Current Issue

November 2023, Volume 15, Number 6

Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient Reinforcement Learning Framework
Shruthi N1 and Siddesh G K2, 1Visvesvaraya Technological University, India, 2ALVA’s Institute of Engineering & Technology, India

Machine to Machine Authenticated Key Agreement with Forward Secrecy for Internet of Things
Batamu Anderson Chiphiko1 and Hyunsung Kim1,2, 1University of Malawi, Malawi, 2Kyungil University, Korea

Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examination and Codification of Vulnerabilities
in Prominent Blockchains

Oualid Zaazaa and Hanan El Bakkali, Mohammed V University in Rabat, Morocco

Unveiling Advanced Persistence Techniques Through Application Shimming and Countermeasures
Akashdeep Bhardwaj1, Naresh Kumar2 and Shawon S. M. Rahman3, 1University of Petroleum and Energy Studies, India, 2University of Nizwa, Oman, 3University of Hawai‘i at Hilo, USA

Channel Estimation in MIMO OFDM Systems with Tapped Delay Line Model
Ravi Hosamani and Yerriswamy T, K.L.E . Institute of Technology, India

Maximum Throughput First Access Point Selection Scheme for Multi-Rate Software-Defined Wireless Network
Hassen A. Mogaibel and Majed Hashim, Al-Ahgaff University, Yemen

Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicular Named Data Networks
Nithin Rao R and Rinki Sharma, Ramaiah University of Applied Sciences, India

Random Relay Selection based Heuristic Optimization Model for the Scheduling and Effective Resource Allocation
in the Cognitive Radio Network

Aravindkumaran.S and Dr.Saraswady.D, Puducherry Technological University, India

September 2023, Volume 15, Number 5

BLE Beacon with Data Accumulation Functionality
KOBAYASHI Kakeru and FUJITA Satoshi, Hiroshima University, Japan

Optimize the Network Coding Paths to Enhance the Coding Protection in Wireless Multimedia Sensor Network
Mohammadjavad Abbasi, A. S. Abdullah and N. Fisal, Universiti Teknologi Malaysia (UTM), Malaysia

Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection based on Delaying the First Node Death

Awatef Chniguir and Zouhair Ben Jemaa, University of Tunis El Manar, Tunisia

Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent Transportation System
Saureng Kumar and S C Sharma, IIT Roorkee, India

Multi Objective Salp Swarm based Energy Efficient Routing Protocol for Heterogeneous Wireless Networks
Salima Nebti1 and Mohammed Redjimi2, 1Emir Abdelkader University, Algeria, 220 Août 1955 University, Algeria

Analysis of System Capacity and Spectral Efficiency of Fixed-Grid Network
Adarsha M1, S. Malathi1 and Santosh Kumar2, 1M. S. Ramaiah University of Applied Sciences, India, 2Liaocheng University, China

A Privacy-Aware Tracking and Tracing System
Ali M. Allam, Helwan University, Egypt

A Survey on CDN Vulnerability to DoS Attacks
Maurizio D’Arienzo and Serena Gracco, Universit`a della Campania ”L.Vanvitelli”, Italy

July 2023, Volume 15, Number 4

Enhancing HTTP Web Protocol Performance with Updated Transport Layer Techniques
Ziaul Hossain1 and Gorry Fairhurst2, 1University of Fraser Valley, Canada, 2University of Aberdeen, UK

Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
Varun P. Sarvade1 and Shrirang Ambaji Kulkarni2, 1B. G. M. Institute of Technology, Mudhol, India, 2The National Institute
of Engineering, India

IoT Resource Allocation and Optimization Using Improved Reptile Search Algorithm
Prabhakar Narasappa Kota1, Pravin Balaso Chopade1, Bhagvat D. Jadhav2, Pravin Marotrao Ghate2 and Shankar Dattatray Chavan3, 1MES’s College of Engineering, India, 2JSPM's Rajarshi Shahu College of Engineering, India, 3Dr. D. Y. Patil Institute
of Technology, India

Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Mohamed Ali Shaaban1, Almohammady S. Alsharkawy2, Mohammad T. Abou-Kreisha2 and Mohammed Abdel Razek2,
1Sinai University, Egypt, 2Al-Azhar University, Egypt

Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utilization in Wireless Sensor Network
Shanmugavalli R and Subashini P, Avinashilingam Institute for Home Science and Higher Education for Women, India

Intrusion Detection System(IDS) Development Using Tree-Based Machine Learning Algorithms
Witcha Chimphlee and Siriporn Chimphlee, Suan Dusit University, Thailand

Machine Learning Based Ensemble Classifier for Android Malware Detection
P Sumalatha1 and G.S. Mahalakshmi2, 1Bhoj Reddy Engineering College for Women, India, 2Anna University, India

Ransomware Attack Detection based on Pertinent System Calls Using Machine Learning Techniques
Ahmed Dib, Sabri Ghazi and Mendjel Mohamed Said Mehdi, Mokhtar Annaba University, Algeria

