Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijcnis/ijcnis10.bht:"
@article{DBLP:journals/ijcnis/AN18, author = {A. Ajina and Mydhili K. Nair}, title = {Dynamic Network State Learning Model for Mobility Based {WMSN} Routing Protocol}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3183}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbdellaouiEB18, author = {Ayoub Abdellaoui and Jamal Elmhamdi and Halim Berradi}, title = {Multipoint Relay Selection based on Stability of Spatial Relation in Mobile Ad hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3132}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AbdellaouiEB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbdullaH18, author = {Shubair Abdulla and Amaal Saleh Al Hashimy}, title = {TiSEFE: Time Series Evolving Fuzzy Engine for Network Traffic Classification}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3125}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AbdullaH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Achbarou18, author = {Omar Achbarou}, title = {A New Distributed Intrusion Detection System Based on Multi-Agent System for Cloud Environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3546}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Achbarou18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Ahanger18, author = {Tariq Ahamed Ahanger}, title = {Mobility of Internet of Things and Fog Computing: Serious Concerns and Future Directions}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3706}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Ahanger18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AhmadZKISZ18, author = {Azuan Ahmad and Wan Shafiuddin Zainudin and Mohd Nazri Kama and Norbik Bashah Idris and Madihah Mohd Saudi and Nur Hafiza Zakaria}, title = {State of the Art Intrusion Detection System for Cloud Computing}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3590}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AhmadZKISZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AjinegoroPN18, author = {Riski Muktiarto Nugroho Ajinegoro and Doan Perdana and Ridha Muldina Negara}, title = {Performance Analysis of Mobility Impact on {IEEE} 802.11ah Standard with Traffic Pattern Scheme}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3212}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AjinegoroPN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Al-AzzehMZOGA18, author = {Jamil Al{-}Azzeh and Abdelwadood Mesleh and Zhengbing Hu and Roman Odarchenko and Sergiy Gnatyuk and Anastasiia Abakumova}, title = {Evaluation Method for {SDN} Network Effectiveness in Next Generation Cellular Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3605}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Al-AzzehMZOGA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Al-FayoumiN18, author = {Mustafa Al{-}Fayoumi and Shadi Nashwan}, title = {Performance Analysis of {SAP-NFC} Protocol}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3237}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Al-FayoumiN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Al-MutiriAT18, author = {Rasha Al{-}Mutiri and Mznah Al{-}Rodhaan and Yuan Tian}, title = {Improving Vehicular Authentication in {VANET} Using}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3124}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Al-MutiriAT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Al-ShayeaA18, author = {Qeethara Al{-}Shayea and Muzhir Al{-}Ani}, title = {Biometric Face Recognition Based on Enhanced Histogram Approach}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3142}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Al-ShayeaA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlqeremH18, author = {Ahmad Alqerem and Ala Hamarsheh}, title = {Statistical-Based Heuristic for Scheduling of Independent Tasks in Cloud Computing}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3406}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlqeremH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Ara18, author = {Tabassum Ara}, title = {Energy efficient secured cluster based distributed fault diagnosis protocol for IoT}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3586}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Ara18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BaharonSAYI18, author = {Mohd Rizuan Baharon and Qi Shi and Mohd Faizal Abdollah and S. M. Warusia Mohamed S. M. M. Yassin and Ariff Idris}, title = {An Improved Fully Homomorphic Encryption Scheme for Cloud Computing}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3573}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/BaharonSAYI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BawanehOA18, author = {Mohammad Jazi Bawaneh and Atef A. Obeidat and Majd M. Al{-}Kofahi}, title = {An Adaptive {FLV} Steganography Approach Using Simulated Annealing}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3072}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/BawanehOA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BiradarS18, author = {Shobha Biradar and P. M. Mallikarjuna Shastry}, title = {Redundancy Elimination with Coverage Preserving algorithm in Wireless Sensor Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3576}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/BiradarS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/CevikG18, author = {Taner {\c{C}}evik and Alex Gunagwera}, title = {Coverage and Energy Efficiency Optimization for Randomly Deployed Multi-Tier Wireless Multimedia Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3032}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/CevikG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Do18, author = {Dinh{-}Thuan Do}, title = {Performance Analysis In Wireless Powered D2D-Aided Non-Orthogonal Multiple Access Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3312}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Do18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ElSharkawy18, author = {Magdy Ibrahim ElSharkawy}, title = {A New Scheme for Spreading {\&} De-spreading in the Direct Sequence Spread Spectrum Mechanism}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3253}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ElSharkawy18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ElSharkawy18a, author = {Magdy Ibrahim ElSharkawy}, title = {Using Quaternion Fourier Transform in Steganography Systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3266}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ElSharkawy18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ElshareE18, author = {Shadi Elshare and Nameer N. El{-}Emam}, title = {Modified Multi-Level Steganography to Enhance Data Security}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3614}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ElshareE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/EyadehA18, author = {Ali Ahmad Eyadeh and Mohammad Bani Amerah}, title = {Ferry-Based Directional Forwarding Mechanism for Improved Network Life-Time in Cluster-Based Wireless