65 | -- | 75 | N. M. Saravana Kumar, S. Lavanya. A novel scheme for secure group communication in multicast network |
76 | -- | 83 | Jai-Pil Oh, Dong-Ho Kim. System architecture and platform design for terrestrial ultra-high definition (UHD) broadcasting service |
84 | -- | 90 | Inkyoo Park, Jongjin Park, Gyooseok Choi. Using Bayesian posterior probability in confidence of attributes for feature selection |
91 | -- | 106 | Vivens Ndatinya, Zhifeng Xiao, Vasudeva Rao Manepalli, Ke Meng, Yang Xiao. Network forensics analysis using Wireshark |
107 | -- | 123 | Yki Kortesniemi, Timo Kiravuo, Mikko Särelä, Hannu H. Kari. Chain reduction of authorisation certificates |
124 | -- | 136 | Jared Lee, Thomas H. Austin, Mark Stamp. Compression-based analysis of metamorphic malware |