International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis

 

Published By: MECS Publisher

 

 

Contents

 

REGULAR PAPERS

 
   

Secure Model for SMS Exchange over GSM

Mohammed Baqer M. Kamel, Loay E. George

Abstract | References | Full Paper: PDF (Size:561KB), PP.1-8, Pub. Date: 2016-1-8

DOI: 10.5815/ijcnis.2016.01.01

 
   

Dynamic and Real-time Sleep Schedule Protocols for Energy Efficiency in WSNs

Kaebeh Yaeghoobi S.B., M.K. Soni, S.S. Tyagi

Abstract | References | Full Paper: PDF (Size:677KB), PP.9-17, Pub. Date: 2016-1-8

DOI: 10.5815/ijcnis.2016.01.02

 
   

A Content based Image Retrieval Framework Using Color Descriptor

Abdelkhalak Bahri, Hamid Zouaki

Abstract | References | Full Paper: PDF (Size:1419KB), PP.18-26, Pub. Date: 2016-1-8

DOI: 10.5815/ijcnis.2016.01.03

 
   

Energy Conscious based Multipath Routing Algorithm in WSN

K.Rajasekaran, Kannan Balasubramanian
Abstract | References | Full Paper: PDF (Size:346KB), PP.27-34, Pub. Date: 2016-1-8

DOI: 10.5815/ijcnis.2016.01.04

 
   

Intrusion Detection with Multi-Connected Representation

Abdelkader Khobzaoui, Abderrahmane Yousfate

Abstract | References | Full Paper: PDF (Size:580KB), PP.35-42, Pub. Date: 2016-1-8

DOI: 10.5815/ijcnis.2016.01.05

 
   

Secure Allocation of Resources in Cloud Using Trust

Usha Divakarla, K. Chandrasekaran

Abstract | References | Full Paper: PDF (Size:701KB), PP.43-52, Pub. Date: 2016-1-8

DOI: 10.5815/ijcnis.2016.01.06

 
   

An Intrusion Detection and Prevention System based on Automatic Learning of Traffic Anomalies

Abdurrahman A. Nasr, Mohamed M. Ezz, Mohamed Z. Abdulmaged

Abstract | References | Full Paper: PDF (Size:440KB), PP.53-60, Pub. Date: 2016-1-8

DOI: 10.5815/ijcnis.2016.01.07

 
   

Context-Sensitive Grammars and Linear-Bounded Automata
Prem Nath

Abstract | References | Full Paper: PDF (Size:382KB), PP.61-66, Pub. Date: 2016-1-8

DOI: 10.5815/ijcnis.2016.01.08