1 | -- | 4 | Athanasios V. Vasilakos, Neal N. Xiong, Laurence Tianruo Yang, Chuan Lin, Lei Shu. Guest Editorial |
5 | -- | 12 | Chin-Chen Chang, Pei-Yu Lin, Zhi-Hui Wang, Ming-Chu Li. A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper) |
13 | -- | 22 | Wenping Deng, Peidong Zhu, Xicheng Lu, Bernhard Plattner. On Evaluating BGP Routing Stress Attack |
23 | -- | 30 | Guangjie Han, Lei Shu, Jianhua Ma, Jong Hyuk Park, Jianjun Ni. Power-Aware and Reliable Sensor Selection Based on Trust for Wireless Sensor Networks |
31 | -- | 38 | Naixue Xiong, Jing He, Yan Yang, Yanxiang He, Tai-Hoon Kim, Chuan Lin. A Survey on Decentralized Flocking Schemes for a Set of Autonomous Mobile Robots (Invited Paper) |
39 | -- | 49 | Massimiliano Rak, Rocco Aversa, Beniamino Di Martino, Antonio Sgueglia. Web Services Resilience Evaluation using LDS Load dependent Server Models. |
50 | -- | 56 | Pramod K. Suri, Kavita Taneja. M3S: Markovian Mobility Management Simulator for Mobility Conscious Routing in Global Networks |
57 | -- | 62 | Guiyi Wei, Yun Ling, Ye Gu, Yujia Ge. A Dependable Cluster Based Topology in P2P Networks |
63 | -- | 70 | Hongju Cheng, Naixue Xiong, Guolong Chen, Xiaofang Zhuang. Channel Assignment with Topology Preservation for Multi-radio Wireless Mesh Networks |
71 | -- | 80 | Toshikazu Uemura, Tadashi Dohi. Optimal Security Patch Management Policies Maximizing System Availability |
81 | -- | 87 | Zizhong Chen. Adaptive Checkpointing (Invited Paper) |