• Home
  • Login
  • Register

HOME / ENGINEERING AND TECHNOLOGY / INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND INFORMATION SECURITY (IJCNIS) / Volume 8 / ISSUE NO 3

INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND INFORMATION SECURITY (IJCNIS)

A collaborative framework for intrusion detection (C-NIDS) in Cloud computing

Author(s): Zayed Al Haddad, Mostafa Hanoune, Abdelaziz Mamouni

Keyword(s): Security, Cloud Computing, NIDS, Cloud based IDS, Virtual infrastructure

Abstract | Download PDF | Website Link

Calculating and Evaluating Trustworthiness of Certification Authority

Author(s): Zakia El uahhabi, Hanan El bakkali

Keyword(s): PKI, certificate authority, trust level, reputation, certificate policy, X.509 certificate

Abstract | Download PDF | Website Link

Energy efficient multipath routing protocol for MANET for enhancing QoS and QoE in multimedia applications

Author(s): V.Sowmya Devi, Nagaratna P Hegde

Keyword(s): Mobile ad hoc network (MANET), Multipath routing, clustering, Cluster head (CH), Super cluster head (SCH), Particle swarm optimization (PSO), Quality of Service (QoS), Quality of experience (QoE), Network simulator2 (NS-2)

Abstract | Download PDF | Website Link

Performance Evaluation of LTE Random Access Procedure under Distributed Location Data Mining for Road Traffic Monitoring

Author(s): Ruki Harwahyu, Misbahuddin , Riri Fitri Sari

Keyword(s): Random Access, LTE, 4G, RACH, Backoff, Location service

Abstract | Download PDF | Website Link

MMEDD: Multithreading Model for an Efficient Data Delivery in wireless sensor networks

Author(s): Blaise Omer Yenke, Damien Wohwe Sambo, Ado Adamou Abba Ari, Abdelhak Gueroui

Keyword(s): Multithreading, Multitasking, Protothreads, WSNs, Cooja, MMEDD

Abstract | Download PDF | Website Link

Energy Aware Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks

Author(s): S. M. Kamruzzaman, Xavier Fernando, Mohammad Jaseemuddin

Keyword(s): Spectrum, energy aware, Multipath routing, Cognitive radio, ad hoc networks, cognitive user, primary user

Abstract | Download PDF | Website Link

DPCA: Dual Phase Cloud Infrastructure Authentication

Author(s): R. Thandeeswaran, M A Saleem Durai

Keyword(s): Dempster Shafer approach, Authentication, Security, CAPTCHA

Abstract | Download PDF | Website Link

Detecting Zero-day Polymorphic Worms with Jaccard Similarity Algorithm

Author(s): Malak Abdullah I. Almarshad, Mohssen M. Z. E. Mohammed, Al-Sakib Khan Pathan

Keyword(s): Algorithm, Attack, Internet, Matching, Mobile, Polymorphic, Signature, String, Worm, Zero-day

Abstract | Download PDF | Website Link

Recommendations Based QoS Trust Aggregation and Routing in Mobile Adhoc Networks

Author(s): Nageswararao Sirisala, C.Shoba Bindu

Keyword(s): Quality of Service, Trust, Aggregation, Mobile Adhoc Network

Abstract | Download PDF | Website Link

An Improved Solar Low Energy Adaptive Clustering Hierarchy (IS-LEACH) Technique

Author(s): Khalid M. Al-Smoul, Thamer A. Al-Rawashdeh, Ali A. Al-Dahoud

Keyword(s): WSNs, LEACH, and Solar Energy

Abstract | Download PDF | Website Link

Security and Privacy Issues in IoT

Author(s): Aqeel-ur-Rehman , Sadiq Ur Rehman, Iqbal Uddin Khan, Muzaffar Moiz, Sarmad Hasan

Keyword(s): Security, Privacy, IoT, Authentication, Access Control, Identification

Abstract | Download PDF | Website Link

cat

x

Top 10 Authors of the Journal

  • Hatim Kharraz Aroussi
  • Rachid Saadane
  • Mohammed Wahbi
  • Mohammed Saber
  • Abdessamad El Rharras
  • Maredi Mphahlele
  • Bongisizwe Erasmus Buthelezi
  • Topside Mathonsi
  • Solly Maswikaneng
  • Deon Deon Du Plessis

About PRDB.pk

Pakistan Research Database helps individuals, professionals and institutions to access all research published in Pakistan at one platform.

  • Blog
  • CareerGuidance
  • eAdmissions
  • About Us
  • Work for PRDB
  • Contact Us
  • Privacy Policy
  • Copyright Policy
  • End User Terms