Editorial
Various networking technologies and terms have been coined in the last couple of decades. The dynamism in networking technologies and applications has paved the way for work on multitudes of research areas. While some areas can be broken into more sub-areas and topics, there is a trend among researc...
| Main Authors: | Pathan, Al-Sakib Khan, Monowar, Muhammad Mostafa, Alzaid, Hani, Hoque, Mohammad Asadul |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Inderscience Publishers, Switzerland
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/42474/ http://irep.iium.edu.my/42474/1/IJCSE100300_PATHAN.pdf http://irep.iium.edu.my/42474/2/IJCSE_1003_CONTENTS_PAGE.pdf |
Similar Items
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Future trends in security issues in internet and web applications
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Guest editorial: Special issue on integration of IoT with future Internet
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Editorial: Wireless sensor networks based on environmental energy harvesting
by: Han, Guangjie, et al.
Published: (2013)
by: Han, Guangjie, et al.
Published: (2013)
Information integrity in smart grid systems
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015)
by: Pathan, Al-Sakib Khan
Published: (2015)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Fi-Wi Network for future cloud
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Wireless network security: 3G, 4G, wireless PAN/LAN/MAN
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Computer science and IT today: research issues and publication tips
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Guest editorial
by: Chieng, David, et al.
Published: (2015)
by: Chieng, David, et al.
Published: (2015)
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012)
by: Khan, Shafiullah, et al.
Published: (2012)
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Preventing persistent cross-site scripting (XSS) attack by applying pattern filtering approach
by: Yusof, Imran, et al.
Published: (2014)
by: Yusof, Imran, et al.
Published: (2014)
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
A pragmatic approach of performance evaluation of MPI-OpenMP on a 12 nodes multi-core cluster
by: Abdelgadir , Tageldin, et al.
Published: (2013)
by: Abdelgadir , Tageldin, et al.
Published: (2013)
Visual computer: guest editorial
by: Shamsuddin, Siti Mariyam, et al.
Published: (2007)
by: Shamsuddin, Siti Mariyam, et al.
Published: (2007)
Where is the intelligence in computational intelligence?
by: Pathan, Al-Sakib Khan
Published: (2005)
by: Pathan, Al-Sakib Khan
Published: (2005)
Securing WSN with lightweight resource-efficient schemes
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Peer-to-peer video-on-demand in future internet
by: Fouda, Mostafa M., et al.
Published: (2013)
by: Fouda, Mostafa M., et al.
Published: (2013)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
On the issues and challenges of Fiber-Wireless (Fi-Wi) networks
by: Win, Harry Tin, et al.
Published: (2013)
by: Win, Harry Tin, et al.
Published: (2013)
Brute force password search using multithreading and grid computing
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
Defending against wireless network intrusion
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
On the key factors of usability in small-sized mobile touch-screen application
by: Gündüz, Feyza, et al.
Published: (2013)
by: Gündüz, Feyza, et al.
Published: (2013)
Automatic defense against zero-day polymorphic worms in communication networks
by: Mohammed, Mohssen, et al.
Published: (2013)
by: Mohammed, Mohssen, et al.
Published: (2013)
Usability improvements for touch-screen mobile flight booking application: a case study
by: Gündüz, Feyza, et al.
Published: (2012)
by: Gündüz, Feyza, et al.
Published: (2012)
Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue
by: Mall, Dieynaba, et al.
Published: (2015)
by: Mall, Dieynaba, et al.
Published: (2015)
Adaptive algorithms for automated intruder detection in surveillance networks
by: Ahmed, Tarem, et al.
Published: (2014)
by: Ahmed, Tarem, et al.
Published: (2014)
On the key revocation schemes in wireless sensor networks
by: Mall, Dieynaba, et al.
Published: (2013)
by: Mall, Dieynaba, et al.
Published: (2013)
Automated surveillance in distributed, wireless visual networks: a comparative study
by: Ahmed, Tarem, et al.
Published: (2013)
by: Ahmed, Tarem, et al.
Published: (2013)
Automated surveillance in distributed, visual networks: an empirical comparison of recent algorithms
by: Ahmed, Tarem, et al.
Published: (2014)
by: Ahmed, Tarem, et al.
Published: (2014)
SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
by: Mall, Dieynaba, et al.
Published: (2014)
by: Mall, Dieynaba, et al.
Published: (2014)
Comparative analysis of IEEE 802.11g multimedia multicast performance using RTP with an implemented test-bed
by: Ezani, Muhammad Faheem Mohd, et al.
Published: (2012)
by: Ezani, Muhammad Faheem Mohd, et al.
Published: (2012)
The need-to-know issues for publishing books and book chapters
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Building customer trust in cloud computing with an ICT-enabled global regulatory body
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
Similar Items
-
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013) -
Future trends in security issues in internet and web applications
by: Pathan, Al-Sakib Khan, et al.
Published: (2012) -
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014) -
Guest editorial: Special issue on integration of IoT with future Internet
by: Pathan, Al-Sakib Khan, et al.
Published: (2014) -
Editorial: Wireless sensor networks based on environmental energy harvesting
by: Han, Guangjie, et al.
Published: (2013)