![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
International Journal of Communication Networks and Information Security (IJCNIS), Volume 4
Volume 4, Number 1, 2012
- Haseeb Zafar, David Harle, Ivan Andonovic, Laiq Hasan, Amjad Ullah Khattak:
QoS-aware Multipath Routing Scheme for Mobile Ad Hoc Networks. - Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, Al-Sakib Khan Pathan:
Automated Intruder Detection from Image Sequences using Minimum Volume Sets. - M. Hussaini, Habeeb Bello-Salau, Abdulazeez Femi Salami, Farhat Anwar, A. H. Abdalla, Md. Rafiqul Islam:
Enhanced Clustering Routing Protocol for Power-Efficient Gathering in Wireless Sensor Network. - Jaydip Sen:
A Secure and User Privacy-Preserving Searching Protocol for Peer-to-Peer Networks. - V. Thiruppathy Kesavan, S. Radhakrishnan:
Multiple Secret Keys based Security for Wireless Sensor Networks.
- Ana-Maria Popescu, Ion Gabriel Tudorache, Bo Peng, Andrew H. Kemp:
Surveying Position Based Routing Protocols for Wireless Sensor and Ad-hoc Networks.
Volume 4, Number 2, 2012
- Farrukh Javed, Imran Shafi, Asad Mahmood:
A Novel Radio Mode Identification Approach for Spectrum Sensing in Cognitive Radios. - Othmane Alaoui Fdili, Youssef Fakhri, Driss Aboutajdine:
Impact of queue buffer size awareness on single and multi service real-time routing protocols for WSNs. - Pyung Soo Kim:
Fair Packet Distribution on Multi-interfaced Mobile Router for Mobile Networks. - Hanieh Jalali, Ahmad Baraani:
Process Aware Host-based Intrusion Detection Model. - Shah Nawaz Khan, Ali Diab, Christian Brosch, Mushtaq Ahmad:
Self-Organized Disjoint Service Placement in Future Mobile Communication Networks. - Rachid Saadane, Mohammed Wahbi:
UWB Indoor Radio Propagation Modelling in Presence of Human Body Shadowing Using Ray Tracing Technique.
- Shensheng Tang, Yi Xie, Chenghua Tang, Jinwen Zhu:
A Comparative Study of Power Line Communication Networks With and Without Buffer. - Parisa Grayeli, Shahram Sarkani, Thomas A. Mazzuchi:
Performance Analysis of IPv6 Transition Mechanisms over MPLS.
Volume 4, Number 3, 2012
- Rastislav Róka, Filip Certík:
Modeling of Environmental Influences at the Signal Transmission in the Optical Transmission Medium. - Ahmed Bisengar, Mohammed Rziza, Mohamed Ouadou:
Queue Length and Mobility aware Routing Protocol for Mobile Ad hoc Network. - N. Jeyanthi, N. Ch. S. N. Iyengar:
Packet Resonance Strategy: A Spoof Attack Detection and Prevention Mechanism in Cloud Computing Environment. - Muhammad Zeeshan, Shoab Ahmed Khan:
A Robust Carrier Frequency Offset Estimation Algorithm in Burst Mode Multicarrier CDMA based Ad Hoc Networks. - Haider N. Hussain, Kamalrulnizam Abu Bakar, Shaharuddin Salleh:
Using Media Independent Handover to Support PMIPv6 Inter-domain Mobility Based Vehicular Networks. - Natarajan Meghanathan:
Link Expiration Time and Minimum Distance Spanning Trees based Distributed Data Gathering Algorithms for Wireless Mobile Sensor Networks.
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.