Journal: IJCNIS

Volume 11, Issue 3

0 -- 0May A. Alotaibi, Mohammed A. Alzain, Ben Soh, Mehedi Masud, Jehad F. Al-Amri. Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection
0 -- 0Salim el Khediri, Rehan Ullah Khan, Waleed Albattah. An optimal clustering algorithm based distance-aware routing protocol for wireless sensor networks
0 -- 0Febrian Wahyu Christanto, Susanto, Agus Priyanto. LOAD BALANCING-FAILOVER METHODS USING STATIC ROUTE WITH ADDRESS LIST, ECMP, PCC, AND NTH FOR OPTIMIZING LAN NETWORK : A COMPARISON
0 -- 0Jhon Francined Herrera Cubides, Paulo Alonso Gaona García, Carlos Enrique Montenegro Marín, Diego Mauricio Cataño, Rubén González Crespo. Security Aspects in Web of Data Based on Trust Principles. A brief of Literature Review
0 -- 0Nur Fasihah Mohd Esa, Shekh Faisal Abdul-Latip, Mohd Rizuan Baharon. A Survey of ARX-based Symmetric-key Primitives
0 -- 0Alvin Jason A. Virata, Enrique Festijo. Identity Verification through Face Recognition Implemented on Raspberry Pi Framework
0 -- 0Ali M. A. Abuagoub. IoT Security Evolution: Challenges and Countermeasures Review
0 -- 0Doan Perdana, Muhammad Imadudin, Gustommy Bisono. Performance Evaluation of Soil Substance Measurement System in Garlic Plant based on Internet of Things with Mesh Topology Network Scenario
0 -- 0Abdullah Shakir, Raed A. Alsaqour, Maha S. Abdelhaq, Amal Alhussan, Mohd Othman, Ahmed Mahdi. Novel Method of Improving Quality of Service for Voice over Internet Protocol Traffic in Mobile Ad Hoc Networks
0 -- 0Yassine El Khanboubi, Mostafa Hanoune. Exploiting Blockchains to improve Data Upload and Storage in the Cloud
0 -- 0Priyang Prakashchandra Bhatt, Bhaskar V. Thakker. Mass Removal of Botnet Attacks Using Heterogeneous Ensemble Stacking PROSIMA classifier in IoT

Volume 11, Issue 2

0 -- 0Muni Lavanya, Shoba Bindu, Vijay Kumar. Internet Traffic based Channel Selection in Multi-Radio Multi-Channel Wireless Mesh Networks
0 -- 0Khalid Saleh Aloufi. 6LoWPAN Stack Model Configuration for IoT Streaming Data Transmission over CoAP
0 -- 0Amiruddin Amiruddin, Anak Agung Putri Ratna, Riri Fitri Sari. Systematic Review of Internet of Things Security
0 -- 0Mohammad Equebal Hussain, Mohammed Qayyum, Mohammad Rashid Hussain, Rashid Hussain. Effective and Secure vWSN Applications in a Virtualized Cloud Computing Environment
0 -- 0Rakesh K. Kadu, Dattatraya S. Adane. Hardware Implementation of Efficient Elliptic Curve Scalar Multiplication using Vedic Multiplier
0 -- 0Ravindra S, Siddesh G. K. Distance Based Power Control for D2D Communication in LTE-Advanced Networks
0 -- 0Saufi Bukhari, Ku Ruhana Ku-Mahamud, Hiroaki Morino. Load Balancing Using Dynamic Ant Colony System Based Fault Tolerance in Grid Computing
0 -- 0Kalpana Murugan, Al-Sakib Khan Pathan. A Routing Algorithm for Extending Mobile Sensor Network's Lifetime using Connectivity and Target Coverage
0 -- 0Reham Abdellatif Abouhogail. A New Secure Lightweight Authentication Protocol for NFC mobile Payment
0 -- 0Zouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El Omri, Mohammed Rida. Intelligent and Improved Self-Adaptive Anomaly based Intrusion Detection System for Networks

