Journal: IJCNIS

Volume 9, Issue 3

0 -- 0Iman El Mir, Kandoussi el Mehdi, Mohamed Hanini, Abdelkrim Haqiq, Dong Seong Kim. A Game Theoretic approach based virtual machine migration for cloud environment security
0 -- 0Shadi Ismail Nashwan. SE-H: A Secure and Efficient Hash Protocol for RFID System
0 -- 0Magdy Ibrahim ElSharkawy. Integrating and Securing Video, Audio and Text Using Quaternion Fourier Transform
0 -- 0Emran Aljarrah. Deployment of Multi-Fuzzy Model Based Routing in RPL to Support Efficient IoT
0 -- 0Pooja Singh, Vikas Pareek, Anil K. Ahlawat. Designing an Energy Efficient Network Using Integration of KSOM, ANN and Data Fusion Techniques
0 -- 0Jhum Swain, Binod Kumar Pattanayak, Bibudhendu Pati. A New Approach for DDoS attacks to discriminate the attack level and provide security for DDoS nodes in MANET
0 -- 0Mike Yuliana, Wirawan, Suwadi. Performance Improvement of Secret Key Generation Scheme in Wireless Indoor Environment
0 -- 0Imran Khan. Performance Analysis of 5G Cooperative-NOMA for IoT-Intermittent Communication
0 -- 0Atef A. Obeidat. Hybrid Approach for Botnet Detection Using K-Means and K-Medoids with Hopfield Neural Network
0 -- 0Dina M. Omar, Ahmed M. Khedr. Optimized Clustering Protocol for Balancing Energy in Wireless Sensor Networks
0 -- 0Wael Alosaimi, Michal Zak, Khalid Al-Begain, Roobaea Alroobaea, Mehedi Masud. Economic Denial of Sustainability Attacks Mitigation in the Cloud
0 -- 0Wan Ahmad Ramzi W. Y., M. A. Faizal, Rudy Fadhlee M. D, Nur Hidayah Mohd Saudi. Revealing Influenced Selected Feature for P2P Botnet Detection
0 -- 0Selo Sulistyo, Sahirul Alam. Distributed Channel and Power Level Selection in VANET Based on SINR using Game Model
0 -- 0Husna Jamal Abdul Nasir, Ku Ruhana Ku-Mahamud, Eiji Kamioka. Enhanced Ant-Based Routing for Improving Performance of Wireless Sensor Network
0 -- 0Movva Pavani, P. Trinatha Rao. Urban Air Pollution Monitoring Using Wireless Sensor Networks: A Comprehensive Review
0 -- 0Bhupendra Kumar Gupta, Srikanta Patnaik, Ajit Kumar Nayak, Manas Kumar Mallick. Congestion Managed Multicast Routing in Wireless Mesh Network
0 -- 0Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod. State of the Art in Biometric Key Binding and Key Generation Schemes
0 -- 0Dixon Salcedo, Cesar Guerrero, Julian Guerrero. Overhead in Available Bandwidth Estimation Tools: Evaluation and Analysis
0 -- 0Amiruddin Amiruddin, Anak Agung Putri Ratna, Riri Fitri Sari. New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks
0 -- 0Anggun Fitrian Isnawati, Risanuri Hidayat, Selo Sulistyo, I. Wayan Mustika. A Novel Utility Function of Power Control Game in Multi-Channel Cognitive Femtocell Network
0 -- 0Wail Mardini, Maad Ebrahim, Mohammed Al-Rudaini. Comprehensive Performance Analysis of RPL Objective Functions in IoT Networks
0 -- 0Veeresh Poola, R. Praveen Sam, Shoba Bindhu C. Fuzzy Based Optimal QoS Constraint Services Composition in Mobile Ad Hoc Networks

