Tumgik
ijcnis · 3 years
Text
Tumblr media
IJCNIS Vol. 13, No. 3, Jun. 2021
Distributed Intelligence Model for IoT Applications Based on Neural Networks
Baha Rababah, Rasit Eskicioglu
Machine Learning-based Distributed Denial of Service Attacks Detection Technique using New Features in Software-defined Networks
Waheed G. Gadallah, Nagwa M. Omar, Hosny M. Ibrahim
Novel Certification Method for Quantum Random Number Generators
Maksim Iavich, Tamari Kuchukhidze, Sergiy Gnatyuk, Andriy Fesenko
Design, Analysis, and Implementation of a Two-factor Authentication Scheme using Graphical Password
Khaja Mizbahuddin Quadry, A Govardhan, Mohammed Misbahuddin
Multicriteria Decision Making using Analytic Hierarchy Process for Child Protection from Malicious Content on the Internet
Fargana J. Abdullayeva, Sabira S. Ojagverdiyeva
Comprehensive Methods of Evaluation of Distance Learning System Functioning
Oleg Barabash, Oleksandr Laptiev, Valentyn Sobchuk, Ivanna Salanda, Yulia Melnychuk, Valerii Lishchyna
0 notes
ijcnis · 3 years
Text
Tumblr media
IJCNIS Vol. 13, No. 2, Apr. 2021
Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain
Alexandr Kuznetsov, Inna Oleshko, Vladyslav Tymchenko, Konstantin Lisitsky, Mariia Rodinko, Andrii Kolhatin
An Efficient Route Failure Detection Mechanism with Energy Efficient Routing (EER) Protocol in MANET
D. S. Jayalakshmi, D. Hemanand, G. Muthu Kumar, M. Madhu Rani
An Optimized Protocol of M2M Authentication for Internet of Things (IoT)
Mohamed M. Samy, Wagdy R. Anis., Ahmed A. Abdel-Hafez, Haitham D. Eldemerdash
Secured Message Broadcasting in VANET using Blowfish Algorithm with Oppositional Deer Hunting Optimization
M. Selvi, B. Ramakrishnan
A Novel Secure Data Hiding Technique into Video Sequences Using RVIHS
Vinay D R, Ananda Babu J
0 notes
ijcnis · 3 years
Text
Tumblr media
IJCNIS Vol. 13, No. 1, Feb. 2021
Evaluation of Multicast and Unicast Routing Protocols Performance for Group Communication with QoS Constraints in 802.11 Mobile Ad-hoc Networks
Sumon Kumar Debnath, Mousumi Saha, Md. Manowarul Islam, Prodip Kumar Sarker, Ileas Pramanik
Comprehensive Methods of Evaluation of Efficiency of Distance Learning System Functioning
Oleg Barabash, Andrii Musienko, Spartak Hohoniants, Oleksand Laptiev, Oleg Salash, Yevgen Rudenko, Alla Klochko
Impact of Equalizer step size in Underwater Acoustic Communication Channel
Krishnamoorthy Raghavan Narasu, Immanuel Rajkumar, Jerry Alexander, Marshiana Devaerakkam
Challenges of Mobile Devices' Resources and in Communication Channels and their Solutions
Rashid G. Alakbarov
Performance Evaluation of Face Recognition system by Concatenation of Spatial and Transformation Domain Features
Raveendra K, Ravi J
0 notes
ijcnis · 3 years
Text
Tumblr media
IJCNIS Vol. 12, No. 6, Dec. 2020
Statistical Techniques for Detecting Cyberattacks on Computer Networks Based on an Analysis of Abnormal Traffic Behavior
Zhengbing Hu, Roman Odarchenko, Sergiy Gnatyuk, Maksym Zaliskyi, Anastasia Chaplits, Sergiy Bondar, Vadim Borovik
Robust and Accurate Trust Establishment Scheme for Wireless Sensor Network
Audrey NANGUE, Elie FUTE TAGNE, Emmanuel TONYE
Malware Classification with Improved Convolutional Neural Network Model
Sumit S. Lad, Amol C. Adamuthe
Industrial Control Systems Honeypot: A Formal Analysis of Conpot
Sheetal Gokhale, Ashwini Dalvi, Irfan Siddavatam
