• Home
  • Login
  • Register

HOME / ENGINEERING AND TECHNOLOGY / INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND INFORMATION SECURITY (IJCNIS) / Volume 10 / ISSUE NO 3

INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND INFORMATION SECURITY (IJCNIS)

A Routing Delay Predication Based on Packet Loss and Explicit Delay Acknowledgement for Congestion Control in MANET

Author(s): Y. Narasimha Reddy, P V S. Srinivas

Keyword(s): Routing, Delay prediction, Packet Loss, Rate control, EDA, Congestion

Abstract | Download PDF | Website Link

Redundancy Elimination with Coverage Preserving algorithm in Wireless Sensor Network

Author(s): Shobha Biradar, Mallikarjuna Shastry

Keyword(s): Coverage, Random Deployment, Redundancy, Sensor Nodes, Wireless sensor network

Abstract | Download PDF | Website Link

Security based partner selection in Inter-organizational workflow systems

Author(s): Asmaa El kandoussi, Hanan Elbakkali

Keyword(s): Inter-Organizational Workflow Systems, Security, Access Control, Task assignment, Partner Selection

Abstract | Download PDF | Website Link

Evaluation Method for SDN Network Effectiveness in Next Generation Cellular Networks

Author(s): Jamil S. Al Azzeh, Abdelwadood Mesleh, Zhengbing Hu, Roman Odarchenko, Sergiy Gnatyuk

Keyword(s): SDN networks, architecture, management level structure, 5G mobile, Quality of Service, openFlow

Abstract | Download PDF | Website Link

Enhancing the Performance of the Advanced Encryption Standard (AES) Algorithm Using Multiple Substitution Boxes

Author(s): Felicisimo V. Wenceslao, Jr

Keyword(s): AES algorithm, S-box, Cryptography, Affine Transformation

Abstract | Download PDF | Website Link

An Improved Fully Homomorphic Encryption Scheme for Cloud Computing

Author(s): Mohd Rizuan Baharon, Qi Shi, Mohd Faizal Abdollah, S.M.Warusia Mohamed S.M.M Yassin, Ariff Idris

Keyword(s): Fully Homomorphic Encryption Scheme, Cloud Computing, Integers, Symmetric Encryption Scheme, Asymmetric Encryption Scheme

Abstract | Download PDF | Website Link

MODIFIED MULTI-LEVEL STEGANOGRAPHY TO ENHANCE DATA SECURITY

Author(s): Shadi Elshare, Nameer N. EL-Emam

Keyword(s): Steganography, Multi-level steganography, Bee Colony Algorithm, least Significant Bit, Image Smoothing, Segmentation Image

Abstract | Download PDF | Website Link

A New Distributed Intrusion Detection System Based on Multi-Agent System for Cloud Environment

Author(s): Omar Achbarou, My Ahmed El Kiram, Outmane Bourkoukou, Salim Elbouanani

Keyword(s): Cloud Computing, intrusion detection system, Distributed system, Multi-Agent Systems, Mobile agent

Abstract | Download PDF | Website Link

Mobility of Internet of Things and Fog Computing: Serious Concerns and Future Directions

Author(s): Tariq Ahamed Ahanger, Usman Tariq, Muneer Nusir

Keyword(s): IoT, Fog Computing, 5G, Mobility, Security

Abstract | Download PDF | Website Link

Energy efficient secured cluster based distributed fault diagnosis protocol for IoT

Author(s): Tabassum Ara, M. Prabhkar, Pritam Gajkumar Shah

Keyword(s): WSN, IoT, Cipher Blocks; fault diagnsis, Cryptography

Abstract | Download PDF | Website Link

Node Activities Learning(NAL)Approach to Build Secure and Privacy-Preserving Routing in Wireless Sensor Networks

Author(s): K. Ramesh Rao, S. N. Tirumala Rao, P. Chenna Reddy

Keyword(s): Node Activities, Learning, Secure routing, Privacy, Wireless sensor networks, NA

Abstract | Download PDF | Website Link

Muti-stage Key Management Scheme for Cluster based WSN

Author(s): R Vijaya Saraswathi, Dr. L Padma Sree, Dr. K Anuradha

Keyword(s): WSN Secured Communication, Key Management, Key Authentication, Homomorphic Encryption

Abstract | Download PDF | Website Link

BotCap: Machine Learning Approach for Botnet Detection Based on Statistical Features

Author(s): Mohammed S. Gadelrab, Muhammad ElSheikh, Mahmoud A. Ghoneim, Mohsen Rashwan

Keyword(s): Security, Botnet, Botware, Malware Analysis, Malware Detection, machine learning

Abstract | Download PDF | Website Link

State of the Art Intrusion Detection System for Cloud Computing

Author(s): Azuan Ahmad, Wan Shafiuddin Zainudin, Mohd Nazri Kama, Norbik Bashah Idris, Madihah Mohd Saudi

Keyword(s): Cloud Computing, intrusion detection system, Virtual Machine, Grid Computing, Artificial Immune System

Abstract | Download PDF | Website Link

Available Bandwidth Estimation Tools Metrics, Approaches and Performance

Author(s): Dixon Salcedo, Cesar D. Guerrero, Roberto Martinez

Keyword(s): Internet measurement tools, Available bandwidth estimation, Network throughput

Abstract | Download PDF | Website Link

cat

x

Top 10 Authors of the Journal

  • Hatim Kharraz Aroussi
  • Rachid Saadane
  • Mohammed Wahbi
  • Mohammed Saber
  • Abdessamad El Rharras
  • Maredi Mphahlele
  • Bongisizwe Erasmus Buthelezi
  • Topside Mathonsi
  • Solly Maswikaneng
  • Deon Deon Du Plessis

About PRDB.pk

Pakistan Research Database helps individuals, professionals and institutions to access all research published in Pakistan at one platform.

  • Blog
  • CareerGuidance
  • eAdmissions
  • About Us
  • Work for PRDB
  • Contact Us
  • Privacy Policy
  • Copyright Policy
  • End User Terms