Vol 9, No 3 (2017)

Table of Contents

Research Articles

Hybrid Approach for Botnet Detection Using K-Means and K-Medoids with Hopfield Neural Network PDF
Atef Ahmed Obeidat
Performance Analysis of 5G Cooperative-NOMA for IoT-Intermittent Communication PDF
Imran Khan
Comprehensive Performance Analysis of RPL Objective Functions in IoT Networks PDF
Wail Mardini, Maad Ebrahim, Mohammed Al-Rudaini
A Game Theoretic approach based virtual machine migration for cloud environment security PDF
iman elmir, kandoussi el mehdi, hanini mohamed, haqiq abdelkrim, dong seong kim
SE-H: A Secure and Efficient Hash Protocol for RFID System PDF
Shadi Ismail Nashwan
Optimized Clustering Protocol for Balancing Energy in Wireless Sensor Networks PDF
Dina Mohamed Omar, Ahmed Mohamed Khedr
New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks PDF
Amiruddin Amiruddin, Anak Agung Putri Ratna, Riri Fitri Sari
Enhanced Ant-Based Routing for Improving Performance of Wireless Sensor Network PDF
Husna Jamal Abdul Nasir, Ku Ruhana Ku-Mahamud, Eiji Kamioka
Overhead in Available Bandwidth Estimation Tools: Evaluation and Analysis PDF
Dixon Salcedo, Cesar Guerrero, Julian Guérrero
A Novel Utility Function of Power Control Game in Multi-Channel Cognitive Femtocell Network PDF
Anggun Fitrian Isnawati, Risanuri Hidayat, Selo Sulistyo, I Wayan Mustika
Integrating and Securing Video, Audio and Text Using Quaternion Fourier Transform PDF
Magdy Ibrahim ElSharkawy
Economic Denial of Sustainability Attacks Mitigation in the Cloud PDF
Wael Alosaimi, Michal Zak, Khalid Al-Begain, Roobaea Alroobaea, Mehedi Masud
Distributed Channel and Power Level Selection in VANET Based on SINR using Game Model PDF
Selo Sulistyo, Sahirul Alam
A New Approach for DDoS attacks to discriminate the attack level and provide security for DDoS nodes in MANET PDF
jhum swain, binod kumar pattanayak, bibudhendu patimilu
Deployment of Multi-Fuzzy Model Based Routing in RPL to Support Efficient IoT PDF
Emran Aljarrah
Designing an Energy Efficient Network Using Integration of KSOM, ANN and Data Fusion Techniques PDF
Pooja Singh, Vikas Pareek, Anil K Ahlawat
Performance Improvement of Secret Key Generation Scheme in Wireless Indoor Environment PDF
Mike Yuliana, Wirawan, Suwadi
Congestion Managed Multicast Routing in Wireless Mesh Network PDF
Bhupendra Kumar Gupta, Srikanta Patnaik, Ajit Kumar Nayak, Manas Kumar Mallick
Fuzzy Based Optimal QoS Constraint Services Composition in Mobile Ad Hoc Networks PDF
Veeresh Poola, Praveen Sam R, Shoba Bindhu C
Revealing Influenced Selected Feature for P2P Botnet Detection PDF
Wan Ahmad Ramzi Wan Yusuf, Faizal M. A, Rudy Fadhlee M. D, Nur Hidayah M. S

Surveys/ Reviews

State of the Art in Biometric Key Binding and Key Generation Schemes PDF
abayomi jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod
Urban Air Pollution Monitoring Using Wireless Sensor Networks: A Comprehensive Review PDF
Movva Pavani, P.Trinatha Rao

International Journal of Communication Networks and Information Security (IJCNIS)          ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)