Table of Contents
Vol 9, No 1 (2022)
Research Articles
Reliable and Efficient Routing Model for Unequal Clustering-Based Wireless Sensor Networks | ||
Rudramurthy V C, R. Aparna | ||
DOI:10.22247/ijcna/2022/211593 , Vol 9, No 1 (2022), Pagination: 1-11 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 613 | PDF Views: 3 |
Energy-Aware Optimal Clustering and Secure Routing Protocol for Heterogeneous Wireless Sensor Network | ||
Swapna M P, G. Satyavathy | ||
DOI:10.22247/ijcna/2022/211594 , Vol 9, No 1 (2022), Pagination: 12-21 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 697 | PDF Views: 7 |
Migration Prediction Approach for Predict the Overloaded and Under Loaded Workload in Cloud Environment | ||
Senthamarai N | ||
DOI:10.22247/ijcna/2022/211600 , Vol 9, No 1 (2022), Pagination: 51-59 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 506 | PDF Views: 3 |
Improving Performance and Efficiency of Software Defined Networking by Identifying Malicious Switches through Deep Learning Model | ||
Thangaraj Ethilu, Abirami Sathappan, Paul Rodrigues | ||
DOI:10.22247/ijcna/2022/211627 , Vol 9, No 1 (2022), Pagination: 72-83 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 605 | PDF Views: 5 |
Blockchain Powered Mutual Authentication and Access Control Protocol | ||
Geeta Kakarla, S. Phani Kumar | ||
DOI:10.22247/ijcna/2022/211629 , Vol 9, No 1 (2022), Pagination: 103-113 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 600 | PDF Views: 3 |
A Novel Algorithm for Secured Data Sharing in Cloud using GWOA-DNA Cryptography | ||
Mercy Joseph, Gobi Mohan | ||
DOI:10.22247/ijcna/2022/211630 , Vol 9, No 1 (2022), Pagination: 114-124 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 637 | PDF Views: 3 |
Optimum Selection of Virtual Machine Using Improved Particle Swarm Optimization in Cloud Environment | ||
R. Jeena, Logesh R | ||
DOI:10.22247/ijcna/2022/211631 , Vol 9, No 1 (2022), Pagination: 125-134 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 575 | PDF Views: 4 |
Design of Maintaining Data Security on IoT Data Transferred Through IoT Gateway System to Cloud Storage | ||
S. Alexander Suresh, R. Jemima Priyadarsini | ||
DOI:10.22247/ijcna/2022/211632 , Vol 9, No 1 (2022), Pagination: 135-149 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 678 | PDF Views: 3 |
Survey Article
Security Challenges and Related Solutions in Software Defined Networks: A Survey | ||
Konda Srikar Goud, Srinivasa Rao Gidituri | ||
DOI:10.22247/ijcna/2022/211595 , Vol 9, No 1 (2022), Pagination: 22-37 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 698 | PDF Views: 8 |
A Survey on Emergency Vehicle Preemption Methods Based on Routing and Scheduling | ||
Shridevi Jeevan Kamble, Manjunath R Kounte | ||
DOI:10.22247/ijcna/2022/211623 , Vol 9, No 1 (2022), Pagination: 60-71 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 849 | PDF Views: 3 |
Review Article
A Review on Intrusion Detection Systems to Secure IoT Networks | ||
A. Arul Anitha, L. Arockiam | ||
DOI:10.22247/ijcna/2022/211599 , Vol 9, No 1 (2022), Pagination: 38-50 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 785 | PDF Views: 3 |
A Review of Chronological Development in Group and Hierarchical Key management Schemes in Access Control Model: Challenges and Solutions | ||
Smita Athanere, Ramesh Thakur | ||
DOI:10.22247/ijcna/2022/211628 , Vol 9, No 1 (2022), Pagination: 84-102 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 542 | PDF Views: 4 |