Main Navigation
Main Content
Sidebar
Register
Login
Toggle navigation
About
Editorial List
Publisher information
Focus and Scope
Open Access Policy
Publication Ethics
Author Guidelines
Peer Review Process
Current
Archives
Copyrights Form
Announcements
Contacts
Privacy Statement
Abstracting/ Indexing
Article processing charge
Search
Home
Archives
Vol. 12 No. 3 (2020)
Published:
2020-12-26
Research Articles
Novel Approach for Intrusion Detection Using Simulated Annealing Algorithm Combined with Hopfield Neural Network
Atef Obeidat
PDF
EVHS - Elastic Virtual Honeypot System for SDNFV-Based Networks
Nguyen Canh Thang, Minho Park, Yang Ick Joo
PDF
A novel Watermarking Technique Based on Hybrid Transforms
Hanaa A. Abdallah, Sara Alsodairi
PDF
Feature Selection with IG-R for Improving Performance of Intrusion Detection System
Kayode Yakub Saheed, F.E. Usman-Hamza
PDF
HP4 High-Performance Programmable Packet Parser
Amr Ibrahim
PDF
A Methodology for Assuring Privacy by Design in Information Systems
Siham Arfaoui, Abdellatif MEZRIOUI, Abdelhamid BELMEKKI
PDF
Rapid Learning Optimization Approach for Battery Recovery-Aware Embedded System Communications
Mohammed ASSAOUY, Ouadoudi Zytoune, Mohamed Ouadou
PDF
Detecting End-Point (EP) Man-In-The-Middle (MITM) Attack based on ARP Analysis: A Machine Learning Approach
Jerry John Kponyo, Justice Owusu Agyemang, Griffith Selorm Klogo
PDF
Energy and Processing Time Efficiency for an Optimal Offloading in a Mobile Edge Computing Node
Mohamed EL GHMARY, Youssef Hmimz, Tarik Chanyour, Mohammed Ouçamah CHERKAOUI MALKI
PDF
Introducing a Machine Learning Password Metric Based on EFKM Clustering Algorithm
Omar Saad Almousa, Hazem Migdady
PDF
Design a secure IoT Architecture using Smart Wireless Networks
Nourah Almrezeq, Lama Almadhoor, Thowg Alrasheed, A. A. Abd El-Aziz, Shadi Nashwan
PDF
Handwritten Arabic Digit Recognition Using Convolutional Neural Network
Jawad Hasan Alkhateeb
PDF
Fuzzy Adaptive Hysteresis of RSS for Handover Decision in V2V VANET
Sahirul Alam, Selo Sulistyo, I Wayan Mustika, Ronald Adrian
PDF
Cost Effective Cloud Storage Interoperability Between Public Cloud Platforms
Yassine Serhane, Abderrahim Sekkaki, Karim Benzidane, Mehdi Abid
PDF
DESIGN OF A MINIMAL OVERHEAD CONTROL TRAFFIC TOPOLOGY DISCOVERY AND DATA FORWARDING PROTOCOL FOR SOFTWARE-DEFINED WIRELESS SENSOR NETWORKS
Simon Atuah Asakipaam, Jerry John Kponyo, Justice Owusu Agyemang, Fredrick Appiah-Twum
PDF
Surveys/ Reviews
ANONYMOUS AUTHENTICATION PROTOCOLS FOR IOT BASED HEALTHCARE: A SURVEY
Mahmoud Rajallah Asassfeh, Nadim Obeid, Wesam Almobaideen
PDF
Evolution of Malware Threats and Techniques: a Review
Mohammad Nasser Alenezi, Haneen Khalid Alabdulrazzaq, Abdullah Abdulhai Alshaher, Mubarak Mohammad Alkharang
PDF
Mobile Malware Behaviour through Opcode Analysis
Noor Azleen Anuar, Mohd Zaki Mas’ud, Nazrulazhar Bahamanan, Nor Azman Mat Ariff
PDF
Analysis of Cybersecurity Standard and Framework Components
Melwin Syafrizal, Siti Rahayu Selamat, Nurul Azma Zakaria
PDF