Journal: IJCNIS

Volume 9, Issue 2

0 -- 0Mohammed Abdel-Azim, Hossam El-Din Salah, menas ebrahim eissa. Black Hole attack Detection using fuzzy based IDS
0 -- 0Nur Hidayah Mohd Saudi, M. A. Faizal, Siti Rahayu Selamat, Rudy Fadhlee M. D, Wan Ahmad Ramzi W. Y.. Revealing the Feature Influence in HTTP Botnet Detection
0 -- 0Magdy Ibrahim ElSharkawy. Quaternion-based Encryption/Decryption of Audio Signal Using Digital Image as Variable Key
0 -- 0Sweta Jain, Vinuraj R. CALAR: Community Aware Location Assisted Routing Framework for Delay Tolerant Networks
0 -- 0Aun Yichiet, Selvakumar Manickam, Shankar Karuppayah. A Review on Features' Robustness in High Diversity Mobile Traffic Classifications
0 -- 0Chafiq Titouna, Abdelhak Mourad Guéroui, Makhlouf Aliouat, Ado Adamou Abba Ari, Amine Adouane. Distributed Fault-Tolerant Algorithm for Wireless Sensor Networks
0 -- 0Selvi E, Shashidhara M. S. Quantum Phase Shift For Energy Conserved Secured Data Communication In Manet
0 -- 0Ahmed Saleh. Bio-Inspired Technique: An Adaptive Routing for Reliability and Energy Efficiency Method in Wireless Sensor Networks
0 -- 0Eyad Salah Taqieddin. On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols
0 -- 0Anant Ram, Manas Kumar Mishra. Mobility Adaptive Density Connected Clustering Approach in Vehicular Ad Hoc Networks
0 -- 0Franco Frattolillo. Digital Copyright Protection: Focus on Some Relevant Solutions
0 -- 0Firas AlBalas, Wail Mardini, Dua'a Bani-salameh. Optimized Job Scheduling approach based on Genetic algorithms in smart Grid environment
0 -- 0Lekha J, Padmavathi Ganapathi. Detection of illegal traffic pattern using Hybrid Improved CART and Multiple Extreme Learning Machine Approach
0 -- 0Muhammad Zeeshan, Huma Javed, Sifat Ullah. Discrete R-Contiguous bit Matching mechanism appropriateness for anomaly detection in Wireless Sensor Networks
0 -- 0Badr Benmammar, Youcef Benmouna, Asma Amraoui, Francine Krief. A parallel implementation on a multi-core architecture of a dynamic programming algorithm applied in cognitive radio ad hoc networks
0 -- 0Venifa Mini G, K. S. Angel Viji. A Comprehensive Cloud Security Model with Enhanced Key Management, Access Control and Data Anonymization Features
0 -- 0Sambhaji Sarode, Jagdish W. Bakal. PFPS: Priority-First Packet Scheduler for IEEE 802.15.4 Heterogeneous Wireless Sensor Networks