404 | -- | 413 | Roberto De Prisco, Alfredo De Santis, Pompeo Faruolo, Marco Mannetta. Design of an outdoor position certification authority |
414 | -- | 423 | Brij B. Gupta, Megha Quamara. Decentralised control-based interaction framework for secure data transmission in internet of automated vehicles |
424 | -- | 433 | Andrea Bruno, Giuseppe Cattaneo. An experimental estimate of the impact produced on PNU by new generation video codecs |
434 | -- | 440 | Katarzyna Koptyra, Marek R. Ogiela. Lightweight and efficient approach for multi-secret steganography |
441 | -- | 452 | Hugo Sbai, Jassim Happa, Michael Goldsmith, Samy Meftali. A survey on screenlogger attacks as well as countermeasures |
453 | -- | 457 | Laiali Almazaydeh. Secure RGB image steganography based on modified LSB substitution |
458 | -- | 466 | Lelio Campanile, Marco Gribaudo, Mauro Iacono, Michele Mastroianni. Modelling performances of an autonomic router running under attack |
467 | -- | 474 | Yafei Wang, Ming Ma. Research on intelligent obstacle avoidance control method for mobile robot in multi-barrier environment |
475 | -- | 483 | P. Kumaresan, Prabukumar Manoharan, S. Subha. Heuristic approach to minimise the energy consumption of sensors in cloud environment for wireless body area network applications |
484 | -- | 490 | Wenbo Fu. Mass internet of things data security exchange model under heterogeneous environment |
491 | -- | 499 | Shuai Yang, Zhi-Hui Zou, Gihong Min. Tracking algorithm of weak disturbance signal under multi-device interference in internet of things |
500 | -- | 509 | Wei She, Zhihao Gu, Wei Liu, Jian-Sen Chen, Bo Wang, Zhao Tian. A channel matching scheme for cross-chain |
510 | -- | 521 | Kehong Zhang, Keqiu Li. A novel algorithm for TOP-K optimal path on complex multiple attribute graph |
522 | -- | 533 | Binbin Yong, Zijian Xu, Jun Shen 0001, Huaming Chen, Jianqing Wu, Fucun Li, Qingguo Zhou. A novel Monte Carlo-based neural network model for electricity load forecasting |
534 | -- | 543 | Zuoting Ning, Lan He, Dafang Zhang, Kun Xie 0001. A novel localised network coding-based overhearing strategy |
544 | -- | 553 | Jianbo Xu, Shu Feng, Wei Liang, Jian Ke, Xiangwei Meng, Ruili Zhang, Danping Shou. An algorithm for determining data forwarding strategy based on recommended trust value in MANET |
554 | -- | 566 | Weili Chen, Zibin Zheng, Mingjie Ma, Pinjia He, Yuren Zhou, Jing Bian. Hierarchical bucket tree: an efficient account structure for blockchain-based system |