International Journal of Computer Network and Information Security(IJCNIS)
ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis
Published By: MECS Press
IJCNIS Vol. 10, No. 3, Mar. 2018
Cover page and Table of Contents: PDF (size: 174KB)
Contents
REGULAR PAPERS
-
An Implementation of Software Routing for Building a Private Cloud
Rawezh Ziad Kamla, Tara Yahiya, Nashwan B. Mustafa
Abstract | References | Full Paper: PDF (Size:552KB), PP.1-7, Pub. Date: 2018-03-08
DOI: 10.5815/ijcnis.2018.03.01
-
Secure Multiparty Computation for Privacy Preserving Range Queries on Medical Records for Star Exchange Topology
Ahmed M. Tawfik, Sahar F. Sabbeh, Tarek A. EL-Shishtawy
Abstract | References | Full Paper: PDF (Size:672KB), PP.8-16, Pub. Date: 2018-03-08
DOI: 10.5815/ijcnis.2018.03.02
-
Performance Analysis of Classification Techniques by using Multi Agent Based Intrusion Detection System
Aumreesh Kumar Saxena, Sitesh Sinha, Piyush Shukla
Abstract | References | Full Paper: PDF (Size:506KB), PP.17-24, Pub. Date: 2018-03-08
DOI: 10.5815/ijcnis.2018.03.03
-
Cyber Attacks in Cloud Computing: Modelling Multi-stage Attacks using Probability Density Curves
Aaron Zimba, Victoria Chama
Abstract | References | Full Paper: PDF (Size:632KB), PP.25-36, Pub. Date: 2018-03-08
DOI: 10.5815/ijcnis.2018.03.04
-
Inter Integrated WSN for Crude Oil Pipeline Monitoring
Bhavyarani M P, U B Mahadeva Swamy, M B Shrynik Jain
Abstract | References | Full Paper: PDF (Size:894KB), PP.37-51, Pub. Date: 2018-03-08
DOI: 10.5815/ijcnis.2018.03.05
-
Optimization of Different Queries using Optimization Algorithm (DE)
Sahil Saharan, J.S. Lather, R. Radhakrishnan
Abstract | References | Full Paper: PDF (Size:869KB), PP.52-59, Pub. Date: 2018-03-08
DOI: 10.5815/ijcnis.2018.03.06
-
Image Cryptography with Matrix Array Symmetric Key using Chaos based Approach
Tarun Kumar, Shikha Chauhan
Abstract | References | Full Paper: PDF (Size:476KB), PP.60-66, Pub. Date: 2018-03-08
DOI: 10.5815/ijcnis.2018.03.07