Abstract is missing.
- Ensuring privacy and authentication for V2V resource sharingLeila Benarous, Benamar Kadri. 1-6 [doi]
- Vulnerability of secured IoT memory against localized back side laser fault injectionDavid Zooker Zabib, Maoz Vizentovski, Alexander Fish, Osnat Keren, Yoav Weizman. 7-11 [doi]
- An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attackSolomon Ogbomon Uwagbole, William J. Buchanan, Lu Fan. 12-17 [doi]
- Measuring and optimising performance of an offline text writer identification system in terms of dimensionality reduction techniquesAmal Durou, Ibrahim Aref, Mosa Elbendak, Sumaya Al-Maadeed, Ahmed Bouridane. 19-25 [doi]
- A dataset for forgery detection and spotting in document imagesNicolas Sidere, Francisco Cruz, Mickaƫl Coustaty, Jean-Marc Ogier. 26-31 [doi]
- An investigation into the impact of rooting android device on user data integrityMohamed Hassan, Lutta Pantaleon. 32-37 [doi]
- Tell me again about the face: Using repeated interviewing techniques to improve feature-based facial composite technologiesCharity Brown, Charlie D. Frowd, Emma Portch. 38-43 [doi]
- Masters of disguise: Super-recognisers' superior memory for concealed unfamiliar facesJosh P. Davis, Donata Tamonyte. 44-49 [doi]
- Have the security flaws surrounding BITCOIN effected the currency's value?John Gregor Fraser, Ahmed Bouridane. 50-55 [doi]
- Windows 10 security hardening using device guard whitelisting and Applocker blacklistingRohan Durve, Ahmed Bouridane. 56-61 [doi]
- Facial action units for presentation attack detectionShi Pan, Farzin Deravi. 62-67 [doi]
- Novel algorithm for landmine detection using C-scan ground penetrating radar signalsHongyuan Jing, Tanya Vladimirova. 68-73 [doi]
- A secure steganography algorithm using compressive sensing based on HVS featureSamaneh Shafee, Boshra Rajaei. 74-78 [doi]
- Breathe, relax and remember: An investigation into how focused breathing can improve identification of EvoFIT facial compositesAlexander J. Martin, Peter J. B. Hancock, Charlie D. Frowd. 79-84 [doi]
- Empirical study of the impact of e-government services on cybersecurity developmentAristotle Onumo, Andrea Gullen, Irfan-Ullah Awan. 85-90 [doi]
- Forensic analysis of popular UAV systemsThomas Edward Allen Barton, M. A. Hannan Bin Azhar. 91-96 [doi]
- Interviewing and visualisation techniques: Attempting to further improve EvoFIT facial compositesEmma Portch, Karen Logan, Charlie D. Frowd. 97-102 [doi]
- Multi-factor authentication using accelerometers for the Internet-of-ThingsJulian Murphy, Gareth Howells, Klaus D. McDonald-Maier. 103-107 [doi]
- HTTP/2 Cannon: Experimental analysis on HTTP/1 and HTTP/2 request flood DDoS attacksDavid Beckett, Sakir Sezer. 108-113 [doi]
- Readability as a basis for information security policy assessmentYazeed Alkhurayyif, George R. S. Weir. 114-121 [doi]
- A new mobile botnet classification based on permission and API callsMuhammad Yusof, Madihah Mohd Saudi, Farida Ridzuan. 122-127 [doi]
- HTTP/2 Tsunami: Investigating HTTP/2 proxy amplification DDoS attacksDavid Beckett, Sakir Sezer. 128-133 [doi]
- A holistic approach to interpreting human states in smart environments providing high quality of lifeAdrian Stoica, Yumi Iwashita, Christopher Assad, Michael S. Ryoo, Gareth Howells. 133-137 [doi]
- Machine learning based intrusion detection system for software defined networksAtiku Abubakar, Bernardi Pranggono. 138-143 [doi]
- Distributed intrusion detection using mobile agents in wireless body area networksAdedayo Odesile, Geethapriya Thamilarasu. 144-149 [doi]
- Towards an efficient intellectual property protection in dynamically reconfigurable FPGAsAdewale Adetomi, Godwin Enemali, Tughrul Arslan. 150-156 [doi]
- Evaluation of 3D obstacle avoidance algorithm for smart powered wheelchairsSotirios Chatzidimitriadis, Paul Oprea, Michael Gillham, Konstantinos Sirlantzis. 157-162 [doi]
- A multimodal biometrie system for personal identification based on deep learning approachesAlaa S. Al-Waisy, Rami Qahwaji, Stanley S. Ipson, Shumoos Al-Fahdawi. 163-168 [doi]
- Automated skin region quality assessment for texture-based biometricsHamed Alsufyani, Sanaul Hoque, Farzin Deravi. 169-174 [doi]
- Analysis of ICMetrics features/technology for wearable devices IOT sensorsSupriya Yadav, Gareth Howells. 175-178 [doi]
- An enhanced AODV protocol for external communication in self-driving vehiclesKhattab M. Ali Alheeti, Klaus D. McDonald-Maier. 179-184 [doi]
- The impact of misleading information on the identifiability of feature-based facial compositesMelanie Pitchford, Danielle Green, Charlie D. Frowd. 185-190 [doi]
- Biometrie authentication platform-based multisensor fusionRedouane Khemmar, Fabien Bonardi, Jean-Yves Ertaud, Xavier Savatier. 191-195 [doi]
- Design of R3TOS based reliable low power network on chipN. Poornima, Seetharaman Gopalakrishnan, Tughrul Arsalan, T. N. Prabakar, M. Santhi. 196-203 [doi]
- LS-ARP: A lightweight and secure ARPVassilis Prevelakis, Wael Adi. 204-208 [doi]
- Random stream cipher as a PUF-like identity in FPGA environmentAyoub Mars, Wael Adi, Saleh Mulhem, Emad Hamadaqa. 209-214 [doi]
- Chaining trusted links by deploying secured physical identitiesSaleh Mulhem, Wael Adi, Ayoub Mars, Vassilis Prevelakis. 215-220 [doi]
- Clone-resistant vehicular RKE by deploying SUCEmad Hamadaqa, Ayoub Mars, Wael Adi, Saleh Mulhem. 221-225 [doi]