281 | -- | 282 | . Guest Editorial: Privacy, Data Assurance, Security Solutions for Internet of Things (PASS4IoT) |
283 | -- | 286 | Jiajia Song, Jinbo Zhang, Xinnan Fan. ad-hoc network |
287 | -- | 293 | Manjula Raja, Raja Datta. Efficient aggregation technique for data privacy in wireless sensor networks |
294 | -- | 298 | Mohamed Boussif, Noureddine Aloui, Adnene Cherif. Secured cloud computing for medical data based on watermarking and encryption |
299 | -- | 305 | Tao Qin, Yuli Gao, Lingyan Wei, Zhaoli Liu, Chenxu Wang. Potential threats mining methods based on correlation analysis of multi-type logs |
306 | -- | 312 | Ainaz Bahramlou, Reza Javidan. Adaptive timing model for improving routing and data aggregation in Internet of things networks using RPL |
313 | -- | 320 | Rajavel Dhandabani, Shantharajah S. Periyasamy, Theagarajan Padma, Arun Kumar Sangaiah. Six-face cubical key encryption and decryption based on product cipher using hybridisation and Rubik's cubes |
321 | -- | 327 | Philip O'Kane, Sakir Sezer, Domhnall Carlin. Evolution of ransomware |
328 | -- | 335 | Thomas I. Tegou, Antonios Tsiflikiotis, Dimitrios D. Vergados, Katherine Siakavara, Spiros Nikolaidis, Sotirios K. Goudos, Panagiotis G. Sarigiannidis, Mohammad S. Obaidat. Spectrum allocation in cognitive radio networks using chaotic biogeography-based optimisation |
336 | -- | 345 | Mahsa Derakhshani, Saeedeh Parsaeefard, Tho Le-Ngoc, Alberto Leon-Garcia. Leveraging synergy of SDWN and multi-layer resource management for 5G networks |
346 | -- | 352 | Mohammad Al-Hisnawi, Mahmood Ahmadi. QCF for deep packet inspection |
353 | -- | 361 | Habib Mostafaei, Mohammad S. Obaidat. Learning automaton-based self-protection algorithm for wireless sensor networks |