International Journal of Computer Network and Information Security(IJCNIS)
ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis
Published By: MECS Press
IJCNIS Vol. 11, No. 11, Nov. 2019
Cover page and Table of Contents: PDF (size: 174KB)
Contents
REGULAR PAPERS
-
Active Defense Strategy against Jamming Attack in Wireless Sensor Networks
Nawfal F. Abdulqader AL-Shaihk, Reza Hassanpour
Abstract | References | Full Paper: PDF (Size:817KB), PP.1-13, Pub. Date: 2019-11-08
DOI: 10.5815/ijcnis.2019.11.01
-
An Efficient (n, n) Visual Secret Image Sharing using Random Grids with XOR Recovery
Ram Gopal Sharma, Hitendra Garg, Priti Dimri
Abstract | References | Full Paper: PDF (Size:747KB), PP.14-20, Pub. Date: 2019-11-08
DOI: 10.5815/ijcnis.2019.11.02
-
Enhancement of Capacity, Detectability and Distortion of BMP, GIF and JPEG images with Distributed Steganography
Istteffanny I. Araujo, Hassan Kazemian
Abstract | References | Full Paper: PDF (Size:385KB), PP.21-27, Pub. Date: 2019-11-08
DOI: 10.5815/ijcnis.2019.11.03
-
Message Based Key Distribution Technique for Establishing a Secure Communication Channel in IoT Networks
G.V.Hindumathi, D. Lalitha Bhaskari
Abstract | References | Full Paper: PDF (Size:744KB), PP.28-35, Pub. Date: 2019-11-08
DOI: 10.5815/ijcnis.2019.11.04
-
A Domains Approach to Remote Access Logical Vulnerabilities Classification
Samuel Ndichu, Sylvester McOyowo, Henry Okoyo, Cyrus Wekesa
Abstract | References | Full Paper: PDF (Size:481KB), PP.36-45, Pub. Date: 2019-11-08
DOI: 10.5815/ijcnis.2019.11.05
-
Delivering a Secured Cloud Computing Architecture and Traditional IT Outsourcing Environment via Penetration Tools in Ghana
Umar Sayibu, Frimpong Twum, Issah Baako
Abstract | References | Full Paper: PDF (Size:665KB), PP.46-59, Pub. Date: 2019-11-08
DOI: 10.5815/ijcnis.2019.11.06