articles
Enhanced Triple Umpiring System for Security and Performance Improvement in Wireless MANETS
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Surveys/ Reviews
Security of IoT in 5G Cellular Networks: A Review of Current Status, Challenges and Future Directions
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 3 (2015) - Research Articles
A Driving Path Based Opportunistic Routing in Vehicular Ad Hoc Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 3 (2018) - Research Articles
Muti-stage Key Management Scheme for Cluster based WSN
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 1 (2011) - Research Articles
Link Aware Earliest Deadline Scheduling Algorithm for WiMAX
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
High-Altitude Configuration of Non-Terrestrial Telecommunication Network using Optical Wireless Technologies
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 1 (2012) - Research Articles
QoS-aware Multipath Routing Scheme for Mobile Ad Hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
A New Approach in Expanding the Hash Size of MD5
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
A Novel Secure Patient Data Transmission through Wireless Body Area Network: Health Tele-Monitoring
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 3 (2016) - Research Articles
Energy efficient multipath routing protocol for MANET for enhancing QoS and QoE in multimedia applications
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 2 (2015) - Research Articles
Topology Optimization in Hybrid Tree/Mesh-based Peer-to-Peer Streaming System
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 2 (2014) - Surveys/ Reviews
A Comprehensive Review of Distributed Coding Algorithms for Visual Sensor Network (VSN)
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 3 (2013) - Research Articles
A Geometric Backoff Time Distribution of IEEE 802.11 DCF: An Analytical Study
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
Congestion Managed Multicast Routing in Wireless Mesh Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 3 (2009) - Research Articles
Intelligent IDS for Mobile Devices: Modeling and Prototyping
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
Handwritten Arabic Digit Recognition Using Convolutional Neural Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
Channel Propagation Characteristics on the Performance of 4G Cellular Systems from High Altitude Platforms (HAPs)
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 3 (2010) - Research Articles
The Integration of Heterogeneous Wireless Networks (IEEE 802.11/IEEE 802.16) and its QoS Analysis
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 2 (2020) - Surveys/ Reviews
Symmetric Encryption Algorithms: Review and Evaluation Study
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
Fuzzy Based Optimal QoS Constraint Services Composition in Mobile Ad Hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 3 (2013) - Research Articles
Decoding of Block Codes by using Genetic Algorithms and Permutations Set
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 2 (2017) - Research Articles
QUANTUM PHASE SHIFT FOR ENERGY CONSERVED SECURED DATA COMMUNICATION IN MANET
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
Method of Determining Trust and Protection of Personal Data in Social Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 2 (2011) - Research Articles
Performance Analysis of Two Case Studies for a Power Line Communication Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
Assisted Navigation Algorithm for Wireless Sensor Actuator and Robot Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
The method of discretization signals to minimize the fallibility of information recovery
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 3 (2016) - Research Articles
MMEDD: Multithreading Model for an Efficient Data Delivery in wireless sensor networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 3 (2011) - Research Articles
Performance Analysis of Unreliable Sensing for an Opportunistic Spectrum Sharing System
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Surveys/ Reviews
Mobile Malware Behaviour through Opcode Analysis
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
A Coalition Formation Game for Cooperative Spectrum Sensing in Cognitive Radio Network under the Constraint of Overhead
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
A New Scheme for Spreading & De-spreading in the Direct Sequence Spread Spectrum Mechanism
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
A Hybrid Graphical User Authentication Scheme in Mobile Cloud Computing Environments
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Research Articles
Adaptive Active Queue Management based on Queue Ratio of Set-point Weighting
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 2 (2017) - Research Articles
Bio-Inspired Technique:An Adaptive R?uting f?r Reliability and Energy E?iciency Method in Wireless Sens?r Netw?rks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 2 (2019) - Research Articles
Internet Traffic based Channel Selection in Multi-Radio Multi-Channel Wireless Mesh Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 1 (2010) - Research Articles
Performance Evaluation of Energy Efficient Modulation Scheme and Hop Distance Estimation for WSN
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
SE-H: A Secure and Efficient Hash Protocol for RFID System
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
SINK MOBILITY MODEL FOR WIRELESS SENSOR NETWORKS USING KOHONEN SELF-ORGANIZING MAP
