International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis

 

Published By: MECS Publisher

 

 

Contents

 

REGULAR PAPERS

 
   

Social Engineering: I-E based Model of Human Weakness for Attack and Defense Investigations

Wenjun Fan, Kevin Lwakatare, Rong Rong

Abstract | References | Full Paper: PDF (Size:337KB), PP.1-11, Pub. Date: 2017-1-8

DOI: 10.5815/ijcnis.2017.01.01

 
   

A Novel Digital Signature Algorithm based on Biometric Hash

Shivangi Saxena, Darpan Anand

Abstract | References | Full Paper: PDF (Size:453KB), PP.12-19, Pub. Date: 2017-1-8

DOI: 10.5815/ijcnis.2017.01.02

 
   

Pre-Processing of University Webserver Log Files for Intrusion Detection

Bukola A. Onyekwelu, B. K. Alese, A. O. Adetunmbi

Abstract | References | Full Paper: PDF (Size:1113KB), PP.20-30, Pub. Date: 2017-1-8

DOI: 10.5815/ijcnis.2017.01.03

 
   

Identity Verification Mechanism for Detecting Fake Profiles in Online Social Networks

Ali M. Meligy, Hani M. Ibrahim, Mohamed F. Torky
Abstract | References | Full Paper: PDF (Size:843KB), PP.31-39, Pub. Date: 2017-1-8

DOI: 10.5815/ijcnis.2017.01.04

 
   

Named Data Networking: Investigate of New Infrastructure for Future of Internet

Hadis Rezaei, Asad Vakili

Abstract | References | Full Paper: PDF (Size:516KB), PP.40-46, Pub. Date: 2017-1-8

DOI: 10.5815/ijcnis.2017.01.05

 
   

An Energy Efficient and Secure Clustering Protocol for Military based WSN

Prachi

Abstract | References | Full Paper: PDF (Size:300KB), PP.47-53, Pub. Date: 2017-1-8

DOI: 10.5815/ijcnis.2017.01.06

 
   

Analysis of User Identity Privacy in LTE and Proposed Solution

Abdulrahman A. Muthana, Mamoon M. Saeed

Abstract | References | Full Paper: PDF (Size:310KB), PP.54-63, Pub. Date: 2017-1-8

DOI: 10.5815/ijcnis.2017.01.07