Abstract is missing.
- A Survey on Privacy Concerns in Blockchain Applications and Current Blockchain Solutions to Preserve Data PrivacyHasventhran Baskaran, Salman Yussof, Fiza Abdul Rahim. 3-17 [doi]
- A Study on Secured Authentication and Authorization in Internet of Things: Potential of Blockchain TechnologySyeda Mariam Muzammal, Raja Kumar Murugesan. 18-32 [doi]
- Patterns and Colors: A Simple yet Innovative Way to Solve Pattern TrackingAbigail Achiamma Joshua, Samanza Kishwar Parvez, Weng Ken Lee, Ee Xion Tan. 33-45 [doi]
- Blockchain-Based Image Sharing ApplicationZhen-Kai Wong, Swee-Huay Heng. 46-59 [doi]
- Proof of Bid as Alternative to Proof of WorkWai Kok Chan, Ji-Jian Chin, Vik Tor Goh. 60-73 [doi]
- Context-Based Blockchain Platform Definition and Analysis MethodologySérgio Luís Ribeiro, Emilio Tissato Nakamura. 74-88 [doi]
- Performance Evaluation of Wavelet SVD-Based Watermarking Schemes for Color ImagesTaha H. Rassem, Nasrin M. Makbol, Bee Ee Khoo. 89-103 [doi]
- Privacy Preserving Threat Hunting in Smart Home EnvironmentsAhmed M. Elmisery, Mirela Sertovic. 104-120 [doi]
- Performance Analysis of EMM an EDoS Mitigation Technique in Cloud Computing EnvironmentParminder Singh, Shafiq Ul Rehman, Selvakumar Manickam. 123-137 [doi]
- Detection Mechanisms of DDoS Attack in Cloud Computing Environment: A SurveyMohammad Abdelkareem Alarqan, Zarul Fitri Zaaba, Ammar Almomani. 138-152 [doi]
- Overview of IPv6 Based DDoS and DoS Attacks Detection MechanismsAbdullah Ahmed Bahashwan, Mohammed Anbar, Sabri M. Hanshi. 153-167 [doi]
- Performance Evaluation for Four Supervised Classifiers in Internet Traffic ClassificationAlhamza Munther, Imad J. Mohammed, Mohammed Anbar, Anwer Mustafa Hilal. 168-181 [doi]
- Mobile Authentication Using Tapping BehaviorVasaki Ponnusamy, Chan Mee Yee, Adnan Bin Amanat Ali. 182-194 [doi]
- The Impact of Different Feature Scaling Methods on Intrusion Detection for in-Vehicle Controller Area Network (CAN)Siti-Farhana Lokman, Abu Talib Othman, Muhamad-Husaini Abu-Bakar, Shahrulniza Musa. 195-205 [doi]
- STEM: Secure Token Exchange MechanismsManeesh Darisi, Janhavi Savla, Mahesh Shirole, Sunil Bhirud. 206-219 [doi]
- On Way to Simplify the Reverse Engineering of UEFI FirmwaresPhilip Lebedev, Konstantin Kogos, Egor Vasilenko. 220-231 [doi]
- Comparison Between BlindLogin and Other Graphical Password Authentication SystemsYean Li Ho, Siong-Hoe Lau, Afizan Azman. 235-246 [doi]
- Bluetooth Low Energy 5 Mesh Based Hospital Communication Network (B5MBHCN)Muhammad Rizwan Ghori, Tat Chee Wan, Gian Chand Sodhy. 247-261 [doi]
- Wireless Sensor Network for Temperature and Humidity Monitoring Systems Based on NodeMCU ESP8266Wong G. Shun, W. Mariam W. Muda, W. Hafiza W. Hassan, A. Z. Annuar. 262-273 [doi]
- Automatic Attendance Taking: A Proof of Concept on Privacy Concerns in 802.11 MAC Address ProbingYichiet Aun, Ming-Lee Gan, Yen-Min Jasmina Khaw. 274-288 [doi]
- An Efficient Encryption Algorithm for Perfect Forward Secrecy in Satellite CommunicationAbid Murtaza, Syed Jahanzeb Hussain Pirzada, Muhammad Noman Hasan, Tongge Xu, Jianwei Liu 0001. 289-302 [doi]
- Iraqi's Organizations Awareness to Prompt Open Source Cloud Computing (OSCC) in Their Service: A StudyHala A. Albaroodi, Mohammed Abomaali, Selvakumar Manickam. 305-319 [doi]
- Appraisal on User's Comprehension in Security Warning Dialogs: Browsers Usability PerspectiveChristine Lim Xin Yi, Zarul Fitri Zaaba, Mohamad Amar Irsyad Mohd Aminuddin. 320-334 [doi]
- Empirical Investigations on Usability of Security Warning Dialogs: End Users ExperienceFarah Nor Aliah Ahmad, Zarul Fitri Zaaba, Mohamad Amar Irsyad Mohd Aminuddin, Nasuha Lee Abdullah. 335-349 [doi]
- Vulnerabilities in Online Food Ordering WebsiteJi-Jian Chin, Yvonne Hwei-Syn Kam, Vik Tor Goh. 350-357 [doi]
- Threats Against Information Privacy and Security in Social Networks: A ReviewAhmed Al-Charchafchi, Selvakumar Manickam, Zakaria N. M. Alqattan. 358-372 [doi]