Pathan, Al-Sakib Khan
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2 No. 1 (2010) - Research Articles
A Review and Cryptanalysis of Similar Timestamp-Based Password Authentication Schemes Using Smart Cards
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
NM-LEACH: A Novel Modified LEACH Protocol to Improve Performance in WSN
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6 No. 2 (2014) - Surveys/ Reviews
On the Medium Access Control Protocols Suitable for Wireless Sensor Networks – A Survey
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 3 (2013) - Surveys/ Reviews
Strengths and Weaknesses of Prominent Data Dissemination Techniques in Wireless Sensor Networks
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 1 (2013) - Research Articles
SMART: A Subspace based Malicious Peers Detection algorithm for P2P Systems
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5 No. 2 (2013) - Surveys/ Reviews
A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks, and Remedies
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 2 (2019) - Research Articles
A Routing Algorithm for Extending Mobile Sensor Network’s Lifetime using Connectivity and Target Coverage
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 2 (2020) - Surveys/ Reviews
Cyber Security Concerns in Social Networking Service
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 3 (2016) - Research Articles
Detecting Zero-day Polymorphic Worms with Jaccard Similarity Algorithm
Abstract PDF