Search dblp for Publications

export results for "toc:db/journals/ijcnis/ijcnis12.bht:"

 download as .bib file

@article{DBLP:journals/ijcnis/AbbasE20,
  author       = {Sara Adel Abbas and
                  Eman Mohamed El{-}Didamony},
  title        = {Reduction of secondary lobes in joint angle and delay estimation in
                  angle of arrival localization to detect {MAC} address spoofing in
                  wireless networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4353},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbbasE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AbdallahA20,
  author       = {Hanaa A. Abdallah and
                  Sara Alsodairi},
  title        = {A novel Watermarking Technique Based on Hybrid Transforms},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4321},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbdallahA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AbdelhaqAAAAAAA20,
  author       = {Maha S. Abdelhaq and
                  Raed A. Alsaqour and
                  Noura Albrahim and
                  Manar Alshehri and
                  Maram Alshehri and
                  Shehana Alserayee and
                  Eatmad Almutairi and
                  Farah Alnajjar},
  title        = {The Impact of selfishness Attack on Mobile Ad Hoc Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4444},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbdelhaqAAAAAAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AbdelkhalkiAB20,
  author       = {Jamal El Abdelkhalki and
                  Mohamed Ben Ahmed and
                  Anouar Abdelhakim Boudhir},
  title        = {Image malware detection using deep learning},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4600},
  timestamp    = {Fri, 11 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbdelkhalkiAB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlKhateeb20,
  author       = {Jawad Hasan Yasin AlKhateeb},
  title        = {Handwritten Arabic Digit Recognition Using Convolutional Neural Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4807},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlKhateeb20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlamSMA20,
  author       = {Sahirul Alam and
                  Selo Sulistyo and
                  I Wayan Mustika and
                  Ronald Adrian},
  title        = {Fuzzy Adaptive Hysteresis of {RSS} for Handover Decision in {V2V}
                  {VANET}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4859},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlamSMA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlbdourMS20,
  author       = {Layla Albdour and
                  Saher Manaseer and
                  Ahmad Sharieh},
  title        = {IoT Crawler with Behavior Analyzer at Fog layer for Detecting Malicious
                  Nodes},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4459},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlbdourMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AleneziAAA20,
  author       = {Mohammad Nasser Alenezi and
                  Haneen Khalid Alabdulrazzaq and
                  Abdullah Abdulhai Alshaher and
                  Mubarak Mohammad Alkharang},
  title        = {Evolution of Malware Threats and Techniques: a Review},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4723},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AleneziAAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AleneziAM20,
  author       = {Mohammad Nasser Alenezi and
                  Haneen Khalid Alabdulrazzaq and
                  Nada Qasem Mohammad},
  title        = {Symmetric Encryption Algorithms: Review and Evaluation Study},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4698},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AleneziAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Allam20,
  author       = {Ali Mohamed Nabil Allam},
  title        = {Cooperative Key Establishment Protocol for Full-Duplex Relay Systems},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4589},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Allam20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlmousaM20,
  author       = {Omar Saad Almousa and
                  Hazem Migdady},
  title        = {Introducing a Machine Learning Password Metric Based on {EFKM} Clustering
                  Algorithm},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4795},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlmousaM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AlmrezeqAAEN20,
  author       = {Nourah Almrezeq and
                  Lama Almadhoor and
                  Thowg Alrasheed and
                  A. A. Abd El{-}Aziz and
                  Shadi Nashwan},
  title        = {Design a secure IoT Architecture using Smart Wireless Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4877},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AlmrezeqAAEN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Alnfiai20,
  author       = {Mrim Mhsn Alnfiai},
  title        = {A Novel Design of Audio {CAPTCHA} for Visually Impaired Users},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4529},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Alnfiai20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AnnaneAG20,
  author       = {Boubakeur Annane and
                  Adel Alti and
                  Osman Ghazali},
  title        = {SecNetworkCloudSim: An Extensible Simulation Tool for Secure Distributed
                  Mobile Applications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4384},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AnnaneAG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AnuarMBA20,
  author       = {Noor Azleen Anuar and
                  Mohd Zaki Mas'ud and
                  Nazrulazhar Bahamanan and
                  Nor Azman Mat Ariff},
  title        = {Mobile Malware Behaviour through Opcode Analysis},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4732},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AnuarMBA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ArfaouiMB20,
  author       = {Siham Arfaoui and
                  Abdellatif Mezrioui and
                  Abdelhamid Belmekki},
  title        = {A Methodology for Assuring Privacy by Design in Information Systems},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4852},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ArfaouiMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AsakipaamKAA20,
  author       = {Simon Atuah Asakipaam and
                  Jerry John Kponyo and
                  Justice Owusu Agyemang and
                  Fredrick Appiah{-}Twum},
  title        = {{AP} Design of a Minimal Overhead Control Traffic Topology Discovery
                  and Data Forwarding Protocol for Software-Defined Wireless Sensor
