Author(s): Atef Ahmed Obeidat
Keyword(s): Botnet, K-Means, K-Medoids, Hopfield, Neural Network, clustering
Author(s): Imran Khan
Keyword(s): 5G, NOMA, IoT, DCS, Cooperative Relaying
Author(s): Wail Mardini, Maad Ebrahim, Mohammed Al-Rudaini
Keyword(s): Internet of Things, RPL, Objective Function, OF0, MRHOF, Cooja, ConikiOS
Author(s): Iman El Mir, El Mehdi Kandoussi, Mohamed Hanin, Abdelkrim Haqiq, Dong Seong Kim
Keyword(s): Cloud Computing security, VM migration, Attack Graph, Game Theory, Nash equilibrium
Author(s): Shadi Nashwan
Author(s): Dina M. Omar, Ahmed M. Khedr, Dharma P. Agrawal
Author(s): Amiruddin , Anak Agung Putri Ratna, Riri Fitri Sari
Author(s): Husna Jamal Abdul Nasir, Ku Ruhana Ku-Mahamud, Eiji Kamioka
Author(s): Dixon Salcedo, Julián Guerrero, Cesar D. Guerrero
Author(s): Anggun Fitrian Isnawati, Risanuri Hidayat, Selo Sulistyo, I Wayan Mustika
Author(s): M. I. Khalil
Keyword(s): Quaternions, Cryptography, Multimedia Synchronization, Encryption, Decryption
Author(s): Wael Alosaimi, Michal Zak, Khalid Al-Begain, Roobaea Alroobaea, Mehedi Masud
Author(s): Selo Sulistyo, Sahirul Alam
Author(s): Jhum Swain, Binod Kumar Pattanayak, Bibudhendu Pati
Keyword(s): MANET, AODV, QoS, MAC Layer, Network layer, DDoS Attack Mitigation, Redundancy, Protection Node
Author(s): Emran Aljarrah
Keyword(s): Fuzzy logic, Multicast algorithm, Quality of Service, Routing, internet of things, IEEE 802.15.4
Author(s): Pooja Singh, Vikas Pareek, A K Ahlawat
Author(s): Mike Yuliana, Wirawan , Suwad
Keyword(s): Wireless Mesh Networks, Routing protocol, traffic, Congestion, delay bound
Author(s): P Veeresh, R Praveen Sam, C Shoba Bindu
Author(s): Wan Ahmad Ramzi W.Y, Faizal M. A, Rudy Fadhlee M. D, Nur Hidayah M. S
Keyword(s): P2P Botnet, Botnet Detection, feature selection, Malware, Flow Analysis, Regression
Author(s): Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod
Keyword(s): Authentication, biometric, Security, Privacy