Abstract is missing.
- Modeling and Analysis of Malware Propagation for Cluster-based Wireless Sensor NetworksXuejin Zhu, Jie Huang, Chunyang Qi, Xiaowen Wang. 1-7 [doi]
- A scalable Blockchain based system for super resolution images manipulationAntonio Rapuano, Gerardo Iovane, Marta Chinnici. 8-15 [doi]
- HBD-Authority: Streaming Access Control Model for HadoopCongwei Chen, Marwa A. Elsayed, Mohammad Zulkernine. 16-25 [doi]
- A secret sharing scheme based on game theory and BP neural networkQiuxian Li, Quanxing Zhou, Qixin Pan, Lingyun Wang, Hongfa Ding. 26-32 [doi]
- Free Chain: Enabling Freedom of Expression through Public BlockchainsIsraa Alsarsour, Qutaibah M. Malluhi, Yongge Wang. 33-40 [doi]
- An Ensemble Feature Selection Method for IoT IDSAlaa Alhowaide, Izzat Alsmadi, Jian Tang. 41-48 [doi]
- Dependable Wildlife DTN: Wearable Animal Resource Optimization for Sustainable Long-Term MonitoringKeijiro Nakagawa, Daisuké Shimotoku, Junya Kawase, Hill Hiroki Kobayashi. 49-56 [doi]
- Real-Time Fault Detection and Diagnosis of CPS Faults in DEVSJoseph Boi-Ukeme, Cristina Ruiz Martin, Gabriel A. Wainer. 57-64 [doi]
- Physical Fingerprinting of Ultrasonic Sensors and Applications to Sensor SecurityEric Cheek, Dhimant Khuttan, Raghu Changalvala, Hafiz Malik. 65-72 [doi]
- Cognitive Privacy: AI-enabled Privacy using EEG Signals in the Internet of ThingsFrancesco Schiliro, Nour Moustafa, Amin Beheshti. 73-79 [doi]
- Implementing a solution for monitoring SLA violations in CloudAndreea Floricu, Razvan Buzatu, Catalin Negru, Florin Pop, Aniello Castiglione. 80-86 [doi]
- A New Chain Code for Bi-Level Image Compression Using an Agent-Based Model of Echolocation in DolphinsKhaldoon Dhou, Christopher Cruzen. 87-91 [doi]
- An attack tree template based on feature diagram hierarchyRajesh Kumar. 92-97 [doi]
- Network Virtualization: Proof of Concept for Remote Management of Multi-Tenant InfrastructureStephen Ugwuanyi, Rameez Asif, James Irvine. 98-105 [doi]
- Privacy Preservation of Aggregated Data Using Virtual Battery in the Smart GridFawaz Kserawi, Qutaibah M. Malluhi. 106-111 [doi]
- LoRaWAN v1.1 Security: Are We in the Clear Yet?Sumesh J. Philip, James M. McQuillan, Oluwatoba Adegbite. 112-118 [doi]
- Investigating Root Causes of Authentication Failures Using a SAML and OIDC ObservatoryJim Basney, Phuong Cao, Terry Fleury. 119-126 [doi]
- A novel approach for predictive maintenance combining GAF encoding strategies and deep networksAntonino Ferraro, Antonio Galli, Vincenzo Moscato, Giancarlo Sperlì. 127-132 [doi]