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
A New Approach for DDoS attacks to discriminate the attack level and provide security for DDoS nodes in MANET
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 2 (2019) - Research Articles
Load Balancing Using Dynamic Ant Colony System Based Fault Tolerance in Grid Computing
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 1 (2011) - Research Articles
A New Protocol for Detecting Black Hole Nodes in Ad Hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
A Multilevel Scheduling MAC Protocol for Underwater Acoustic Sensor Networks(UASN)
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 1 (2017) - Research Articles
Enhanced Handover Mechanism in Long Term Evolution (LTE) Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
Investigating the effect of High Altitude Platform Positioning on Latency and Coverage of 4G Cellular Systems
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 3 (2015) - Research Articles
Applying Correlation and Regression Analysis Methods for Security Incidents Detection in the Internet of Things
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 1 (2015) - Research Articles
An Individual Node Delay Based Efficient Power Aware Routing Protocol for Wireless Heterogeneous Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 3 (2012) - Research Articles
Packet Resonance Strategy: A Spoof Attack Detection and Prevention Mechanism in Cloud Computing Environment
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 1 (2014) - Research Articles
Improved Sensing Accuracy using Enhanced Energy Detection Algorithm with Secondary User Cooperation in Cognitive Radios
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 2 (2009) - Research Articles
Toward a Gigabit Wireless Communications System
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 2 (2015) - Research Articles
GCCP - NS: Grid based Congestion Control protocol with N-Sinks in a Wireless Sensor Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 2 (2010) - Research Articles
A Proactively Maintained Quality of Service Infrastructure for Wireless Mobile Ad Hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Surveys/ Reviews
Opportunistic Networks: Present Scenario- A Mirror Review
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 2 (2011) - Research Articles
Design for 5G Mobile Network Architecture
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
Two-Time Procedure for Calculation of Carrier Frequency of Phasomodulated in Communication Systems
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
Improved Residual Dense Network for Large Scale Super-Resolution via Generative Adversarial Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
Reliability and Failure Functions of the Consecutive k-out-of-m-from-n: F Linear and Circular System
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
Dynamic Detection of Software Defects Using Supervised Learning Techniques
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
Performance analysis of black hole and worm hole attacks in MANETs
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
Ensemble Method for Mobile Malware Detection using N-Gram Sequences of System Calls
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
A Game Theoretic approach based virtual machine migration for cloud environment security
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 2 (2012) - Research Articles
Process Aware Host-based Intrusion Detection Model
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 3 (2009) - Research Articles
Performance Comparison of UMTS/WLAN Integrated Architectures with Dynamic Home Agent Assignments
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
Design a secure IoT Architecture using Smart Wireless Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 3 (2010) - Research Articles
PAPR Reduction in MIMO-OFDM Systems using Modified PTS and SLM without Side Information
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 1 (2017) - Research Articles
EEPR-OLSR: an Energy Efficient and Path Reliability protocol for proactive MANET routing
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
A High-Throughput Hardware Implementation of NAT Traversal For IPSEC VPN
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 3 (2018) - Research Articles
Energy efficient secured cluster based distributed fault diagnosis protocol for IoT
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
Power Management Strategies in Energy-Harvesting Wireless Sensor Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 2 (2020) - Research Articles
Cooperative Key Establishment Protocol for Full-Duplex Relay Systems
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 2 (2012) - Research Articles
Self-Organized Disjoint Service Placement in Future Mobile Communication Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
A Methodology for Assuring Privacy by Design in Information Systems
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 1 (2009) - Surveys/ Reviews
VoIP Performance over Different Interior Gateway Protocols
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 3 (2014) - Research Articles
Cardinality Enhancement of SAC-OCDMA Systems Using New Diagonal Double Weight Code
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 1 (2013) - Research Articles
Robust Sampling Clock Recovery Algorithm for Wideband Networking Waveform of SDR
Abstract
pdf
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
Enhancing Steganography by Image Segmentation and Multi-level Deep Hiding
