International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis

 

Published By: MECS Publisher

 

 

Contents

 

REGULAR PAPERS

 

 

LPA 2D-DOA Estimation for Fast Nonstationary Sources Using New Array Geometry Configuration

AmiraAshour, Yasser Albagory

Abstract | References | Full Paper: PDF (Size:414KB), PP.1-8, Pub. Date: 2013-9-2

DOI: 10.5815/ijcnis.2013.11.01


 

Time Window Management for Alert Correlation using Context Information and Classification

Mehdi Bateni, Ahmad Baraani

Abstract | References | Full Paper: PDF (Size: 264KB), PP.9-16, Pub. Date: 2013-9-2

DOI: 10.5815/ijcnis.2013.11.02

 

 

An Update based Energy-Efficient Reactive Routing Protocol for Mobile Ad Hoc Networks

Dhirendra Kumar Sharma, Amar Nath Patra, Chiranjeev Kumar

Abstract | References | Full Paper: PDF (Size:610KB), PP.17-26, Pub. Date: 2013-9-2

DOI: 10.5815/ijcnis.2013.11.03

 

 

Study of ANN Configuration on Performance of Smart MIMO Channel Estimation for Downlink LTE-Advanced System

Nirmalkumar S. Reshamwala, Pooja S. Suratia, Satish K. Shah

Abstract | References | Full Paper: PDF (Size:509KB), PP.27-35, Pub. Date: 2013-9-2

DOI: 10.5815/ijcnis.2013.11.04

 

 

Triple Layered Encryption Algorithm for IEEE 802.11 WLANs in E-Government Services

M A Kabir, K A Sayeed, M A Matin, T Mehenaz, M Kamruzzaman

Abstract | References | Full Paper: PDF (Size:77KB), PP.36-41, Pub. Date: 2013-9-2

DOI: 10.5815/ijcnis.2013.11.05

 

 

Optimization of Routing in Distributed Sensor Networks Using Heuristic Technique Approach

Lokesh. B. Bhajantri, Nalini. N

Abstract | References | Full Paper: PDF (Size:296KB), PP.42-50, Pub. Date: 2013-9-2

DOI: 10.5815/ijcnis.2013.11.06

 

 

A New Model for Intrusion Detection based on Reduced Error Pruning Technique

Mradul Dhakar, Akhilesh Tiwari

Abstract | References | Full Paper: PDF (Size:313KB), PP.51-57, Pub. Date: 2013-9-2

DOI: 10.5815/ijcnis.2013.11.07

 

 

Context-Sensitive Access Control Policy Evaluation and Enforcement Using Vulnerability Exploitation Data

Hassan Rasheed

Abstract | References | Full Paper: PDF (Size:382KB), PP.58-68, Pub. Date: 2013-9-2

DOI: 10.5815/ijcnis.2013.11.08