International Journal of Computer Networks & Communications (IJCNC)

AIRCC PUBLISHING CORPORATION

IJNSA 01

Classification of Source Code Vulnerabilities and Analysis of Detection Methods: Evaluation, Comparison, and ProposedApproaches Nin Ho Le Viet 1,2 , Chieu Ta Quang 2 , Cuong Nguyen Van 3 and Tuan Nguyen Kim 3 , 1Duy Tan University, Vietnam,2Thuyloi … Continue reading

April 15, 2026 · Leave a comment

IJCNC 04

EFFICIENT ENERGY-BASED CLUSTER HEAD ELECTION AND ROUTING PROTOCOL IN WSNS Ahmad Abuashour Department of Information Technology and Computing, Arab Open University, Arab Open University, Kuwait City, Kuwait ABSTRACT Wireless Sensor … Continue reading

April 14, 2026 · Leave a comment

IJNSA 04

From Pipelines to Platforms: The Impact of Platform-Centric Data Architecture on Enterprise AI in Regulated Industries Mohammed Arbaaz Shareef Lead Data Engineer at Anblicks ABSTRACT The article discusses the transition … Continue reading

April 14, 2026 · Leave a comment

RERESDA: AN ENERGY-EFFICIENT EDUNDANCYELIMINATION AND SECURE DATA AGGREGATIONFRAMEWORK FOR WIRELESS SENSOR NETWORKS

Sunil S harakannanavar1, Sumathi M S2, Srinivasan P3, Sapnakumari C4 andRangaswamy Y5 1Department of Electronics and Communication Engineering, Nitte Meenakshi Institute of Technology (NMIT), Nitte (Deemed to be University), Nitte … Continue reading

April 12, 2026 · Leave a comment

IJCNC 05

ENERGY AWARE ROUTING METRIC FOR EFFICIENT DATA TRANSMISSION IN LOW-POWER AND LOSSY NETWORKS Sabrina Mokrani1, Tassadit Sadoun1, Ahmed Lallal1, Malika Belkadi1, Jaime Lloret2, Rachida Aoudjit1, 1Mouloud Mammeri University of Tizi-Ouzou, Algeria, 2Universitat … Continue reading

April 12, 2026 · Leave a comment

CLASSIFICATION OF SOURCE CODEVULNERABILITIES AND ANALYSIS OF DETECTIONMETHODS: EVALUATION, COMPARISON, ANDPROPOSED APPROACHES

Nin Ho Le Viet1,2 , Chieu Ta Quang2 , Cuong Nguyen Van3 and Tuan Nguyen Kim3 1School of Computer Science, Duy Tan University, Danang, Vietnam 2Faculty of Computer Science and … Continue reading

February 28, 2026 · Leave a comment

IJCNC 06

HLEVRA: AN EFFICIENT RESOURCE ALLOCATION STRATEGY FOR UPLINK AND DOWNLINK IN 6G NETWORKS ABSTRACT During the last decade, there has been a massive development of wireless networks, and nowadays 4G … Continue reading

February 25, 2026 · Leave a comment

IJCNC 7

COMPARATIVE ANALYSIS OF BLACK-BOX TARGETED ADVERSARIAL ATTACKS ON DL-BASED NIDS: A STUDY OF C&W AND JSMA USING CICDDOS2019 ABSTRACT Deep and machine learning (DL/ML) models are extensively used in cybersecurity … Continue reading

February 25, 2026 · Leave a comment

IJCNC 03

TOWARDS OPTIMAL MIMO-OFDM WAVEFORMS : A LOW-PAPR TRANSMISSION STRATEGY WITH ARTIFICIAL NEURAL NETWORKS Fatma Ben Salah 1, Abdelhakim Khlifi 2, Marwa Rjili 1 and Belgacem Chibani 1 ,  1University of Gabes, Tunisia, 2University of Carthage, Tunisia ABSTRACT … Continue reading

February 25, 2026 · Leave a comment

IJNSA 02

EMPIRICAL TELEMETRY-BASED METRICS FOREVALUATING HONEYPOT REALISM ANDDECEPTION EFFECTIVENESS Teresita Noelia Nunez Migliorisi Electrical and Computer Engineering, University of Delaware, Delaware, USA ABSTRACT Honeypots remain critical tools for cyber deception, adversarial … Continue reading

February 25, 2026 · Leave a comment