Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient Reinforcement Learning Framework Full Text Shruthi N1 and Siddesh G K2 , 1 Visvesvaraya Technological University, India, 2 ALVA’s Institute of Engineering & Technology, India
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Internet of Things Full Text Batamu Anderson Chiphiko1 and Hyunsung Kim1,2 , 1 University of Malawi, Malawi, 2 Kyungil University, Korea
Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examination and Codification of Vulnerabilities in Prominent Blockchains Full Text Oualid Zaazaa and Hanan El Bakkali, Mohammed V University in Rabat, Morocco
Unveiling Advanced Persistence Techniques Through Application Shimming and Countermeasures Full Text Akashdeep Bhardwaj1 , Naresh Kumar2 and Shawon S. M. Rahman3 , 1 University of Petroleum and Energy Studies, India, 2 University of Nizwa, Oman, 3 University of Hawai‘i at Hilo, USA
Channel Estimation in MIMO OFDM Systems with Tapped Delay Line Model Full Text Ravi Hosamani and Yerriswamy T, K.L.E . Institute of Technology, India
Maximum Throughput First Access Point Selection Scheme for Multi-Rate Software-Defined Wireless Network Full Text Hassen A. Mogaibel and Majed Hashim, Al-Ahgaff University, Yemen
Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicular Named Data Networks Full Text Nithin Rao R and Rinki Sharma, Ramaiah University of Applied Sciences, India
Random Relay Selection based Heuristic Optimization Model for the Scheduling and Effective Resource Allocation in the Cognitive Radio Network Full Text Aravindkumaran.S and Dr.Saraswady.D, Puducherry Technological University, India
BLE Beacon with Data Accumulation Functionality Full Text KOBAYASHI Kakeru and FUJITA Satoshi, Hiroshima University, Japan
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireless Multimedia Sensor Network Full Text Mohammadjavad Abbasi, A. S. Abdullah and N. Fisal, Universiti Teknologi Malaysia (UTM), Malaysia
Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection based on Delaying the First Node Death in MWSN-IoT Full Text Awatef Chniguir and Zouhair Ben Jemaa, University of Tunis El Manar, Tunisia
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent Transportation System Full Text Saureng Kumar and S C Sharma, IIT Roorkee, India
Multi Objective Salp Swarm based Energy Efficient Routing Protocol for Heterogeneous Wireless Networks Full Text Salima Nebti1 and Mohammed Redjimi2 , 1 Emir Abdelkader University, Algeria, 2 20 Août 1955 University, Algeria
Analysis of System Capacity and Spectral Efficiency of Fixed-Grid Network Full Text Adarsha M1 , S. Malathi1 and Santosh Kumar2 , 1 M. S. Ramaiah University of Applied Sciences, India, 2 Liaocheng University, China
A Privacy-Aware Tracking and Tracing System Full Text Ali M. Allam, Helwan University, Egypt
A Survey on CDN Vulnerability to DoS Attacks Full Text Maurizio D’Arienzo and Serena Gracco, Universit`a della Campania ”L.Vanvitelli”, Italy
Enhancing HTTP Web Protocol Performance with Updated Transport Layer Techniques Full Text Ziaul Hossain1 and Gorry Fairhurst2 , 1 University of Fraser Valley, Canada, 2 University of Aberdeen, UK
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks Full Text Varun P. Sarvade1 and Shrirang Ambaji Kulkarni2 , 1 B. G. M. Institute of Technology, Mudhol, India, 2 The National Institute of Engineering, India
IoT Resource Allocation and Optimization Using Improved Reptile Search Algorithm Full Text Prabhakar Narasappa Kota1 , Pravin Balaso Chopade1 , Bhagvat D. Jadhav2 , Pravin Marotrao Ghate2 and Shankar Dattatray Chavan3 , 1 MES’s College of Engineering, India, 2 JSPM's Rajarshi Shahu College of Engineering, India, 3 Dr. D. Y. Patil Institute of Technology, India
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment Full Text Mohamed Ali Shaaban1 , Almohammady S. Alsharkawy2 , Mohammad T. Abou-Kreisha2 and Mohammed Abdel Razek2 , 1 Sinai University, Egypt, 2 Al-Azhar University, Egypt
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utilization in Wireless Sensor Network Full Text Shanmugavalli R and Subashini P, Avinashilingam Institute for Home Science and Higher Education for Women, India
Intrusion Detection System(IDS) Development Using Tree-Based Machine Learning Algorithms Full Text Witcha Chimphlee and Siriporn Chimphlee, Suan Dusit University, Thailand
Machine Learning Based Ensemble Classifier for Android Malware Detection Full Text P Sumalatha1 and G.S. Mahalakshmi2 , 1 Bhoj Reddy Engineering College for Women, India, 2 Anna University, India
Ransomware Attack Detection based on Pertinent System Calls Using Machine Learning Techniques Full Text Ahmed Dib, Sabri Ghazi and Mendjel Mohamed Said Mehdi, Mokhtar Annaba University, Algeria