A Proficient Mechanism for Cloud Security Supervision in Distributive Computing Environment
Kamta Nath Mishra
0 notes
ijcnis · 3 years
Text
Tumblr media
IJCNIS Vol. 12, No. 5, Oct. 2020
Performance Study of Spread Spectrum Systems with Hard Limiters
Oleksandr Pliushch, Viktor Vyshnivskyi, Volodymyr Tolubko, Vadym Mukhin, Serhii Ishcheryakov, Mykhailo Okhramovych, Vitalii Loza
A Hybrid Approach for the Multi-sensor Patrolling Problem in an Unknown Environment with Obstacles
Elie Tagne Fute, Doris-Khöler Nyabeye Pangop, Emmanuel Tonye
Analyzing the IPv6 Deployment Process in Palestine
Yazan W. Abdalaziz, Ala Hamarsheh
Method for Effective Use of Cloudlet Network Resources
Rashid G. Alakbarov
Finding K Shortest Paths in a Network Using Genetic Algorithm
Meenakshi Moza, Suresh Kumar
0 notes
ijcnis · 3 years
Text
Tumblr media
IJCNIS Vol. 12, No. 4, Aug. 2020
A New Hybrid Encryption Approach for Secure Communication: GenComPass
Remzi GÜRFİDAN, Mevlüt ERSOY
Mitigating the Impact of IoT Routing Attacks on Power Consumption in IoT Healthcare Environment using Convolutional Neural Network
Samah Osama M. Kamel, Sanaa Abou Elhamayed
Information Technology Risk Management Using ISO 31000 Based on ISSAF Framework Penetration Testing (Case Study: Election Commission of X City)
I Gede Ary Suta Sanjaya, Gusti Made Arya Sasmita, Dewa Made Sri Arsa
Design and Implementation of Reliable Encryption Algorithms through Soft Error Mitigation
Jamuna S, Dinesha P, Kp Shashikala, Kishore Kumar K
Visual Semagram: An Enhanced Technique for Confidentiality Requirement of Electronic Voting System
Adewale Olumide S., Boyinbode Olutayo K., Salako E. Adekunle
0 notes
ijcnis · 3 years
Text
Tumblr media
IJCNIS Vol. 12, No. 3, Jun. 2020
High-Speed and Secure PRNG for Cryptographic Applications
Zhengbing Hu, Sergiy Gnatyuk, Tetiana Okhrimenko, Sakhybay Tynymbayev, Maksim Iavich
MapReduce Algorithm for Single Source Shortest Path Problem
Praveen Kumar, Anil Kumar Singh
Design of a Green Automated Wireless System for Optimal Irrigation
Andrews A. Okine, Michael O. Appiah, Ibrar Ahmad, Bismark Asante-Badu, Benjamin B. Uzoejinwa
Detecting Hidden Information in FAT
Kyryl Shekhanin, Alexandr Kuznetsov, Victor Krasnobayev, Oleksii Smirnov
Privacy Protection in Smart Cities by a Personal Data Management Protocol in Blockchain
Hossein Mohammadinejad, Fateme Mohammadhoseini
0 notes
ijcnis · 3 years
Text
Tumblr media
IJCNIS Vol. 12, No. 2, Apr. 2020
An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems
Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos
Method of Restoring Parameters of Information Objects in a Unified Information Space Based on Computer Networks
Vadym Mukhin, Valerii Zavgorodnii, Oleg Barabash, Roman Mykolaichuk, Yaroslav Kornaga, Anna Zavgorodnya, Vitalii Statkevych
Cost Optimization based Resource Allocation Scheme for Vehicular Cloud Networks
Mahantesh G. Kambalimath, Mahabaleshwar S. Kakkasageri
Implementation of the Naive Bayes Classifier Method for Potential Network Port Selection
Rheo Malani, Arief Bramanto Wicaksono Putra, Muhammad Rifani
Empowering Information Retrieval in Semantic Web
Ahamed. M Mithun, Z. Abu Bakar
0 notes
ijcnis · 3 years
Text
Tumblr media
IJCNIS Vol. 12, No. 1, Feb. 2020
A Risk-Assessment of Cyber Attacks and Defense Strategies in Industry 4.0 Ecosystem
Ahmet Ali Süzen
Evaluation of QoS Support of AODV and its Multicast Extension for Multimedia over MANETs