Sensor Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2776}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/EyadehA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Frattolillo18, author = {Franco Frattolillo}, title = {Assisted Navigation Algorithm for Wireless Sensor Actuator and Robot Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3429}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Frattolillo18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GadelrabEGR18, author = {Mohammed S. Gadelrab and Muhammad H. ElSheikh and Mahmoud A. Ghoneim and Mohsen A. Rashwan}, title = {BotCap: Machine Learning Approach for Botnet Detection Based on Statistical Features}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3624}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/GadelrabEGR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HindumathiR18, author = {Voruganti Hindumathi and Katta Rama Linga Reddy}, title = {Delay aware optimal resource allocation in {MU} {MIMO-OFDM} using enhanced spider monkey optimization}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3102}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/HindumathiR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HussainiNA18, author = {Muktar Hussaini and Shahrudin Awang Nor and Amran Ahmad}, title = {{PMSS:} Producer Mobility Support Scheme Optimization with {RWP} Mobility Model in Named Data Networking}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3272}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/HussainiNA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Jan18, author = {Tariqullah Jan}, title = {Implementing Enhanced {MIMO} with {F-OFDM} to Increase System Efficiency for Future 5G Cellular Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3286}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Jan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/JusakM18, author = {Jusak Jusak and Seedahmed Sharif Mahmoud}, title = {A Novel and Low Processing Time {ECG} Security Method Suitable for Sensor Node Platforms}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3169}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/JusakM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KandoussiB18, author = {Asmaa El Kandoussi and Hanan El Bakkali}, title = {Security based partner selection in Inter-organizational workflow systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3670}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KandoussiB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Karanam18, author = {Ramesh Rao Karanam}, title = {Node Activities Learning(NAL)Approach to Build Secure and Privacy-Preserving Routing in Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3699}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Karanam18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KhamaysehA18, author = {Yaser M. Khamayseh and Rabiah Al{-}qudah}, title = {Resource Allocation using Genetic Algorithm in Multimedia Wireless Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3280}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KhamaysehA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KhedrA18, author = {Ahmed Khedr and Arwa Attia}, title = {New Holes and Boundary Detection Algorithm for Heterogeneous Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2973}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KhedrA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KumarK18, author = {Neeraj Kumar and Dalveer Kaur}, title = {Capacity Enhancement of Multiuser Wireless Communication System through Adaptive Non-Linear Pre coding}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3056}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KumarK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Lekha18, author = {Sri Lekha}, title = {A Multilevel Scheduling {MAC} Protocol for Underwater Acoustic Sensor Networks(UASN)}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3420}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Lekha18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MaliberanSM18, author = {Esmael Verano Maliberan and Ariel M. Sison and Ruji P. Medina}, title = {A New Approach in Expanding the Hash Size of {MD5}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3292}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MaliberanSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MarwanPS18, author = {Abdul Aziz Marwan and Doan Perdana and Danu Dwi Sanjoyo}, title = {Performance Analysis of User Speed Impact on {IEEE} 802.11ah Standard affected by Doppler Effect}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3334}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MarwanPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MasdukiRM18, author = {Bisyron Wahyudi Masduki and Kalamullah Ramli and Hendri Murfi}, title = {Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3375}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MasdukiRM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MezghaniA18, author = {Omnia Mezghani and Pr. Mahmoud Abdellaoui}, title = {Efficient Clustering Protocol Based on Stochastic Matrix {\&} {MCL} and Data Routing for Mobile Wireless Sensors Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3208}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MezghaniA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Monsakul18, author = {Annop Monsakul}, title = {{SRAD:} Smart Routing Algorithm Design for Supporting IoT Network Architecture}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3121}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Monsakul18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MorilloGM18, author = {Dixon Salcedo Morillo and C{\'{e}}sar D. Guerrero and Roberto Mart{\'{\i}}nez}, title = {Available Bandwidth Estimation Tools Metrics, Approaches and Performance}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3516}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/MorilloGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MoudniEMH18, author = {Houda Moudni and Mohamed Er{-}rouidi and Hicham Mouncif and Benachir El Hadadi}, title = {Fuzzy Logic based Intrusion Detection System against Black Hole Attack in Mobile Ad Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3267}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MoudniEMH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/MunanzarAS18, author = {Hery Munanzar and Teuku Yuliar Arif and Syahrial}, title = {{AARF-HT:} Adaptive Auto Rate Fallback for High-Throughput {IEEE} 802.11n WLANs}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3122}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/MunanzarAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Nashwan18, author = {Imad I. H. Nashwan}, title = {Reliability and Failure Functions of the Consecutive k-out-of-m-from-n: {F} Linear and Circular System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3449}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Nashwan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/NayyarBHS18, author = {Anand Nayyar and Ranbir Singh Batth and Dac{-}Binh Ha and G. Sussendran}, title = {Opportunistic Networks: Present Scenario- {A} Mirror