, Saudi Arabia
-
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 2 (2022) - Research Articles
Performance Ameliorations of AODV by Black Hole Attack Detection Utilizing IDSAODV as Well as Reverse AODV
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 15 No. 1 (2023) - Research Articles
The role of Information System to measure the Cost and Performance Aware Scheduling Technique for Cloud Computing Environment
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 15 No. 1 (2023) - Research Articles
Intelligent agents Model with JADE for scheduling analysis and correction of Real-Time Systems
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 15 No. 1 (2023) - Surveys/ Reviews
Review of Using Technologies of Artificial Intelligence in Companies
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 15 No. 2 (2023) - Surveys/ Reviews
IoT Protection Against Cyber Threats Based on Blockchain and Access Control: A Comprehensive Review
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 15 No. 2 (2023) - Surveys/ Reviews
Analyzing the Users' Awareness of Data Privacy and Security on Online Social Network in Saudi Arabia: A Systematic Literature Review
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 15 No. 2 (2023) - Research Articles
Hybrid Intrusion Detection Model for Enhancing the Security and Reducing the Computational Cost
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 15 No. 3 (2023) - Research Articles
Mathematically Engineered Adams Optimizer for Energy Efficient and Optimal Routing Approach for the Wireless Sensor Network
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8 No. 3 (2016) - Research Articles
Energy Aware Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 2 (2017) - Research Articles
Quaternion-based Encryption/Decryption of Audio Signal Using Digital Image as Variable Key
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
Integrating and Securing Video, Audio and Text Using Quaternion Fourier Transform
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
SE-H: A Secure and Efficient Hash Protocol for RFID System
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 9 No. 3 (2017) - Research Articles
Economic Denial of Sustainability Attacks Mitigation in the Cloud
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Improving Vehicular Authentication in VANET Using
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
A New Scheme for Spreading & De-spreading in the Direct Sequence Spread Spectrum Mechanism
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 3 (2018) - Research Articles
Mobility of Internet of Things and Fog Computing: Serious Concerns and Future Directions
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
Image Encryption and Decryption Using Chua’s Circuits
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 3 (2019) - Research Articles
An optimal clustering algorithm based distance-aware routing protocol for wireless sensor networks
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 2 (2019) - Research Articles
6LoWPAN Stack Model Configuration for IoT Streaming Data Transmission over CoAP
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 3 (2019) - Surveys/ Reviews
IoT Security Evolution: Challenges and Countermeasures Review
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
A novel Watermarking Technique Based on Hybrid Transforms
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 3 (2019) - Research Articles
Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
A Low Power Architectural Framework for Automated Surveillance System with Low Bit Rate Transmission
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 1 (2020) - Research Articles
The Impact of selfishness Attack on Mobile Ad Hoc Network
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 2 (2020) - Research Articles
A Novel Design of Audio CAPTCHA for Visually Impaired Users
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
Handwritten Arabic Digit Recognition Using Convolutional Neural Network
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
A Hybrid Graphical User Authentication Scheme in Mobile Cloud Computing Environments
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
Multi-Stage Protection Using Pixel Selection Technique for Enhancing Steganography
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
Improved Multi-Verse Optimizer Feature Selection Technique With Application To Phishing, Spam, and Denial Of Service Attacks
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
An Energy-Efficient Scheme for IoT Networks
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Research Articles
Machine Learning based Attacks Detection and Countermeasures in IoT
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Surveys/ Reviews
Defense in Depth: Multilayer of security
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 1 (2021) - Research Articles
Developing a simulated intelligent instrument to measure user behavior toward cybersecurity policies
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 2 (2021) - Surveys/ Reviews
Machine Learning Techniques for Malware Detection with Challenges and Future Directions
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 13 No. 3 (2021) - Research Articles
Design of a Network Intrusion Detection System Using Complex Deep Neuronal Networks
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 1 (2022) - Research Articles
TRW-MAC: A thermal-aware receiver-driven wake-up radio enabled duty cycle MAC protocol for multi-hop implantable wireless body area networks in Internet of Things
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 3 (2019) - Research Articles
Novel Method of Improving Quality of Service for Voice over Internet Protocol Traffic in Mobile Ad Hoc Networks
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 2 (2019) - Research Articles
Effective and Secure vWSN Applications in a Virtualized Cloud Computing Environment
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 3 (2022) - Research Articles
An Optimal Routing Protocol Using a Multiverse Optimizer Algorithm for Wireless Mesh Network
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
A Novel and Low Processing Time ECG Security Method Suitable for Sensor Node Platforms
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10 No. 1 (2018) - Research Articles
Performance Analysis of SAP-NFC Protocol
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
Smart Relay Selection Scheme Based on Fuzzy Logic with Optimal Power Allocation and Adaptive Data Rate Assignment
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 3 (2022) - Research Articles
Cloud Computing Based Computing System for Women's Higher Education in Isolated Areas
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 3 (2022) - Research Articles
AI Enabled-6G: Artificial Intelligence (AI) for Integration of 6G Wireless Communications
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 14 No. 3 (2022) - Research Articles
Autonomous Underwater Vehicle: 5G Network Design and Simulation Based on Mimetic Technique Control System
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 12 No. 3 (2020) - Research Articles
Design a secure IoT Architecture using Smart Wireless Networks
Abstract PDF -
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11 No. 1 (2019) - Research Articles
Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method
Abstract PDF