Abstract is missing.
- Efficient Block replication to optimize the blockchain resourcesEl-hacen Diallo, Alexandre Laubé, Khaldoun Al Agha, Steven Martin 0001. 1-5 [doi]
- A Blockchain-Encryption-Based Approach to Protect Fog Federations from Rogue NodesMohammed Alshehri, Brajendra Panda. 6-13 [doi]
- Towards Blockchain Services For Mobile Money Traceability And FederationKodjo Edem Agbezoutsi, Pascal Urien, Toundé Mesmin Dandjinou. 14-20 [doi]
- Going Beyond the Blockchain Hype: In Which Cases are Blockchains Useful for IT Applications?Nour El Madhoun, Julien Hatin, Emmanuel Bertin. 21-27 [doi]
- A Blockchain-based Lightweight Authentication Solution for IoTAchraf Fayad, Badis Hammi, Rida Khatoun, Ahmed Serhrouchni. 28-34 [doi]
- A Secure and Fault-Tolerant Architecture for LoRaWAN Based on BlockchainVictor Pasknel de Alencar Ribeiro, Raimir Holanda Filho, Alex Ramos. 35-41 [doi]
- Trust-based collaborative defences in multi network alliancesRalph Koning, Ameneh Deljoo, Lydia Meijer, Cees de Laat, Paola Grosso. 42-49 [doi]
- Managing Effective Collaboration in Cybersecurity Alliances Using Social Computational TrustAmeneh Deljoo, Ralph Koning, Tom M. van Engers, Leon Gommans, Cees de Laat. 50-57 [doi]
- Information sharing in cybersecurity : Enhancing security, trust and privacy by capacity buildingSolange Ghernaouti, Léonore Cellier, Bastien Wanner. 58-62 [doi]
- Information Security Management Frameworks in Higher Education Institutions: An OverviewJorge Merchan-Lima, Fabian Astudillo-Salinas, Luis Tello-Oquendo, Franklin Sanchez, Gabriel Lopez, Dorys Quiroz. 63-65 [doi]
- Dynamic security management driven by situations: An exploratory analysis of logs for the identification of security situationsAbdelmalek Benzekri, Romain Laborde, Arnaud Oglaza, Darine Rammal, François Barrère. 66-72 [doi]
- Human Interaction Proofs (HIPs) based on Emerging Images and Topological Data Analysis (TDA) TechniquesMaria Alejandra Osorio Angarita, Ebroul Izquierdo, Agustín Moreno Cañadas. 73-79 [doi]
- The EMV Payment System: Is It Reliable?Nour El Madhoun, Emmanuel Bertin, Guy Pujolle. 80-85 [doi]
- A Risk Management Framework and A Generalized Attack Automata for IoT based Smart Home EnvironmentFathima James. 86-90 [doi]
- Hashing-based authentication for CAN bus and application to Denial-of-Service protectionOlivier Cros, Gabriel Chênevert. 91-98 [doi]
- Bluetooth Low Energy Makes "Just Works" Not WorkKarim Lounis, Mohammad Zulkernine. 99-106 [doi]
- IoT Cybersecurity based Smart Home Intrusion Prevention SystemFathima James. 107-113 [doi]
- Cloud-based Sybil Attack Detection Scheme for Connected VehiclesAnika Anwar, Talal Halabi, Mohammad Zulkernine. 114-121 [doi]
- Physical Layer Security for 5G Wireless Networks: A Comprehensive SurveyJosé David Vega Sánchez, Luis Urquiza Aguiar, Martha Cecilia Paredes Paredes. 122-129 [doi]
- Verification of Keyboard Acoustics Authentication on Laptops and Smartphones Using WebRTCChristian Tietz, Eric Klieme, Lukas Behrendt, Pawel Böning, Leonard Marschke, Christoph Meinel. 130-137 [doi]
- Social Consensus-inspired Aggregation Algorithms for Edge ComputingFiras Al-Doghman, Zenon Chaczko, Wayne Brookes, Lucia Carrion Gordon. 138-141 [doi]
- XSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Attacks in UniversitiesGermán E. Rodríguez, Jenny Torres, Pamela Flores, Eduardo Benavides, Daniel Nuñez-Agurto. 142-149 [doi]
- A Precise Method for Monitoring and Detecting Recurrent Attacks on Wireless Networks based on Link-Layer Traffic ClassificationAndreane Spano da Roza, João Vitor Valle, Diogo Menezes Ferrazani Mattos. 150-157 [doi]
- TAG: Topological Attack Graph Analysis ToolMarek Malowidzki, Damian Hermanowski, Przemyslaw Berezinski. 158-160 [doi]
- Phishing Attacks: Detecting and Preventing Infected E-mails Using Machine Learning MethodsDiego Oña, Lenín Zapata, Walter Fuertes, Germán E. Rodríguez, Eduardo Benavides, Theofilos Toulkeridis. 161-163 [doi]