337 | -- | 356 | Djamel Herbadji, Nadir Derouiche, Aïssa Belmeguenaï, Nedal Tahat, Selma Boumerdassi. A new colour image encryption approach using a combination of two 1D chaotic map |
357 | -- | 385 | Anas AlMajali, Yatin Wadhawan, Mahmood S. Saadeh, Laith Shalalfeh, Clifford Neuman. Risk assessment of smart grids under cyber-physical attacks using Bayesian networks |
386 | -- | 396 | V. Joseph Raymond, R. Jeberson Retna Raj. Reversing and auditing of android malicious applications using sandboxing environment |
397 | -- | 411 | Reza Montasari, Richard Hill, Simon Parkinson, Alireza Daneshkhah, Amin Hosseinian Far. Hardware-based cyber threats: attack vectors and defence techniques |
412 | -- | 423 | Kanat S. Lakbayev, Gulnara M. Rysmagambetova, Alizhan U. Umetov, Askar K. Sysoyev. The crimes in the field of high technology: concept, problems and methods of counteraction in Kazakhstan |
424 | -- | 436 | Reza Montasari, Richard Hill, Farshad Montaseri, Hamid Jahankhani, Amin Hosseinian Far. Internet of things devices: digital forensic process and data reduction |