Journal: Computers & Electrical Engineering

Volume 38, Issue 5

1033 -- 1034Gregorio Martínez Pérez, Félix Gómez Mármol, Jose M. Alcaraz Calero. Introduction to Recent Advances in Security and Privacy in Distributed Communications
1035 -- 1046Yuan Mei, Guo Cao, HuaiJiang Sun, Rongtao Hou. A systematic gradient-based method for the computation of fingerprint's orientation field
1047 -- 1061Yu Yao, Lei Guo, Hao Guo, Ge Yu, Fuxiang Gao, Xiao-jun Tong. Pulse quarantine strategy of internet worm propagation: Modeling and analysis
1062 -- 1072Carlos Catania, Carlos García Garino. Automatic network intrusion detection: Current techniques and open issues
1073 -- 1087Imad M. Abbadi, Muntaha Alawneh. A framework for establishing trust in the Cloud
1088 -- 1101Dong Chen, Guiran Chang, Dawei Sun, Jie Jia, Xingwei Wang. Modeling access control for cyber-physical systems using reputation
1102 -- 1114Verónica Mateos Lanchas, Víctor A. Villagrá, Francisco Romero Bueno, Julio Berrocal. Definition of response metrics for an ontology-based Automated Intrusion Response Systems
1115 -- 1128Husameldin Mukhtar, Khaled Salah, Youssef Iraqi. Mitigation of DHCP starvation attack
1129 -- 1145Farhan Siddiqui, Sherali Zeadally, Thabet Kacem, Scott Fowler. Zero Configuration Networking: Implementation, performance, and security
1146 -- 1161Béla Genge, Christos Siaterlis, Igor Nai Fovino, Marcelo Masera. A cyber-physical experimentation environment for the security analysis of networked industrial control systems
1162 -- 1163Ferat Sahin. Introduction to Special Issue on Image Processing
1164 -- 1176Gaurav Bhatnagar, Q. M. Jonathan Wu, Balasubramanian Raman. Robust gray-scale logo watermarking in wavelet domain
1177 -- 1185Bin Huang, Guohui Tian, Fengyu Zhou. Human typical action recognition using gray scale image of silhouette sequence
1186 -- 1195Wei Ji, Dean Zhao, Fengyi Cheng, Bo Xu, Ying Zhang, Jinjing Wang. Automatic recognition vision system guided for apple harvesting robot
1196 -- 1204Xiangzhi Bai, Fugen Zhou, Bindang Xue. Toggle and top-hat based morphological contrast operators
1205 -- 1212Huanghui Shen, Zhensong Wang, Weimin Zheng. Corner turn of SAR data based on multi-FPGAs parallel system
1213 -- 1221Weiping Yang, Xuezhi Wang, Bill Moran, Ashley Wheaton, Nicola Cooley. Efficient registration of optical and infrared images via modified Sobel edging for plant canopy temperature estimation
1222 -- 1239Dongil Han, Jongho Choi, Byungwhan Kim, Jae Il Cho. Design and VLSI implementation of a high-performance face detection engine
1240 -- 1248Lili Liu, Qiang Zhang, Xiaopeng Wei. A RGB image encryption algorithm based on DNA encoding and chaos map
1249 -- 1261Xin-Wei Li, Baolong Guo, Long Chen, Xian-xiang Wu, Lei-Da Li. A high capacity and strong robust fingerprinting for compressed images
1262 -- 1277P. Jidesh, Santhosh George. Shock coupled fourth-order diffusion for image enhancement
1278 -- 1298Amit Phadikar, Santi P. Maity. On protection of compressed image in fading channel using data hiding
1299 -- 1309Hamit Soyel, Hasan Demirel. Localized discriminative scale invariant feature transform based facial expression recognition
1310 -- 1324Hong Shen, Bo Chen. From single watermark to dual watermark: A new approach for image watermarking
1325 -- 1335Syed Mahfuzul Aziz, Minh-Duc Pham. Efficient parallel architecture for multi-level forward discrete wavelet transform processors
1336 -- 1345Jinzheng Lu, Qiheng Zhang, Zhiyong Xu, Zhenming Peng. 0 norm minimization
1346 -- 1357Cailing Wang, Xiaoyuan Jing, Chunxia Zhao. Local Upsampling Fourier Transform for accurate 2D/3D image registration
1358 -- 1376Sherin M. Youssef. ICTEDCT-CBIR: Integrating curvelet transform with enhanced dominant colors extraction and texture analysis for efficient content-based image retrieval