International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis

 

Published By: MECS Publisher

 

 

Contents

 

REGULAR PAPERS

 

 

Cellular Automata based Encrypted ECG-hash Code Generation: An Application in Inter human Biometric Authentication System

Subrata Nandi, Satyabrata Roy, Jayanti Dansana, Wahiba Ben Abdessalem Karaa, Ruben Ray, Shatadru Roy Chowdhury, Sayan Chakraborty, Nilanjan Dey

Abstract | References | Full Paper: PDF (Size:683KB), PP.1-12, Pub. Date: 2014-10-8

DOI: 10.5815/ijcnis.2014.11.01


 

An Improved Trusted Greedy Perimeter Stateless Routing for Wireless Sensor Networks

P. Raghu Vamsi, Krishna Kant

Abstract | References | Full Paper: PDF (Size:397KB), PP.13-19, Pub. Date: 2014-10-8

DOI: 10.5815/ijcnis.2014.11.02

 

 

Implementation of Risk Management with SCRUM to Achieve CMMI Requirements

Eman Talal Alharbi, M. Rizwan Jameel Qureshi

Abstract | References | Full Paper: PDF (Size:414KB), PP.20-25, Pub. Date: 2014-10-8

DOI: 10.5815/ijcnis.2014.11.03

 

 

Optimized and Executive Survey of Physical Node Capture Attack in Wireless Sensor Network

Bhavana Butani, Piyush Kumar Shukla, Sanjay Silakari

Abstract | References | Full Paper: PDF (Size:243KB), PP.26-34, Pub. Date: 2014-10-8

DOI: 10.5815/ijcnis.2014.11.04

 

 

HTTP Packet Inspection Policy for Improvising Internal Network Security

Kuldeep Tomar, S.S. Tyagi

Abstract | References | Full Paper: PDF (Size:447KB), PP.35-42, Pub. Date: 2014-10-8

DOI: 10.5815/ijcnis.2014.11.05

 

 

VoIP Performance Analysis over IPv4 and IPv6

Monjur Ahmed, Alan T Litchfield, Shakil Ahmed, Adnan Mahmood, Md. Emran Hossain Meazi

Abstract | References | Full Paper: PDF (Size:216KB), PP.43-48, Pub. Date: 2014-10-8

DOI: 10.5815/ijcnis.2014.11.06

 

 

OpenFlow Technology: A Journey of Simulation Tools

Rakesh k. Jha, Pooja Kharga, Idris Z. Bholebawa, Sangeet Satyarthi , Anuradha, Shashi Kumari

Abstract | References | Full Paper: PDF (Size:523KB), PP.49-55, Pub. Date: 2014-10-8

DOI: 10.5815/ijcnis.2014.11.07

 

 

Detection Block Model for SQL Injection Attacks

Diksha G. Kumar, Madhumita Chatterjee

Abstract | References | Full Paper: PDF (Size:1074KB), PP.56-63, Pub. Date: 2014-10-8

DOI: 10.5815/ijcnis.2014.11.08