367 | -- | 0 | . Guest Editorial: Security on Mobile and IoT Devices |
368 | -- | 379 | Max Ingham, Jims Marchang, Deepayan Bhowmik. IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN |
380 | -- | 390 | Mengxia Shuai, Ling Xiong, Changhui Wang, Nenghai Yu. Lightweight and privacy-preserving authentication scheme with the resilience of desynchronisation attacks for WBANs |
391 | -- | 400 | Amit Kumar Roy, Ajoy Kumar Khan. Privacy preservation with RTT-based detection for wireless mesh networks |
401 | -- | 409 | Xiujuan Wang, Haoyang Tang, Kangfeng Zheng, Yuanrui Tao. Detection of compromised accounts for online social networks based on a supervised analytical hierarchy process |
410 | -- | 418 | Eligijus Sakalauskas, Aleksejus Mihalkovich, Arnas Uselis. Security analysis of KAP based on enhanced MPF |
419 | -- | 429 | Lahouari Ghouti, Muhammad Imam. Malware classification using compact image features and multiclass support vector machines |
430 | -- | 441 | Chen-Dong Ye, Tian Tian. Algebraic method to recover superpolies in cube attacks |
443 | -- | 451 | Qi Feng, Debiao He, Zhe Liu 0001, Ding Wang 0002, Kim-Kwang Raymond Choo. Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme |
452 | -- | 458 | Hongsong Chen, Caixia Meng, Zhongchuan Fu, Chao-Hsien Lee. Novel LDoS attack detection by Spark-assisted correlation analysis approach in wireless sensor network |
459 | -- | 469 | Mohammad Taherifard, Mahdi Fazeli, Ahmad Patooghy. Scan-based attack tolerance with minimum testability loss: a gate-level approach |
470 | -- | 481 | Jinguo Li, Mi Wen, Kai Zhang. Cloud-assisted secure and conjunctive publish/subscribe service in smart grids |