Abstract is missing.
- Intrusion Detection System Classifier for VANET Based on Pre-processing Feature ExtractionAyoob Ayoob, Ghaith Khalil, Morshed U. Chowdhury, Robin Doss. 3-22 [doi]
- Ad-Hoc Framework for Efficient Network Security for Unmanned Aerial Vehicles (UAV)Md Samsul Haque, Morshed U. Chowdhury. 23-36 [doi]
- Performance Evaluation of LoRaWAN for Mission-Critical IoT NetworksAnsa Iftikhar Ahmad, Biplob Ray, Morshed U. Chowdhury. 37-51 [doi]
- An Efficient Dynamic Group-Based Batch Verification Scheme for Vehicular Sensor NetworksLiming Jiang, Yan Wang, Jiajun Tian, Frank Jiang 0001, Nick J. Patterson, Robin Doss. 52-64 [doi]
- MetaCom: Profiling Meta Data to Detect Compromised Accounts in Online Social NetworksRavneet Kaur, Sarbjeet Singh, Harish Kumar. 65-80 [doi]
- Ameliorating Depression Anxiety and Stress Caused by Social Media Among Young Women: Procedural and Technological ResponsesHonour Carmichael, Gabrielle Peko, Khushbu Tilvawala, Johnny Chan, David Sundaram. 81-96 [doi]
- Attainable Hacks on Keystore Files in Ethereum Wallets - A Systematic AnalysisPurathani Praitheeshan, Yi Wei Xin, Lei Pan 0002, Robin Doss. 99-117 [doi]
- Cancelable Palmprint Feature Generation Method Based on Minimum SignatureJian Qiu, Hengjian Li, Xiyu Wang. 118-127 [doi]
- Thermal Distribution Change of Optical Fiber Terminal Based NG-PON2 Link Security Monitoring TechnologyXiaokai Ye, Xiaohan Sun. 128-133 [doi]
- Pseudonymization Approach in a Health IoT System to Strengthen Security and Privacy Results from OCARIoT ProjectSérgio Luís Ribeiro, Emilio Tissato Nakamura. 134-146 [doi]
- System Usage Profiling Metrics for Notifications on Abnormal User BehaviorAustin Sasko, Trevor Hillsgrove, Kanwalinderjit Gagneja, Udita Katugampola. 149-160 [doi]
- A New Lightweight Encryption Approach for Correlated Content Exchange in Internet of ThingsTasnime Omrani, Layth Sliman. 161-171 [doi]
- Digital Forensics for Drone Data - Intelligent Clustering Using Self Organising MapsSri Harsha Mekala, Zubair Baig. 172-189 [doi]
- An Investigation of Using Time and Ambient Conditions to Sense the Unexpected Removal of RFID TagYuju Tu. 190-197 [doi]
- Analysis of In-vehicle Security System of Smart VehiclesNazeeruddin Mohammad, Shahabuddin Muhammad, Eman Shaikh. 198-211 [doi]
- Quorum Chain-Based Malware Detection in Android Smart DevicesFei Gao, Frank Jiang 0001, Yuping Zhang, Robin Doss. 212-224 [doi]
- Asymmetric Information in High-Value Low-Frequency Transactions: Mitigation in Real Estate Using BlockchainMark Hoksbergen, Johnny Chan, Gabrielle Peko, David Sundaram. 225-239 [doi]
- Critical Evaluation of RFID Applications in HealthcareYu-Ju Tu, Huihui Chi, Wei Zhou 0001, Gaurav Kapoor, Enes Eryarsoy, Selwyn Piramuthu. 240-248 [doi]