Abstract is missing.
- ICITST honorary chair and distinguished keynote speaker: The cyborg experimentsKevin Warwick. 15 [doi]
- Keynote speaker 1: Computer Evolution over the next decade: Fact or fiction?Frank Z. Wang. 16 [doi]
- Keynote speaker 2: Swimming against the current - Dealing with ICS cyber threats in the Water SectorMartin Visser. 17-18 [doi]
- Keynote speaker 3: Secure software engineering in the cloudAspen Olmsted. 19 [doi]
- Keynote speaker 4: Socio-technical transitions towards sustainabilityFrank Geels. 20 [doi]
- Keynote speaker 5: Issues in energy harvesting cyber-physical systemsMaryline Chetto. 21 [doi]
- Bench-marking of traditional cryptographic algorithms and chaos-based algorithms with DNA operationsMirko Koscina, Daniel Caragata. 26-31 [doi]
- Hash function based on efficient Chaotic Neural NetworkNabil Abdoun, Safwan El Assad, Mohammad Abu Taha, Rima Assaf, Olivier Déforges, Mohamad Khalil. 32-37 [doi]
- A novel chaotic generator based on weakly-coupled discrete skewtent mapsOns Jallouli, Safwan El Assad, Maryline Chetto, René Lozi, Daniel Caragata. 38-43 [doi]
- Chaos-based cryptosystems using dependent diffusion: An overviewMohammed AbuTaha, Safwan El Assad, Mousa Farajallah, Audrey Queudet, Olivier Déforges. 44-49 [doi]
- A proposed framework for proactive vulnerability assessments in cloud deploymentsKennedy A. Torkura, Feng Cheng 0002, Christoph Meinel. 51-57 [doi]
- A survey of authentication methods in mobile cloud computingG. Reshmi, C. S. Rakshmy. 58-63 [doi]
- Recent advances of smart glass application security and privacyButi Al Delail, Chan Yeob Yeun. 65-69 [doi]
- Security and privacy framework for ubiquitous healthcare IoT devicesEbrahim Al Alkeem, Chan Yeob Yeun, M. Jamal Zemerly. 70-75 [doi]
- Passive forensics for image splicing based on PCA noise estimationLifei Zhan, Yuesheng Zhu. 78-83 [doi]
- Crawler classification using ant-based clustering schemeNaomi Kuze, Shu Ishikura, Takeshi Yagi, Daiki Chiba, Masayuki Murata. 84-89 [doi]
- Awareness, behaviour and culture: The ABC in cultivating security complianceEmad Sherif, Steven Furnell, Nathan L. Clarke. 90-94 [doi]
- Fingerprint security for protecting EMV payment cardsHimanshu Vats, Ron Ruhl, Shaun Aghili. 95-101 [doi]
- Secure distributed key generation in attribute based encryption systemsDaniel Pletea, Saeed Sedghi, Meilof Veeningen, Milan Petkovic. 103-107 [doi]
- Secure personal cloud storageKheng Kok Mar, Chee Yong Law, Victoria Chin. 108-113 [doi]
- Study of applicability of Chinese remainder theorem based group key management for cloud environmentVimal Kumar SathiyaBalan, Pavol Zavarsky, Dale Lindskog, Sergey Butakov. 114-119 [doi]
- A study on the flame detection and object classification technique using the color informationMin-Gu Kim, Sung Bum Pan. 120-123 [doi]
- Case-based reasoning system for predicting the sustainability of a telecentreAzerikatoa D. Ayoung, Boyce Sigweni, Pamela Abbott. 125-130 [doi]
- Rep on the block: A next generation reputation system based on the blockchainRichard Dennis, Gareth Owen. 131-138 [doi]
- Long running, consistent, web service transactionsAspen Olmsted. 139-144 [doi]
- Security concerns and mitigation approaches for MOOC-based applicationsDavid Lebron, Hossain Shahriar, Rubana Yasmin Lupu. 145-150 [doi]
- Framework for automatically construct ontology knowledge base from semi-structured datasetsGui-hyun Baek, Su-Kyoung Kim, Ki-hong Ahn. 152-157 [doi]
- Emerging new trends of location based systems securityFatema Al Mansoori, Chan Yeob Yeun. 158-163 [doi]
- Optimized hardware design and implementation of EC based key management scheme for WSNP. Jilna, P. P. Deepthi, U. K. Jayaraj. 164-169 [doi]
- Bi-directional traffic management support system with decision tree based dynamic routingMd. Rahatur Rahman, Shamim Akhter. 170-175 [doi]
- Application of theory of reasoned action in u-health systemMincheol Kim. 177-178 [doi]
- Usable security of authentication process: New approach and practical assessmentMaha M. Althobaiti, Pam J. Mayhew. 179-180 [doi]
- Security aspects of PRNGs with large state spacesGabriele Spenger, Jqorg Keller. 181-185 [doi]
- Analysis of effectiveness of black-box web application scanners in detection of stored SQL injection and stored XSS vulnerabilitiesMuhammad Parvez, Pavol Zavarsky, Nidal Khoury. 186-191 [doi]
- Attacks on Web browsers with HTML5Soojin Yoon, Jonghun Jung, Hwan Kuk Kim. 193-197 [doi]
- The awareness of social engineering in information revolution: Techniques and challengesAisha Suliaman Alazri. 198-201 [doi]
- A survey on security and privacy issues in big dataDuygu Sinanc Terzi, Ramazan Terzi, Seref Sagiroglu. 202-207 [doi]
- A survey of honeypot research: Trends and opportunitiesRonald M. Campbell, Keshnee Padayachee, Themba Masombuka. 208-212 [doi]
- Study of compliance of Apple's location based APIs with recommendations of the IETF GeoprivRohit Beniwal, Pavol Zavarsky, Dale Lindskog. 214-219 [doi]
- Role-based privilege isolation: A novel authorization model for Android smart devicesBatsayan Das, Lakshmipadmaja Maddali, Harshita Vani Nallagonda. 220-225 [doi]
- Mitigating insider threats in a cloud using a knowledgebase approach while maintaining data availabilityQutaibah Althebyan, Rami Mohawesh, Qussai Yaseen, Yaser Jararweh. 226-231 [doi]
- iBook: An interactive book systemShafiq ur Réhman. 233-237 [doi]
- Toward power consumption in partitioned Wireless Sensors Networks routing techniqueAhmad Al-Khasawneh. 238-241 [doi]
- Transparent high capacity audio watermarking in wavelet domainMehdi Fallahpour, David Megías. 242-247 [doi]
- Towards a holistic brokerage system for multi-cloud environmentBandar Aldawsari, Thar Baker, David England. 249-255 [doi]
- Application of quantitative security metrics in cloud computingKennedy A. Torkura, Feng Cheng 0002, Christoph Meinel. 256-262 [doi]
- From use case diagrams to executable context-aware ambientsFrançois Siewe, Ahmed Al-alshuhai. 263-268 [doi]
- SCAP benchmark for Cisco router security configuration complianceChit Nyi Nyi Hlyne, Pavol Zavarsky, Sergey Butakov. 270-276 [doi]
- HeartSync: Mobile pacemaker failure detectorClinton Medbery, Aspen Olmsted. 277-279 [doi]
- A taxonomy of perceived information security and privacy threats among IT security studentsAli Farooq, Syed Rameez Ullah Kakakhel, Seppo Virtanen, Jouni Isoaho. 280-286 [doi]
- Assessment of research efforts in surveillance systemsChristos Ntrigkogias, Nineta Polemi. 288-294 [doi]
- Equilibrium properties of rate control protocolsAbhijit Kiran Valluri. 295-301 [doi]
- MapReduce: A critical analysis of existing authentication methodsIbrahim Lahmer, Ning Zhang. 302-313 [doi]
- Load-adjusted video quality prediction methods for missing dataRuairi de Fréin. 314-319 [doi]
- RAT-based malicious activities detection on enterprise internal networksMasahiro Yamada, Masanobu Morinaga, Yuki Unno, Satoru Torii, Masahiko Takenaka. 321-325 [doi]
- Cyber-physical testbed - The impact of cyber attacks and the human factorYannis Soupionis, Thierry Benoist. 326-331 [doi]
- Facial expression change detection algorithm using optical flow techniqueNorulzahrah Mohd. Zainudin, Suzaimah Ramli, Tuan Khalisah Tan Zizi, Nor Asiakin Hasbullah, Norazlin Ibrahim. 332-335 [doi]
- Internet of things (IoT) security: Current status, challenges and prospective measuresRwan Mahmoud, Tasneem Yousuf, Fadi A. Aloul, Imran A. Zualkernan. 336-341 [doi]
- Conceptual maps for physical securitySabah Al-Fedaghi. 343-348 [doi]
- Current efforts in ports and supply chains risk assessmentNineta Polemi, Spyros Papastergiou. 349-354 [doi]
- Automated security configuration checklist for a cisco IPsec VPN router using SCAP 1.2Gabriel Biedima Peterside, Pavol Zavarsky, Sergey Butakov. 355-360 [doi]
- Managing security trade-offs in the Internet of Things using adaptive securityWaqas Aman, Einar Snekkenes. 362-368 [doi]
- Dynamic forward error correction algorithm over IP network services for ITU-T G.722.2 codecFatiha Merazka, Fulvio Babich. 369-372 [doi]
- A generalized web service response time metric to support collaborative and corroborative web service monitoringIshmael Makitla, Jabu Mtsweni. 373-377 [doi]
- The role of HTML5 IndexedDB, the past, present and futureStefan Kimak, Jeremy Ellman. 379-383 [doi]
- Predicting multi-stage attacks based on IP informationAbdulrazaq Almutairi, David J. Parish, James Flint. 384-390 [doi]
- Virtual closed networks: A secure approach to autonomous mobile ad hoc networksDarren Hurley-Smith, Jodie Wetherall, Andrew A. Adekunle. 391-398 [doi]
- Low complexity linear equalization of doubly selective channelSajjad Ahmed Ghauri, Hasan Humayun, Mobeen Iqbal. 400-405 [doi]
- Transparent authentication systems for mobile device security: A reviewSaud Alotaibi, Steven Furnell, Nathan L. Clarke. 406-413 [doi]
- Detecting intelligent malware on dynamic Android analysis environmentsShirish Kumar Singh, Bharavi Mishra, Saket Singh. 414-419 [doi]
- The effectiveness of digital game for introductory programming conceptsWong Seng Yue, Wong Lai Wan. 421-425 [doi]
- Visual location recognition using smartphone sensors for indoor environmentGuanyuan Feng, Xuezhi Tan, Lin Ma. 426-430 [doi]
- Fountain-code-enabled DCF for optimazing throughput in wireless sensorsRachid Aouami, Essaid Sabir, Mounir Rifi, Mohamed Ouzzif. 431-436 [doi]
- Dragoon: Advanced modelling of IP geolocation by use of latency measurementsPeter Hillmann, Lars Stiemert, Gabi Dreo Rodosek, Oliver Rose. 438-445 [doi]
- Usability evaluation of Twitter on Android platform for elderly Arab users using morae evaluation toolMashail Al-khomsan, Alaa Al-Arjan, Abrar Al-Amro, Khalid Al-Nafjan. 446-447 [doi]
- An extension of RSA_512 to RSA_1024 core under hardware platform based on montgomery poweringWahiba Hentabli, Fatiha Merazka. 448-453 [doi]