Volume 9, Issue 2

0 -- 0Mohammed Abdel-Azim, Hossam El-Din Salah, menas ebrahim eissa. Black Hole attack Detection using fuzzy based IDS
0 -- 0Nur Hidayah Mohd Saudi, M. A. Faizal, Siti Rahayu Selamat, Rudy Fadhlee M. D, Wan Ahmad Ramzi W. Y.. Revealing the Feature Influence in HTTP Botnet Detection
0 -- 0Magdy Ibrahim ElSharkawy. Quaternion-based Encryption/Decryption of Audio Signal Using Digital Image as Variable Key
0 -- 0Sweta Jain, Vinuraj R. CALAR: Community Aware Location Assisted Routing Framework for Delay Tolerant Networks
0 -- 0Aun Yichiet, Selvakumar Manickam, Shankar Karuppayah. A Review on Features' Robustness in High Diversity Mobile Traffic Classifications
0 -- 0Chafiq Titouna, Abdelhak Mourad Guéroui, Makhlouf Aliouat, Ado Adamou Abba Ari, Amine Adouane. Distributed Fault-Tolerant Algorithm for Wireless Sensor Networks
0 -- 0Selvi E, Shashidhara M. S. Quantum Phase Shift For Energy Conserved Secured Data Communication In Manet
0 -- 0Ahmed Saleh. Bio-Inspired Technique: An Adaptive Routing for Reliability and Energy Efficiency Method in Wireless Sensor Networks
0 -- 0Eyad Salah Taqieddin. On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols
0 -- 0Anant Ram, Manas Kumar Mishra. Mobility Adaptive Density Connected Clustering Approach in Vehicular Ad Hoc Networks
0 -- 0Franco Frattolillo. Digital Copyright Protection: Focus on Some Relevant Solutions
0 -- 0Firas AlBalas, Wail Mardini, Dua'a Bani-salameh. Optimized Job Scheduling approach based on Genetic algorithms in smart Grid environment
0 -- 0Lekha J, Padmavathi Ganapathi. Detection of illegal traffic pattern using Hybrid Improved CART and Multiple Extreme Learning Machine Approach
0 -- 0Muhammad Zeeshan, Huma Javed, Sifat Ullah. Discrete R-Contiguous bit Matching mechanism appropriateness for anomaly detection in Wireless Sensor Networks
0 -- 0Badr Benmammar, Youcef Benmouna, Asma Amraoui, Francine Krief. A parallel implementation on a multi-core architecture of a dynamic programming algorithm applied in cognitive radio ad hoc networks
0 -- 0Venifa Mini G, K. S. Angel Viji. A Comprehensive Cloud Security Model with Enhanced Key Management, Access Control and Data Anonymization Features
0 -- 0Sambhaji Sarode, Jagdish W. Bakal. PFPS: Priority-First Packet Scheduler for IEEE 802.15.4 Heterogeneous Wireless Sensor Networks

Volume 9, Issue 1

0 -- 0Rastislav Róka, Pavol Salík. Impact of Environmental Influences on Multilevel Modulation Formats at the Signal Transmission in the Optical Transmission Medium
0 -- 0Sanaa Oulaourf, Abdelfatteh Haidine, Abdelhak Aqqal, Hassan Ouahmane. Review on Radio Resource Allocation Optimization in LTE/LTE-Advanced using Game Theory
0 -- 0Doan Perdana, Favian Dewanta, Ig Prasetya Dwi Wibawa. Extending Monitoring Area of Production Plant Using Synchronized Relay Node Message Scheduling
0 -- 0Ajina A, Mydhili K. Nair. Cross Layered Network Condition Aware Mobile-Wireless Multimedia Sensor Network Routing Protocol for Mission Critical Communication
0 -- 0Lyamine Guezouli, Kamel Barka, Souheila Bouam, Abdelmadjid Zidani. IMPLEMENTATION AND OPTIMIZATION OF RWP MOBILITY MODEL IN WSNS UNDER TOSSIM SIMULATOR
0 -- 0Nyoman Gunantara, Agus Dharma. Optimal Path Pair Routes through Multi-Criteria Weights in Ad Hoc Network Using the Genetic Algorithm
0 -- 0Mohsin Khan, Majid Ashraf, Haseeb Zafar, Tufail Ahmad. Enhanced Handover Mechanism in Long Term Evolution (LTE) Networks
0 -- 0Shahid Bashir, M. Salman Khan, Khadim Ullah Jan, Sadiq Ullah. Performance Enhancement of Wearable Antenna Using High Impedance Surfaces
0 -- 0Azuan Ahmad, Norbik Bashah Idris, Mohd Nazri Kama. CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism
0 -- 0Kavitha R, Padmavathi G. Advanced Random Time Queue Blocking With Traffic Prediction For Defense Of Low-Rate Dos Attacks Against Application Servers
0 -- 0Vijaya Kumar Gurram, C. Shoba Bindu. A New Method of User Association in Wireless Mesh Networks
0 -- 0Abdelkabir Sahnoun, Ahmed Habbani, Jamal El Abbadi. EEPR-OLSR: an Energy Efficient and Path Reliability protocol for proactive MANET routing
0 -- 0Ramesh Kumar, Ayaz Hussain, Abdul Aziz, Inwhee Joe. Wireless DF Relaying with Beamforming for an Unmanned Aircraft System over κ-μ Fading Channels
0 -- 0Indrarini Dyah Irawati, Andriyan Bayu Suksmono, Ian Ian Yosef Matheus Edward. Missing Internet Traffic Reconstruction using Compressive Sampling