| Enhancing HTTP Web Protocol Performance with Updated Transport Layer Techniques |
| Ziaul Hossain1 and Gorry Fairhurst2, 1University of Fraser Valley, Canada, 2University of Aberdeen, UK |
| Volume : 15 volume number : 4 pdf |
| Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks |
| Varun P. Sarvade1 and Shrirang Ambaji Kulkarni2, 1B. G. M. Institute of Technology, Mudhol, India, 2The National Institute of Engineering, India |
| Volume : 15 volume number : 4 pdf |
| IoT Resource Allocation and Optimization Using Improved Reptile Search Algorithm |
| Prabhakar Narasappa Kota1, Pravin Balaso Chopade1, Bhagvat D. Jadhav2, Pravin Marotrao Ghate2 and Shankar Dattatray Chavan3 |
| Volume : 15 volume number : 4 pdf |
| Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment |
| Mohamed Ali Shaaban1, Almohammady S. Alsharkawy2, Mohammad T. Abou-Kreisha2 and Mohammed Abdel Razek2, 1Sinai University, Egypt, 2Al-Azhar University, Egypt |
| Volume : 15 volume number : 4 pdf |
| Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utilization in Wireless Sensor Network |
| Shanmugavalli R and Subashini P, Avinashilingam Institute for Home Science and Higher Education for Women, India |
| Volume : 15 volume number : 4 pdf |
| Intrusion Detection System(IDS) Development Using Tree-Based Machine Learning Algorithms |
| Witcha Chimphlee and Siriporn Chimphlee, Suan Dusit University, Thailand |
| Volume : 15 volume number : 4 pdf |
| Machine Learning Based Ensemble Classifier for Android Malware Detection |
| P Sumalatha1 and G.S. Mahalakshmi2, 1Bhoj Reddy Engineering College for Women, India, 2Anna University, India |
| Volume : 15 volume number : 4 pdf |
| Ransomware Attack Detection based on Pertinent System Calls Using Machine Learning Techniques |
| Ahmed Dib, Sabri Ghazi and Mendjel Mohamed Said Mehdi, Mokhtar Annaba University, Algeria |
| Volume : 15 volume number : 4 pdf |