Volume 3, Issue 4, July 2017
Hybrid Insider Cyber Security Threats Mitigation Scheme Using ECC and Behavoural Analysis Methodology
Stephen M. Musili, Michael Kimwele, Richard Rimiru
Pages: 29-38     Published Online: Jul. 4, 2017
DOI: 10.11648/j.awcn.20170304.11
Abstract | Full-Text PDF (303KB)
View 2082                 Downloads 127
M2M Communication in Ad-Hoc WSNs for Industrial Application Using MQTT Protocol
Suma Manuvinakurike Narasimhasastry, Pramodh Basavaraju, Kirthana Bhaskar, Ranganatha Horigowda, Bhimalinga Kore
Pages: 39-44     Published Online: Jul. 25, 2017
DOI: 10.11648/j.awcn.20170304.12
Abstract | Full-Text PDF (710KB)
View 1788                 Downloads 117
Game Theory Basics and Its Application in Cyber Security
Amadi Emmanuuel Chukwudi, Eze Udoka, Ikerionwu Charles
Pages: 45-49     Published Online: Jul. 27, 2017
DOI: 10.11648/j.awcn.20170304.13
Abstract | Full-Text PDF (200KB)
View 2091                 Downloads 210
Browse journals by subject