International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis

 

Published By: MECS Publisher

 

 

Contents

 

REGULAR PAPERS

 
   

Limitations of Passively Mapping Logical Network Topologies

Ayodeji J. Akande, Colin Fidge, Ernest Foo

Abstract | References | Full Paper: PDF (Size:853KB), PP.1-11, Pub. Date: 2017-2-8

DOI: 10.5815/ijcnis.2017.02.01

 
   

Application of Attribute Based Access Control Model for Industrial Control Systems

Erkan Yalcinkaya, Antonio Maffei, Mauro Onori

Abstract | References | Full Paper: PDF (Size:593KB), PP.12-21, Pub. Date: 2017-2-8

DOI: 10.5815/ijcnis.2017.02.02

 
   

Medical Image Steganography: Study of Medical Image Quality Degradation when Embedding Data in the Frequency Domain

M.I.Khalil

Abstract | References | Full Paper: PDF (Size:1073KB), PP.22-28, Pub. Date: 2017-2-8

DOI: 10.5815/ijcnis.2017.02.03

 
   

Design of an Android Application for Secure Chatting

Ammar H. Ali, Ali M. Sagheer
Abstract | References | Full Paper: PDF (Size:472KB), PP.29-35, Pub. Date: 2017-2-8

DOI: 10.5815/ijcnis.2017.02.04

 
   

An Effective Way of Evaluating Trust in Inter-cloud Computing

Kiran Mary Matthew, Abdul Quadir Md

Abstract | References | Full Paper: PDF (Size:273KB), PP.36-42, Pub. Date: 2017-2-8

DOI: 10.5815/ijcnis.2017.02.05

 
   

Pre-quarantine Approach for Defense against Propagation of Malicious Objects in Networks

ChukwuNonso H. Nwokoye, Godwin C. Ozoegwu, Virginia E. Ejiofor

Abstract | References | Full Paper: PDF (Size:930KB), PP.43-52, Pub. Date: 2017-2-8

DOI: 10.5815/ijcnis.2017.02.06

 
   

Novel Cloud Architecture to Decrease Problems Related to Big Data

Entesar Althagafy, M. Rizwan Jameel Qureshi

Abstract | References | Full Paper: PDF (Size:510KB), PP.53-60, Pub. Date: 2017-2-8

DOI: 10.5815/ijcnis.2017.02.07