Table of Contents
Vol 9, No 1 (2022)
Research Articles
Reliable and Efficient Routing Model for Unequal Clustering-Based Wireless Sensor Networks | ||
Rudramurthy V C, R. Aparna | ||
DOI:10.22247/ijcna/2022/211593 , Vol 9, No 1 (2022), Pagination: 1-11 | ||
ABSTRACT | PDF | Abstract Views: 493 | PDF Views: 3 |
Energy-Aware Optimal Clustering and Secure Routing Protocol for Heterogeneous Wireless Sensor Network | ||
Swapna M P, G. Satyavathy | ||
DOI:10.22247/ijcna/2022/211594 , Vol 9, No 1 (2022), Pagination: 12-21 | ||
ABSTRACT | PDF | Abstract Views: 562 | PDF Views: 7 |
Migration Prediction Approach for Predict the Overloaded and Under Loaded Workload in Cloud Environment | ||
Senthamarai N | ||
DOI:10.22247/ijcna/2022/211600 , Vol 9, No 1 (2022), Pagination: 51-59 | ||
ABSTRACT | PDF | Abstract Views: 403 | PDF Views: 3 |
Improving Performance and Efficiency of Software Defined Networking by Identifying Malicious Switches through Deep Learning Model | ||
Thangaraj Ethilu, Abirami Sathappan, Paul Rodrigues | ||
DOI:10.22247/ijcna/2022/211627 , Vol 9, No 1 (2022), Pagination: 72-83 | ||
ABSTRACT | PDF | Abstract Views: 493 | PDF Views: 5 |
Blockchain Powered Mutual Authentication and Access Control Protocol | ||
Geeta Kakarla, S. Phani Kumar | ||
DOI:10.22247/ijcna/2022/211629 , Vol 9, No 1 (2022), Pagination: 103-113 | ||
ABSTRACT | PDF | Abstract Views: 488 | PDF Views: 3 |
A Novel Algorithm for Secured Data Sharing in Cloud using GWOA-DNA Cryptography | ||
Mercy Joseph, Gobi Mohan | ||
DOI:10.22247/ijcna/2022/211630 , Vol 9, No 1 (2022), Pagination: 114-124 | ||
ABSTRACT | PDF | Abstract Views: 524 | PDF Views: 3 |
Optimum Selection of Virtual Machine Using Improved Particle Swarm Optimization in Cloud Environment | ||
R. Jeena, Logesh R | ||
DOI:10.22247/ijcna/2022/211631 , Vol 9, No 1 (2022), Pagination: 125-134 | ||
ABSTRACT | PDF | Abstract Views: 471 | PDF Views: 4 |
Design of Maintaining Data Security on IoT Data Transferred Through IoT Gateway System to Cloud Storage | ||
S. Alexander Suresh, R. Jemima Priyadarsini | ||
DOI:10.22247/ijcna/2022/211632 , Vol 9, No 1 (2022), Pagination: 135-149 | ||
ABSTRACT | PDF | Abstract Views: 529 | PDF Views: 3 |
Survey Article
Security Challenges and Related Solutions in Software Defined Networks: A Survey | ||
Konda Srikar Goud, Srinivasa Rao Gidituri | ||
DOI:10.22247/ijcna/2022/211595 , Vol 9, No 1 (2022), Pagination: 22-37 | ||
ABSTRACT | PDF | Abstract Views: 524 | PDF Views: 8 |
A Survey on Emergency Vehicle Preemption Methods Based on Routing and Scheduling | ||
Shridevi Jeevan Kamble, Manjunath R Kounte | ||
DOI:10.22247/ijcna/2022/211623 , Vol 9, No 1 (2022), Pagination: 60-71 | ||
ABSTRACT | PDF | Abstract Views: 686 | PDF Views: 3 |
Review Article
A Review on Intrusion Detection Systems to Secure IoT Networks | ||
A. Arul Anitha, L. Arockiam | ||
DOI:10.22247/ijcna/2022/211599 , Vol 9, No 1 (2022), Pagination: 38-50 | ||
ABSTRACT | PDF | Abstract Views: 633 | PDF Views: 3 |
A Review of Chronological Development in Group and Hierarchical Key management Schemes in Access Control Model: Challenges and Solutions | ||
Smita Athanere, Ramesh Thakur | ||
DOI:10.22247/ijcna/2022/211628 , Vol 9, No 1 (2022), Pagination: 84-102 | ||
ABSTRACT | PDF | Abstract Views: 432 | PDF Views: 4 |