Review}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3283}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/NayyarBHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/OliveiraGF18, author = {Ren{\^{e}} Pomilio de Oliveira and Lourival Aparecido de G{\'{o}}is and Augusto Foronda}, title = {Enhanced {PF} Scheduling Algorithm for {LTE} Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3026}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/OliveiraGF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/OsamyK18, author = {Walid Osamy and Ahmed M. Khedr}, title = {An algorithm for enhancing coverage and network lifetime in cluster-based Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2849}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/OsamyK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ParedesSM18, author = {Rolysent Paredes and Ariel M. Sison and Ruji P. Medina}, title = {Bandwidth Allocation Mechanism based on Users' Web Usage Patterns for Campus Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3400}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ParedesSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PatilGK18, author = {Veeresh Patil and Sanjeev Gupta and C. Keshavamurthy}, title = {{S-RLNC} based {MAC} Optimization for Multimedia Data Transmission over {LTE/LTE-A} Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2984}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PatilGK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PorrasDP18, author = {Jonier Porras and Daniel Ducuara and Gustavo Puerto}, title = {OpenDaylight vs. Floodlight: Comparative Analysis of a Load Balancing Algorithm for Software Defined Networking}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3178}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PorrasDP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PutraASK18, author = {Septafiansyah Dwi Putra and Adang Suwandi Ahmad and Sarwono Sutikno and Yusuf Kurniawan}, title = {Attacking AES-Masking Encryption Device with Correlation Power Analysis}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2884}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PutraASK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/R18, author = {Vijaya Saraswathi R}, title = {Muti-stage Key Management Scheme for Cluster based {WSN}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3650}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/R18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/RaisBO18, author = {Amine Rais and Khalid Bouragba and Mohamed Ouzzif}, title = {Determination of Itinerary Planning for Multiple Agents in Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3081}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/RaisBO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ReddyS18, author = {Y. Narasimha Reddy and P. V. S. Srinivas}, title = {A Routing Delay Predication Based on Packet Loss and Explicit Delay Acknowledgement for Congestion Control in {MANET}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3582}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ReddyS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ReyesFM18, author = {Ariel Roy L. Reyes and Enrique D. Festijo and Ruji P. Medina}, title = {Securing One Time Password {(OTP)} for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3188}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ReyesFM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Saberi18, author = {Mohsen Saberi}, title = {Private and Mobile inter-network routing for Wireless Sensor Networks and Internet of Things}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3003}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Saberi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SatizabalP18, author = {Cristina Satiz{\'{a}}bal and Rafael P{\'{a}}ez}, title = {Internet Voting Protocols: An Analysis of the Cryptographic Operations per Phase}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3112}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SatizabalP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ShatnawiAJ18, author = {Ali M. Shatnawi and Bushra AlHajouj and Moath H. A. Jarrah}, title = {A New Multi-threaded and Interleaving Approach to Enhance String Matching for Intrusion Detection Systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3209}, timestamp = {Wed, 26 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ShatnawiAJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SuudZOH18, author = {Jamaah Binti Suud and Hushairi Zen and Al{-}Khalid Othman and Khairuddin Abdul Hamid}, title = {Decoding of Decode and Forward {(DF)} Relay Protocol using Min-Sum Based Low Density Parity Check {(LDPC)} System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3066}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SuudZOH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ThakurSP18, author = {Kutub Thakur and Juan Shan and Al{-}Sakib Khan Pathan}, title = {Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2991}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ThakurSP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/VenkataramananL18, author = {V. Venkataramanan and S. Lakshmi}, title = {A Case Study of Various Wireless Network Simulation Tools}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {2}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3261}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/VenkataramananL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Wenceslao18, author = {Felicisimo Villarico Wenceslao Jr.}, title = {Enhancing the Performance of the Advanced Encryption Standard {(AES)} Algorithm Using Multiple Substitution Boxes}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {3}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3589}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Wenceslao18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/WulandariPN18, author = {Triani Wulandari and Doan Perdana and Ridha Muldina Negara}, title = {Node Density Performance Analysis on {IEEE} 802.11ah Standard for VoIP Service}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3023}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/WulandariPN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Yassein18, author = {Muneer O. Bani Yassein}, title = {Enhanced Home Energy Management Scheme {(EHEM)} in Smart Grids}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3109}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Yassein18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ZayoudAAK18, author = {Maha Zayoud and Hanady M. Abdulsalam and A. Al{-}Yatama and Seifedine Nimer Kadry}, title = {Split and Merge {LEACH} Based Routing Algorithm for Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3028}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ZayoudAAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/adelaniMH18, author = {Zahra Adelani and Ghasem Mirjalily and Milad HajMirzaei}, title = {Balanced Multi-Channel Data Collection in Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {10}, number = {1}, year = {2018}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2893}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/adelaniMH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.