Found: 10
Select item for more details and to access through your institution.
Green Optimization with Load balancing in Wireless Sensor Network using Elephant Herding Optimization.
- Published in:
- International Journal of Computer Network & Information Security, 2024, v. 16, n. 6, p. 120, doi. 10.5815/ijcnis.2024.06.10
- By:
- Publication type:
- Article
A Novel GAN-based Chaotic Method with DNA Computing for Enhancing Security of Medical Images.
- Published in:
- International Journal of Computer Network & Information Security, 2024, v. 16, n. 6, p. 106, doi. 10.5815/ijcnis.2024.06.09
- By:
- Publication type:
- Article
Anti-jamming and Power Minimization Interference Nulling in Uplink MIMO-NOMA Technique.
- Published in:
- International Journal of Computer Network & Information Security, 2024, v. 16, n. 6, p. 95, doi. 10.5815/ijcnis.2024.06.08
- By:
- Publication type:
- Article
An Efficient Optimized Neural Network System for Intrusion Detection in Wireless Sensor Networks.
- Published in:
- International Journal of Computer Network & Information Security, 2024, v. 16, n. 6, p. 83
- By:
- Publication type:
- Article
GDAR: A Secure Authentication for Dapp Interoperability in Blockchain.
- Published in:
- International Journal of Computer Network & Information Security, 2024, v. 16, n. 6, p. 69, doi. 10.5815/ijcnis.2024.06.06
- By:
- Publication type:
- Article
Two-factor Mutual Authentication with Fingerprint and MAC Address Validation.
- Published in:
- International Journal of Computer Network & Information Security, 2024, v. 16, n. 6, p. 56, doi. 10.5815/ijcnis.2024.06.05
- By:
- Publication type:
- Article
ANTMAC: Addressing Novel Congestion Technique Hybrid Model for Collision Control in IoT-based Environments using Contention-based MAC Protocol.
- Published in:
- International Journal of Computer Network & Information Security, 2024, v. 16, n. 6, p. 45, doi. 10.5815/ijcnis.2024.06.04
- By:
- Publication type:
- Article
Proof of Notoriety: A Promised Consensus Mechanism for the Blockchain-based Copyright System.
- Published in:
- International Journal of Computer Network & Information Security, 2024, v. 16, n. 6, p. 32, doi. 10.5815/ijcnis.2024.06.03
- By:
- Publication type:
- Article
Delay-sensitive Quality of Service Routing with Integrated Admission Control for Wireless Mesh Network.
- Published in:
- International Journal of Computer Network & Information Security, 2024, v. 16, n. 6, p. 20, doi. 10.5815/ijcnis.2024.06.02
- By:
- Publication type:
- Article
Methodology for Searching for the Dependence Between Data Defensiveness and Volume of Social Network Evolution.
- Published in:
- International Journal of Computer Network & Information Security, 2024, v. 16, n. 6, p. 1, doi. 10.5815/ijcnis.2024.06.01
- By:
- Publication type:
- Article