Performance Evaluation of ERGR-EMHC Routing Protocol using LSWTS and 3DUL Localization Schemes in UWSNs Faiza Al-Salti1, N. Alzeidi2, Khaled Day2, Abderezak Touzene2, 1Sultan Qaboos Comprehensive Cancer Care and Research Centre, Oman, 2Sultan Qaboos University, Oman |
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks Chandra Kanta Samal, Delhi University, India |
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network Savita Jadhav1 and Sangeeta Jadhav2, 1Dr. D. Y. Patil Institute of Technology Pimpri, India,2Army Institute of Technology, Dhighi, India |
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in Heterogeneous LTE-VANET Networks Driss Abada1, Rachid Adrdor2, Omar Boutkhoum3, and Adil Bohouch4, 1,3Chouaïb Doukkali University, Morocco, 2Ibn Zohr University, Morocco, 4Mohamed V University, Morocco |
Security Culture, Top Management, and Training on Security Effectiveness: A Correlational Study Without CISSP Participants Joshua Porche1 and Shawon Rahman2, 1Information Security System Engineer, USA, 2University of Hawaii-Hilo Hilo, USA |
Detection of Peer-to-Peer Botnets using Graph Mining Dhruba Jyoti Borah and Abhijit Sarma, Gauhati University, India |
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET Nitesh Ghodichor1, Raj Thaneeghavl. V1, Dinesh Sahu1, Gautam Borkar2, Ankush Sawarkar3, 1SRK University, India, 2DY Patil University, India, 3VNIT, India |
Performance Evaluation of the KVM Hypervisor Running on ARM-Based Single-Board Computers Eric Gamess, Mausam Parajuli, and Syed Shah, Jacksonville State University, USA |
An Intrusion Detection Mechanism for MANETS based on Deep Learning Artificial Neural Networks (ANNS) Mohamad T Sultan1,2, Hesham El Sayed1,2 and Manzoor Ahmed Khan3, 1,3College of Information Technology United Arab Emirates University, UAE, 2United Arab Emirates University, United Arab Emirates |
Phishing URL Detection using LSTM Based Ensemble Learning Approaches
Bireswar Banik and Abhijit Sarma, Gauhati University, India |
A Lightweight Method for Detecting Cyber Attacks in High-traffic Large Networks based on Clustering Techniques Nguyen Hong Son1 and Ha Thanh Dung2, 1Posts and Telecommunications Institute of Technology, Vietnam, 2Saigon University, Vietnam |
Actor Critic Approach based Anomaly Detection for Edge Computing Environments Shruthi N1 and Siddesh G K2, 1BNMIT, India, 2New Horizon College of Engineering, India |
An Efficient Method to Compute the Rate Matrix for Multi-Server Retrial Queues with Cloud Computing Systems Dang Thanh Chuong, Hoa Ly Cuong, Hoang Dinh Long and Duong Duc Hung, Hue University, Vietnam |
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network Nibedita Jagadev1, Binod Kumar Pattanayak1, Ahmadkhader habboush2, Bassam Mohammad Elzaghmouri2, Mahmoud Ali Al Shugran2, 1Siksha’O’ Anusandhan Deemed to be University, India, 2Jerash University, Jordan |
Dynamic Interference Suppression for TV White Space: the Case of Thailand Prathana Thaopanya1 and Teerapat Sanguankotchakorn2, 1Thai Public Broadcasting Service (ThaiPBS), Thailand, 2Asian Institute of Technology, Thailand |
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcement Learning Bayarmaa Ragchaa and Kazuhiko Kinoshita, Tokushima University, Japan |