1 | -- | 2 | Igor V. Kotenko. Guest Editorial: Intelligent Distributed Computing |
3 | -- | 22 | Abhishta Abhishta, Wouter van Heeswijk, Marianne Junger, Lambert J. M. Nieuwenhuis, Reinoud Joosten. Why would we get attacked? An analysis of attacker's aims behind DDoS attacks |
23 | -- | 33 | Oleg V. Baranov, Nikolay V. Smirnov, Tatyana E. Smirnova, Yefim V. Zholobov. Design of a quadrocopter with PID-controlled fail-safe algorithm |
34 | -- | 54 | Diana Berbecaru, Antonio Lioy, Cesare Cameroni. Supporting Authorize-then-Authenticate for Wi-Fi access based on an electronic identity infrastructure |
55 | -- | 73 | Yulia A. Shichkina, Galina V. Kataeva, Yulia A. Irishina, Elizaveta S. Stanevich. The use of mobile phones to monitor the status of patients with Parkinson's disease |
74 | -- | 86 | Dung Hoang Duong, Willy Susilo, Viet Cuong Trinh. Wildcarded Identity-Based Encryption with Constant-size Ciphertext and Secret Key |
87 | -- | 105 | Yaser M. Khamayseh, Wail Mardini, Monther Aldwairi, Hussein T. Mouftah. On the Optimality of Route Selection in Grid Wireless Sensor Networks: Theory and Applications |
106 | -- | 125 | Al-Hussein Hameed Jasim, Niclas Ögren, Dimitar Minovski, Karl Andersson 0001. Packet Probing Study to Assess Sustainability in Available Bandwidth Measurements: Case of High-Speed Cellular Networks |