1 | -- | 18 | Hongsong Chen, Caixia Meng, Jingjiu Chen. DDoS Attack Simulation and Machine Learning-Based Detection Approach in Internet of Things Experimental Environment |
19 | -- | 32 | Priti Jagwani, Saroj Kaushik. Entropy-Based Quantification of Privacy Attained Through User Profile Similarity |
33 | -- | 47 | Nabil Kannouf, Mohamed Labbi, Yassine Chahid, Mohammed Benabdellah, Abdelmalek Azizi. A Key Establishment Attempt Based on Genetic Algorithms Applied to RFID Technologies |
48 | -- | 64 | Sabyasachi Pramanik, Debabrata Samanta, Samir Kumar Bandyopadhyay, Ramkrishna Ghosh. A New Combinational Technique in Image Steganography |
65 | -- | 82 | Oladayo Olufemi Olakanmi, Kehinde Oluwasesan Odeyemi. VerSA: Verifiable and Secure Approach With Provable Security for Fine-Grained Data Distribution in Scalable Internet of Things Networks |
83 | -- | 105 | Vartika Puri, Parmeet Kaur, Shelly Sachdeva. ADT: Anonymization of Diverse Transactional Data |
106 | -- | 128 | N. Muraleedharan, B. Janet. SCAFFY: A Slow Denial-of-Service Attack Classification Model Using Flow Data |