International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis

 

Published By: MECS Publisher

 

 

Contents

 

REGULAR PAPERS

 

 

Router-based Content-aware Data Redirection for Future CDN Systems

Janaka L. Wijekoon, Erwin H. Harahap, Shinichi Ishida, Rajitha L. Tennekoon, Hiroaki Nishi

Abstract | References | Full Paper: PDF (Size:701KB), PP.1-10, Pub. Date: 2014-6-8

DOI: 10.5815/ijcnis.2014.07.01


 

ECCO Mnemonic Authentication—Two-Factor Authentication Method with Ease-of-Use

Saman Gerami Moghaddam, Amin Nasiri, Mohsen Sharifi

Abstract | References | Full Paper: PDF (Size:379KB), PP.11-18, Pub. Date: 2014-6-8

DOI: 10.5815/ijcnis.2014.07.02

 

 

Forward Error Correction Convolutional Codes for RTAs' Networks: An Overview

Salehe I. Mrutu, Anael Sam, Nerey H. Mvungi

Abstract | References | Full Paper: PDF (Size:478KB), PP.19-27, Pub. Date: 2014-6-8

DOI: 10.5815/ijcnis.2014.07.03

 

 

Performance Comparison of single and multiple watermarking techniques

Mohananthini Natarajan, Yamuna Govindarajan

Abstract | References | Full Paper: PDF (Size:271KB), PP.28-34, Pub. Date: 2014-6-8

DOI: 10.5815/ijcnis.2014.07.04

 

 

A New Optimization Model for Distribution Siting and Sizing in Unbalanced Three-phase Networks for Loss and Cost Minimization

Farzaneh Yazdani, Seyyed Mehdy Hosseini, Taghi Barforuoshi

Abstract | References | Full Paper: PDF (Size:292KB), PP.35-41, Pub. Date: 2014-6-8

DOI: 10.5815/ijcnis.2014.07.05

 

 

Mobility Based Cluster Head Selection Algorithm for Mobile Ad-Hoc Network

Soumyabrata Talapatra, Alak Roy

Abstract | References | Full Paper: PDF (Size:391KB), PP.42-49, Pub. Date: 2014-6-8

DOI: 10.5815/ijcnis.2014.07.06

 

 

Task Assignment for Heterogeneous Computing Problems using Improved Iterated Greedy Algorithm

R.Mohan, N.P.Gopalan

Abstract | References | Full Paper: PDF (Size:397KB), PP.50-55, Pub. Date: 2014-6-8

DOI: 10.5815/ijcnis.2014.07.07

 

 

Feature Selection for Modeling Intrusion Detection

Virendra Barot, Sameer Singh Chauhan, Bhavesh Patel

Abstract | References | Full Paper: PDF (Size:1130KB), PP.56-62, Pub. Date: 2014-6-8

DOI: 10.5815/ijcnis.2014.07.08