International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis

 

Published By: MECS Publisher

 

 

Contents

 

REGULAR PAPERS

 
   

Contextual Risk-based Decision Modeling for Vehicular Networks

Vijey Thayananthan, Riaz Ahmed Shaikh

Abstract | References | Full Paper: PDF (Size:507KB), PP.1-9, Pub. Date: 2016-9-8

DOI: 10.5815/ijcnis.2016.09.01

 
   

A Novel Scheme for Image Authentication and Secret Data Sharing

Auqib Hamid Lone, Ab Waheed Lone, Moin Uddin

Abstract | References | Full Paper: PDF (Size:1037KB), PP.10-18, Pub. Date: 2016-9-8

DOI: 10.5815/ijcnis.2016.09.02

 
   

Honeypot System for Attacks on SSH Protocol

Solomon Z. Melese, P.S. Avadhani

Abstract | References | Full Paper: PDF (Size:496KB), PP.19-26, Pub. Date: 2016-9-8

DOI: 10.5815/ijcnis.2016.09.03

 
   

Alternative Equations for Guillou-Quisquater Signature Scheme

J. Ettanfouhi, O. Khadir
Abstract | References | Full Paper: PDF (Size:418KB), PP.27-33, Pub. Date: 2016-9-8

DOI: 10.5815/ijcnis.2016.09.04

 
   

Comparative Analysis of Classification Algorithms on KDD'99 Data Set

Iknoor Singh Arora, Gurpriya Kaur Bhatia, Amrit Pal Singh

Abstract | References | Full Paper: PDF (Size:529KB), PP.34-40, Pub. Date: 2016-9-8

DOI: 10.5815/ijcnis.2016.09.05

 
   

Interaction of High Speed TCPs with Recent AQMs through Experimental Evaluation

VandanaKushwaha, Ratneshwer

Abstract | References | Full Paper: PDF (Size:684KB), PP.41-47, Pub. Date: 2016-9-8

DOI: 10.5815/ijcnis.2016.09.06

 
   

Efficient Resource Management for Multicast Ad Hoc Networks: Survey

Amit Chopra, Rajneesh Kumar

Abstract | References | Full Paper: PDF (Size:268KB), PP.48-55, Pub. Date: 2016-9-8

DOI: 10.5815/ijcnis.2016.09.07

 
   

Detection and Mitigation of Sybil Attack in Peer-to-peer Network

Arpita M. Bhise, Shailesh D. Kamble

Abstract | References | Full Paper: PDF (Size:410KB), PP.56-63, Pub. Date: 2016-9-8

DOI: 10.5815/ijcnis.2016.09.08