International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis


Published By: MECS Publisher







Limitations of Passively Mapping Logical Network Topologies

Ayodeji J. Akande, Colin Fidge, Ernest Foo

Abstract | References | Full Paper: PDF (Size:853KB), PP.1-11, Pub. Date: 2017-2-8

DOI: 10.5815/ijcnis.2017.02.01


Application of Attribute Based Access Control Model for Industrial Control Systems

Erkan Yalcinkaya, Antonio Maffei, Mauro Onori

Abstract | References | Full Paper: PDF (Size:593KB), PP.12-21, Pub. Date: 2017-2-8

DOI: 10.5815/ijcnis.2017.02.02


Medical Image Steganography: Study of Medical Image Quality Degradation when Embedding Data in the Frequency Domain


Abstract | References | Full Paper: PDF (Size:1073KB), PP.22-28, Pub. Date: 2017-2-8

DOI: 10.5815/ijcnis.2017.02.03


Design of an Android Application for Secure Chatting

Ammar H. Ali, Ali M. Sagheer
Abstract | References | Full Paper: PDF (Size:472KB), PP.29-35, Pub. Date: 2017-2-8

DOI: 10.5815/ijcnis.2017.02.04


An Effective Way of Evaluating Trust in Inter-cloud Computing

Kiran Mary Matthew, Abdul Quadir Md

Abstract | References | Full Paper: PDF (Size:273KB), PP.36-42, Pub. Date: 2017-2-8

DOI: 10.5815/ijcnis.2017.02.05


Pre-quarantine Approach for Defense against Propagation of Malicious Objects in Networks

ChukwuNonso H. Nwokoye, Godwin C. Ozoegwu, Virginia E. Ejiofor

Abstract | References | Full Paper: PDF (Size:930KB), PP.43-52, Pub. Date: 2017-2-8

DOI: 10.5815/ijcnis.2017.02.06


Novel Cloud Architecture to Decrease Problems Related to Big Data

Entesar Althagafy, M. Rizwan Jameel Qureshi

Abstract | References | Full Paper: PDF (Size:510KB), PP.53-60, Pub. Date: 2017-2-8

DOI: 10.5815/ijcnis.2017.02.07