Current Issue

March 2023, Volume 15, Number 2

Performance Evaluation of ERGR-EMHC Routing Protocol using LSWTS and 3DUL Localization Schemes in UWSNs
Faiza Al-Salti1, N. Alzeidi2, Khaled Day2, Abderezak Touzene2, 1Sultan Qaboos Comprehensive Cancer Care and Research Centre, Oman, 2Sultan Qaboos University, Oman

Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Chandra Kanta Samal, Delhi University, India

VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
Savita Jadhav1 and Sangeeta Jadhav2, 1Dr. D. Y. Patil Institute of Technology Pimpri, India,2Army Institute of Technology, Dhighi, India

An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in Heterogeneous LTE-VANET

Driss Abada1, Rachid Adrdor2, Omar Boutkhoum3, and Adil Bohouch4, 1,3Chouaïb Doukkali University, Morocco,
2Ibn Zohr University, Morocco, 4Mohamed V University, Morocco

Security Culture, Top Management, and Training on Security Effectiveness: A Correlational Study Without CISSP

Joshua Porche1 and Shawon Rahman2, 1Information Security System Engineer, USA, 2University of Hawaii-Hilo
Hilo, USA

Detection of Peer-to-Peer Botnets using Graph Mining
Dhruba Jyoti Borah and Abhijit Sarma, Gauhati University, India

Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET
Nitesh Ghodichor1, Raj Thaneeghavl. V1, Dinesh Sahu1, Gautam Borkar2, Ankush Sawarkar3, 1SRK University, India,
2DY Patil University, India, 3VNIT, India

Performance Evaluation of the KVM Hypervisor Running on ARM-Based Single-Board Computers
Eric Gamess, Mausam Parajuli, and Syed Shah, Jacksonville State University, USA

January 2023, Volume 15, Number 1

An Intrusion Detection Mechanism for MANETS based on Deep Learning Artificial Neural Networks (ANNS)
Mohamad T Sultan1,2, Hesham El Sayed1,2 and Manzoor Ahmed Khan3, 1,3College of Information Technology United Arab Emirates University, UAE, 2United Arab Emirates University, United Arab Emirates

Phishing URL Detection using LSTM Based Ensemble Learning Approaches
Bireswar Banik and Abhijit Sarma, Gauhati University, India

A Lightweight Method for Detecting Cyber Attacks in High-traffic Large Networks based on Clustering Techniques
Nguyen Hong Son1 and Ha Thanh Dung2, 1Posts and Telecommunications Institute of Technology, Vietnam,
2Saigon University, Vietnam

Actor Critic Approach based Anomaly Detection for Edge Computing Environments
Shruthi N1 and Siddesh G K2, 1BNMIT, India, 2New Horizon College of Engineering, India

An Efficient Method to Compute the Rate Matrix for Multi-Server Retrial Queues with Cloud Computing Systems
Dang Thanh Chuong, Hoa Ly Cuong, Hoang Dinh Long and Duong Duc Hung, Hue University, Vietnam

Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Nibedita Jagadev1, Binod Kumar Pattanayak1, Ahmadkhader habboush2, Bassam Mohammad Elzaghmouri2,
Mahmoud Ali Al Shugran2, 1Siksha’O’ Anusandhan Deemed to be University, India, 2Jerash University, Jordan

Dynamic Interference Suppression for TV White Space: the Case of Thailand
Prathana Thaopanya1 and Teerapat Sanguankotchakorn2, 1Thai Public Broadcasting Service (ThaiPBS), Thailand,
2Asian Institute of Technology, Thailand

Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcement Learning
Bayarmaa Ragchaa and Kazuhiko Kinoshita, Tokushima University, Japan