Vol 10, No 2 (2018)

Table of Contents

Research Articles

Ferry–Based Directional Forwarding Mechanism for Improved Network Life-Time in Cluster-Based Wireless Sensor Network PDF
Ali Ahmad Eyadeh, Mohammad Bani Amerah
Dynamic Network State Learning Model for Mobility Based WMSN Routing Protocol PDF
Ajina A, Mydhili K. Nair
A New Multi-threaded and Interleaving Approach to Enhance String Matching for Intrusion Detection Systems PDF
Ali M Shatnawi, Bushra AlHajouj, Moath Jarrah
Performance Analysis of User Speed Impact on IEEE 802.11ah Standard affected by Doppler Effect PDF
Abdul Aziz Marwan, Doan Perdana, Danu Dwi Sanjoyo
Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System PDF
Bisyron Wahyudi Masduki, Kalamullah Ramli, Hendri Murfi
PERFORMANCE ANALYSIS IN WIRELESS POWERED D2D- AIDED NON-ORTHOGONAL MULTIPLE ACCESS NETWORKS PDF
Dinh-Thuan Do
PMSS: Producer Mobility Support Scheme Optimization with RWP Mobility Model in Named Data Networking PDF
Muktar Hussaini, S. A. Nor, A. Ahmad
Assisted Navigation Algorithm for Wireless Sensor Actuator and Robot Networks PDF
Franco Frattolillo
OpenDaylight vs. Floodlight: Comparative Analysis of a Load Balancing Algorithm for Software Defined Networking PDF
Jonier Porras, Daniel Ducuara, Gustavo Puerto
Statistical-Based Heuristic for Scheduling of Independent Tasks in Cloud Computing PDF
Ahmad Al-Qerem, Ala Hamarsheh
Fuzzy Logic based Intrusion Detection System against Black Hole Attack in Mobile Ad Hoc Networks PDF
Houda Moudni, Mohamed Er-rouidi, Hicham Mouncif, Benachir El Hadadi
A New Approach in Expanding the Hash Size of MD5 PDF
Esmael Verano Maliberan, Ariel M Sison, Ruji P Medina
Bandwidth Allocation Mechanism based on Users' Web Usage Patterns for Campus Networks PDF
Rolysent Paredes, Ariel M Sison, Ruji P Medina
Attacking AES-Masking Encryption Device with Correlation Power Analysis PDF
Septafiansyah Dwi Putra, Adang Suwandi Ahmad, Sarwono Sutikno, Yusuf Kurniawan
Implementing Enhanced MIMO with F-OFDM to Increase System Efficiency for Future 5G Cellular Networks PDF
tariqullah jan
Delay aware optimal resource allocation in MU MIMO-OFDM using enhanced spider monkey optimization PDF
Voruganti Hindumathi, Katta Rama Linga Reddy
Resource Allocation using Genetic Algorithm in Multimedia Wireless Networks PDF
Yaser Khamayseh, Rabiah Al-qudah
Using Quaternion Fourier Transform in Steganography Systems PDF
Magdy Ibrahim ElSharkawy
Reliability and Failure Functions of the Consecutive k-out-of-m-from-n: F Linear and Circular System PDF
Imad I.H. Nashwan
A Multilevel Scheduling MAC Protocol for Underwater Acoustic Sensor Networks(UASN) PDF
Sri Lekha

Surveys/ Reviews

Internet Voting Protocols: An Analysis of the Cryptographic Operations per Phase PDF
Cristina Satizabal, Rafael Paez
A CASE STUDY OF VARIOUS WIRELESS NETWORK SIMULATION TOOLS PDF
V Venkataramanan, S Lakshmi


International Journal of Communication Networks and Information Security (IJCNIS)          ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)