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 2 (2010) - Research Articles
Asynchronous Networks and Erlang Formulas
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
Resource Allocation using Genetic Algorithm in Multimedia Wireless Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 1 (2011) - Research Articles
Throughput Parameter Optimization of Adaptive ARQ/HARQ Scheme
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 3 (2019) - Research Articles
An optimal clustering algorithm based distance-aware routing protocol for wireless sensor networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
Developing a simulated intelligent instrument to measure user behavior toward cybersecurity policies
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 3 (2013) - Research Articles
Link Quality and MAC-Overhead aware Predictive Preemptive Multipath Routing Protocol for Mobile Ad hoc Networks
Abstract
pdf
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
Dynamic Network State Learning Model for Mobility Based WMSN Routing Protocol
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
Improved Multi-Verse Optimizer Feature Selection Technique With Application To Phishing, Spam, and Denial Of Service Attacks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
An Assessment of Eclipse Bugs' Priority and Severity Prediction Using Machine Learning
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1 No. 3 (2009) - Research Articles
A Traffic Signature-based Algorithm for Detecting Scanning Internet Worms
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Efficient Clustering Protocol Based on Stochastic Matrix & MCL and Data Routing for Mobile Wireless Sensors Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 3 (2010) - Research Articles
Semi-Blind Channel Estimation and Multi-User Data Detection for Downlink MC-CDMA
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
Design and Development of Novel Hybrid Precoder for Millimeter-Wave MIMO System
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 2 (2019) - Research Articles
A New Secure Lightweight Authentication Protocol for NFC mobile Payment
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 2 (2020) - Research Articles
Fuzzy Logic-based Trusted and Power-aware Routing Protocol in Mobile Ad-hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 2 (2011) - Research Articles
Impact Of Varying Channel Model Mixtures On Radio Resource Management For The OFDMA Downlink
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 1 (2014) - Research Articles
Predictive preemptive certificate transfer in Cluster-Based Certificate Chain
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
A Novel Utility Function of Power Control Game in Multi-Channel Cognitive Femtocell Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
Quasi Real-Time Intermodulation Interference Method: Analysis and Performance
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 2 (2015) - Research Articles
Bearing Accuracy Improvement of the Amplitude Comparison Direction Finding Equipment by Analyzing the Error
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 3 (2011) - Research Articles
Message efficient global snapshot recording using a self stabilizing spanning tree in a MANET
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 1 (2017) - Research Articles
Missing Internet Traffic Reconstruction using Compressive Sampling
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 2 (2016) - Research Articles
Optimal Cluster Head in DTN Routing Hierarchical Topology (DRHT)
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Surveys/ Reviews
A CASE STUDY OF VARIOUS WIRELESS NETWORK SIMULATION TOOLS
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 2 (2019) - Research Articles
6LoWPAN Stack Model Configuration for IoT Streaming Data Transmission over CoAP
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 1 (2010) - Research Articles
Worm Spreading and Patching in Inter-vehicle Communications
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Research Articles
Slid Pairs of the Fruit-80 Stream Cipher
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
A Rate Control Model of MPEG-4 Encoder for Video Transmission over Wireless Sensor Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 1 (2012) - Research Articles
A Secure and User Privacy-Preserving Searching Protocol for Peer-to-Peer Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 1 (2017) - Research Articles
Wireless DF Relaying with Beamforming for an Unmanned Aircraft System over ??? Fading Channels
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
Delay aware optimal resource allocation in MU MIMO-OFDM using enhanced spider monkey optimization
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 1 (2015) - Research Articles
EICIDS-Elastic and Internal Cloud-based Intrusion Detection System
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3 No. 1 (2011) - Research Articles
Modeling and Analysis of Collision Avoidance MAC Protocol in Multi-Hop Wireless Ad-Hoc Network
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 3 (2012) - Research Articles
A Robust Carrier Frequency Offset Estimation Algorithm in Burst Mode Multicarrier CDMA based Ad Hoc Networks
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
FPGA Implementation of Data Flow Graphs for Digital Signal Processing Applications
Abstract
PDF
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 2 (2017) - Research Articles
Revealing the Feature Influence in HTTP Botnet Detection
Abstract
PDF