| 0 | -- | 0 | Mohammad Reza Aref. Editorial |
| 1 | -- | 7 | Oleksandr A. Letychevskyi, Yaroslav Hryniuk, Viktor Yakovlev, Volodymyr Peschanenko, Viktor Radchenko. Algebraic Matching of Vulnerabilities in a Low-Level Code |
| 9 | -- | 17 | Hadjer Saadi, Mustapha C. E. Yagoub, Rachida Touhami. Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns |
| 19 | -- | 27 | Ibrahim Soran, Qing Tan. A Sudy on Information Privacy Issue on Social Networks |
| 29 | -- | 34 | Dalia A. Shaaban, Mohamed H. Saad, Ahmed H. Madian, Hesham N. Elmahdy. Medical Image Compression Based on Region of Interest |
| 35 | -- | 38 | Rawan Flifel. The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices |
| 39 | -- | 50 | Omed Hassan Ahmed, Joan Lu, Qiang Xu 0002, Muzhir Shaban Al-Ani. Face Recognition Based Rank Reduction SVD Approach |
| 51 | -- | 58 | Areej Fatima, Muhammad Adnan Khan, Sagheer Abbas, Muhammad Waqas, Leena Anum, Muhammad Asif. Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) |
| 59 | -- | 65 | Fairouz Zendaoui, Walid-Khaled Hidouci. Considering Uncertainty in Modeling Historical Knowledge |
| 67 | -- | 72 | Ehab Khatter, Dina Ibrahim. Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance |
| 73 | -- | 78 | Felisa M. Córdova, Claudia A. Durán, Fredi Palominos. Cognitive Strategic Model applied to a Port System |
| 79 | -- | 89 | Ahmed BaniMustafa. Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining |
| 91 | -- | 96 | Ayman Atia, Nada Shorim. Hand Gestures Classification with Multi-Core DTW |
| 97 | -- | 103 | Muhammad Ali Memon, Zaira Hassan, Kamran Dahri, Asadullah Shaikh, Muhammad Ali Nizamani. Aspect Oriented UML to ECORE Model Transformation |
| 105 | -- | 111 | Evelina Pencheva, Ivaylo Atanasov, Ivaylo Asenov. Access and Mobility Policy Control at the Network Edge |
| 113 | -- | 122 | Mohammed J. F. Alenazi. Evaluating Multipath TCP Resilience against Link Failures |
| 123 | -- | 130 | Joel E. Cordeiro Junior, Marcelo S. Alencar, José Valentim Dos Santos Filho, Karcius D. R. Assis. A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain |
| 131 | -- | 137 | Matthias Gottlieb, Marwin Shraideh, Isabel Fuhrmann, Markus Böhm 0001, Helmut Krcmar. Critical Success Factors for Data Virtualization: A Literature Review |
| 139 | -- | 144 | Saad Ali Alahmari. Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies |
| 145 | -- | 151 | Anwar Saeed, Muhammad Yousif, Areej Fatima, Sagheer Abbas, Muhammad Adnan Khan, Leena Anum, Ali Akram. An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling |
| 153 | -- | 160 | Tahir Alyas, Gulzar Ahmad, Yousaf Saeed, Muhammad Asif, Umer Farooq, Asma Kanwal. Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) |
| 161 | -- | 172 | Wajdi Al Jedaibi, Sufian Khamis. Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase |
| 173 | -- | 180 | Istabraq M. Al-Joboury, Emad H. Al-Hemiary. IoT Protocols Based Fog/Cloud over High Traffic |
| 181 | -- | 186 | Oula L. Abdulsattar, Emad H. Al-Hemiary. Virtualized Network Management Laboratory for Educational Purposes |