Search dblp for Publications

export results for "toc:db/journals/ijcnis/ijcnis9.bht:"

 download as .bib file

@article{DBLP:journals/ijcnis/AN17,
  author       = {A. Ajina and
                  Mydhili K. Nair},
  title        = {Cross Layered Network Condition Aware Mobile-Wireless Multimedia Sensor
                  Network Routing Protocol for Mission Critical Communication},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2174},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Abdel-AzimSe17,
  author       = {Mohammed Abdel{-}Azim and
                  Hossam El{-}Din Salah and
                  Menas Ebrahim Eissa},
  title        = {Black Hole attack Detection using fuzzy based {IDS}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2281},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Abdel-AzimSe17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AhmadIK17,
  author       = {Azuan Ahmad and
                  Norbik Bashah Idris and
                  Mohd Nazri Kama},
  title        = {CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell
                  Mechanism},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2233},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AhmadIK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlBalasMB17,
  author       = {Firas AlBalas and
                  Wail Mardini and
                  Dua'a Bani{-}salameh},
  title        = {Optimized Job Scheduling approach based on Genetic algorithms in smart
                  Grid environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2285},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlBalasMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Aljarrah17,
  author       = {Emran Aljarrah},
  title        = {Deployment of Multi-Fuzzy Model Based Routing in {RPL} to Support
                  Efficient IoT},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2918},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Aljarrah17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlosaimiZAAM17,
  author       = {Wael Alosaimi and
                  Michal Z{\'{a}}k and
                  Khalid Al{-}Begain and
                  Roobaea Alroobaea and
                  Mehedi Masud},
  title        = {Economic Denial of Sustainability Attacks Mitigation in the Cloud},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2798},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlosaimiZAAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AmiruddinRS17,
  author       = {Amiruddin Amiruddin and
                  Anak Agung Putri Ratna and
                  Riri Fitri Sari},
  title        = {New Key Generation and Encryption Algorithms for Privacy Preservation
                  in Mobile Ad Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2307},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AmiruddinRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BashirKJU17,
  author       = {Shahid Bashir and
                  M. Salman Khan and
                  Khadim Ullah Jan and
                  Sadiq Ullah},
  title        = {Performance Enhancement of Wearable Antenna Using High Impedance Surfaces},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2220},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BashirKJU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BenmammarBAK17,
  author       = {Badr Benmammar and
                  Youcef Benmouna and
                  Asma Amraoui and
                  Francine Krief},
  title        = {A parallel implementation on a multi-core architecture of a dynamic
                  programming algorithm applied in cognitive radio ad hoc networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2354},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BenmammarBAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ES17,
  author       = {Selvi E and
                  Shashidhara M. S},
  title        = {Quantum Phase Shift For Energy Conserved Secured Data Communication
                  In Manet},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2365},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ES17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ElSharkawy17,
  author       = {Magdy Ibrahim ElSharkawy},
  title        = {Quaternion-based Encryption/Decryption of Audio Signal Using Digital
                  Image as Variable Key},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2379},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ElSharkawy17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ElSharkawy17a,
  author       = {Magdy Ibrahim ElSharkawy},
  title        = {Integrating and Securing Video, Audio and Text Using Quaternion Fourier
                  Transform},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2634},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ElSharkawy17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ElmirMHHK17,
  author       = {Iman El Mir and
                  Kandoussi el Mehdi and
                  Mohamed Hanini and
                  Abdelkrim Haqiq and
                  Dong Seong Kim},
  title        = {A Game Theoretic approach based virtual machine migration for cloud
                  environment security},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2579},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ElmirMHHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Frattolillo17,
  author       = {Franco Frattolillo},
  title        = {Digital Copyright Protection: Focus on Some Relevant Solutions},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2425},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Frattolillo17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GV17,
  author       = {Venifa Mini G and
                  K. S. Angel Viji},
  title        = {A Comprehensive Cloud Security Model with Enhanced Key Management,
                  Access Control and Data Anonymization Features},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2372},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GuezouliBBZ17,
  author       = {Lyamine Guezouli and
                  Kamel Barka and
                  Souheila Bouam and
                  Abdelmadjid Zidani},
  title        = {Implementation and Optimization of {RWP} Mobility Model in {WSNS}
                  under Tossim Simulator},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2116},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GuezouliBBZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GunantaraD17,
  author       = {Nyoman Gunantara and
                  Agus Dharma},
  title        = {Optimal Path Pair Routes through Multi-Criteria Weights in Ad Hoc
                  Network Using the Genetic Algorithm},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2037},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GunantaraD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GuptaPNM17,
  author       = {Bhupendra Kumar Gupta and
                  Srikanta Patnaik and
                  Ajit Kumar Nayak and
                  Manas Kumar Mallick},
