IJCNC 06
Maximum Throughput First Access Point Selection Scheme for Multi-Rate Software-Defined Wireless Network Hassen A. Mogaibel1 and Majed Hashim21Department of Information Technology, Al-Ahgaff University, Mukalla, Yemen ABSTRACT As the number of … Continue reading
IJNSA 02
A Framework for Securing Email Entrances and Mitigating Phishing Impersonation Attacks Wosah Peace Nmachi School of Computing & Engineering, University of Gloucestershire, Park Campus, Cheltenham, GL50 2RH United Kingdom Abstract … Continue reading
IJCNC 01
TRUST METRIC-BASED ANOMALY DETECTION VIA DEEP DETERMINISTIC POLICY GRADIENT REINFORCEMENT LEARNING FRAMEWORK Shruthi N1 and Siddesh G K2 1Research Scholar, JSS Academy of Technical Education,Visvesvaraya Technological University, Belagavi-590018, Karnataka2Head, ECE … Continue reading
IJCNC 07
HOP COUNT BASED INTEREST SELECTION ANDCONTENT FORWARDING SCHEME FOR VEHICULARNAMED DATA NETWORKS Nithin Rao R1 and Rinki Sharma21Research Scholar, Department of Computer Science and Engineering, RamaiahUniversity of Applied Sciences, India2Professor, … Continue reading
IJCNC 08
RANDOM RELAY SELECTION BASED HEURISTIC OPTIMIZATION MODEL FOR THE SCHEDULING AND EFFECTIVE RESOURCE ALLOCATION IN THE COGNITIVE RADIO NETWORK Aravindkumaran.S *, Dr.Saraswady.D Research scholar, Department of Electronics and communication engineering, … Continue reading
IJCNC 03
Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examination and Codification of Vulnerabilities in Prominent Blockchains Oualid Zaazaa and Hanan El BakkaliRabat IT Center, Smart Systems Laboratory (SSL), ENSIAS, Mohammed … Continue reading
IJNSA O3
A Systematic Review on Machine Learning Insider Threat Detection Models, Datasets and Evaluation Metrics Everleen Nekesa Wanyonyi1,2, Silvance Abeka2 and Newton Masinde2, 1Murang’a University of Technology, Kenya,2Jaramogi Oginga Odinga University of Science … Continue reading
IJNSA 01
INVERTIBLE NEURAL NETWORK FORINFERENCE PIPELINE ANOMALY DETECTION Malgorzata Schwab and Ashis BiswasDepartment of Computer Science and Engineering, University of Colorado,at Denver, Colorado Abstract This study combines research in machine learning … Continue reading
IJCNC 08
A SURVEY ON CDN VULNERABILITY TO DOS ATTACKS Maurizio D’Arienzo and Serena Gracco Dipartimento di Scienze Politiche Universit`a della Campania ”L.Vanvitelli” – Italy ABSTRACT Content Delivery Networks (CDN), or ”content … Continue reading
IJNSA 02
SPDZ-BASED OPTIMISTIC FAIR MULTI-PARTYCOMPUTATION Chung-Li WangAlibaba Inc., Sunnyvale, California, USA ABSTRACTThe fairness of multi-party computation has been investigated for long time. Classic results demonstrate that fair exchange can be achieved … Continue reading