IJCNC 03
EVALUATING OTFS MODULATION FOR 6G: IMPACT OF HIGH MOBILITY AND ENVIRONMENTAL NOISE Abderrahim Mohammadi 1 , Aziz Dkiouak 2 ,Mostafa Baghouri 3 , Saad Chakkor 4 , Ahmed EL Oualkadi … Continue reading
IJNSA 02
ACCESS DETECTION SYSTEM ON WEB CAMERAS AND MICROPHONES Homam El-Taj, Amena Khoja, Basmah Alsharif, Dana Alsulami, and Jumaina AbdulmajedDar Al-Hekma University, Cybersecurity Department, Jeddah, Saudi Arabia ABSTRACTThe proliferation of unauthorized … Continue reading
IJCNC 02
SIMULATED ANNEALING-SALP SWARM ALGORITHM BASED VARIATIONAL AUTOENCODER FOR PEAKTO-AVERAGE POWER RATIO REDUCTION Prabhakar Narasappa Kota1, Pravin Balaso Chopade 1, Bhagvat D Jadhav 3, Shriram Sadashiv Kulkarni 4 and Pravin Marotrao … Continue reading
IJNSA 06
A LIGHTWEIGHT NETWORK INTRUSION DETECTION SYSTEM FOR SMES Homam El-Ta, Mawadah Fahhad , Reeman Abumlha, Shadan Showman, and Zaina Saab Department of Cybersecurity, Dar Al-Hekma University, Saudi Arabia ABSTRACT Small … Continue reading
IJCNC 05
ENERGY EFFICIENT VIRTUAL MIMO COMMUNICATION DESIGNED FOR CLUSTER BASED ON COOPERATIVE WSN USING OLEACH PROTOCOL Shitiz Upreti , Mahaveer Singh NarukaDepartment of Engineering and Technology, Maharishi University of InformationTechnology (MUIT), … Continue reading
IJCNC 06
A CLUSTER-BASED TRUSTED SECURE MULTIPATHROUTING PROTOCOL FOR MOBILEAD HOC NETWORKS Himanshu Bartwal 1 , Himani Sivaraman 1 , Jogendra Kumar 21 Department of Computer Science and Engineering, Jigyasa Univesity,Dehradun,Uttarakhand, India2 … Continue reading
IJNSA 01
Detecting Malicious URLs: Trends, Challenges and the Role of Browser Extensions Homam Eltaj and Maria Ajaj Department of Cybersecurity, Dar Al-Hekma University, Jeddah, Saudi Arabia ABSTRACT Malicious URLs continue to … Continue reading
IJCNC 07
CLASSIFICATION OF NETWORK TRAFFIC USINGMACHINE LEARNING MODELS ON THENETML DATASET Mezati Messaoud Department of Computer , Kasdi Merbah University, Ouargla, Algeria ABSTRACTNetwork traffic classification plays a critical role in cybersecurity, … Continue reading
IJNSA 04
SCALABILITY ANALYSIS OF IOT-DAG DISTRIBUTEDLEDGERS USING PREFERENTIAL ATTACHMENT TOPOLOGY: A SIMULATION APPROACH Peter Kimemiah Mwangi 1, Stephen T. Njenga 2and Gabriel Ndung’u Kamau 21Department of Information Technology, School of Computing … Continue reading
A FRAMEWORK FOR SECURING PERSONAL DATASHARED BY USERS ON THE DIGITAL PLATFORMS
Nirjhor Anjum 1 , Lamia Islam 2 , Md Rubel Chowdhury 3 , Ariful Alam 41 Researcher, SCIT, University of the Cumberlands, Williamsburg, KY, USA2 Doctoral Researcher, PPPA, Washington State … Continue reading