Improved Q-Reinforcement Learning based Optimal Channel Selection in Cognitive Radio Networks Full Text Sopan Talekar1 , Satish Banait2 and Mithun Patil3 , 1 MVPS’s KBT College of Engineering, India, 2 K.K. Wagh Institute of Engineering Education & Research, India, 3 N.K. Orchid College of Engineering & Technology, India
Evaluating Latency in Fifth-Generation Vehicle-to-Everything Communications using Adaptive Neuro-Fuzzy Inference System Model Full Text Hamdy A.M. Sayedahmed1,3 , Emadeldin M. Elgamal1,2 , Hesham A. Hefny1 , 1 Cairo University, Egypt, 2 Tarleton State University, USA, 3 Central Metallurgical Research and Development Institute, Egypt
IoT-Based Mobile Adaptive Routing Algorithm in a Ubiquitous Network Full Text Prasanna Kumar G and Shankaraiah N, Jayachamarajendra College of Engineering, India
Enabling Ray Tracing for 5G Full Text Vladislav Ryzhov, Moscow Institute of Physics and Technology, Russia
Congestion and Energy Aware Multipath Load Balancing Routing for LLNs Full Text Kala Venugopal and T G Basavaraju, Government Engineering College, India
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Polymorphic Treatment of Features Full Text S. Chanti, T. Chithralekha, and K. S. Kuppusamy, Pondicherry University, India
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Practical Environment Full Text Dinh Thi Thai Mai, Nguyen Tien Dat, Pham Minh Bao, Can Quang Truong, Nguyen Thanh Tung, VNU University of Engineering and Technology, Hanoi, Vietnam
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications Full Text Hariharasudhan V and P.Vetrivelan, VIT, India
Performance Evaluation of ERGR-EMHC Routing Protocol using LSWTS and 3DUL Localization Schemes in UWSNs Full Text Faiza Al-Salti1 , N. Alzeidi2 , Khaled Day2 , Abderezak Touzene2 , 1 Sultan Qaboos Comprehensive Cancer Care and Research Centre, Oman, 2 Sultan Qaboos University, Oman
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks Full Text Chandra Kanta Samal, Delhi University, India
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network Full Text Savita Jadhav1 and Sangeeta Jadhav2 , 1 Dr. D. Y. Patil Institute of Technology Pimpri, India,2 Army Institute of Technology, Dhighi, India
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in Heterogeneous LTE-VANET Networks Full Text Driss Abada1 , Rachid Adrdor2 , Omar Boutkhoum3 , and Adil Bouhouch4 , 1,3 Chouaïb Doukkali University, Morocco, 2 Ibn Zohr University, Morocco, 4 Mohamed V University, Morocco
Security Culture, Top Management, and Training on Security Effectiveness: A Correlational Study Without CISSP Participants Full Text Joshua Porche1 and Shawon Rahman2 , 1 Information Security System Engineer, USA, 2 University of Hawaii-Hilo Hilo, USA
Detection of Peer-to-Peer Botnets using Graph Mining Full Text Dhruba Jyoti Borah and Abhijit Sarma, Gauhati University, India
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET Full Text Nitesh Ghodichor1 , Raj Thaneeghavl. V1 , Dinesh Sahu1 , Gautam Borkar2 , Ankush Sawarkar3 , 1 SRK University, India, 2 DY Patil University, India, 3 VNIT, India
Performance Evaluation of the KVM Hypervisor Running on ARM-Based Single-Board Computers Full Text Eric Gamess, Mausam Parajuli, and Syed Shah, Jacksonville State University, USA
An Intrusion Detection Mechanism for MANETS based on Deep Learning Artificial Neural Networks (ANNS) Full Text Mohamad T Sultan1,2 , Hesham El Sayed1,2 and Manzoor Ahmed Khan3 , 1,3 College of Information Technology United Arab Emirates University, UAE, 2 United Arab Emirates University, United Arab Emirates
Phishing URL Detection using LSTM Based Ensemble Learning Approaches
Full Text Bireswar Banik and Abhijit Sarma, Gauhati University, India
A Lightweight Method for Detecting Cyber Attacks in High-traffic Large Networks based on Clustering Techniques Full Text Nguyen Hong Son1 and Ha Thanh Dung2 , 1 Posts and Telecommunications Institute of Technology, Vietnam, 2 Saigon University, Vietnam
Actor Critic Approach based Anomaly Detection for Edge Computing Environments Full Text Shruthi N1 and Siddesh G K2 , 1 BNMIT, India, 2 New Horizon College of Engineering, India
An Efficient Method to Compute the Rate Matrix for Multi-Server Retrial Queues with Cloud Computing Systems Full Text Dang Thanh Chuong, Hoa Ly Cuong, Hoang Dinh Long and Duong Duc Hung, Hue University, Vietnam
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network Full Text Nibedita Jagadev1 , Binod Kumar Pattanayak1 , Ahmadkhader habboush2 , Bassam Mohammad Elzaghmouri2 , Mahmoud Ali Al Shugran2 , 1 Siksha’O’ Anusandhan Deemed to be University, India, 2 Jerash University, Jordan
Dynamic Interference Suppression for TV White Space: the Case of Thailand Full Text Prathana Thaopanya1 and Teerapat Sanguankotchakorn2 , 1 Thai Public Broadcasting Service (ThaiPBS), Thailand, 2 Asian Institute of Technology, Thailand
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcement Learning Full Text Bayarmaa Ragchaa and Kazuhiko Kinoshita, Tokushima University, Japan