• Home
  • Login
  • Register

HOME / ENGINEERING AND TECHNOLOGY / INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND INFORMATION SECURITY (IJCNIS) / Volume 9 / ISSUE NO 2

INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND INFORMATION SECURITY (IJCNIS)

Discrete R-Contiguous bit Matching mechanism appropriateness for anomaly detection in Wireless Sensor Networks

Author(s): M. Zeeshan, Huma Javed, Sifat Ullah

Keyword(s): Wireless Sensor Networks, R-Contiguous bit matching Security, Negative Selection, Attack Detection

Abstract | Download PDF | Website Link

Detection of illegal traffic pattern using Hybrid Improved CART and Multiple Extreme Learning Machine Approach

Author(s): J. Lekha, Padmavathi Ganapathi

Keyword(s): Anomaly detection, misuse detection, Traffic pattern, hybrid approach

Abstract | Download PDF | Website Link

Optimized Job Scheduling approach based on Genetic algorithms in smart Grid environment

Author(s): Firas Albalas, Wail Mardini, Dua'a Bani-salameh

Keyword(s): Smart Grid, Job Scheduling, Genetic Algorithms, Sensor Networks

Abstract | Download PDF | Website Link

QUANTUM PHASE SHIFT FOR ENERGY CONSERVED SECURED DATA COMMUNICATION IN MANET

Author(s): E.Selvi , M. S. Shashidhara

Keyword(s): Mobile ad hoc network (MANET), Quantum phase shift (QPS), Energy conservation, Intrusion Detection Systems (IDS), Dynamic source routing (DSR) protocol

Abstract | Download PDF | Website Link

Black Hole attack Detection using fuzzy based IDS

Author(s): Mohammed Abdel-Azim, Hossam El-Din Salah, Menas Ibrahim

Keyword(s): Black Hole Attack, ANFIS, GA, FIS

Abstract | Download PDF | Website Link

A parallel implementation on a multi-core architecture of a dynamic programming algorithm applied in cognitive radio ad hoc networks

Author(s): Badr Benmammar, Youcef Benmouna, Asma Amraoui, Francine Krief

Keyword(s): Parallel computing, dynamic programming, cuckoo search, cognitive radio ad hoc networks

Abstract | Download PDF | Website Link

CALAR: Community Aware Location Assisted Routing Framework for Delay Tolerant Networks

Author(s): Sweta Jain, Vinuraj.R

Keyword(s): DTN, VANET, Location based, Community based

Abstract | Download PDF | Website Link

Quaternion-based Encryption/Decryption of Audio Signal Using Digital Image as Variable Key

Author(s): M.I.Khalil

Keyword(s): Quaternions, Cryptography, Symmetric, Asymmetric, Encryption, Decryption, SIMULINK

Abstract | Download PDF | Website Link

Mobility Adaptive Density Connected Clustering Approach in Vehicular Ad Hoc Networks

Author(s): Anant Ram, Manas Kumar Mishra

Keyword(s): Clustering, VANETs, Cluster Head, Cluster Member, Relative velocity

Abstract | Download PDF | Website Link

On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols

Author(s): Eyad Taqieddin

Keyword(s): Authentication, Cryptography, cyclic redundancy check codes, Information Security, RFID tags

Abstract | Download PDF | Website Link

Distributed Fault-Tolerant Algorithm for Wireless Sensor Networks

Author(s): Chafiq Titouna, Mourad Gueroui, Makhlouf Aliouat, Ado Adamou Abba Ari, Adouane Amine

Keyword(s): Wireless Sensor Networks, fault tolerance, connectivity restoration

Abstract | Download PDF | Website Link

Bio-Inspired Technique:An Adaptive Rοuting fοr Reliability and Energy Efficiency Method in Wireless Sensοr Netwοrks

Author(s): Ahmed M. Shamsan Saleh

Keyword(s): Reliability, Energy Efficient, Link Failure, Swarm Intelligence, Ant Cοlοny

Abstract | Download PDF | Website Link

PFPS: Priority-First Packet Scheduler for IEEE 802.15.4 Heterogeneous Wireless Sensor Networks

Author(s): Sambhaji Sarode, Jagdish Bakal

Keyword(s): Wireless sensor networks, priority-based data delivery, buffer management, packet scheduling, heterogeneous traffic flows

Abstract | Download PDF | Website Link

A Comprehensive Cloud Security Model with Enhanced Key Management, Access Control and Data Anonymization Features

Author(s): G.Venifa Mini, K. S. Angel Viji

Keyword(s): Key Management, Access Control, Anonymization, policy, cloud

Abstract | Download PDF | Website Link

Revealing the Feature Influence in HTTP Botnet Detection

Author(s): Nur Hidayah M. S, Faizal M. A, Siti Rahayu Selamat, Rudy Fadhlee M. D, Wan Ahmad Ramzi W. Y

Keyword(s): Feature Selection, Botnet, HTTP Botnet, Statistical Approaches

Abstract | Download PDF | Website Link

Digital Copyright Protection: Focus on Some Relevant Solutions

Author(s): Franco Frattolillo

Keyword(s): digital copyright protection, watermarking protocols, digital rights management

Abstract | Download PDF | Website Link

A Review on Features’ Robustness in High Diversity Mobile Traffic Classifications

Author(s): Yichiet Aun, Selvakumar Manickam, Shankar Karuppayah

Keyword(s): Traffic classification, Survey, Protocol identification, Features & Signature, Payload, Statistical, Application profiling

Abstract | Download PDF | Website Link

cat

x

Top 10 Authors of the Journal

  • Hatim Kharraz Aroussi
  • Rachid Saadane
  • Mohammed Wahbi
  • Mohammed Saber
  • Abdessamad El Rharras
  • Maredi Mphahlele
  • Bongisizwe Erasmus Buthelezi
  • Topside Mathonsi
  • Solly Maswikaneng
  • Deon Deon Du Plessis

About PRDB.pk

Pakistan Research Database helps individuals, professionals and institutions to access all research published in Pakistan at one platform.

  • Blog
  • CareerGuidance
  • eAdmissions
  • About Us
  • Work for PRDB
  • Contact Us
  • Privacy Policy
  • Copyright Policy
  • End User Terms