International Journal of Computer Network and Information Security(IJCNIS)
ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis
Published By: MECS Press
IJCNIS Vol. 5, No. 11, Sep. 2013
Cover page and Table of Contents: PDF (size: 1338KB)
Contents
REGULAR PAPERS
-
LPA 2D-DOA Estimation for Fast Nonstationary Sources Using New Array Geometry Configuration
AmiraAshour, Yasser Albagory
Abstract | References | Full Paper: PDF (Size:413KB), PP.1-8, Pub. Date: 2013-09-02
DOI: 10.5815/ijcnis.2013.11.01
-
Time Window Management for Alert Correlation using Context Information and Classification
Mehdi Bateni, Ahmad Baraani
Abstract | References | Full Paper: PDF (Size:264KB), PP.9-16, Pub. Date: 2013-09-02
DOI: 10.5815/ijcnis.2013.11.02
-
An Update based Energy-Efficient Reactive Routing Protocol for Mobile Ad Hoc Networks
Dhirendra Kumar Sharma, Amar Nath Patra, Chiranjeev Kumar
Abstract | References | Full Paper: PDF (Size:610KB), PP.17-26, Pub. Date: 2013-09-02
DOI: 10.5815/ijcnis.2013.11.03
-
Study of ANN Configuration on Performance of Smart MIMO Channel Estimation for Downlink LTE-Advanced System
Nirmalkumar S. Reshamwala, Pooja S. Suratia, Satish K. Shah
Abstract | References | Full Paper: PDF (Size:509KB), PP.27-35, Pub. Date: 2013-09-02
DOI: 10.5815/ijcnis.2013.11.04
-
Triple Layered Encryption Algorithm for IEEE 802.11 WLANs in E-Government Services
M A Kabir,K A Sayeed, M A Matin, T Mehenaz, M Kamruzzaman
Abstract | References | Full Paper: PDF (Size:76KB), PP.36-41, Pub. Date: 2013-09-02
DOI: 10.5815/ijcnis.2013.11.05
-
Optimization of Routing in Distributed Sensor Networks Using Heuristic Technique Approach
Lokesh. B. Bhajantri, Nalini. N
Abstract | References | Full Paper: PDF (Size:295KB), PP.42-50, Pub. Date: 2013-09-02
DOI: 10.5815/ijcnis.2013.11.06
-
A New Model for Intrusion Detection based on Reduced Error Pruning Technique
Mradul Dhakar, Akhilesh Tiwari
Abstract | References | Full Paper: PDF (Size:312KB), PP.51-57, Pub. Date: 2013-09-02
DOI: 10.5815/ijcnis.2013.11.07
-
Context-Sensitive Access Control Policy Evaluation and Enforcement Using Vulnerability Exploitation Data
Hassan Rasheed
Abstract | References | Full Paper: PDF (Size:382KB), PP.58-68, Pub. Date: 2013-09-02
DOI: 10.5815/ijcnis.2013.11.08