1 | -- | 2 | Kim-Kwang Raymond Choo, Jemal Abawajy, Md. Rafiqul Islam 0001. Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions |
3 | -- | 21 | Gustavo Gonzalez Granadillo, Joaquín García, Hervé Debar. A polytope-based approach to measure the impact of events against critical infrastructures |
22 | -- | 42 | Deepak Puthal, Surya Nepal, Rajiv Ranjan, Jinjun Chen. A dynamic prime number based efficient security mechanism for big sensing data streams |
43 | -- | 57 | Martin Grill, Tomás Pevný, Martin Rehák. Reducing false positives of network anomaly detection by local adaptive multivariate smoothing |
58 | -- | 72 | Adnan Anwar, Abdun Naser Mahmood, Mark Pickering. Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements |
73 | -- | 83 | Chao Lin, Wei Wu, Xinyi Huang, Li Xu. A new universal designated verifier transitive signature scheme for big graph data |
84 | -- | 100 | Vitaly Ford, Ambareen Siraj, Mohammad Ashiqur Rahman. Secure and efficient protection of consumer privacy in Advanced Metering Infrastructure supporting fine-grained data analysis |
101 | -- | 120 | Stefan Haar, Serge Haddad, Tarek Melliti, Stefan Schwoon. Optimal constructions for active diagnosis |
121 | -- | 131 | Gregory Gutin, Magnus Wahlström, Anders Yeo. Rural postman parameterized by the number of components of required edges |
132 | -- | 158 | Josep Díaz, Olli Pottonen, Maria J. Serna, Erik Jan van Leeuwen. Complexity of metric dimension on planar graphs |
159 | -- | 179 | Le Hoang Son, Pham Huy Thong. Soft computing methods for WiMax Network Planning on 3D Geographical Information Systems |
180 | -- | 206 | Tomasz Gogacz, Jerzy Marcinkowski. Converging to the chase - A tool for finite controllability |
207 | -- | 214 | Shmuel Onn. Huge tables and multicommodity flows are fixed-parameter tractable via unimodular integer Carathéodory |