Main Navigation
Main Content
Sidebar
Register
Login
Toggle navigation
About
Editorial List
Publisher information
Focus and Scope
Open Access Policy
Publication Ethics
Author Guidelines
Peer Review Process
Current
Archives
Copyrights Form
Announcements
Contacts
Privacy Statement
Abstracting/ Indexing
Article processing charge
Search
Home
Archives
Vol. 9 No. 3 (2017)
Published:
2017-12-17
Research Articles
Hybrid Approach for Botnet Detection Using K-Means and K-Medoids with Hopfield Neural Network
Atef Ahmed Obeidat
PDF
Performance Analysis of 5G Cooperative-NOMA for IoT-Intermittent Communication
Imran Khan
PDF
Comprehensive Performance Analysis of RPL Objective Functions in IoT Networks
Wail Mardini, Maad Ebrahim, Mohammed Al-Rudaini
PDF
A Game Theoretic approach based virtual machine migration for cloud environment security
iman elmir, kandoussi el mehdi, hanini mohamed, haqiq abdelkrim, dong seong kim
PDF
SE-H: A Secure and Efficient Hash Protocol for RFID System
Shadi Ismail Nashwan
PDF
Optimized Clustering Protocol for Balancing Energy in Wireless Sensor Networks
Dina Mohamed Omar, Ahmed Mohamed Khedr
PDF
New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks
Amiruddin Amiruddin, Anak Agung Putri Ratna, Riri Fitri Sari
PDF
Enhanced Ant-Based Routing for Improving Performance of Wireless Sensor Network
Husna Jamal Abdul Nasir, Ku Ruhana Ku-Mahamud, Eiji Kamioka
PDF
Overhead in Available Bandwidth Estimation Tools: Evaluation and Analysis
Dixon Salcedo, Cesar Guerrero, Julian Guérrero
PDF
A Novel Utility Function of Power Control Game in Multi-Channel Cognitive Femtocell Network
Anggun Fitrian Isnawati, Risanuri Hidayat, Selo Sulistyo, I Wayan Mustika
PDF
Integrating and Securing Video, Audio and Text Using Quaternion Fourier Transform
Magdy Ibrahim ElSharkawy
PDF
Economic Denial of Sustainability Attacks Mitigation in the Cloud
Wael Alosaimi, Michal Zak, Khalid Al-Begain, Roobaea Alroobaea, Mehedi Masud
PDF
Distributed Channel and Power Level Selection in VANET Based on SINR using Game Model
Selo Sulistyo, Sahirul Alam
PDF
A New Approach for DDoS attacks to discriminate the attack level and provide security for DDoS nodes in MANET
jhum swain, binod kumar pattanayak, bibudhendu patimilu
PDF
Deployment of Multi-Fuzzy Model Based Routing in RPL to Support Efficient IoT
Emran Aljarrah
PDF
Designing an Energy Efficient Network Using Integration of KSOM, ANN and Data Fusion Techniques
Pooja Singh, Vikas Pareek, Anil K Ahlawat
PDF
Performance Improvement of Secret Key Generation Scheme in Wireless Indoor Environment
Mike Yuliana, Wirawan, Suwadi
PDF
Congestion Managed Multicast Routing in Wireless Mesh Network
Bhupendra Kumar Gupta, Srikanta Patnaik, Ajit Kumar Nayak, Manas Kumar Mallick
PDF
Fuzzy Based Optimal QoS Constraint Services Composition in Mobile Ad Hoc Networks
Veeresh Poola, Praveen Sam R, Shoba Bindhu C
PDF
Revealing Influenced Selected Feature for P2P Botnet Detection
Wan Ahmad Ramzi Wan Yusuf, Faizal M. A, Rudy Fadhlee M. D, Nur Hidayah M. S
PDF
Surveys/ Reviews
State of the Art in Biometric Key Binding and Key Generation Schemes
abayomi jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod
PDF
Urban Air Pollution Monitoring Using Wireless Sensor Networks: A Comprehensive Review
Movva Pavani, P.Trinatha Rao
PDF