27 | -- | 0 | Ting Ye, Baowei Wang. Density Self-Adaptive Hybrid Clustering Routing Protocol for Wireless Sensor Networks |
28 | -- | 0 | Mikhail Strizhov, Zachary Osman, Indrajit Ray. Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup |
29 | -- | 0 | Waqas Haider, Gideon Creech, Yi Xie, Jiankun Hu. Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks |
30 | -- | 0 | Antonio Santos-Olmo Parra, Luís Enrique Sanchez, Ismael Caballero, Sara Camacho, Eduardo Fernández-Medina. The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets |
31 | -- | 0 | Simon Dedeo. Conflict and Computation on Wikipedia: A Finite-State Machine Analysis of Editor Interactions |
32 | -- | 0 | Gabriele Guidi, Roberto Miniati, Matteo Mazzola, Ernesto Iadanza. Case Study: IBM Watson Analytics Cloud Platform as Analytics-as-a-Service System for Heart Failure Early Detection |
33 | -- | 0 | Angélica Flórez, Lenin Serrano, Urbano Gómez, Luis Suárez, Alejandro Villarraga, Hugo Rodríguez. Analysis of Dynamic Complexity of the Cyber Security Ecosystem of Colombia |
34 | -- | 0 | Kathryn E. Merrick, Medria K. D. Hardhienata, Kamran Shafi, Jiankun Hu. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios |
35 | -- | 0 | Weili Kou, Hui Li, Kailai Zhou. Turning Video Resource Management into Cloud Computing |
36 | -- | 0 | Antonio Santos-Olmo Parra, Luís Enrique Sanchez, David G. Rosado, Eduardo Fernández-Medina, Mario Piattini. Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems |
37 | -- | 0 | Maged N. Kamel Boulos, Dean M. Giustini, Steve Wheeler. Instagram and WhatsApp in Health and Healthcare: An Overview |
38 | -- | 0 | Weijun Yang, Yuanfeng Chen. A Novel QoS Provisioning Algorithm for Optimal Multicast Routing in WMNs |
39 | -- | 0 | Xin Liu, Zhongfu Li, Shaohua Jiang. Ontology-Based Representation and Reasoning in Building Construction Cost Estimation in China |
40 | -- | 0 | Rassarin Chinnachodteeranun, Kiyoshi Honda. Sensor Observation Service API for Providing Gridded Climate Data to Agricultural Applications |
41 | -- | 0 | Paloma Díaz, John M. Carroll, Ignacio Aedo. Coproduction as an Approach to Technology-Mediated Citizen Participation in Emergency Management |
42 | -- | 0 | Rita Francese, Michele Risi. Supporting Elderly People by Ad Hoc Generated Mobile Applications Based on Vocal Interaction |
43 | -- | 0 | Salvatore Carta, Ludovico Boratto. Introduction to the Special Issue on Human-Computer Interaction and the Social Web |
44 | -- | 0 | Julio Moreno, Manuel A. Serrano, Eduardo Fernández-Medina. Main Issues in Big Data Security |
45 | -- | 0 | Alexander Kosenkov. Cyber Conflicts as a New Global Threat |