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4803},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AsakipaamKAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AsassfehOA20,
  author       = {Mahmoud Rajallah Asassfeh and
                  Nadim Obeid and
                  Wesam Almobaideen},
  title        = {Anonymous Authentication Protocols for IoT Based Healthcare: {A} Survey},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4713},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AsassfehOA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AssaouyZO20,
  author       = {Mohammed Assaouy and
                  Ouadoudi Zytoune and
                  Mohamed Ouadou},
  title        = {Rapid Learning Optimization Approach for Battery Recovery-Aware Embedded
                  System Communications},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4774},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AssaouyZO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Chandrakar20,
  author       = {Ila Chandrakar},
  title        = {Articulation Point Based Quasi Identifier Detection for Privacy Preserving
                  in Distributed Environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4426},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Chandrakar20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ElghayyatyMWBIH20,
  author       = {Mohamed Elghayyaty and
                  Omar Mouhib and
                  Azeddine Wahbi and
                  Ahmed Amine Barakate and
                  Anas el Habti el Idrissi and
                  Laamari Hlou and
                  Abdelkader Hadjoudja},
  title        = {Performance Comparison of new Designs of Chien Search and Syndrome
                  Blocks for {BCH} and Reed Solomon Codes},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4562},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ElghayyatyMWBIH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/FajriR20,
  author       = {Misbahul Fajri and
                  Kalamullah Ramli},
  title        = {Adaptive Active Queue Management based on Queue Ratio of Set-point
                  Weighting},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4428},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/FajriR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GhmaryCHM20,
  author       = {Mohamed El Ghmary and
                  Tarik Chanyour and
                  Youssef Hmimz and
                  Mohammed Ou{\c{c}}amah Cherkaoui Malki},
  title        = {Offloading Decisions in a Mobile Edge Computing Node with Time and
                  Energy Constraints},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4419},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GhmaryCHM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GhmaryHCM20,
  author       = {Mohamed El Ghmary and
                  Youssef Hmimz and
                  Tarik Chanyour and
                  Mohammed Ou{\c{c}}amah Cherkaoui Malki},
  title        = {Energy and Processing Time Efficiency for an Optimal Offloading in
                  a Mobile Edge Computing Node},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4750},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GhmaryHCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/HamidASP20,
  author       = {Abdul Hamid and
                  Monsur Alam and
                  Hafsina Sheherin and
                  Al{-}Sakib Khan Pathan},
  title        = {Cyber Security Concerns in Social Networking Service},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4634},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/HamidASP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/HassaniSB20,
  author       = {Abdelhadi Eloudrhiri Hassani and
                  Aicha Sahel and
                  Abdelmajid Badri},
  title        = {A New Objective Function Based on Additive Combination of Node and
                  Link Metrics as a Mechanism Path Selection for {RPL} Protocol},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4446},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/HassaniSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Ibrahim20,
  author       = {Amr Ibrahim},
  title        = {{HP4} High-Performance Programmable Packet Parser},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4734},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Ibrahim20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KarriT20,
  author       = {Ganesh Reddy Karri and
                  P. Santhi Thilagam},
  title        = {Na{\"{\i}}ve Bayes Classifier to Mitigate the DDoS Attacks Severity
                  in Ad-Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4574},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KarriT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KponyoAK20,
  author       = {Jerry John Kponyo and
                  Justice Owusu Agyemang and
                  Griffith Selorm Klogo},
  title        = {Detecting End-Point {(EP)} Man-In-The-Middle {(MITM)} Attack based
                  on {ARP} Analysis: {A} Machine Learning Approach},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4735},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KponyoAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/NkosiMOM20,
  author       = {Themba Lucky Nkosi and
                  Maredi Mphahlele and
                  Sunday Olusegun Ojo and
                  Topside E. Mathonsi},
  title        = {Enhanced Dynamic Bandwidth Allocation Algorithm for Intelligent Home
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4196},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/NkosiMOM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Obeidat20,
  author       = {Atef A. Obeidat},
  title        = {Novel Approach for Intrusion Detection Using Simulated Annealing Algorithm
                  Combined with Hopfield Neural Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4665},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Obeidat20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/OuazzaniB20,
  author       = {Zakariae El Ouazzani and
                  Hanan El Bakkali},
  title        = {A Classification of non-Cryptographic Anonymization Techniques Ensuring
                  Privacy in Big Data},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4401},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/OuazzaniB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PangAR20,
  author       = {Kok{-}An Pang and
                  Shekh Faisal Abdul{-}Latip and
                  Hazlin Abdul Rani},
  title        = {Slid Pairs of the Fruit-80 Stream Cipher},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4382},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PangAR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/PatchmuthuWS20,
  author       = {Ravi Kumar Patchmuthu and
                  Au Thien Wan and
