default search action
International Journal of Communication Networks and Information Security (IJCNIS), Volume 13
Volume 13, Number 1, 2021
- Manjula C. Belavagi, Balachandra Muniyal:
Improved Intrusion Detection System using Quantal Response Equilibrium-based Game Model and Rule-based Classification. - Azeddine Wahbi, Anas el Habti el Idrissi, Ahmed Roukhe, Bahloul Bensassi, Laamari Hlou:
Design, optimization and Real Time implementation of a new Embedded Chien Search Block for Reed-Solomon (RS) and Bose-Chaudhuri-Hocquenghem (BCH) codes on FPGA Board. - Oleksandr Laptiev, Vitalii Savchenko, Andrii Kotenko, Volodimir Akhramovych, Vladimir Samosyuk, German Shuklin, Anatjliy Biehun:
Method of Determining Trust and Protection of Personal Data in Social Networks. - Drishya S. R., Renukadevi S., Vaidehi V.:
A Stable Clustering Scheme with Node Prediction in MANET. - Ahmed Amine Barakate, Rida Abdelmoumene, Azeddine Wahbi, Mohamed Maddi, Laamari Hlou, Abdelkader Hadjoudja:
Modeling, Development and Analysis Performance of an Intelligent Control of Photovoltaic System by Fuzzy Logic approach for Maximum Power Point Tracking. - Oleksandr Laptiev, Vitalii Savchenko, Andrii Pravdyvyi, Ivan Ablazov, Rostyslav Lisnevsky, Oleksandr Koloss, Viktor Hudyma:
Method of Detecting Radio Signals using Means of Covert by Obtaining Information on the basis of Random Signals Model. - Khalil Ibrahim Mohammad Abuzanouneh, Mohammed Hadwan:
Multi-Stage Protection Using Pixel Selection Technique for Enhancing Steganography. - Anas Abu Taleb:
Sink Mobility Model for Wireless Sensor Networks Using Kohonen Self-Organizing Map. - Khalil Al-Shqeerat, Khalil Ibrahim Abuzanouneh:
A Hybrid Graphical User Authentication Scheme in Mobile Cloud Computing Environments. - Malek Alzaqebah, Sana Jawarneh, Rami Mustafa A. Mohammad, Mutasem K. Alsmadi, Ibrahim Almarashdeh:
Improved Multi-Verse Optimizer Feature Selection Technique With Application To Phishing, Spam, and Denial Of Service Attacks. - Khalid Adnan Alissa, Bashar A. Aldeeb, Hanan A. Alshehri, Shahad A. Dahdouh, Basstaa M. Alsubaie, Afnan M. Alghamdi, Mutasem Alsmadi:
Developing a simulated intelligent instrument to measure user behavior toward cybersecurity policies. - Hala Al-Zu'bi, Osama Daifallah Al-Khaleel, Ali M. Shatnawi:
FPGA Implementation of Data Flow Graphs for Digital Signal Processing Applications. - Hanan A. Hosni Mahmoud:
A Low Power Architectural Framework for Automated Surveillance System with Low Bit Rate Transmission. - Mohammad Malkawi, Khaldoon Al-Zoubi, Ahmed Shatnawi:
Quasi Real-Time Intermodulation Interference Method: Analysis and Performance. - Saîd El Abdellaoui, Youssef Fakhri:
Power Management Strategies in Energy-Harvesting Wireless Sensor Networks. - Alaa' Al-Ahmad, Omar Saad Almousa, Qusai Abuein:
Enhancing Steganography by Image Segmentation and Multi-level Deep Hiding. - Nesrine Meddeb, Amel Meddeb-Makhlouf, Mohamed Ali Ben Ayed:
Secure and Efficient Video Transmission in VANET.
- Duhaq Ehasn Mohsen, Ali Mehdi Hammadi, Ali J. Al-Askery:
WDM and DWDM based RoF system in Fiber Optic Communication Systems: A review.
