, Morocco
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 15 No. 4 (2023) - Research Articles
Named Multipath Depth-First Search: An SDN-based Routing Strategy for Efficient Failure Handling and Content Delivery in NDN
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 2 (2012) - Research Articles
Impact of queue buffer size awareness on single and multi service real-time routing protocols for WSNs
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 2 (2012) - Research Articles
UWB Indoor Radio Propagation Modelling in Presence of Human Body Shadowing Using Ray Tracing Technique
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4 No. 3 (2012) - Research Articles
Queue Length and Mobility aware Routing Protocol for Mobile Ad hoc Network
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 3 (2013) - Research Articles
Decoding of Block Codes by using Genetic Algorithms and Permutations Set
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 1 (2014) - Research Articles
QoS-VNS-CS: QoS constraints Core Selection Algorithm based on Variable Neighborhood Search Algorithm
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 3 (2014) - Research Articles
A fuzzy-based QoS Maximization protocol for WiFi Multimedia (IEEE 802.11e) Ad hoc Networks
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 1 (2015) - Research Articles
A dynamic study with side channel against An Identification Based Encryption
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 3 (2015) - Research Articles
Improved IDMA for Multiple Access of 5G
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No. 2 (2015) - Research Articles
Cooperative Trust Framework for Cloud Computing Based on Mobile Agents
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 2 (2016) - Research Articles
Optimal Cluster Head in DTN Routing Hierarchical Topology (DRHT)
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 2 (2016) - Research Articles
Relay based thermal aware and mobility support routing protocol for wireless body sensor networks
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 3 (2016) - Research Articles
Calculating and Evaluating Trustworthiness of Certification Authority
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 3 (2016) - Research Articles
A collaborative framework for intrusion detection (C-NIDS) in Cloud computing
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 1 (2017) - Research Articles
EEPR-OLSR: an Energy Efficient and Path Reliability protocol for proactive MANET routing
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 1 (2017) - Surveys/ Reviews
Review on Radio Resource Allocation Optimization in LTE/LTE-Advanced using Game Theory
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
A Game Theoretic approach based virtual machine migration for cloud environment security
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Determination of Itinerary Planning for Multiple Agents in Wireless Sensor Networks
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Multipoint Relay Selection based on Stability of Spatial Relation in Mobile Ad hoc Networks
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 2 (2018) - Research Articles
Fuzzy Logic based Intrusion Detection System against Black Hole Attack in Mobile Ad Hoc Networks
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
Artificial Neural Networks, Support Vector Machine And Energy Detection For Spectrum Sensing Based On Real Signals
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
Traffic congestion prevention system
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 3 (2018) - Research Articles
Security based partner selection in Inter-organizational workflow systems
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
New Anomaly Network Intrusion Detection System in Cloud Environment Based on Optimized Back Propagation Neural Network Using Improved Genetic Algorithm
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 2 (2019) - Research Articles
Intelligent and Improved Self-Adaptive Anomaly based Intrusion Detection System for Networks
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
Application-based authentication on an inter-VM traffic in a Cloud environment
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
Blockchain & Multi-Agent System: A New Promising Approach for Cloud Data Integrity Auditing with Deduplication
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
CDS-MIP: CDS-based Multiple Itineraries Planning for mobile agents in wireless sensor network
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 3 (2019) - Research Articles
Exploiting Blockchains to improve Data Upload and Storage in the Cloud
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Surveys/ Reviews
A Classification of non-Cryptographic Anonymization Techniques Ensuring Privacy in Big Data
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Research Articles
Offloading Decisions in a Mobile Edge Computing Node with Time and Energy Constraints
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Research Articles
A New Objective Function Based on Additive Combination of Node and Link Metrics as a Mechanism Path Selection for RPL Protocol
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 2 (2020) - Research Articles
PERFORMANCE COMPARISON OF NEW DESIGNS OF CHIEN SEARCH AND SYNDROME BLOCKS FOR BCH AND REED SOLOMON CODES
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 2 (2020) - Research Articles
Image malware detection using deep learning
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
Energy and Processing Time Efficiency for an Optimal Offloading in a Mobile Edge Computing Node
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
Rapid Learning Optimization Approach for Battery Recovery-Aware Embedded System Communications
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
Power Management Strategies in Energy-Harvesting Wireless Sensor Networks
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
A Methodology for Assuring Privacy by Design in Information Systems
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
Modeling, Development and Analysis Performance of an Intelligent Control of Photovoltaic System by Fuzzy Logic approach for Maximum Power Point Tracking
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
Design, optimization and Real Time implementation of a new Embedded Chien Search Block for Reed-Solomon (RS) and Bose-Chaudhuri-Hocquenghem (BCH) codes on FPGA Board
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
A Privacy by Design Methodology Application in Telecom Domain
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
A New Data Deletion Scheme for a Blockchain-based De-duplication System in the Cloud
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
A multi-agent Framework for dynamic traffic management Considering Priority Link
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
An improved Framework for Biometric Database’s privacy
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
A Like ELGAMAL Cryptosystem But Resistant To Post-Quantum Attacks
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
Automatic Building of a Powerful IDS for The Cloud Based on Deep Neural Network by Using a Novel Combination of Simulated Annealing Algorithm and Improved Self- Adaptive Genetic Algorithm
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 3 (2013) - Research Articles
A Geometric Backoff Time Distribution of IEEE 802.11 DCF: An Analytical Study
Abstract PDF