Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijcnis/ijcnis12.bht:"
@article{DBLP:journals/ijcnis/AbbasE20, author = {Sara Adel Abbas and Eman Mohamed El{-}Didamony}, title = {Reduction of secondary lobes in joint angle and delay estimation in angle of arrival localization to detect {MAC} address spoofing in wireless networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4353}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AbbasE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbdallahA20, author = {Hanaa A. Abdallah and Sara Alsodairi}, title = {A novel Watermarking Technique Based on Hybrid Transforms}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4321}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AbdallahA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbdelhaqAAAAAAA20, author = {Maha S. Abdelhaq and Raed A. Alsaqour and Noura Albrahim and Manar Alshehri and Maram Alshehri and Shehana Alserayee and Eatmad Almutairi and Farah Alnajjar}, title = {The Impact of selfishness Attack on Mobile Ad Hoc Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4444}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AbdelhaqAAAAAAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AbdelkhalkiAB20, author = {Jamal El Abdelkhalki and Mohamed Ben Ahmed and Anouar Abdelhakim Boudhir}, title = {Image malware detection using deep learning}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4600}, timestamp = {Fri, 11 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AbdelkhalkiAB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlKhateeb20, author = {Jawad Hasan Yasin AlKhateeb}, title = {Handwritten Arabic Digit Recognition Using Convolutional Neural Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4807}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlKhateeb20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlamSMA20, author = {Sahirul Alam and Selo Sulistyo and I Wayan Mustika and Ronald Adrian}, title = {Fuzzy Adaptive Hysteresis of {RSS} for Handover Decision in {V2V} {VANET}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4859}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlamSMA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlbdourMS20, author = {Layla Albdour and Saher Manaseer and Ahmad Sharieh}, title = {IoT Crawler with Behavior Analyzer at Fog layer for Detecting Malicious Nodes}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4459}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlbdourMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AleneziAAA20, author = {Mohammad Nasser Alenezi and Haneen Khalid Alabdulrazzaq and Abdullah Abdulhai Alshaher and Mubarak Mohammad Alkharang}, title = {Evolution of Malware Threats and Techniques: a Review}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4723}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AleneziAAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AleneziAM20, author = {Mohammad Nasser Alenezi and Haneen Khalid Alabdulrazzaq and Nada Qasem Mohammad}, title = {Symmetric Encryption Algorithms: Review and Evaluation Study}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4698}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AleneziAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Allam20, author = {Ali Mohamed Nabil Allam}, title = {Cooperative Key Establishment Protocol for Full-Duplex Relay Systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4589}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Allam20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlmousaM20, author = {Omar Saad Almousa and Hazem Migdady}, title = {Introducing a Machine Learning Password Metric Based on {EFKM} Clustering Algorithm}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4795}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlmousaM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlmrezeqAAEN20, author = {Nourah Almrezeq and Lama Almadhoor and Thowg Alrasheed and A. A. Abd El{-}Aziz and Shadi Nashwan}, title = {Design a secure IoT Architecture using Smart Wireless Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4877}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlmrezeqAAEN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Alnfiai20, author = {Mrim Mhsn Alnfiai}, title = {A Novel Design of Audio {CAPTCHA} for Visually Impaired Users}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4529}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Alnfiai20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AnnaneAG20, author = {Boubakeur Annane and Adel Alti and Osman Ghazali}, title = {SecNetworkCloudSim: An Extensible Simulation Tool for Secure Distributed Mobile Applications}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4384}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AnnaneAG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AnuarMBA20, author = {Noor Azleen Anuar and Mohd Zaki Mas'ud and Nazrulazhar Bahamanan and Nor Azman Mat Ariff}, title = {Mobile Malware Behaviour through Opcode Analysis}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4732}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AnuarMBA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ArfaouiMB20, author = {Siham Arfaoui and Abdellatif Mezrioui and Abdelhamid Belmekki}, title = {A Methodology for Assuring Privacy by Design in Information Systems}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4852}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ArfaouiMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AsakipaamKAA20, author = {Simon Atuah Asakipaam and Jerry John Kponyo and Justice Owusu Agyemang and Fredrick Appiah{-}Twum}, title = {{AP} Design of a Minimal Overhead Control Traffic Topology Discovery and Data Forwarding Protocol for