Volume 13, Number 2, April 2022
- Inad A. Aljarrah:
Effect of image degradation on performance of Convolutional Neural Networks. - Mohammed A Alqhatani:
Machine Learning Techniques for Malware Detection with Challenges and Future Directions. - Ahmad Y. Alhusenat, Abdallah Y. Alma'aitah, Khaled F. Hayajneh:
Matching Subcarrier Resource Allocation and Offloading Decision. - Vaneet Kaur Bhatia, Akshay Girdhar, Sawtantar Singh Khurmi:
Gaussian functional shapes-based type-II fuzzy membership-based cluster protocol for energy harvesting IoT networks. - Nikheel Tashvin Seechurn, Avinash Mungur, Sheeba Armoogum, Sameerchand Pudaruth:
Issues and Challenges for Network Virtualisation. - Rachid Zagrouba, Reem Alhajri:
Machine Learning based Attacks Detection and Countermeasures in IoT. - Abdirisaq Jama, Othman O. Khalifa, Nantha Kumar Subramaniam:
Novel Approach for IP-PBX Denial of Service Intrusion Detection Using Support Vector Machine Algorithm. - Hemangi Goswami, Hiten Choudhury:
Security of IoT in 5G Cellular Networks: A Review of Current Status, Challenges and Future Directions. - Karina Turzhanova, Valery Tikhvinskiy, Sergey Konshin, Alexandr Solochshenko:
Experimental Performance Evaluation of NB-IOT Deployment Modes in Urban Area. - Irwan Piesessa, Benfano Soewito:
Analysis of BGP4 Peering Establishment Time on IPv6 Connection over 6PE and 6VPE. - Raed A. Alsaqour, Ahmed Majrashi, Mohammed Alreedi, Khalid Alomar, Maha S. Abdelhaq:
Defense in Depth: Multilayer of security. - Mohammed N. Alenezi, Fawaz S. Al-Anzi:
A Study of Z-Transform Based Encryption Algorithm. - Himanshu Agarwal, Farooq Husain:
Protecting Ownership Rights of Videos Against Digital Piracy: An Efficient Digital Watermarking Scheme. - Mohammad Malkawi, Wail Mardini, Toqa' Abu Zaitoun:
Auto Signature Verification Using Line Projection Features Combined With Different Classifiers and Selection Methods. - Thamer Alhussain:
An Energy-Efficient Scheme for IoT Networks. - Mohialdeen Mustafa Mohammed, Zaika Viktor, Yurii Khlaponin, Berkman Lyubov, Polonskyi Konstiantyn, Oleksandr Leonidovich Turovsky:
Methods for assessing the impact of bandwidth of control channels on the quality of telecommunications networks in the transmission of data packets of different types. - Oleksandr Laptiev, Volodymyr Tkachev, Oleksii Maystrov, Oleksandr Krasikov, Pavlo Open'ko, Volodimir Khoroshko, Lubomir Parkhuts:
The method of spectral analysis of the determination of random digital signals. - Nor Azman Mat Ariff:
Ensemble Method for Mobile Malware Detection using N-Gram Sequences of System Calls. - Siham Arfaoui, Abdelhamid Belmekki, Abdellatif Mezrioui:
A Privacy by Design Methodology Application in Telecom Domain. - Yassine El Khanboubi, Mostafa Hanoune, Mohamed El Ghazouani:
A New Data Deletion Scheme for a Blockchain-based De-duplication System in the Cloud. - Abdelouafi Ikidid, Abdelaziz El Fazziki, Mohamed Sadgal:
A multi-agent Framework for dynamic traffic management Considering Priority Link.
Volume 13, Number 3, December 2021
- Ahmed El-Yahyaoui, Fouzia Omary:
An improved Framework for Biometric Database's privacy. - Andrey Silva:
Security Improvements for Connected Vehicles Position-Based Routing. - Oleksandr Laptiev, Serhii Yevseiev, Larysa Hatsenko, Olena Daki, Vitaliy Ivanenko, Valery Fedunov, Spartak Hohoniants:
The method of discretization signals to minimize the fallibility of information recovery. - Jaafer Saraireh, Haya Joudeh:
An Efficient Authentication Scheme for Internet of Things. - Andrey Silva:
Security Improvements for Connected Vehicles Position-Based Routing. - Norliza Katuk, Ikenna Rene Chiadighikaobi:
An Enhanced Block Pre-processing of PRESENT Algorithm for Fingerprint Template Encryption in the Internet of Things Environment. - Lavanya-Nehan Degambur, Avinash Mungur, Sheeba Armoogum, Sameerchand Pudaruth:
Resource Allocation in 4G and 5G Networks: A Review. - Sandugash Serikbayeva, J. A. Tussupov, M. A. Sambetbayeva, A. S. Yerimbetova, Gauchar Borankulova, Aigul Tungatarova:
A Model of a Distributed Information System based on the Z39.50 Protocol. - Kabiru Yusuf, Dahiru Sani Shu'aibu, Suleiman Aliyu Babale:
Channel Propagation Characteristics on the Performance of 4G Cellular Systems from High Altitude Platforms (HAPs). - Nabeel Tawalbeh, Mohammad Malkawi, Hanan M. Abusamaha, Sahban Alnaser:
Demand Based Cost Optimization of Electric Bills for Household Users. - Lavanya-Nehan Degambur, Avinash Mungur, Sheeba Armoogum, Sameerchand Pudaruth:
Resource Allocation in 4G and 5G Networks: A Review. - Yana Kremenetska, Anatoliy Makarenko, Andrii Bereznyuk, Serhii Lazebnyi, Natalia Rudenko, Olexander Vlasov:
