International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

DOI: 10.5815/ijcnis

Published By: MECS Press

IJCNIS Vol. 5, No. 8, Jun. 2013

Cover page and Table of Contents: PDF (size: 125KB)



  • Analysis of the SYN Flood DoS Attack

    Mitko Bogdanoski,Tomislav Shuminoski,Aleksandar Risteski

    DOI: 10.5815/ijcnis.2013.08.01

  • MUSIC 2D-DOA Estimation using Split Vertical Linear and Circular Arrays

    Yasser Albagory,Amira Ashour

    DOI: 10.5815/ijcnis.2013.08.02

  • Information Leakage Prevention Using Virtual Disk Drive

    Tarek S. Sobh

    DOI: 10.5815/ijcnis.2013.08.03

  • A Novel Solution for Discriminating Wormhole Attacks in MANETs from Congested Traffic using RTT and Transitory Buffer

    Maria Sebastian,Arun Raj Kumar P.

    DOI: 10.5815/ijcnis.2013.08.04

  • GSM Base Stations Location Monitoring using Geographic Information System

    Kuboye B. M.,Dada O. A.,Akinwonmi F. C.

    DOI: 10.5815/ijcnis.2013.08.05

  • Performance Analysis of Route Discovery by Cross Layer Routing Protocol- RDCLRP

    Mehajabeen Fatima,Roopam Gupta,T.K.Bandhopadhyay

    DOI: 10.5815/ijcnis.2013.08.06

  • Establishing Inter Vehicle Wireless Communication in Vanet and Preventing It from Hackers

    M. Milton Joe,R.S. Shaji,K. Ashok Kumar

    DOI: 10.5815/ijcnis.2013.08.07

  • Geographic Load Balanced Routing in Wireless Sensor Networks

    Robin Guleria,Ankit Kumar Jain

    DOI: 10.5815/ijcnis.2013.08.08