Table of Contents
Vol 9, No 2 (2022)
Research Articles
RMBSRA: Routing Manager Based Secure Route Analysis Mechanism for Achieving Secure Routing Protocol in IOT MANET | ||
P. T. Kasthuri Bai | ||
DOI:10.22247/ijcna/2022/212331 , Vol 9, No 2 (2022), Pagination: 150-159 | ||
ABSTRACT | PDF | Abstract Views: 305 | PDF Views: 1 |
A Symmetric, Probabilistic, Non-Circuit Based Fully Homomorphic Encryption Scheme | ||
George Asante, James Ben Hayfron-Acquah, Michael Asante, Joshua Caleb Dagadu | ||
DOI:10.22247/ijcna/2022/212332 , Vol 9, No 2 (2022), Pagination: 160-168 | ||
ABSTRACT | PDF | Abstract Views: 274 | PDF Views: 2 |
Improving Sinkhole Attack Detection Rate through Knowledge-Based Specification Rule for a Sinkhole Attack Intrusion Detection Technique of IoT | ||
Ga Hyeon An, Tae Ho Cho | ||
DOI:10.22247/ijcna/2022/212333 , Vol 9, No 2 (2022), Pagination: 169-178 | ||
ABSTRACT | PDF | Abstract Views: 331 | PDF Views: 2 |
Performance Analysis of Malicious Node Detection in Wireless Multimedia Sensor Networks using Modified LeNET Architecture | ||
S. Arockia Jayadhas, S. Emalda Roslin | ||
DOI:10.22247/ijcna/2022/212334 , Vol 9, No 2 (2022), Pagination: 179-188 | ||
ABSTRACT | PDF | Abstract Views: 273 | PDF Views: 3 |
Optimization of Computation and Communication Driven Resource Allocation in Mobile Cloud | ||
R. Shankar, Tharani Vimal | ||
DOI:10.22247/ijcna/2022/212335 , Vol 9, No 2 (2022), Pagination: 189-201 | ||
ABSTRACT | PDF | Abstract Views: 276 | PDF Views: 2 |
Analysis of Machine Learning Classifiers to Detect Malicious Node in Vehicular Cloud Computing | ||
A. Sheela Rini, C. Meena | ||
DOI:10.22247/ijcna/2022/212336 , Vol 9, No 2 (2022), Pagination: 202-213 | ||
ABSTRACT | PDF | Abstract Views: 295 | PDF Views: 2 |
BTDEC: Blockchain-Based Trible Data Elliptic Curve Cryptosystem with Fine-Grained Access Control for Personal Data | ||
K. Mohamed Sayeed Khan, S. Shajun Nisha | ||
DOI:10.22247/ijcna/2022/212337 , Vol 9, No 2 (2022), Pagination: 214-228 | ||
ABSTRACT | PDF | Abstract Views: 265 | PDF Views: 2 |
Hybrid Optimization-Based Secure Routing Protocol for Cloud Computing | ||
B. Vatchala, G. Preethi | ||
DOI:10.22247/ijcna/2022/212338 , Vol 9, No 2 (2022), Pagination: 229-239 | ||
ABSTRACT | PDF | Abstract Views: 221 | PDF Views: 2 |
Energy-Efficient Perspicacious Ant Colony Optimization Based Routing Protocol for Mobile Ad-Hoc Network | ||
K. Sumathi, D. | ||
DOI:10.22247/ijcna/2022/212339 , Vol 9, No 2 (2022), Pagination: 240-250 | ||
ABSTRACT | PDF | Abstract Views: 238 | PDF Views: 2 |
Minimizing Delay in Mobile Ad-Hoc Network Using Ingenious Grey Wolf Optimization Based Routing Protocol | ||
K. Sumathi, D. Vimal Kumar | ||
DOI:10.22247/ijcna/2022/212340 , Vol 9, No 2 (2022), Pagination: 251-261 | ||
ABSTRACT | PDF | Abstract Views: 275 | PDF Views: 2 |