High-Altitude Configuration of Non-Terrestrial Telecommunication Network using Optical Wireless Technologies. - Mohammed Ali Tawfeeq:
Enhancing Route lifetime in Vehicular Ad Hoc ?Networks Based on Skellam Distribution Model. - Husna Sarirah Husin:
Preventing data leakage by securing chat session with randomized session ID. - Rana Al-Rawashdeh, Mohammad Al-Fawa'reh, Wail Mardini:
Enhanced Epileptic Seizure diagnosis using EEG Signals with Support vector machine and Bagging Classifiers. - Marwa Ahmad, Nameer N. El-Emam, Ali F. Al-Azawi:
Improved Deep Hiding/Extraction Algorithm to Enhance the Payload Capacity and Security Level of Hidden Information. - Srinivas K, Srinivasulu Tadisetty:
Design and Development of Novel Hybrid Precoder for Millimeter-Wave MIMO System. - Utpala Borgohain, Surajit Borkotokey, S. K. Deka:
A Coalition Formation Game for Cooperative Spectrum Sensing in Cognitive Radio Network under the Constraint of Overhead. - Reham Abdellatif Abouhogail:
Untraceable Authentication Protocol for IEEE802.11s Standard. - Marwa Ahmad, Nameer N. El-Emam, Ali F. Al-Azawi:
Improved Deep Hiding/Extraction Algorithm to Enhance the Payload Capacity and Security Level of Hidden Information. - Ja'afer Al-Saraireh, Haya Joudeh:
An Efficient Authentication Scheme for Internet of Things. - Husna Sarirah Husin:
Preventing data leakage by securing chat session with randomized session ID. - Utpala Borgohain, Surajit Borkotokey, S. K. Deka:
A Coalition Formation Game for Cooperative Spectrum Sensing in Cognitive Radio Network under the Constraint of Overhead. - Kabiru Yusuf, Dahiru Sani Shu'aibu, Suleiman Aliyu Babale:
Channel Propagation Characteristics on the Performance of 4G Cellular Systems from High Altitude Platforms (HAPs). - Essraa Hesham Mahmoud, Mohammed S. Gadelrab, Khaled Elsayed, Abdel Rahman Sallam:
Modelling Multilayer Communication Channel in Terahertz Band for Medical Applications. - Mohammed Abdulhameed Al-Shabi:
Design of a Network Intrusion Detection System Using Complex Deep Neuronal Networks. - Wanderson L. Costa, Ariel L. C. Portela, Rafael Lopes Gomes:
Features-Aware DDoS Detection in Heterogeneous Smart Environments based on Fog and Cloud Computing. - Oleksandr Leonidovich Turovsky, Vadym Vlasenko, Nataliia Rudenko, Oleksandr Golubenko, Oleh Kitura, Oleksandr Drobyk:
Two-Time Procedure for Calculation of Carrier Frequency of Phasomodulated in Communication Systems. - Srinivas K, Srinivasulu Tadisetty:
Design and Development of Novel Hybrid Precoder for Millimeter-Wave MIMO System. - Norliza Katuk, Ikenna Rene Chiadighikaobi:
An Enhanced Block Pre-processing of PRESENT Algorithm for Fingerprint Template Encryption in the Internet of Things Environment. - Mohammed Abdulhameed Al-Shabi:
Design of a Network Intrusion Detection System Using Complex Deep Neuronal Networks. - Rana Al-Rawashdeh, Mohammad Al-Fawa'reh, Wail Mardini:
Enhanced Epileptic Seizure diagnosis using EEG Signals with Support vector machine and Bagging Classifiers. - Nabeel Tawalbeh, Mohammad Malkawi, Hanan M. Abusamaha, Sahban Alnaser:
Demand Based Cost Optimization of Electric Bills for Household Users. - Yana Kremenetska, Anatoliy Makarenko, Andrii Bereznyuk, Serhii Lazebnyi, Natalia Rudenko, Olexander Vlasov:
High-Altitude Configuration of Non-Terrestrial Telecommunication Network using Optical Wireless Technologies. - Essraa Hesham Mahmoud, Mohammed S. Gadelrab, Khaled Elsayed, Abdel Rahman Sallam:
Modelling Multilayer Communication Channel in Terahertz Band for Medical Applications. - Sandugash Serikbayeva, J. A. Tussupov, M. A. Sambetbayeva, A. S. Yerimbetova, Gauchar Borankulova, Aigul Tungatarova:
A Model of a Distributed Information System based on the Z39.50 Protocol. - Reham Abdellatif Abouhogail:
Untraceable Authentication Protocol for IEEE802.11s Standard. - Wanderson L. Costa, Ariel L. C. Portela, Rafael Lopes Gomes:
Features-Aware DDoS Detection in Heterogeneous Smart Environments based on Fog and Cloud Computing. - Oleksandr Leonidovich Turovsky, Vadym Vlasenko, Nataliia Rudenko, Oleksandr Golubenko, Oleh Kitura, Oleksandr Drobyk:
Two-Time Procedure for Calculation of Carrier Frequency of Phasomodulated in Communication Systems. - Oleksandr Laptiev, Serhii Yevseiev, Larysa Hatsenko, Olena Daki, Vitaliy Ivanenko, Valery Fedunov, Spartak Hohoniants:
The method of discretization signals to minimize the fallibility of information recovery. - Mohammed Ali Tawfeeq:
Enhancing Route lifetime in Vehicular Ad Hoc Networks Based on Skellam Distribution Model. - Ahmed El-Yahyaoui, Fouzia Omary:
An improved Framework for Biometric Database's privacy.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.