IJNSA 01
Classification of Source Code Vulnerabilities and Analysis of Detection Methods: Evaluation, Comparison, and ProposedApproaches Nin Ho Le Viet 1,2 , Chieu Ta Quang 2 , Cuong Nguyen Van 3 and Tuan Nguyen Kim 3 , 1Duy Tan University, Vietnam,2Thuyloi … Continue reading
IJCNC 04
EFFICIENT ENERGY-BASED CLUSTER HEAD ELECTION AND ROUTING PROTOCOL IN WSNS Ahmad Abuashour Department of Information Technology and Computing, Arab Open University, Arab Open University, Kuwait City, Kuwait ABSTRACT Wireless Sensor … Continue reading
IJNSA 04
From Pipelines to Platforms: The Impact of Platform-Centric Data Architecture on Enterprise AI in Regulated Industries Mohammed Arbaaz Shareef Lead Data Engineer at Anblicks ABSTRACT The article discusses the transition … Continue reading
RERESDA: AN ENERGY-EFFICIENT EDUNDANCYELIMINATION AND SECURE DATA AGGREGATIONFRAMEWORK FOR WIRELESS SENSOR NETWORKS
Sunil S harakannanavar1, Sumathi M S2, Srinivasan P3, Sapnakumari C4 andRangaswamy Y5 1Department of Electronics and Communication Engineering, Nitte Meenakshi Institute of Technology (NMIT), Nitte (Deemed to be University), Nitte … Continue reading
IJCNC 05
ENERGY AWARE ROUTING METRIC FOR EFFICIENT DATA TRANSMISSION IN LOW-POWER AND LOSSY NETWORKS Sabrina Mokrani1, Tassadit Sadoun1, Ahmed Lallal1, Malika Belkadi1, Jaime Lloret2, Rachida Aoudjit1, 1Mouloud Mammeri University of Tizi-Ouzou, Algeria, 2Universitat … Continue reading
CLASSIFICATION OF SOURCE CODEVULNERABILITIES AND ANALYSIS OF DETECTIONMETHODS: EVALUATION, COMPARISON, ANDPROPOSED APPROACHES
Nin Ho Le Viet1,2 , Chieu Ta Quang2 , Cuong Nguyen Van3 and Tuan Nguyen Kim3 1School of Computer Science, Duy Tan University, Danang, Vietnam 2Faculty of Computer Science and … Continue reading
IJCNC 06
HLEVRA: AN EFFICIENT RESOURCE ALLOCATION STRATEGY FOR UPLINK AND DOWNLINK IN 6G NETWORKS ABSTRACT During the last decade, there has been a massive development of wireless networks, and nowadays 4G … Continue reading
IJCNC 7
COMPARATIVE ANALYSIS OF BLACK-BOX TARGETED ADVERSARIAL ATTACKS ON DL-BASED NIDS: A STUDY OF C&W AND JSMA USING CICDDOS2019 ABSTRACT Deep and machine learning (DL/ML) models are extensively used in cybersecurity … Continue reading
IJCNC 03
TOWARDS OPTIMAL MIMO-OFDM WAVEFORMS : A LOW-PAPR TRANSMISSION STRATEGY WITH ARTIFICIAL NEURAL NETWORKS Fatma Ben Salah 1, Abdelhakim Khlifi 2, Marwa Rjili 1 and Belgacem Chibani 1 , 1University of Gabes, Tunisia, 2University of Carthage, Tunisia ABSTRACT … Continue reading
IJNSA 02
EMPIRICAL TELEMETRY-BASED METRICS FOREVALUATING HONEYPOT REALISM ANDDECEPTION EFFECTIVENESS Teresita Noelia Nunez Migliorisi Electrical and Computer Engineering, University of Delaware, Delaware, USA ABSTRACT Honeypots remain critical tools for cyber deception, adversarial … Continue reading