Lavanya. Poluboyina, Sivakumar Reddy. V, Mallikarjuna Prasad. A
A Novel Android Security Framework to Prevent Privilege Escalation Attacks
Ahamed K. H. Hussain, Mohsen Kakavand, Mira Silval, Lingges Arulsamy
Centralized Relay Selection and Optical Filtering Based System Design for Reliable Free Space Optical Communication over Atmospheric Turbulence
M. Mubasher Hassan, G M Rather
Analysis of VoIP over Wired & Wireless Network with Implementation of QoS CBWFQ & 802.11e
Zahid Ali, Falak Naz, Javed, Muhammad Qurban, Muhammad Yasir, Shehroz Jehangir
0 notes
ijcnis · 3 years
Text
Tumblr media
IJCNIS Vol. 11, No. 12, Dec. 2019
Performance Analysis of Network Applications on IPv6 Cloud Connected Virtual Machine
Zeeshan Ashraf, Adnan Sohail, Muhammad Yousaf
Design and Implementation of Runtime Reconfigurable Encryption Algorithms using Custom ICAP Processor
Jamuna S, Dinesha P, K PShashikala, Kishore Kumar K
IT Risk Management Based on ISO 31000 and OWASP Framework using OSINT at the Information Gathering Stage (Case Study: X Company)
Anak Agung Bagus Arya Wiradarma, Gusti Made Arya Sasmita
Evaluation of Quality for Semi-Structured Database System
Rita Ganguly, Anirban Sarkar
An Improved Machine Learning-Based Short Message Service Spam Detection System
Odukoya Oluwatoyin, Akinyemi Bodunde, Gooding Titus, Aderounmu Ganiyu
0 notes
ijcnis · 3 years
Text
Tumblr media
IJCNIS Vol. 11, No. 11, Nov. 2019
Active Defense Strategy against Jamming Attack in Wireless Sensor Networks
Nawfal F. Abdulqader AL-Shaihk, Reza Hassanpour
An Efficient (n, n) Visual Secret Image Sharing using Random Grids with XOR Recovery
Ram Gopal Sharma, Hitendra Garg, Priti Dimr
Enhancement of Capacity, Detectability and Distortion of BMP, GIF and JPEG images with Distributed Steganography
Istteffanny I. Araujo, Hassan Kazemian
Message Based Key Distribution Technique for Establishing a Secure Communication Channel in IoT Networks
G.V.Hindumathi, D. Lalitha Bhaskari
A Domains Approach to Remote Access Logical Vulnerabilities Classification
Samuel Ndichu, Sylvester McOyowo, Henry Okoyo, Cyrus Wekesa
Delivering a Secured Cloud Computing Architecture and Traditional IT Outsourcing Environment via Penetration Tools in Ghana
Umar Sayibu, Frimpong Twum, Issah Baako
0 notes
ijcnis · 3 years
Text
Tumblr media
IJCNIS Vol. 11, No. 10, Oct. 2019
An Efficiency Optimization for Network Intrusion Detection System
Mahmoud M. Sakr, Medhat A. Tawfeeq, Ashraf B. El-Sisi
PAPR Reduction in OFDM System Using Clipping and Filtering Methods Based on CCDF
Tanvir Ul Haque, Sharif Hossen
Privacy and Security Concerns in Electronic Commerce Websites in Ghana: A Survey Study
Issah Baako, Sayibu Umar, Prosper Gidisu
Security Policy Modelling in the Mobile Agent System
Hassan RAZOUKI
Network Architectures, Challenges, Security Attacks, Research Domains and Research Methodologies in VANET: A Survey
Amit Kumar Goyal, Gaurav Agarwal, Arun Kumar Tripathi
An TPM Based Approach for Generation of Secret Key
Sanjay Kr. Pal, Shubham Mishra
0 notes
ijcnis · 3 years
Text
Tumblr media
IJCNIS Vol. 11, No. 9, Sep. 2019
Parameter Training in MANET using Artificial Neural Network
Baisakhi Chatterjee, Himadri Nath Saha
An Improved Method for Packed Malware Detection using PE Header and Section Table Information
Nahid Maleki, Mehdi Bateni, Hamid Rastegari
