Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Articles
Current
Archives
Authors
Guidelines
Rights and Responsibilities
Benefits
Make a Submissions
Policies
Frequently Asked Questions
Editorial Policy
Open Access Policy
Privacy Policy
Publication Ethics
Withdrawal, Retraction, Correction
Editorial Team
About
About the Journal
Article Publishing Fee
Abstracting and Indexing
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 8 No. 3 (2020): Transactions on Networks and Communications
Vol. 8 No. 3 (2020): Transactions on Networks and Communications
Transactions on Networks and Communications
Volume 8, No 3, June 2020
DOI:
https://doi.org/10.14738/tnc.83.2020
Published:
2020-06-30
Articles
Wi-Fi Security Using WEKA
DOI:
https://doi.org/10.14738/tnc.83.8253
Khaing Khaing Wai
01-07
PDF
A Forensics Analysis of ICMP Flooded DDoS Attack using WireShark
Forensics Analysis of ICMP Flooded DDoS Attack using WireShark
DOI:
https://doi.org/10.14738/tnc.83.8250
Thazin Tun
08-15
PDF
IoT Security: Simulation and Analysis of TCP SYN Flooded DDOS Attack using WireShark
DOI:
https://doi.org/10.14738/tnc.83.8389
Yee Mon Thant
16-25
PDF
Author Center
About the Journal
Current Issue
Archives
Make a Submission
Author Guidelines
Call for Papers
Indexing
Follow Us
Current Issue
Most Read Last Week
Enhanced TCP Westwood Slow Start Phase
11
A Stratified Cyber Security Vigilance Model: An Augmentation of Risk-Based Information System Security
10
Multilevel Cryptography with Metadata and Lock Approach for Storing Data in Cloud
8
A 1-5Ghz, Hybrid Mic Wideband LNA utilizing Microstrip Geometric Structure Variety for Performance Improvement
7
Seven Cool Number Patterns
7
Keywords
QoS
Stability
Cassava
Mobile Networks
sustainability
Yield
Bifurcation
LSB
FPGA
maize
security
Technology
functional properties
Farmers
Routing
impact
AODV
classification
DSR
LDPC
WSN
Encryption
Security
Maize
LTE
BER