- Yilihamu Yaermaimaiti, Yan Tian Xing, Tusongjiang Kari. Asymmetric multi-period deep residual network face age estimation. IJCNDS, 30(2):227-242, 2024.
- Ranjan Kumar Mahapatra, Yajunath Kaliyath, N. S. V. Shet, Soumya Ranjan Mahapatro, Gnane Swarnadh Satapathi, Sankata Bhanjan Prusty, B. Shivalal Patro. A survey on wireless sensor network (applications and architecture). IJCNDS, 30(2):136-201, 2024.
- Haiyan Wang, Xinmin Li, Feiying Luo, Jiahui Li, Xiaoqiang Zhang. Subcarrier power control for URLLC communication system via multi-agent deep reinforcement learning in IoT network. IJCNDS, 30(3):374-392, 2024.
- Peng Geng, Zixin Ye, Huizhen Hao, Annan Yang, Yan Liu. Robustness of complex networks considering load and cascading failure under edge-removal attack. IJCNDS, 30(5):572-593, 2024.
- Midde Adiseshaiah, Sailaja Maruvada. A network packet classification engine for real-time applications with enhanced performance. IJCNDS, 30(2):115-135, 2024.
- Jing Li, Mohd Shahizan Othman, Hewan Chen, Lizawati Mi Yusuf. A critical review of feature selection methods for machine learning in IoT security. IJCNDS, 30(3):264-312, 2024.
- Matheus Monteiro Silveira, Maria C. M. M. Ferreira, Rafael L. Gomes. Elastic demand network slicing based on fuzzy multi-criteria. IJCNDS, 30(5):639-655, 2024.
- Flavien Donkeng Zemo, Sara Bakkali. A survey on security threats in cognitive radio networks based on cooperative spectrum sensing. IJCNDS, 30(4):433-466, 2024.
- Sandeep Chand Kumain, Maroti Deshmukh, Maheep Singh. Extended Diffie-Hellman protocol based on exponential and multiplication operations over modular arithmetic. IJCNDS, 30(4):486-499, 2024.
- Shariq Murtuza, Krishna Asawa. Detection and mitigation of link flooding-based DDoS attacks on a software defined network using network function virtualisation. IJCNDS, 30(2):202-226, 2024.