International Journal of Computer Networks & Communications (IJCNC)

AIRCC PUBLISHING CORPORATION

IJCNC 05

CHANNEL ESTIMATION IN MIMO OFDM SYSTEMSWITH TAPPED DELAY LINE MODELRavi Hosamani1, Yerriswamy T21Department of Electronics and Communication Engineering,K.L.E . Institute ofTechnology, Hubballi, Karnataka, India 5800272Department of Computer Science and Engineering. … Continue reading

December 16, 2023 · Leave a comment

EXPLORING CRITICAL VULNERABILITIES IN SIEMIMPLEMENTATION AND SOC SERVICEPROCUREMENT: AN IN-DEPTH ANALYSIS OFHIGH-RISK SCENARIOS

December 15, 2023 · Leave a comment

EXPLORING CRITICAL VULNERABILITIES IN SIEMIMPLEMENTATION AND SOC SERVICEPROCUREMENT: AN IN-DEPTH ANALYSIS OFHIGH-RISK SCENARIOS

Ertuğrul AKBAŞComputer Engineering, Istanbul Esenyurt University, SureLog SIEM İstanbul, Turkey ABSTRACT This research paper examines the high risks encountered while using a Security Information and EventManagement (SIEM) product or acquiring … Continue reading

December 15, 2023 · Leave a comment

IJCNC 04

UNVEILING ADVANCED PERSISTENCETECHNIQUES THROUGH APPLICATION SHIMMINGAND COUNTERMEASURES Akashdeep Bhardwaj1 ,Naresh Kumar2 , and Shawon S. M. Rahman3 1Professor of Cybersecurity & Digital Forensics, University of Petroleum and Energy Studies, Dehradun, … Continue reading

December 14, 2023 · Leave a comment

IJCNC -02

MACHINE TO MACHINE AUTHENTICATED KEYAGREEMENT WITH FORWARD SECRECY FORINTERNET OF THINGS Batamu Anderson Chiphiko1 and Hyunsung Kim1,21Dept. of Mathematical Sciences, University of Malawi, Malawi2(Corresponding Author) Dept. of Cyber Security, Kyungil … Continue reading

December 13, 2023 · Leave a comment

IJCNC 06

Maximum Throughput First Access Point Selection Scheme for Multi-Rate Software-Defined Wireless Network Hassen A. Mogaibel1 and Majed Hashim21Department of Information Technology, Al-Ahgaff University, Mukalla, Yemen ABSTRACT As the number of … Continue reading

December 13, 2023 · Leave a comment

IJNSA 02

A Framework for Securing Email Entrances and Mitigating Phishing Impersonation Attacks Wosah Peace Nmachi School of Computing & Engineering, University of Gloucestershire, Park Campus, Cheltenham, GL50 2RH United Kingdom Abstract … Continue reading

December 13, 2023 · Leave a comment

IJCNC 01

TRUST METRIC-BASED ANOMALY DETECTION VIA DEEP DETERMINISTIC POLICY GRADIENT REINFORCEMENT LEARNING FRAMEWORK Shruthi N1 and Siddesh G K2 1Research Scholar, JSS Academy of Technical Education,Visvesvaraya Technological University, Belagavi-590018, Karnataka2Head, ECE … Continue reading

December 12, 2023 · Leave a comment

IJCNC 07

HOP COUNT BASED INTEREST SELECTION ANDCONTENT FORWARDING SCHEME FOR VEHICULARNAMED DATA NETWORKS Nithin Rao R1 and Rinki Sharma21Research Scholar, Department of Computer Science and Engineering, RamaiahUniversity of Applied Sciences, India2Professor, … Continue reading

December 12, 2023 · Leave a comment

IJCNC 08

RANDOM RELAY SELECTION BASED HEURISTIC OPTIMIZATION MODEL FOR THE SCHEDULING AND EFFECTIVE RESOURCE ALLOCATION IN THE COGNITIVE RADIO NETWORK Aravindkumaran.S *, Dr.Saraswady.D Research scholar, Department of Electronics and communication engineering, … Continue reading

December 11, 2023 · Leave a comment