Abstract is missing.
- Challenges pertaining to cyber war under international lawMurdoch Watney. 1-5 [doi]
- The importance of mandatory data breach notification to identity crimeEric Holm, Geraldine Mackenzie. 6-11 [doi]
- An enhancement of traceability model based-on scenario for digital forensic investigation processIman Ahmeid Mohamed, Azizah Bt Abdul Manaf. 12-15 [doi]
- Comparison between Alloy and Timed Automata for modelling and analysing of access control specificationsEmsaieb Geepalla. 16-21 [doi]
- An approach for forensic investigation in Firefox OSMohd Najwadi Yusoff, Ramlan Mahmod, Ali Dehghantanha, Mohd Taufik Abdullah. 22-26 [doi]
- Mobile forensic data acquisition in Firefox OSMohd Najwadi Yusoff, Ramlan Mahmod, Mohd Taufik Abdullah, Ali Dehghantanha. 27-31 [doi]
- Modeling the propagation of security threats: An e-learning case studyNeila Rjaibi, Nawel Gannouni, Latifa Ben Arfa Rabai, Anis Ben Aissa. 32-37 [doi]
- Modifying authentication techniques in mobile communication systemsZakaria Zakaria Hassan, Talaat A. Elgarf, Abdelhalim Zekry. 38-44 [doi]
- Statistical analysis for random bits generation on quantum key distributionOmer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem. 45-51 [doi]
- A cognitive approach for botnet detection using Artificial Immune System in the cloudVictor R. Kebande, Hein S. Venter. 52-57 [doi]
- On the power of quantum cryptography and computersHeshem A. El Zouka, Mustafa M. Hosni. 58-63 [doi]
- Autonomous integrity monitoring for GNSS localization using informational approach and iono-free measurementsM. Kaddour, Nourdine Ait Tmazirte, Maan El Badaoui El Najjar, Z. Naja, N. Moubayed. 64-69 [doi]