Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Articles
Current
Archives
Authors
Guidelines
Rights and Responsibilities
Benefits
Make a Submissions
Policies
Frequently Asked Questions
Editorial Policy
Open Access Policy
Privacy Policy
Publication Ethics
Withdrawal, Retraction, Correction
Editorial Team
About
About the Journal
Article Publishing Fee
Abstracting and Indexing
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 8 No. 3 (2020): Transactions on Networks and Communications
Vol. 8 No. 3 (2020): Transactions on Networks and Communications
Transactions on Networks and Communications
Volume 8, No 3, June 2020
DOI:
https://doi.org/10.14738/tnc.83.2020
Published:
2020-06-30
Articles
Wi-Fi Security Using WEKA
Khaing Khaing Wai
01-07
PDF
DOI:
https://doi.org/10.14738/tnc.83.8253
A Forensics Analysis of ICMP Flooded DDoS Attack using WireShark
Forensics Analysis of ICMP Flooded DDoS Attack using WireShark
Thazin Tun
08-15
PDF
DOI:
https://doi.org/10.14738/tnc.83.8250
IoT Security: Simulation and Analysis of TCP SYN Flooded DDOS Attack using WireShark
Yee Mon Thant
16-25
PDF
DOI:
https://doi.org/10.14738/tnc.83.8389
Author Center
About the Journal
Current Issue
Archives
Make a Submission
Author Guidelines
Call for Papers
Indexing
Follow Us
Current Issue
Most Read Last Week
Cryptography and Steganography: New Approach
21
Exploiting Cryptocurrency Miners with OISNT Techniques
12
The Dark Side of the China: The Government, Society and the Great Cannon
8
Condition Absolute Stability Control System of Electromagnetoelastic Actuator for Communication Equipment
7
Holomorphy in Pseudo-Euclidean Spaces and the Classic Electromagnetic Theory
6
Keywords