  title        = {Congestion Managed Multicast Routing in Wireless Mesh Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2643},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GuptaPNM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GurramB17,
  author       = {Vijaya Kumar Gurram and
                  Shoba Bindu Chigarepalli},
  title        = {A New Method of User Association in Wireless Mesh Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1960},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GurramB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/IrawatiSE17,
  author       = {Indrarini Dyah Irawati and
                  Andriyan Bayu Suksmono and
                  Ian Yosef Matheus Edward},
  title        = {Missing Internet Traffic Reconstruction using Compressive Sampling},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2249},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/IrawatiSE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/IsnawatiHSM17,
  author       = {Anggun Fitrian Isnawati and
                  Risanuri Hidayat and
                  Selo Sulistyo and
                  I Wayan Mustika},
  title        = {A Novel Utility Function of Power Control Game in Multi-Channel Cognitive
                  Femtocell Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2770},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/IsnawatiHSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/JG17,
  author       = {Lekha J and
                  Ganapathi Padmavathi},
  title        = {Detection of illegal traffic pattern using Hybrid Improved {CART}
                  and Multiple Extreme Learning Machine Approach},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2053},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/JG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/JainR17,
  author       = {Sweta Jain and
                  Vinuraj R},
  title        = {{CALAR:} Community Aware Location Assisted Routing Framework for Delay
                  Tolerant Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2082},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/JainR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/JegedeUAM17,
  author       = {Abayomi Jegede and
                  Nur Izura Udzir and
                  Azizol Abdullah and
                  Ramlan Mahmod},
  title        = {State of the Art in Biometric Key Binding and Key Generation Schemes},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2388},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/JegedeUAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Khan17,
  author       = {Imran Khan},
  title        = {Performance Analysis of 5G Cooperative-NOMA for IoT-Intermittent Communication},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2641},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Khan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KhanAZA17,
  author       = {Mohsin Khan and
                  Majid Ashraf and
                  Haseeb Zafar and
                  Tufail Ahmad},
  title        = {Enhanced Handover Mechanism in Long Term Evolution {(LTE)} Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2219},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KhanAZA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KumarHAJ17,
  author       = {Ramesh Kumar and
                  Ayaz Hussain and
                  Abdul Aziz and
                  Inwhee Joe},
  title        = {Wireless {DF} Relaying with Beamforming for an Unmanned Aircraft System
                  over {\(\kappa\)}-{\(\mu\)} Fading Channels},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2275},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KumarHAJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MardiniEA17,
  author       = {Wail Mardini and
                  Maad Ebrahim and
                  Mohammed Al{-}Rudaini},
  title        = {Comprehensive Performance Analysis of {RPL} Objective Functions in
                  IoT Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2515},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MardiniEA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Nashwan17,
  author       = {Shadi Ismail Nashwan},
  title        = {{SE-H:} {A} Secure and Efficient Hash Protocol for {RFID} System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2728},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Nashwan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/NasirKK17,
  author       = {Husna Jamal Abdul Nasir and
                  Ku Ruhana Ku{-}Mahamud and
                  Eiji Kamioka},
  title        = {Enhanced Ant-Based Routing for Improving Performance of Wireless Sensor
                  Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2611},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/NasirKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Obeidat17,
  author       = {Atef A. Obeidat},
  title        = {Hybrid Approach for Botnet Detection Using K-Means and K-Medoids with
                  Hopfield Neural Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2514},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Obeidat17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/OmarK17,
  author       = {Dina M. Omar and
                  Ahmed M. Khedr},
  title        = {Optimized Clustering Protocol for Balancing Energy in Wireless Sensor
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2607},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/OmarK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/OulaourfHAO17,
  author       = {Sanaa Oulaourf and
                  Abdelfatteh Haidine and
                  Abdelhak Aqqal and
                  Hassan Ouahmane},
  title        = {Review on Radio Resource Allocation Optimization in LTE/LTE-Advanced
                  using Game Theory},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2257},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/OulaourfHAO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PavaniR17,
  author       = {Movva Pavani and
                  Polipalli Trinatha Rao},
  title        = {Urban Air Pollution Monitoring Using Wireless Sensor Networks: {A}
                  Comprehensive Review},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2708},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PavaniR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PerdanaDW17,
  author       = {Doan Perdana and
                  Favian Dewanta and
                  Ig Prasetya Dwi Wibawa},
  title        = {Extending Monitoring Area of Production Plant Using Synchronized Relay
                  Node Message Scheduling},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2280},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PerdanaDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PoolaSC17,
  author       = {Veeresh Poola and
                  R. Praveen Sam and
                  Shoba Bindhu C},
  title        = {Fuzzy Based Optimal QoS Constraint Services Composition in Mobile
