International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis


Published By: MECS Publisher








Cellular Automata based Encrypted ECG-hash Code Generation: An Application in Inter human Biometric Authentication System

Subrata Nandi, Satyabrata Roy, Jayanti Dansana, Wahiba Ben Abdessalem Karaa, Ruben Ray, Shatadru Roy Chowdhury, Sayan Chakraborty, Nilanjan Dey

Abstract | References | Full Paper: PDF (Size:683KB), PP.1-12, Pub. Date: 2014-10-8

DOI: 10.5815/ijcnis.2014.11.01


An Improved Trusted Greedy Perimeter Stateless Routing for Wireless Sensor Networks

P. Raghu Vamsi, Krishna Kant

Abstract | References | Full Paper: PDF (Size:397KB), PP.13-19, Pub. Date: 2014-10-8

DOI: 10.5815/ijcnis.2014.11.02



Implementation of Risk Management with SCRUM to Achieve CMMI Requirements

Eman Talal Alharbi, M. Rizwan Jameel Qureshi

Abstract | References | Full Paper: PDF (Size:414KB), PP.20-25, Pub. Date: 2014-10-8

DOI: 10.5815/ijcnis.2014.11.03



Optimized and Executive Survey of Physical Node Capture Attack in Wireless Sensor Network

Bhavana Butani, Piyush Kumar Shukla, Sanjay Silakari

Abstract | References | Full Paper: PDF (Size:243KB), PP.26-34, Pub. Date: 2014-10-8

DOI: 10.5815/ijcnis.2014.11.04



HTTP Packet Inspection Policy for Improvising Internal Network Security

Kuldeep Tomar, S.S. Tyagi

Abstract | References | Full Paper: PDF (Size:447KB), PP.35-42, Pub. Date: 2014-10-8

DOI: 10.5815/ijcnis.2014.11.05



VoIP Performance Analysis over IPv4 and IPv6

Monjur Ahmed, Alan T Litchfield, Shakil Ahmed, Adnan Mahmood, Md. Emran Hossain Meazi

Abstract | References | Full Paper: PDF (Size:216KB), PP.43-48, Pub. Date: 2014-10-8

DOI: 10.5815/ijcnis.2014.11.06



OpenFlow Technology: A Journey of Simulation Tools

Rakesh k. Jha, Pooja Kharga, Idris Z. Bholebawa, Sangeet Satyarthi , Anuradha, Shashi Kumari

Abstract | References | Full Paper: PDF (Size:523KB), PP.49-55, Pub. Date: 2014-10-8

DOI: 10.5815/ijcnis.2014.11.07



Detection Block Model for SQL Injection Attacks

Diksha G. Kumar, Madhumita Chatterjee

Abstract | References | Full Paper: PDF (Size:1074KB), PP.56-63, Pub. Date: 2014-10-8

DOI: 10.5815/ijcnis.2014.11.08