IJNSA O4
TRUST WITHOUT EXPOSURE: VERIFIABLEOBSERVABILITY WITH CAPABILITY-NATIVEWEBASSEMBLY AT THE EDGE Bala Subramanyan Verifoxx, London, UK ABSTRACT In modern data ecosystems, where edge autonomy, privacy, and verifiability are essential, enablingtrustworthy observability without … Continue reading
IJCNC 07
AUTHENTICATED KEY AGREEMENT PROTOCOLWITH FORWARD SECRECY FOR SECURING CYBERPHYSICAL SYSTEMS Sung-Woon Lee 1 and Hyunsung Kim 2 1 Dept. of Information System and Security, Tongmyong University, Korea 2 Dept. of … Continue reading
IJCNC 02
QOS BASED RELIABLE ROUTE IN MANET FOR MILITARY APPLICATIONS Diksha Shukla and Raghuraj SinghDepartment of Computer Science and Engineering,Harcourt Butler Technical University, Kanpur, India ABSTRACT Mobile Ad hoc Networks (MANETs) … Continue reading
IJCNC 01
Conflict Flow Avoided Proactive Rerouting Algorithm Using Online Active Learning for Efficient Transmission of Datastream in Software Defined Networks Kalaivani Subramaniam and Sumathi Arumugam Department of Computer Science, KPR College … Continue reading
IJCNC 05
ANALYSIS OF LTE/5G NETWORK PERFORMANCE PARAMETERS IN SMARTPHONE USE CASES: ASTUDY OF PACKET LOSS, DELAY AND SLICE TYPESAlmamoon Alauthman and Abeer Al-HyariElectrical Engineering Department, Al-Balqa Applied University, As Salt 19117, … Continue reading
IJCNC 04
An Energy Hole Detection and Relay Repositioning in Cluster Based Routing Protocol for Improving Lifetime of WSN Saranya Selvaraj and Anitha DamodaranDepartment of Computer Science, Sri Ramakrishna College of Arts … Continue reading
IJNSA 02
Using Combination of Fuzzy Set and Gravitational Algorithm for Improving Intrusion Detection Amin Dastanpour 1 and Raja Azlina Raja Mahmood 2, 1 Kerman Institute of Higher Education, Iran, 2 University Putra Malaysia, Malaysia ABSTRACT An intrusion detection … Continue reading
IJNSA O3
A SYSTEMATIC REVIEW OF APPLICATIONS INFRAUD DETECTION Hashim Jameel Shareef Jarrar Department of Cybersecurity, College of Information Technology, Middle East University,Amman, Jordan ABSTRACTThe following systematic review aims to investigate the … Continue reading
IJCNC 08
ENHANCING CYBER DEFENSE AGAINST ZERO-DAY ATTACKS USING ENSEMBLE NEURAL NETWORKS Swathy Akshaya and Padmavathi Department of Computer Science, Avinashilingam University, Coimbatore, India ABSTRACT Zero-Day Attacks (ZDAs) are a significant concern … Continue reading
IJNSA 01
SMART METER SECURITY ISSUES: A REVIEW PAPER Osama Alshannaq 1 , Mohd Rizuan Baharon 1 , Shekh Faisal Abdul Latip 1 , Hairol Nizam Mohd Shah 2and Áine MacDermott 3 … Continue reading