Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Articles
Current
Archives
Authors
Guidelines
Rights and Responsibilities
Benefits
Make a Submissions
Policies
Frequently Asked Questions
Editorial Policy
Open Access Policy
Privacy Policy
Publication Ethics
Withdrawal, Retraction, Correction
Editorial Team
About
About the Journal
Article Publishing Fee
Abstracting and Indexing
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 8 No. 3 (2020): Transactions on Networks and Communications
Vol. 8 No. 3 (2020): Transactions on Networks and Communications
Transactions on Networks and Communications
Volume 8, No 3, June 2020
DOI:
https://doi.org/10.14738/tnc.83.2020
Published:
2020-06-30
Articles
Wi-Fi Security Using WEKA
Khaing Khaing Wai
01-07
PDF
DOI:
https://doi.org/10.14738/tnc.83.8253
A Forensics Analysis of ICMP Flooded DDoS Attack using WireShark
Forensics Analysis of ICMP Flooded DDoS Attack using WireShark
Thazin Tun
08-15
PDF
DOI:
https://doi.org/10.14738/tnc.83.8250
IoT Security: Simulation and Analysis of TCP SYN Flooded DDOS Attack using WireShark
Yee Mon Thant
16-25
PDF
DOI:
https://doi.org/10.14738/tnc.83.8389
Author Center
About the Journal
Current Issue
Archives
Make a Submission
Author Guidelines
Call for Papers
Indexing
Follow Us
Current Issue
Most Read Last Week
Cryptography and Steganography: New Approach
49
Big Data and Machine Learning Driven Open5GMEC for Vehicular Communications
15
Optimization of WSNs Flooding Rates by Khalimsky Topology
7
Exploiting Cryptocurrency Miners with OISNT Techniques
5
File Carving Survey on Techniques, Tools and Areas of Use
4
Keywords