Volume 11, Issue 1

0 -- 0Esmael Verano Maliberan. Modified SHA1: A Hashing Solution to Secure Web Applications through Login Authentication
0 -- 0Mohammed Falah Abood Salman, Leili Farzinvash. A Hybrid Algorithm for Reliable and Energy-efficient Data Gathering in Wireless Sensor Networks
0 -- 0Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang. Efficient and Secure ECDSA Algorithm and its Applications: A Survey
0 -- 0Rafat Ahmed Alhanani, Jaafar Abouchabaka, Najat Rafalia. CDS-MIP: CDS-based Multiple Itineraries Planning for mobile agents in wireless sensor network
0 -- 0Zheng Wei Clement Chan, Chuah Chai Wen, Janaka Alawatugoda. Review on Leakage Resilient Key Exchange Security Model
0 -- 0Mohamed El Ghazouani, Moulay Ahmed El Kiram, Er-Rajy Latifa. Blockchain & Multi-Agent System: A New Promising Approach for Cloud Data Integrity Auditing with Deduplication
0 -- 0Bongisizwe Erasmus Buthelezi, Maredi Mphahlele, Deon Du Plessis, Solly Maswikaneng, Topside E. Mathonsi. ZigBee Healthcare Monitoring System for Ambient Assisted Living Environments
0 -- 0Mohammed Alsaedi. Image Encryption and Decryption Using Chua's Circuits
0 -- 0Hamza Toulni, Mounia Miyara, Benayad Nsiri, Mohcine Boudhane. Traffic congestion prevention system
0 -- 0Zouhair Chiba. New Anomaly Network Intrusion Detection System in Cloud Environment Based on Optimized Back Propagation Neural Network Using Improved Genetic Algorithm
0 -- 0Muhammad Biben Triadi, Doan Perdana, Rendy Munadi, Wenzao Li. A New Variant of Game Theory Based Decision Making (GTDM) Algorithm Routing Protocols to Improve Energy Efficiency on Vehicular Delay Tolerant Network (VDTN)
0 -- 0Dina M. Omar, Ahmed Khedr. SEPCS: Prolonging Stability Period of Wireless Sensor Networks using Compressive Sensing
0 -- 0Nayab Taj, Mohammad Haseeb Zafar, Shakeel Ahmad Waqas, Humaira Rehman, Madini O. Alassafi, Imran Khan 0006. Smart Relay Selection Scheme Based on Fuzzy Logic with Optimal Power Allocation and Adaptive Data Rate Assignment
0 -- 0Felomino Porras Alba, Enrique D. Festijo, Ruji P. Medina. A Distance-Based Data-Mule Scheduling Technique for Lesser Nodal Delay in Wireless Sensor Network
0 -- 0Deris Stiawan, Diky Aryandi, Ahmad Heryanto, Tri Wanda Septian, Farkhana Muchtar, Mohammad Yazid Bin Idris, Rahmat Budiarto. Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method
0 -- 0Ahmed Jedidi. Workload Cluster Balance Algorithm to Improve Wireless Sensor Network Performance
0 -- 0Farizah Yunus. A Rate Control Model of MPEG-4 Encoder for Video Transmission over Wireless Sensor Network
0 -- 0Amjad Yosef Hendi, Majed O. Dwairi, Ziad Abdulkareem Al-Qadi, Mohamed S. Soliman. A NOVEL SIMPLE AND HIGHLY SECURE METHOD FOR DATA ENCRYPTION-DECRYPTION
0 -- 0Gabriel Vasconcelos, Rodrigo Sanches Miani, Vitor Guizlini, Jefferson Souza. Evaluation of DoS attacks on Commercial Wi-Fi-Based UAVs
0 -- 0Mohammed Saber, Abdessamad El Rharras, Rachid Saadane, Hatim Kharraz-Aroussi, Mohamed Wahbi. Artificial Neural Networks, Support Vector Machine And Energy Detection For Spectrum Sensing Based On Real Signals
0 -- 0Dalveer Kaur, Neeraj Kumar. Dexterity for Channel Capacity Enhancement in MU-MIMO by Abrogating Interference
0 -- 0Alaa Al-Nusirat, Feras Hanandeh, Mohammad Kamel Kharabsheh, Mahmoud Al-Ayyoub, Nahla Al-dhfairi. Dynamic Detection of Software Defects Using Supervised Learning Techniques
0 -- 0A. Basnet, Abeer Alsadoon, P. W. C. Prasad, Omar Hisham Alsadoon, Linh Pham, Amr Elchouemi. A Novel Secure Patient Data Transmission through Wireless Body Area Network: Health Tele-Monitoring
0 -- 0Karim Benzidane, Saad Khoudali, Leila Fetjah, Said Jai-Andaloussi, Abderrahim Sekkaki. Application-based authentication on an inter-VM traffic in a Cloud environment