An Approach to Develop a Transactional Calculus for Semi-Structured Database System
Rita Ganguly, Anirban Sarkar
A Classification Framework to Detect DoS Attacks
Ahmed Iqbal, Shabib Aftab, Israr Ullah, Muhammad Anwaar Saeed, Arif Husen
0 notes
ijcnis · 3 years
Text
Tumblr media
IJCNIS Vol. 11, No. 8, Aug. 2019
Data Mining based Framework for Effective Intrusion Detection using Hybrid Feature Selection Approach
B.A. Manjunatha, Prasanta Gogoi, M. T. Akkalappa
Multiple Core Fibers versus Multiple Fibers Enabled Space Division Multiplexing Based Elastic Optical Networks: A Performance Comparison
Sridhar Iyer
5G Small Cell Backhaul: A Solution Based on GSM-Aided Hybrid Beamforming
Olabode Idowu-Bismark, Oluseun Oyeleke, Aderemi A. Atayero, Francis Idachaba
A Comparative Study of Network Performance between ContikiMAC and XMAC Protocols in Data Collection Application with ContikiRPL
Vu Chien Thang
0 notes
ijcnis · 3 years
Text
Tumblr media
IJCNIS Vol. 11, No. 7, Jul. 2019
Performance Evaluation of MAC Protocols with Multi-Sink for Mobile UWSNs
Areeg Fahad Rasheed, A E Abdelkareem
Open Source Intelligence Testing Using the OWASP Version 4 Framework at the Information Gathering Stage (Case Study: X Company)
I Putu Agus Eka Pratama, Anak Agung Bagus Arya Wiradarma
An improved DNA Based Security Model using Reduced Cipher Text Technique
Lalit Mohan Gupta, Hitendra Garg, Abdus Samad
Proposing a Method for Enhancing the Reliability of RPL Routing Protocol in the Smart Grid Neighborhood Area Networks
Hossein Mohammadinejad, Fateme Mohammadhoseini
Agent Based Trust Establishment between Vehicle in Vehicular Cloud Networks
Shailaja S. Mudengudi, Mahabaleshwar S. Kakkasageri
Ensemble Feature Selection and Classification of Internet Traffic using XGBoost Classifier
N Manju, B S Harish, V Prajwal
0 notes
ijcnis · 3 years
Text
Tumblr media
IJCNIS Vol. 11, No. 6, Jun. 2019
A New Classification Based Model for Malicious PE Files Detection
Imad Abdessadki, Saiida Lazaar
Cloud-based Framework for Efficient Storage of Unstructured Patient Health Records
Hanya M. Abdallah, Ahmed Taha, Mazen M. Selim
Blind Payment Protocol for Payment Channel Networks
Zhengbing Hu, Ivan Dychka, Mykola Onai, Yuri Zhykin
A Privacy-Aware Dynamic Authentication Scheme for IoT Enabled Business Services
Nitin Singh Chauhan, Ashutosh Saxena, JVR Murthy
A Mobile Application of Augmented Reality for Aircraft Maintenance of Fan Cowl Door Opening
Sei Wei Yong, Aun Naa Sung
Secure Data Transmission of Video Steganography Using Arnold Scrambling and DWT
Hnin Lai Nyo, Aye Wai Oo
0 notes
ijcnis · 3 years
Text
Tumblr media
IJCNIS Vol. 11, No. 5, May. 2019
Construction for Searchable Encryption with Strong Security Guarantees
István Vajda
IAMIN: An Infrastructure-aware Middleware for the Reconfiguration of Unstructured Peer-to-Peer Overlay Networks
Morteza Alizadeh, Arash Ghafouri, Mohsen Sharifi
Distributed Wormhole Attack Mitigation Technique in WSNs
Sharada Kori, Krishnamurthy G N, Nandini Sidnal
A Passive Approach for Detecting Image Splicing using Deep Learning and Haar Wavelet Transform
Eman I. Abd El-Latif, Ahmed Taha, Hala H. Zayed
Multicopy Energy Aware Distance and Inter-Contact Delay Routing (EDICDR) Approach for Delay Tolerant Networks
Savita, D. K. Lobiyal
Cluster based Routing Protocols for IOT Application
Anna Merine George, S.Y Kulkarni, Vice Chancellor
0 notes