Journal: IJMCMC

Volume 6, Issue 4

1 -- 19Jianhua Fan, Qiping Wang, Xianglin Wei, Tongxiang Wang. Jammer Location-Oriented Noise Node Elimination Method for MHWN
20 -- 35Yangguang Liu, Yangming Zhou, Shiting Wen, Chaogang Tang. A Strategy on Selecting Performance Metrics for Classifier Evaluation
36 -- 55Guomin Zhang, Zhan-feng Wang, Rui Wang, Na Wang, Chang-you Xing. What is New about the Internet Delay Space?
56 -- 72Qinghong Yang, Xiangquan Hu, Zhichao Cheng, Kang Miao. Machine Learning Based Prediction and Prevention of Malicious Inventory Occupied Orders
73 -- 97Evgenia Novikova, Igor V. Kotenko, Evgenii Fedotov. Interactive Multi-View Visualization for Fraud Detection in Mobile Money Transfer Services
98 -- 114Konstantin Borisenko, Ivan Kholod, Andrey Shorov. Framework for Infrastructure Attack Modeling in Hybrid Networks

Volume 6, Issue 3

1 -- 21Saeed-ur Rehman, Shafiq Alam, Iman Tabatabaei Ardekani. An Overview of Radio Frequency Fingerprinting for Low-End Devices
22 -- 55Kan Chen, Bala Natarajan. MIMO-Based Secret Key Generation Strategies: Rate Analysis
56 -- 74E. Prince Edward. A Context Transfer Model for Secure Handover in WiMAX/LTE Integrated Networks
75 -- 105Wasan Shaker Awad, Hanin Mohammed Abdullah. Improving the Security of Storage Systems: Bahrain Case Study

Volume 6, Issue 2

1 -- 12Hirotsugu Matsukida, Yuta Mieno, Hiroyuki Fujioka. Reconstructing Handwriting Character Font Models with Incorrect Stroke Order
13 -- 21Shinji Sakamoto, Algenti Lala, Tetsuya Oda, Vladi Kolici, Leonard Barolli, Fatos Xhafa. Application of WMN-SA Simulation System for Node Placement in Wireless Mesh Networks: A Case Study for a Realistic Scenario
22 -- 32Guorui Sheng, Bo Yang. An Improved Counter-Forensic Algorithm to Erase the JPEG Compression Artifacts
33 -- 49Shigang Liu, Yali Peng, Guoyong Qiu, Xuanwen Hao. A Local Statistical Information Active Contour Model for Image Segmentation
50 -- 67Alba Amato, Salvatore Venticinque, Beniamino Di Martino. A Distributed and Scalable Solution for Applying Semantic Techniques to Big Data
68 -- 77Jyh-Horng Wen, Jheng-Sian Li, Hsiang-Shan Hou, Cheng-Ying Yang. Relay Selection Scheme for Cooperative Communication Systems in Fixed Decode-and-Forward Mode

Volume 6, Issue 1

1 -- 16Bouchra Frikh, Brahim Ouhbi. Web Algorithms for Information Retrieval: A Performance Comparative Study
17 -- 53Stevan Novakov, Chung-Horng Lung, Ioannis Lambadaris, Nabil Seddigh. A Hybrid Technique Using PCA and Wavelets in Network Traffic Anomaly Detection
54 -- 67Tarik Mountassir, Bouchaib Nassereddine, Abdelkrim Haqiq, Samir Bennani. Optimal Channel Assignment Algorithm for Least Interfered Wireless Mesh Networks