![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
International Journal of Communication Networks and Information Security (IJCNIS), Volume 5
Volume 5, Number 1, 2013
- Xianglin Wei, Jianhua Fan, Ming Chen, Tarem Ahmed, Al-Sakib Khan Pathan:
SMART: A Subspace based Malicious Peers Detection algorithm for P2P Systems. - Muhammad Zeeshan, Shoab Ahmed Khan:
Robust Sampling Clock Recovery Algorithm for Wideband Networking Waveform of SDR. - Arfianto Fahmi, Muhamad Asvial, Dadang Gunawan:
Combined-order Algorithm using Promethee Method Approach and Analytic Hierarchy Decision for Chunk Allocation in LTE Uplink Systems. - Nasreddine Hajlaoui, Issam Jabri, Maher Ben Jemaa:
Experimental Performance Evaluation and Frame Aggregation Enhancement in IEEE 802.11n WLANs. - Hamid Naderi, Hadi Shahosseini, Amir Jafari:
Evaluation MCDM Multi-disjoint Paths Selection Algorithms Using Fuzzy-Copeland Ranking Method.
- Natarajan Meghanathan:
A Survey on the Communication Protocols and Security in Cognitive Radio Networks.
Volume 5, Number 2, 2013
- Mahdieh Ghazvini, Naser Movahhedinia, Kamal Jamshidi:
A Game Theory based Contention Window Adjustment for IEEE 802.11 under Heavy Load. - Arif Iqbal, Kazi M. Ahmed:
Integrated Satellite-Terrestrial System Capacity Over Mix Shadowed Rician and Nakagami Channels. - N. Jeyanthi, N. Ch. S. N. Iyengar, P. C. Mogan Kumar, A. Kannammal:
An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment. - Deivison Pinheiro Franco, Felipe Dantas Barboza, Nágila Magalhães Cardoso:
A Secure Method for Authenticity Verification of Handwritten Signatures Through Digital Image Processing and Artificial Neural Networks. - Faisal Riaz, Syed Ismail Shah, Muhammad Raees, Imran Shafi, Arslan Iqbal:
Lateral Pre-crash Sensing and Avoidance in Emotion Enabled Cognitive Agent based Vehicle-2-Vehicle Communication System.
- Badr Benmammar, Asma Amraoui, Francine Krief:
A Survey on Dynamic Spectrum Access Techniques in Cognitive Radio Networks. - Diallo Abdoulaye Kindy, Al-Sakib Khan Pathan:
A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks, and Remedies.
Volume 5, Number 3, 2013
- Shahrukh Khalid, Athar Mahboob:
Design and Implementation of ID Based MANET Autoconfiguration Protocol. - Ferchichi Abdelhak, Sabri Beldi, Ali Gharsallah:
An electrical model to design a Metamaterial Left Hand Antenna. - Somia Sahraoui, Souheila Bouam:
Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks. - Husna Zainol Abidin, Norashidah Md Din, Nurul Asyikin Mohamed Radzi:
Deterministic Static Sensor Node Placement in Wireless Sensor Network based on Territorial Predator Scent Marking Behaviour. - Youssef Dehbi, Hafssa Benaboud, Noufissa Mikou:
A Geometric Backoff Time Distribution of IEEE 802.11 DCF: An Analytical Study. - Saïd Nouh, Idriss Chana, Mostafa Belkasmi:
Decoding of Block Codes by using Genetic Algorithms and Permutations Set. - Ali Cherif Moussa, Kamel Mohamed Faraoun, Sofiane Boukli Hacene:
Link Quality and MAC-Overhead aware Predictive Preemptive Multipath Routing Protocol for Mobile Ad hoc Networks.
- Mohamed Guerroumi, Al-Sakib Khan Pathan, Nadjib Badache, Samira Moussaoui:
Strengths and Weaknesses of Prominent Data Dissemination Techniques in Wireless Sensor Networks.
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.