May 2023, Volume 15, Number 3

Improved Q-Reinforcement Learning based Optimal Channel Selection in Cognitive Radio Networks
Sopan Talekar1, Satish Banait2 and Mithun Patil3, 1MVPS’s KBT College of Engineering, India, 2K.K. Wagh Institute of Engineering Education & Research, India, 3N.K. Orchid College of Engineering & Technology, India

Evaluating Latency in Fifth-Generation Vehicle-to-Everything Communications using Adaptive Neuro-Fuzzy Inference
System Model

Hamdy A.M. Sayedahmed1,3, Emadeldin M. Elgamal1,2, Hesham A. Hefny1, 1Cairo University, Egypt, 2Tarleton State University, USA, 3Central Metallurgical Research and Development Institute, Egypt

IoT-Based Mobile Adaptive Routing Algorithm in a Ubiquitous Network
Prasanna Kumar G and Shankaraiah N, Jayachamarajendra College of Engineering, India

Enabling Ray Tracing for 5G
Vladislav Ryzhov, Moscow Institute of Physics and Technology, Russia

Congestion and Energy Aware Multipath Load Balancing Routing for LLNs
Kala Venugopal and T G Basavaraju, Government Engineering College, India

PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Polymorphic Treatment of Features
S. Chanti, T. Chithralekha, and K. S. Kuppusamy, Pondicherry University, India

DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Practical Environment
Dinh Thi Thai Mai, Nguyen Tien Dat, Pham Minh Bao, Can Quang Truong, Nguyen Thanh Tung, VNU University
of Engineering and Technology, Hanoi, Vietnam

Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Hariharasudhan V and P.Vetrivelan, VIT, India

March 2023, Volume 15, Number 2

Performance Evaluation of ERGR-EMHC Routing Protocol using LSWTS and 3DUL Localization Schemes in UWSNs
Faiza Al-Salti1, N. Alzeidi2, Khaled Day2, Abderezak Touzene2, 1Sultan Qaboos Comprehensive Cancer Care and Research Centre, Oman, 2Sultan Qaboos University, Oman

Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Chandra Kanta Samal, Delhi University, India

VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
Savita Jadhav1 and Sangeeta Jadhav2, 1Dr. D. Y. Patil Institute of Technology Pimpri, India,2Army Institute of Technology, Dhighi, India

An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in Heterogeneous LTE-VANET

Driss Abada1, Rachid Adrdor2, Omar Boutkhoum3, and Adil Bouhouch4, 1,3Chouaïb Doukkali University, Morocco,
2Ibn Zohr University, Morocco, 4Mohamed V University, Morocco

Security Culture, Top Management, and Training on Security Effectiveness: A Correlational Study Without CISSP

Joshua Porche1 and Shawon Rahman2, 1Information Security System Engineer, USA, 2University of Hawaii-Hilo
Hilo, USA

Detection of Peer-to-Peer Botnets using Graph Mining
Dhruba Jyoti Borah and Abhijit Sarma, Gauhati University, India

Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET
Nitesh Ghodichor1, Raj Thaneeghavl. V1, Dinesh Sahu1, Gautam Borkar2, Ankush Sawarkar3, 1SRK University, India,
2DY Patil University, India, 3VNIT, India

Performance Evaluation of the KVM Hypervisor Running on ARM-Based Single-Board Computers
Eric Gamess, Mausam Parajuli, and Syed Shah, Jacksonville State University, USA

January 2023, Volume 15, Number 1

An Intrusion Detection Mechanism for MANETS based on Deep Learning Artificial Neural Networks (ANNS)
Mohamad T Sultan1,2, Hesham El Sayed1,2 and Manzoor Ahmed Khan3, 1,3College of Information Technology United Arab Emirates University, UAE, 2United Arab Emirates University, United Arab Emirates

Phishing URL Detection using LSTM Based Ensemble Learning Approaches
Bireswar Banik and Abhijit Sarma, Gauhati University, India

A Lightweight Method for Detecting Cyber Attacks in High-traffic Large Networks based on Clustering Techniques
Nguyen Hong Son1 and Ha Thanh Dung2, 1Posts and Telecommunications Institute of Technology, Vietnam,
2Saigon University, Vietnam

Actor Critic Approach based Anomaly Detection for Edge Computing Environments
Shruthi N1 and Siddesh G K2, 1BNMIT, India, 2New Horizon College of Engineering, India

An Efficient Method to Compute the Rate Matrix for Multi-Server Retrial Queues with Cloud Computing Systems
Dang Thanh Chuong, Hoa Ly Cuong, Hoang Dinh Long and Duong Duc Hung, Hue University, Vietnam

Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Nibedita Jagadev1, Binod Kumar Pattanayak1, Ahmadkhader habboush2, Bassam Mohammad Elzaghmouri2,
Mahmoud Ali Al Shugran2, 1Siksha’O’ Anusandhan Deemed to be University, India, 2Jerash University, Jordan

Dynamic Interference Suppression for TV White Space: the Case of Thailand
Prathana Thaopanya1 and Teerapat Sanguankotchakorn2, 1Thai Public Broadcasting Service (ThaiPBS), Thailand,
2Asian Institute of Technology, Thailand

Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcement Learning
Bayarmaa Ragchaa and Kazuhiko Kinoshita, Tokushima University, Japan