Table of Contents
Articles
| Authentication Database Leakage Detection | |
| ISRAA S. AHMED | 1-4 |
| Single Sink Repositioning Technique in Wireless Sensor Networks for Increasing Throughput and Decreasing Delay | |
| Asrat Sime Bedada | 5-15 |
| A Proposed Model for Maximizing Broadband Penetration with Submarine Cable in Nigeria | |
| Bourdillon Omijeh | 16-24 |
| Adaptive Network Based Fuzzy Inference System and the Future of Employability | |
| Saada Abdel Gawad Khadragy, Sherief Abdallah | 25-32 |
| Intrusion Detection System in Cloud Computing: A Literature Review | |
| Kezang Dema, Naghmeh Moradpoor, Thinley Jamtsho | 33-41 |
Paper submission email: NCS@iiste.org
ISSN (Paper)2224-610X ISSN (Online)2225-0603
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org
Network and Complex Systems


