A
-
ABPNN-MLPQS
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
-
AI
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]
-
Algebraic Matching
Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]
-
Algebraic Resolution
Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]
-
ANP DEMATEL
A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]
-
Architecture
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]
-
ARIMA
Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies [Volume 11, Issue 3, 2019, Pages 139-144]
-
Authentication
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]
-
Authentication
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]
-
AVISPA
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]
B
-
Backpropagation
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
-
BAN logic
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]
-
Behavior Algebra
Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]
-
Belief
Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]
-
Biometric Recognition
Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]
-
Biometric system
The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ [Volume 11, Issue 3, 2019, Pages 195-207]
-
Branch number
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]
-
Business Intelligence
Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]
C
-
Companion matrix
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]
-
Contention-based
Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]
-
Controllable point
Secure FPGA Design by Filling Unused Spaces [Volume 11, Issue 1, 2019, Pages 47-56]
-
Correctness Verification
A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]
-
Critical success factors
Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]
-
Critical Success Factors (CSF)
Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]
-
Cryptanalysis
New Fixed Point Attacks on GOST2 Block Cipher [Volume 11, Issue 2, 2019, Pages 145-158]
-
Cryptocurrency
Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies [Volume 11, Issue 3, 2019, Pages 139-144]
D
-
Database Outsourcing
A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]
-
Database Security
A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]
-
Data Integration
Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]
-
Data mining
Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]
-
Data mining
Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining [Volume 11, Issue 3, 2019, Pages 79-89]
-
Data Outsourcing
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]
-
Data Reduction
Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]
-
Data Reduction
Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining [Volume 11, Issue 3, 2019, Pages 79-89]
-
Data Virtualization
Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]
-
Decision support system
A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]
-
Differential Fault Analysis
Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]
-
Diffusion layer
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]
-
DSS
A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]
-
DTW
Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]
E
-
Edge Computing
IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]
-
EMF ECORE
Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]
-
Enterprise Resource Planning Systems (ERPs)
Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]
-
ETL
Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]
-
Event
Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]
F
-
Fairness
A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]
-
Fake Accounts
Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]
-
Feature selection
Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]
-
Field Programmable Gate Array
Secure FPGA Design by Filling Unused Spaces [Volume 11, Issue 1, 2019, Pages 47-56]
-
Fixed Point Attack
New Fixed Point Attacks on GOST2 Block Cipher [Volume 11, Issue 2, 2019, Pages 145-158]
-
Fog Computing
IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]
-
Fuzzy Inference System(FIS)
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]
G
-
Game Design
Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]
-
Gesture recognition
Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]
-
GNS3
Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]
-
Goal/Question/Metric paradigm (GQM)
Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]
-
Gost2 Block Cipher
New Fixed Point Attacks on GOST2 Block Cipher [Volume 11, Issue 2, 2019, Pages 145-158]
H
-
Hand gesture classification
Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]
-
Handover
Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]
-
History
Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]
-
HTTP
IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]
I
-
IDSS
A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]
-
Imbalanced Classes
Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]
-
Imbalanced Classes
Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining [Volume 11, Issue 3, 2019, Pages 79-89]
-
Information Imperfection
Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]
-
Intelligent decision support system
A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]
-
Interdependent Security
Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]
-
Internet of Things
IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]
-
Internet of Things(IoT)
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]
-
Intrusion Detection
Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]
-
IoT
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]
-
IoT
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]
-
IoT devices
Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]
-
IoT devices
The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices [Volume 11, Issue 3, 2019, Pages 35-38]
K
-
Kermeta
Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]
-
Knowledge Representation
Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]
L
-
Lattice Based cryptography
A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]
-
Lightweight cryptographic primitives
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]
-
Linear Algebra
Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]
-
Literature Review
Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]
-
Low Rank
Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]
M
-
Machine Learning
Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies [Volume 11, Issue 3, 2019, Pages 139-144]
-
MAC protocols
Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]
-
Management information systems
The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ [Volume 11, Issue 3, 2019, Pages 195-207]
-
MDS matrix
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]
-
Measurement
Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]
-
Meet in the Middle
New Fixed Point Attacks on GOST2 Block Cipher [Volume 11, Issue 2, 2019, Pages 145-158]
-
Mobile Communication
A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]
-
Model-driven engineering
Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]
-
Model transformation
Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]
-
MQTT
IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]
-
Multi-access Edge Computing
Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]
-
Multi-core processing
Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]
-
Multi-homing
Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]
-
Multilayer Fuzzy logic
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]
-
Multilevel
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
-
Multi-level Priority Queue Scheduling
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
-
Multi-path TCP
Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]
-
Multiple Byte Fault
Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]
N
-
Nash equilibrium
Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]
-
Network management
Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]
-
Neural Networks
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
-
NO
Editorial [Volume 11, Issue 3, 2019]
-
NOMA
A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]
O
-
Observable points
Secure FPGA Design by Filling Unused Spaces [Volume 11, Issue 1, 2019, Pages 47-56]
-
One Class Classification
Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]
-
Order-Preserving Encryption
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]
P
-
Packet Tracer
Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]
-
Packet Tracer
The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices [Volume 11, Issue 3, 2019, Pages 35-38]
-
PAKE
A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]
-
Path diversity
Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]
-
Performance Evaluation
Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]
-
Personal Privacy
A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]
-
PFSC
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]
-
PIPEDA Privacy Laws
A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]
-
Policy control
Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]
-
Power allocation
A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]
-
Priority Scheduling
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
-
Privacy
Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]
-
Privacy Preserving
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]
R
-
Registration and Mobility Management
Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]
-
Reliable data transfer
Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]
-
Re-sampling
Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]
-
Re-sampling
Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining [Volume 11, Issue 3, 2019, Pages 79-89]
-
Resilient networks
Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]
-
Rewriting Rules
Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]
-
RFID
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]
-
Ring-LWE
A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]
S
-
Searchable Encryption
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]
-
Security
Secure FPGA Design by Filling Unused Spaces [Volume 11, Issue 1, 2019, Pages 47-56]
-
Security
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]
-
Sensors
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]
-
SHA-3
Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]
-
SIC
A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]
-
Singular Value Decomposition
Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]
-
Smart city
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]
-
Smart Home
Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]
-
Smart Home
The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices [Volume 11, Issue 3, 2019, Pages 35-38]
-
Social Media
A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]
-
Social Networks
A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]
-
Social Networks
Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]
-
Social Optimum
Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]
-
Software Project Management
Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]
-
SPHF
A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]
-
State Recovery
Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]
-
ST-Slotted-CS-ALOHA protocol
Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]
-
Support Vector Machines
Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]
-
Symbolic Modeling
Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]
T
-
Time-series analysis
Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies [Volume 11, Issue 3, 2019, Pages 139-144]
-
Tsung
IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]
U
-
Unified Modeling Language
Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]
-
UWSNs
Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]
V
-
Virtualbox
Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]
-
Virtulization
Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]
-
VNML
Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]
-
Vulnerability Detection
Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]
W
-
Web of Things
IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]
-
Wireless Networks
Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]
-
Wireless Networks
The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices [Volume 11, Issue 3, 2019, Pages 35-38]