                  Ad Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2525},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PoolaSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RG17,
  author       = {Kavitha R and
                  Padmavathi G},
  title        = {Advanced Random Time Queue Blocking With Traffic Prediction For Defense
                  Of Low-Rate Dos Attacks Against Application Servers},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2253},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RamM17,
  author       = {Anant Ram and
                  Manas Kumar Mishra},
  title        = {Mobility Adaptive Density Connected Clustering Approach in Vehicular
                  Ad Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2325},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RamM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/RokaS17,
  author       = {Rastislav R{\'{o}}ka and
                  Pavol Sal{\'{\i}}k},
  title        = {Impact of Environmental Influences on Multilevel Modulation Formats
                  at the Signal Transmission in the Optical Transmission Medium},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2134},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/RokaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SahnounHA17,
  author       = {Abdelkabir Sahnoun and
                  Ahmed Habbani and
                  Jamal El Abbadi},
  title        = {{EEPR-OLSR:} an Energy Efficient and Path Reliability protocol for
                  proactive {MANET} routing},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {1},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2215},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SahnounHA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SalcedoGG17,
  author       = {Dixon Salcedo Morillo and
                  C{\'{e}}sar D. Guerrero and
                  Julian Guerrero},
  title        = {Overhead in Available Bandwidth Estimation Tools: Evaluation and Analysis},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2475},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SalcedoGG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Saleh17,
  author       = {Ahmed M. Shamsan Saleh},
  title        = {Bio-Inspired Technique: An Adaptive Routing for Reliability and Energy
                  Efficiency Method in Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2326},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Saleh17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SarodeB17,
  author       = {Sambhaji Sarode and
                  Jagdish W. Bakal},
  title        = {{PFPS:} Priority-First Packet Scheduler for {IEEE} 802.15.4 Heterogeneous
                  Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2419},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SarodeB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SaudiFSDY17,
  author       = {Nur Hidayah Mohd Saudi and
                  M. A. Faizal and
                  Siti Rahayu Selamat and
                  Rudy Fadhlee M. D and
                  Wan Ahmad Ramzi W. Y.},
  title        = {Revealing the Feature Influence in {HTTP} Botnet Detection},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2391},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SaudiFSDY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SinghPA17,
  author       = {Pooja Singh and
                  Vikas Pareek and
                  Anil K. Ahlawat},
  title        = {Designing an Energy Efficient Network Using Integration of KSOM, {ANN}
                  and Data Fusion Techniques},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2769},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SinghPA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SulistyoA17,
  author       = {Selo Sulistyo and
                  Sahirul Alam},
  title        = {Distributed Channel and Power Level Selection in {VANET} Based on
                  {SINR} using Game Model},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2896},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SulistyoA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SwainPP17,
  author       = {Jhum Swain and
                  Binod Kumar Pattanayak and
                  Bibudhendu Pati},
  title        = {A New Approach for DDoS attacks to discriminate the attack level and
                  provide security for DDoS nodes in {MANET}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2903},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SwainPP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Taqieddin17,
  author       = {Eyad Salah Taqieddin},
  title        = {On the Improper Use of {CRC} for Cryptographic Purposes in {RFID}
                  Mutual Authentication Protocols},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2376},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Taqieddin17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TitounaGAAA17,
  author       = {Chafiq Titouna and
                  Abdelhak Mourad Gu{\'{e}}roui and
                  Makhlouf Aliouat and
                  Ado Adamou Abba Ari and
                  Amine Adouane},
  title        = {Distributed Fault-Tolerant Algorithm for Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/1848},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TitounaGAAA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/YFDS17,
  author       = {Wan Ahmad Ramzi W. Y. and
                  M. A. Faizal and
                  Rudy Fadhlee M. D and
                  Nur Hidayah Mohd Saudi},
  title        = {Revealing Influenced Selected Feature for {P2P} Botnet Detection},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2927},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/YFDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/YichietMK17,
  author       = {Aun Yichiet and
                  Selvakumar Manickam and
                  Shankar Karuppayah},
  title        = {A Review on Features' Robustness in High Diversity Mobile Traffic
                  Classifications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2368},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/YichietMK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/YulianaWS17,
  author       = {Mike Yuliana and
                  Wirawan and
                  Suwadi},
  title        = {Performance Improvement of Secret Key Generation Scheme in Wireless
                  Indoor Environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2890},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/YulianaWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ZeeshanJU17,
  author       = {Muhammad Zeeshan and
                  Huma Javed and
                  Sifat Ullah},
  title        = {Discrete R-Contiguous bit Matching mechanism appropriateness for anomaly
                  detection in Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {2},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2456},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ZeeshanJU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics