- DocumentDesign of a Neural Controller Applied a Level System in Hart Protocoluploaded byInternational Journal of Computer Networks and Communications Security
- DocumentMonitoring and Analyzing System Activities Using High Interaction Honeypotuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentA Cloud Computing Architecture with Wireless Sensor Networks for Agricultural Applicationsuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentInformation Processing Theory in Budgetary Participationuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentWormhole Attack in Wireless Sensor Networkuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentSecuring Patient Privacy in E-Health Cloud Using Homomorphic Encryption and Access Controluploaded byInternational Journal of Computer Networks and Communications Security
- DocumentManagement of Confidentiality of Cryptosystems Using Linear Codes- a Bird’s Eye Viewuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentHybrid of Genetic Algorithm and Continuous Ant Colony Optimization for Optimum Solutionuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentSecurity in Wireless Sensor Networksuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentPerformance Assessment of DFT-OFDM and DWT-OFDM Systems in the Presence of the SSPA and Fading Channeluploaded byInternational Journal of Computer Networks and Communications Security
- DocumentAn Effectual Identification Manual Malware Analysis Using Static Methoduploaded byInternational Journal of Computer Networks and Communications Security
- DocumentDesign Electronic Stethoscope for Cardiac Auscultation analyzed using Wavelet Decompositionuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentDecomposition of 3D medical image based on Fast and Adaptive Bidimensional Empirical Mode Decompositionuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentThe Network Architecture Encrypted Color Image Transmission in an Amplify and Forward Relaying Based STBC Encoded Cooperative MIMO OFDM Systemuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentImproved Data Preparation Technique in Web Usage Mininguploaded byInternational Journal of Computer Networks and Communications Security
- DocumentDiffServ over WiMAX network simulation testbeduploaded byInternational Journal of Computer Networks and Communications Security
- DocumentAn Effectual Identification and Prevention OF DDOS Attacks in Web Using Divide-And-Conquer Algorithmuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentImplementation of a New Concept of Conduct of the Electric Network Based on the Control of Topologyuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentThe Security of Information in Financial Transactions via Mobileuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentA New Unicast Routing Algorithm for Load Balancing in Multi-Gateway Wireless Mesh Networksuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentData Privacyuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentDesign and Implementation of Geographic Information Systems of Poor Households on Web Based in Ketapang Regencyuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentDecisive Factors of False Detection on Spectrum Sensing in Cognitive Radiouploaded byInternational Journal of Computer Networks and Communications Security
- DocumentThe Network Architecture Designed for an Adaptable IoT-based Smart Office Solutionuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentMitigating the effect of malicious node in Mobile Ad Hoc Networks using Trust based Explicit No Techniqueuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentAnalysis the MAC Protocol of IEEE 802.11 Wireless LANuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentE-Learning-Based Trainings for Expenditure Treasurersuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentA Study on Analysis of SMS Classification Using TF-IDF weightinguploaded byInternational Journal of Computer Networks and Communications Security
- DocumentBiometric(s) Detection and Steganographyuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentLand Cover Classification Using Hidden Markov Modelsuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentOne Way Direction Communication Synchronization for WideMac Protocol in IR-UWB based WSNuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentAn Advance Security Technique Challenges to Government in Wireless Sensor Network for Healthuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentAssessment of Offline Digital Signature Recognition Classification Techniquesuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentContourlet Transform and Histogram Equalization for Brightness Enhancement of Color Imageuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentContourlet Transformation for Text Hiding in HSV Color Imageuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentLinear Switching State Space (LS3) Model for Task Schedulinguploaded byInternational Journal of Computer Networks and Communications Security
- DocumentSolving Haplotype Assembly Problem Using Harmony Searchuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentCryptosystem An Implementation of RSA Using Veriloguploaded byInternational Journal of Computer Networks and Communications Security
- DocumentSLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Frameworkuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentState of the ART in Boolean Functions Cryptographic Assessmentuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentNeural Network Web-Based Human Resource Management System Model (NNWBHRMSM)uploaded byInternational Journal of Computer Networks and Communications Security
- DocumentPerformance Enhancement of VNSIP approach, using MCAC algorithmuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentSecure Virtualization for Cloud Environment Using Guest OS and VMM-based Technologyuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentCross Layer- Performance Enhancement Architecture (CL-PEA) for MANETuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentDesign and Performance Analysis of Energy Aware Routing Protocol for Delay Sensitive Applications for Wireless Sensor Networksuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentDOS Attacks on TCP/IP Layers in WSNuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentGini in A Bottleuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentA New Technique for Adapting SIP Protocol to Ad Hoc Networksuploaded byInternational Journal of Computer Networks and Communications Security
- DocumentDesign of Robust Speed Controller by Optimization Techniques for DTC IM Driveuploaded byInternational Journal of Computer Networks and Communications Security