Software-Defined Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4803}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AsakipaamKAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AsassfehOA20, author = {Mahmoud Rajallah Asassfeh and Nadim Obeid and Wesam Almobaideen}, title = {Anonymous Authentication Protocols for IoT Based Healthcare: {A} Survey}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4713}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AsassfehOA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AssaouyZO20, author = {Mohammed Assaouy and Ouadoudi Zytoune and Mohamed Ouadou}, title = {Rapid Learning Optimization Approach for Battery Recovery-Aware Embedded System Communications}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4774}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AssaouyZO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Chandrakar20, author = {Ila Chandrakar}, title = {Articulation Point Based Quasi Identifier Detection for Privacy Preserving in Distributed Environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4426}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Chandrakar20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ElghayyatyMWBIH20, author = {Mohamed Elghayyaty and Omar Mouhib and Azeddine Wahbi and Ahmed Amine Barakate and Anas el Habti el Idrissi and Laamari Hlou and Abdelkader Hadjoudja}, title = {Performance Comparison of new Designs of Chien Search and Syndrome Blocks for {BCH} and Reed Solomon Codes}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4562}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ElghayyatyMWBIH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/FajriR20, author = {Misbahul Fajri and Kalamullah Ramli}, title = {Adaptive Active Queue Management based on Queue Ratio of Set-point Weighting}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4428}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/FajriR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GhmaryCHM20, author = {Mohamed El Ghmary and Tarik Chanyour and Youssef Hmimz and Mohammed Ou{\c{c}}amah Cherkaoui Malki}, title = {Offloading Decisions in a Mobile Edge Computing Node with Time and Energy Constraints}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4419}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/GhmaryCHM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/GhmaryHCM20, author = {Mohamed El Ghmary and Youssef Hmimz and Tarik Chanyour and Mohammed Ou{\c{c}}amah Cherkaoui Malki}, title = {Energy and Processing Time Efficiency for an Optimal Offloading in a Mobile Edge Computing Node}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4750}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/GhmaryHCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HamidASP20, author = {Abdul Hamid and Monsur Alam and Hafsina Sheherin and Al{-}Sakib Khan Pathan}, title = {Cyber Security Concerns in Social Networking Service}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4634}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/HamidASP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HassaniSB20, author = {Abdelhadi Eloudrhiri Hassani and Aicha Sahel and Abdelmajid Badri}, title = {A New Objective Function Based on Additive Combination of Node and Link Metrics as a Mechanism Path Selection for {RPL} Protocol}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4446}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/HassaniSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Ibrahim20, author = {Amr Ibrahim}, title = {{HP4} High-Performance Programmable Packet Parser}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4734}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Ibrahim20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KarriT20, author = {Ganesh Reddy Karri and P. Santhi Thilagam}, title = {Na{\"{\i}}ve Bayes Classifier to Mitigate the DDoS Attacks Severity in Ad-Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4574}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KarriT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KponyoAK20, author = {Jerry John Kponyo and Justice Owusu Agyemang and Griffith Selorm Klogo}, title = {Detecting End-Point {(EP)} Man-In-The-Middle {(MITM)} Attack based on {ARP} Analysis: {A} Machine Learning Approach}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4735}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/KponyoAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/NkosiMOM20, author = {Themba Lucky Nkosi and Maredi Mphahlele and Sunday Olusegun Ojo and Topside E. Mathonsi}, title = {Enhanced Dynamic Bandwidth Allocation Algorithm for Intelligent Home Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4196}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/NkosiMOM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Obeidat20, author = {Atef A. Obeidat}, title = {Novel Approach for Intrusion Detection Using Simulated Annealing Algorithm Combined with Hopfield Neural Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4665}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Obeidat20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/OuazzaniB20, author = {Zakariae El Ouazzani and Hanan El Bakkali}, title = {A Classification of non-Cryptographic Anonymization Techniques Ensuring Privacy in Big Data}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4401}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/OuazzaniB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PangAR20, author = {Kok{-}An Pang and Shekh Faisal Abdul{-}Latip and Hazlin Abdul Rani}, title = {Slid Pairs of the Fruit-80 Stream Cipher}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4382}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PangAR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/PatchmuthuWS20, author = {Ravi Kumar Patchmuthu and Au Thien Wan and Wida Susanty Suhaili}, title = {Exploring Data Security and Privacy Issues in Internet