Journal: IJCNIS

Volume 9, Issue 3

0 -- 0Iman El Mir, Kandoussi el Mehdi, Mohamed Hanini, Abdelkrim Haqiq, Dong Seong Kim. A Game Theoretic approach based virtual machine migration for cloud environment security
0 -- 0Shadi Ismail Nashwan. SE-H: A Secure and Efficient Hash Protocol for RFID System
0 -- 0Magdy Ibrahim ElSharkawy. Integrating and Securing Video, Audio and Text Using Quaternion Fourier Transform
0 -- 0Emran Aljarrah. Deployment of Multi-Fuzzy Model Based Routing in RPL to Support Efficient IoT
0 -- 0Pooja Singh, Vikas Pareek, Anil K. Ahlawat. Designing an Energy Efficient Network Using Integration of KSOM, ANN and Data Fusion Techniques
0 -- 0Jhum Swain, Binod Kumar Pattanayak, Bibudhendu Pati. A New Approach for DDoS attacks to discriminate the attack level and provide security for DDoS nodes in MANET
0 -- 0Mike Yuliana, Wirawan, Suwadi. Performance Improvement of Secret Key Generation Scheme in Wireless Indoor Environment
0 -- 0Imran Khan. Performance Analysis of 5G Cooperative-NOMA for IoT-Intermittent Communication
0 -- 0Atef A. Obeidat. Hybrid Approach for Botnet Detection Using K-Means and K-Medoids with Hopfield Neural Network
0 -- 0Dina M. Omar, Ahmed M. Khedr. Optimized Clustering Protocol for Balancing Energy in Wireless Sensor Networks
0 -- 0Wael Alosaimi, Michal Zak, Khalid Al-Begain, Roobaea Alroobaea, Mehedi Masud. Economic Denial of Sustainability Attacks Mitigation in the Cloud
0 -- 0Wan Ahmad Ramzi W. Y., M. A. Faizal, Rudy Fadhlee M. D, Nur Hidayah Mohd Saudi. Revealing Influenced Selected Feature for P2P Botnet Detection
0 -- 0Selo Sulistyo, Sahirul Alam. Distributed Channel and Power Level Selection in VANET Based on SINR using Game Model
0 -- 0Husna Jamal Abdul Nasir, Ku Ruhana Ku-Mahamud, Eiji Kamioka. Enhanced Ant-Based Routing for Improving Performance of Wireless Sensor Network
0 -- 0Movva Pavani, P. Trinatha Rao. Urban Air Pollution Monitoring Using Wireless Sensor Networks: A Comprehensive Review
0 -- 0Bhupendra Kumar Gupta, Srikanta Patnaik, Ajit Kumar Nayak, Manas Kumar Mallick. Congestion Managed Multicast Routing in Wireless Mesh Network
0 -- 0Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod. State of the Art in Biometric Key Binding and Key Generation Schemes
0 -- 0Dixon Salcedo, Cesar Guerrero, Julian Guerrero. Overhead in Available Bandwidth Estimation Tools: Evaluation and Analysis
0 -- 0Amiruddin Amiruddin, Anak Agung Putri Ratna, Riri Fitri Sari. New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks
0 -- 0Anggun Fitrian Isnawati, Risanuri Hidayat, Selo Sulistyo, I. Wayan Mustika. A Novel Utility Function of Power Control Game in Multi-Channel Cognitive Femtocell Network
0 -- 0Wail Mardini, Maad Ebrahim, Mohammed Al-Rudaini. Comprehensive Performance Analysis of RPL Objective Functions in IoT Networks
0 -- 0Veeresh Poola, R. Praveen Sam, Shoba Bindhu C. Fuzzy Based Optimal QoS Constraint Services Composition in Mobile Ad Hoc Networks