- Yaser M. Khamayseh, Rabiah Al-qudah:
Resource Allocation using Genetic Algorithm in Multimedia Wireless Networks. Int. J. Commun. Networks Inf. Secur. 10(2) (2018) - Ahmed Khedr, Arwa Attia:
New Holes and Boundary Detection Algorithm for Heterogeneous Wireless Sensor Networks. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - Neeraj Kumar, Dalveer Kaur:
Capacity Enhancement of Multiuser Wireless Communication System through Adaptive Non-Linear Pre coding. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - Sri Lekha:
A Multilevel Scheduling MAC Protocol for Underwater Acoustic Sensor Networks(UASN). Int. J. Commun. Networks Inf. Secur. 10(2) (2018) - Esmael Verano Maliberan, Ariel M. Sison, Ruji P. Medina:
A New Approach in Expanding the Hash Size of MD5. Int. J. Commun. Networks Inf. Secur. 10(2) (2018) - Abdul Aziz Marwan, Doan Perdana, Danu Dwi Sanjoyo:
Performance Analysis of User Speed Impact on IEEE 802.11ah Standard affected by Doppler Effect. Int. J. Commun. Networks Inf. Secur. 10(2) (2018) - Bisyron Wahyudi Masduki, Kalamullah Ramli, Hendri Murfi:
Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System. Int. J. Commun. Networks Inf. Secur. 10(2) (2018) - Omnia Mezghani, Pr. Mahmoud Abdellaoui:
Efficient Clustering Protocol Based on Stochastic Matrix & MCL and Data Routing for Mobile Wireless Sensors Network. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - Annop Monsakul:
SRAD: Smart Routing Algorithm Design for Supporting IoT Network Architecture. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - Dixon Salcedo Morillo, César D. Guerrero, Roberto Martínez:
Available Bandwidth Estimation Tools Metrics, Approaches and Performance. Int. J. Commun. Networks Inf. Secur. 10(3) (2018) - Houda Moudni, Mohamed Er-rouidi, Hicham Mouncif, Benachir El Hadadi:
Fuzzy Logic based Intrusion Detection System against Black Hole Attack in Mobile Ad Hoc Networks. Int. J. Commun. Networks Inf. Secur. 10(2) (2018) - Hery Munanzar, Teuku Yuliar Arif, Syahrial:
AARF-HT: Adaptive Auto Rate Fallback for High-Throughput IEEE 802.11n WLANs. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - Imad I. H. Nashwan:
Reliability and Failure Functions of the Consecutive k-out-of-m-from-n: F Linear and Circular System. Int. J. Commun. Networks Inf. Secur. 10(2) (2018) - Anand Nayyar, Ranbir Singh Batth, Dac-Binh Ha, G. Sussendran:
Opportunistic Networks: Present Scenario- A Mirror Review. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - Renê Pomilio de Oliveira, Lourival Aparecido de Góis, Augusto Foronda:
Enhanced PF Scheduling Algorithm for LTE Networks. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - Walid Osamy, Ahmed M. Khedr:
An algorithm for enhancing coverage and network lifetime in cluster-based Wireless Sensor Networks. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - Rolysent Paredes, Ariel M. Sison, Ruji P. Medina:
Bandwidth Allocation Mechanism based on Users' Web Usage Patterns for Campus Networks. Int. J. Commun. Networks Inf. Secur. 10(2) (2018) - Veeresh Patil, Sanjeev Gupta, C. Keshavamurthy:
S-RLNC based MAC Optimization for Multimedia Data Transmission over LTE/LTE-A Network. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - Jonier Porras, Daniel Ducuara, Gustavo Puerto:
OpenDaylight vs. Floodlight: Comparative Analysis of a Load Balancing Algorithm for Software Defined Networking. Int. J. Commun. Networks Inf. Secur. 10(2) (2018) - Septafiansyah Dwi Putra, Adang Suwandi Ahmad, Sarwono Sutikno, Yusuf Kurniawan:
Attacking AES-Masking Encryption Device with Correlation Power Analysis. Int. J. Commun. Networks Inf. Secur. 10(2) (2018) - Vijaya Saraswathi R:
Muti-stage Key Management Scheme for Cluster based WSN. Int. J. Commun. Networks Inf. Secur. 10(3) (2018) - Amine Rais, Khalid Bouragba, Mohamed Ouzzif:
Determination of Itinerary Planning for Multiple Agents in Wireless Sensor Networks. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - Y. Narasimha Reddy, P. V. S. Srinivas:
A Routing Delay Predication Based on Packet Loss and Explicit Delay Acknowledgement for Congestion Control in MANET. Int. J. Commun. Networks Inf. Secur. 10(3) (2018) - Ariel Roy L. Reyes, Enrique D. Festijo, Ruji P. Medina:
Securing One Time Password (OTP) for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - Mohsen Saberi:
Private and Mobile inter-network routing for Wireless Sensor Networks and Internet of Things. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - Cristina Satizábal, Rafael Páez:
Internet Voting Protocols: An Analysis of the Cryptographic Operations per Phase. Int. J. Commun. Networks Inf. Secur. 10(2) (2018) - Ali M. Shatnawi, Bushra AlHajouj, Moath H. A. Jarrah:
A New Multi-threaded and Interleaving Approach to Enhance String Matching for Intrusion Detection Systems. Int. J. Commun. Networks Inf. Secur. 10(2) (2018) - Jamaah Binti Suud, Hushairi Zen, Al-Khalid Othman, Khairuddin Abdul Hamid:
Decoding of Decode and Forward (DF) Relay Protocol using Min-Sum Based Low Density Parity Check (LDPC) System. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - Kutub Thakur, Juan Shan, Al-Sakib Khan Pathan:
Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - V. Venkataramanan, S. Lakshmi:
A Case Study of Various Wireless Network Simulation Tools. Int. J. Commun. Networks Inf. Secur. 10(2) (2018)