                  Wida Susanty Suhaili},
  title        = {Exploring Data Security and Privacy Issues in Internet of Things Based
                  on Five-Layer Architecture},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4345},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/PatchmuthuWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SaheedU20,
  author       = {Kayode Yakub Saheed and
                  Fatimah E. Usman{-}Hamza},
  title        = {Feature Selection with {IG-R} for Improving Performance of Intrusion
                  Detection System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4569},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SaheedU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SalehDAA20,
  author       = {Ma'en Saleh and
                  Liang Dong and
                  Ahmad Aljaafreh and
                  Naeem Al{-}Oudat},
  title        = {Secure Location-Aided Routing Protocols With Wi-Fi Direct For Vehicular
                  Ad Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4351},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SalehDAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SerhaneSBA20,
  author       = {Yassine Serhane and
                  Abderrahim Sekkaki and
                  Karim Benzidane and
                  Mehdi Abid},
  title        = {Cost Effective Cloud Storage Interoperability Between Public Cloud
                  Platforms},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4822},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SerhaneSBA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ShahiBE20,
  author       = {Gurpreet singh Shahi and
                  Ranbir Singh Batth and
                  Simon Egerton},
  title        = {{MRGM:} An Adaptive Mechanism for Congestion Control in Smart Vehicular
                  Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4684},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ShahiBE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ShakerSS20,
  author       = {Hothefa Shaker and
                  Baraa T. Sharef and
                  Zeyad T. Sharef},
  title        = {Fuzzy Logic-based Trusted and Power-aware Routing Protocol in Mobile
                  Ad-hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4587},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ShakerSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Siswanto20,
  author       = {Apri Siswanto},
  title        = {Chaotic-Based Encryption Algorithm using Henon and Logistic Maps for
                  Fingerprint Template Protection},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4395},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Siswanto20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Somwang20,
  author       = {Preecha Somwang},
  title        = {Efficient Load Balancing for Cloud Computing by Using Content Analysis},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4557},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Somwang20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Sone20,
  author       = {Michael Ekonde Sone},
  title        = {Physical Layer Security for Wireless Networks Based on Coset Convolutional
                  Coding},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4433},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Sone20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SukuvaaraMSK20,
  author       = {Timo Sukuvaara and
                  Kari M{\"{a}}enp{\"{a}}{\"{a}} and
                  Daria Stepanova and
                  Virve Karsisto},
  title        = {Vehicular Networking Road Weather Information System Tailored for
                  Arctic Winter Conditions},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4595},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SukuvaaraMSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SupMB20,
  author       = {Luciano Mauro Arley Sup and
                  Renato Mariz de Moraes and
                  Adolfo Bauchspiess},
  title        = {Acknowledge-Based Non-Congestion Estimation: An Indirect Queue Management
                  Approach for Concurrent {TCP} and UDP-Like Flows},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4371},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SupMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SyafeiSP20,
  author       = {Wahyul Amien Syafei and
                  Yosua Alvin Adi Soetrisno and
                  Agung Budi Prasetijo},
  title        = {Smart Agent and Modified Master-Backup Algorithm for Auto Switching
                  Dynamic Host Configuration Protocol Relay through Wireless Router},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4478},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SyafeiSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SyafrizalSZ20,
  author       = {Melwin Syafrizal and
                  Siti Rahayu Selamat and
                  Nurul Azma Zakaria},
  title        = {Analysis of Cybersecurity Standard and Framework Components},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4817},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SyafrizalSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ThangPJ20,
  author       = {Nguyen Canh Thang and
                  Minho Park and
                  Yang{-}Ick Joo},
  title        = {{EVHS} - Elastic Virtual Honeypot System for SDNFV-Based Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {3},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4701},
  timestamp    = {Mon, 27 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ThangPJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/TriptiJ20,
  author       = {Tripti C and
                  Jibukumar M G},
  title        = {An enhanced synchronized multi-channel {MAC} scheme to improve throughput
                  in {VANET}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4566},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/TriptiJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/VermaB20,
  author       = {Upendra Verma and
                  Diwakar Bhardwaj},
  title        = {Design of Lightweight Authentication Protocol for Fog enabled Internet
                  of Things- {A} Centralized Authentication Framework},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {2},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4464},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/VermaB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/godalaV20,
  author       = {Sravanthi Godala and
                  Rama Prasad V. Vaddella},
  title        = {A Study on Intrusion Detection System in Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {12},
  number       = {1},
  year         = {2020},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4429},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/godalaV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics