Abstract is missing.
- A Bio-inspired Comprehensive Distributed Correlation Approach for Intrusion Detection Alerts and EventsAyman M. Bahaa Eldin. 3-38 [doi]
- Bio-inspired Evolutionary Sensory System for Cyber-Physical System SecurityMohamed Azab, Mohamed Eltoweissy. 39-69 [doi]
- An Optimized Approach for Medical Image WatermarkingMona M. Soliman, Aboul Ella Hassanien, Hoda M. Onsi. 71-91 [doi]
- Bio-inspiring Techniques in Watermarking Medical Images: A ReviewMona M. Soliman, Aboul Ella Hassanien, Hoda M. Onsi. 93-114 [doi]
- Efficient Image Authentication and Tamper Localization Algorithm Using Active WatermarkingSajjad Dadkhah, Azizah Abd Manaf, Somayeh Sadeghi. 115-148 [doi]
- TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for Mobile Ad-Hoc NetworksAyman M. Bahaa Eldin. 151-184 [doi]
- An Overview of Self-Protection and Self-Healing in Wireless Sensor NetworksTarek Gaber, Aboul Ella Hassanien. 185-202 [doi]
- Cybercrime Investigation Challenges: Middle East and North AfricaMohamed Sarrab, Nasser Alalwan, Ahmed Alzahrani, Mahdi Kordestani. 203-223 [doi]
- Multilayer Machine Learning-Based Intrusion Detection SystemAmira Sayed A. Aziz, Aboul Ella Hassanien. 225-247 [doi]
- An Improved Key Management Scheme with High Security in Wireless Sensor NetworksD. Satish kumar, N. Nagarajan, Ahmad Taher Azar. 249-264 [doi]
- Key Pre-distribution Techniques for WSN Security ServicesMohamed Mostafa M. Fouad, Aboul Ella Hassanien. 265-283 [doi]
- Fusion of Multiple Biometric Traits: Fingerprint, Palmprint and IrisN. L. Manasa, A. Govardhan, Ch. Satyanarayana. 287-320 [doi]
- Biometric Recognition Systems Using Multispectral ImagingAbdallah Meraoumia, Salim Chitroub, Ahmed Bouridane. 321-347 [doi]
- Electrocardiogram (ECG): A New Burgeoning Utility for Biometric RecognitionManal M. Tantawi, Kenneth Revett, Abdel-Badeeh M. Salem, Mohamed Fahmy Tolba. 349-382 [doi]
- Image Pre-processing Techniques for Enhancing the Performance of Real-Time Face Recognition System Using PCABehzad Nazarbakhsh, Azizah Abd Manaf. 383-422 [doi]
- Biometric and Traditional Mobile Authentication Techniques: Overviews and Open IssuesReham Amin, Tarek Gaber, Ghada ElTaweel, Aboul Ella Hassanien. 423-446 [doi]
- Cloud Services Discovery and Selection: Survey and New Semantic-Based SystemYasmine M. Afify, Ibrahim F. Moawad, Nagwa L. Badr, M. F. Tolba. 449-477 [doi]
- Data and Application Security in CloudRajesh P. Barnwal, Nirnay Ghosh, Soumya K. Ghosh. 479-495 [doi]
- Security Issues on Cloud Data ServicesNour Zawawi, Mohamed Hamdy El-Eliemy, Rania El-Gohary, Mohamed F. Tolba. 497-517 [doi]
- A Reputation Trust Management System for Ad-Hoc Mobile CloudsAhmed Hammam, Samah Senbel. 519-539 [doi]
- Secured and Networked Emergency Notification Without GPS Enabled DevicesQurban A. Memon. 541-563 [doi]
- Towards Cloud Customers Self-Monitoring and Availability-MonitoringSameh Hussein, Nashwa Abdelbaki. 565-585 [doi]