of Things Based on Five-Layer Architecture}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4345}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/PatchmuthuWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SaheedU20, author = {Kayode Yakub Saheed and Fatimah E. Usman{-}Hamza}, title = {Feature Selection with {IG-R} for Improving Performance of Intrusion Detection System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4569}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SaheedU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SalehDAA20, author = {Ma'en Saleh and Liang Dong and Ahmad Aljaafreh and Naeem Al{-}Oudat}, title = {Secure Location-Aided Routing Protocols With Wi-Fi Direct For Vehicular Ad Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4351}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SalehDAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SerhaneSBA20, author = {Yassine Serhane and Abderrahim Sekkaki and Karim Benzidane and Mehdi Abid}, title = {Cost Effective Cloud Storage Interoperability Between Public Cloud Platforms}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4822}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SerhaneSBA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ShahiBE20, author = {Gurpreet singh Shahi and Ranbir Singh Batth and Simon Egerton}, title = {{MRGM:} An Adaptive Mechanism for Congestion Control in Smart Vehicular Network}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4684}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ShahiBE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ShakerSS20, author = {Hothefa Shaker and Baraa T. Sharef and Zeyad T. Sharef}, title = {Fuzzy Logic-based Trusted and Power-aware Routing Protocol in Mobile Ad-hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4587}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ShakerSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Siswanto20, author = {Apri Siswanto}, title = {Chaotic-Based Encryption Algorithm using Henon and Logistic Maps for Fingerprint Template Protection}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4395}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Siswanto20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Somwang20, author = {Preecha Somwang}, title = {Efficient Load Balancing for Cloud Computing by Using Content Analysis}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4557}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Somwang20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Sone20, author = {Michael Ekonde Sone}, title = {Physical Layer Security for Wireless Networks Based on Coset Convolutional Coding}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4433}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Sone20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SukuvaaraMSK20, author = {Timo Sukuvaara and Kari M{\"{a}}enp{\"{a}}{\"{a}} and Daria Stepanova and Virve Karsisto}, title = {Vehicular Networking Road Weather Information System Tailored for Arctic Winter Conditions}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4595}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SukuvaaraMSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SupMB20, author = {Luciano Mauro Arley Sup and Renato Mariz de Moraes and Adolfo Bauchspiess}, title = {Acknowledge-Based Non-Congestion Estimation: An Indirect Queue Management Approach for Concurrent {TCP} and UDP-Like Flows}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4371}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SupMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SyafeiSP20, author = {Wahyul Amien Syafei and Yosua Alvin Adi Soetrisno and Agung Budi Prasetijo}, title = {Smart Agent and Modified Master-Backup Algorithm for Auto Switching Dynamic Host Configuration Protocol Relay through Wireless Router}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4478}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SyafeiSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/SyafrizalSZ20, author = {Melwin Syafrizal and Siti Rahayu Selamat and Nurul Azma Zakaria}, title = {Analysis of Cybersecurity Standard and Framework Components}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4817}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/SyafrizalSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ThangPJ20, author = {Nguyen Canh Thang and Minho Park and Yang{-}Ick Joo}, title = {{EVHS} - Elastic Virtual Honeypot System for SDNFV-Based Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {3}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4701}, timestamp = {Mon, 27 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ThangPJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/TriptiJ20, author = {Tripti C and Jibukumar M G}, title = {An enhanced synchronized multi-channel {MAC} scheme to improve throughput in {VANET}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4566}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/TriptiJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/VermaB20, author = {Upendra Verma and Diwakar Bhardwaj}, title = {Design of Lightweight Authentication Protocol for Fog enabled Internet of Things- {A} Centralized Authentication Framework}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {2}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4464}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/VermaB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/godalaV20, author = {Sravanthi Godala and Rama Prasad V. Vaddella}, title = {A Study on Intrusion Detection System in Wireless Sensor Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {12}, number = {1}, year = {2020}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4429}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/godalaV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.