Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Articles
Current
Archives
Authors
Guidelines
Rights and Responsibilities
Benefits
Make a Submissions
Policies
Frequently Asked Questions
Editorial Policy
Open Access Policy
Privacy Policy
Publication Ethics
Withdrawal, Retraction, Correction
Editorial Team
About
About the Journal
Article Publishing Fee
Abstracting and Indexing
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 5 No. 6 (2017): Transactions on Networks and Communications
Vol. 5 No. 6 (2017): Transactions on Networks and Communications
Transactions on Networks and Communications
Volume 5, No 6, Dec 2017
DOI:
https://doi.org/10.14738/tnc.56.2017
Published:
2017-12-31
Full Issue
Volume 5 No 6, Dec 2017
Articles
Whisper: A High Capacity File Encrypting and Hiding Method in an Audio File
Mohammed Aldarwbi, Talal Al-Kharobi
01
PDF
DOI:
https://doi.org/10.14738/tnc.56.3766
Hierarchy Website Fingerprint Using N-gram Byte Distribution
Mohammed Aldarwbi, Essa Shahra
09
PDF
DOI:
https://doi.org/10.14738/tnc.56.3767
TPC Together with Overlapped Time Domain Multiplexing System Based on Turbo Structure
Hao Zheng, Mingjun Xing, Yutao Yue, Xue Li, Daoben Li, Chunlin Ji
17
PDF
DOI:
https://doi.org/10.14738/tnc.56.3655
Cryptography and Steganography: New Approach
Ahmed Ali AL-Shaaby, Talal AlKharobi
25
PDF
DOI:
https://doi.org/10.14738/tnc.56.3914
Exploiting Cryptocurrency Miners with OISNT Techniques
Arif Sari, Seyfullah Kilic
62
PDF
DOI:
https://doi.org/10.14738/tnc.56.4083
Technical Reviews
Arif Sari
39
PDF
DOI:
https://doi.org/10.14738/tnc.56.4061
The Dark Side of the China: The Government, Society and the Great Cannon
Arif Sari, Zakria Abdul Qayyum, Onder Onursal
48
PDF
DOI:
https://doi.org/10.14738/tnc.56.4062
Author Center
About the Journal
Current Issue
Archives
Make a Submission
Author Guidelines
Call for Papers
Indexing
Follow Us
Current Issue
Most Read Last Week
Traffic Management in 5G Mobile Networks: Selfish Users and Fair Network
23
Designing Networks with Low Structural Congestion via Game Theory and Linear Programming
15
Developing of Human Resources in E-learning and Practical Experience in its implementation
10
Cryptography and Steganography: New Approach
9
Exploiting Cryptocurrency Miners with OISNT Techniques
9
Keywords