| 1033 | -- | 1034 | Gregorio Martínez Pérez, Félix Gómez Mármol, Jose M. Alcaraz Calero. Introduction to Recent Advances in Security and Privacy in Distributed Communications |
| 1035 | -- | 1046 | Yuan Mei, Guo Cao, HuaiJiang Sun, Rongtao Hou. A systematic gradient-based method for the computation of fingerprint's orientation field |
| 1047 | -- | 1061 | Yu Yao, Lei Guo, Hao Guo, Ge Yu, Fuxiang Gao, Xiao-jun Tong. Pulse quarantine strategy of internet worm propagation: Modeling and analysis |
| 1062 | -- | 1072 | Carlos Catania, Carlos García Garino. Automatic network intrusion detection: Current techniques and open issues |
| 1073 | -- | 1087 | Imad M. Abbadi, Muntaha Alawneh. A framework for establishing trust in the Cloud |
| 1088 | -- | 1101 | Dong Chen, Guiran Chang, Dawei Sun, Jie Jia, Xingwei Wang. Modeling access control for cyber-physical systems using reputation |
| 1102 | -- | 1114 | Verónica Mateos Lanchas, Víctor A. Villagrá, Francisco Romero Bueno, Julio Berrocal. Definition of response metrics for an ontology-based Automated Intrusion Response Systems |
| 1115 | -- | 1128 | Husameldin Mukhtar, Khaled Salah, Youssef Iraqi. Mitigation of DHCP starvation attack |
| 1129 | -- | 1145 | Farhan Siddiqui, Sherali Zeadally, Thabet Kacem, Scott Fowler. Zero Configuration Networking: Implementation, performance, and security |
| 1146 | -- | 1161 | Béla Genge, Christos Siaterlis, Igor Nai Fovino, Marcelo Masera. A cyber-physical experimentation environment for the security analysis of networked industrial control systems |
| 1162 | -- | 1163 | Ferat Sahin. Introduction to Special Issue on Image Processing |
| 1164 | -- | 1176 | Gaurav Bhatnagar, Q. M. Jonathan Wu, Balasubramanian Raman. Robust gray-scale logo watermarking in wavelet domain |
| 1177 | -- | 1185 | Bin Huang, Guohui Tian, Fengyu Zhou. Human typical action recognition using gray scale image of silhouette sequence |
| 1186 | -- | 1195 | Wei Ji, Dean Zhao, Fengyi Cheng, Bo Xu, Ying Zhang, Jinjing Wang. Automatic recognition vision system guided for apple harvesting robot |
| 1196 | -- | 1204 | Xiangzhi Bai, Fugen Zhou, Bindang Xue. Toggle and top-hat based morphological contrast operators |
| 1205 | -- | 1212 | Huanghui Shen, Zhensong Wang, Weimin Zheng. Corner turn of SAR data based on multi-FPGAs parallel system |
| 1213 | -- | 1221 | Weiping Yang, Xuezhi Wang, Bill Moran, Ashley Wheaton, Nicola Cooley. Efficient registration of optical and infrared images via modified Sobel edging for plant canopy temperature estimation |
| 1222 | -- | 1239 | Dongil Han, Jongho Choi, Byungwhan Kim, Jae Il Cho. Design and VLSI implementation of a high-performance face detection engine |
| 1240 | -- | 1248 | Lili Liu, Qiang Zhang, Xiaopeng Wei. A RGB image encryption algorithm based on DNA encoding and chaos map |
| 1249 | -- | 1261 | Xin-Wei Li, Baolong Guo, Long Chen, Xian-xiang Wu, Lei-Da Li. A high capacity and strong robust fingerprinting for compressed images |
| 1262 | -- | 1277 | P. Jidesh, Santhosh George. Shock coupled fourth-order diffusion for image enhancement |
| 1278 | -- | 1298 | Amit Phadikar, Santi P. Maity. On protection of compressed image in fading channel using data hiding |
| 1299 | -- | 1309 | Hamit Soyel, Hasan Demirel. Localized discriminative scale invariant feature transform based facial expression recognition |
| 1310 | -- | 1324 | Hong Shen, Bo Chen. From single watermark to dual watermark: A new approach for image watermarking |
| 1325 | -- | 1335 | Syed Mahfuzul Aziz, Minh-Duc Pham. Efficient parallel architecture for multi-level forward discrete wavelet transform processors |
| 1336 | -- | 1345 | Jinzheng Lu, Qiheng Zhang, Zhiyong Xu, Zhenming Peng. 0 norm minimization |
| 1346 | -- | 1357 | Cailing Wang, Xiaoyuan Jing, Chunxia Zhao. Local Upsampling Fourier Transform for accurate 2D/3D image registration |
| 1358 | -- | 1376 | Sherin M. Youssef. ICTEDCT-CBIR: Integrating curvelet transform with enhanced dominant colors extraction and texture analysis for efficient content-based image retrieval |