Abstract is missing.
- Integrating Blockchain Technology into Cybersecurity EducationJanei Elliston, Hongmei Chi, Shonda Bernadin, Maryam Taeb. 1-15 [doi]
- Developing and Implementing Blockchain Identity Management to Verify Students' Certifications and Data (VeriOn)Mahmoud Abdulaziz Elsayed Yousef. 16-35 [doi]
- Specifying Blockchain-Based Resource-Exchange Systems by Business-Level Users Using a Generic Easy-To-Use FrameworkKushal Soni, Olga De Troyer. 36-54 [doi]
- Spatial Blockchain: Smart Contract Using Multiple Camera CensusesVasanth Iyer, Asif Mehmood, Baniya Babu, Y. B. Reddy. 55-66 [doi]
- Local Adjustment Strategy of Aggregation Tree Based on Energy SensitivityDongMei Xing. 67-77 [doi]
- Design and Usability of an Information Interface for Bird Species Endemic to TaiwanChia-Yin Yu. 78-91 [doi]
- Dependency of Indoor Delay Spread and Path Loss on 5G and 6G Frequencies and Its Simple FormulationMohammad Tanvir Kawser, Zebun Nasreen Ahmed. 92-105 [doi]
- Is Free-Viewpoint Video the Future of Online TV?Pierre Boulanger. 106-119 [doi]
- Sound as an Interface, Methods to Evaluate Voice User Interface (VUI) Experiences in Various ContextsMegan Cackett, Laura Fulton, David Pearl. 120-129 [doi]
- Implementation of Lightweight Cryptographic Algorithms in IoT Devices and Sensor NetworksAlaa Hassan. 130-146 [doi]
- A Lightweight Encryption Scheme for IoT Devices in the FogMatthew Chun, Stefan Weber 0003, Hitesh Tewari. 147-161 [doi]
- Condition Monitoring and Fault Detection for Electrical Machines Using IOTHadi Ashraf Raja, Toomas Vaimann, Anton Rassõlkin, Ants Kallaste. 162-173 [doi]
- The Awareness of Internet of Things (IoT) Privacy Risk: A Survey StudyHameed Almubark, Omar Masmali. 174-190 [doi]
- A New Approach of IoT Implementation for Driving Cycle Tracking Device (DC-TRAD)S. K. Arun, I. N. Anida, J. S. Norbakyah, A. R. Salisa. 191-201 [doi]
- Generating Human-Like Motion to Defeat Interaction-Based CAPTCHAsMatthew Moore, Kristen R. Walcott. 202-217 [doi]
- Internet of Things (IoT) and Its Empowering ApplicationsAlaa Hassan. 218-232 [doi]
- A Fog Computing-Based Efficient Data Management Smart Home ArchitectureKelvin N. Lawal, Titus K. Olaniyi, Ryan M. Gibson. 233-257 [doi]
- S-Image (Situation Image): A New Technique for Data Aggregation in Cloud Server for IoT Based Smart CitySk Alamgir Hossain, Md. Anisur Rahman, M. Anwar Hossain 0001. 258-273 [doi]
- Internet of Things Support System for Diabetic Students: An Exploratory StudyMona Alotaibi, Mike Joy. 274-283 [doi]
- WSN System Warns "Atta Cephalotes" Climbing in Mango Fruit TreesFederico Hahn, Fermín Martinez. 284-296 [doi]
- State-of-the-Art Lightweight Cryptographic Protocols for IoT NetworksAlaa Hassan. 297-310 [doi]
- Cybernetic Risk Management for Methodological Model of NIST-Based to Prevent Cybercrime Approach in OrganizationsE. Ortiz Ruiz. 311-325 [doi]
- Ransomware Identification Through Sandbox EnvironmentNeiler W. Pérez-Díaz, Jorge O. Chinchay-Maldonado, Heber I. Mejía-Cabrera, David E. Bances-Saavedra, Jaime A. Bravo-Ruiz. 326-335 [doi]
- On the Empirical Validation of a Zero Trust Security Framework via Group Support System ResearchYuri Bobbert. 336-353 [doi]
- Safeguarding National Security Interests Utilizing Location-Aware Camera DevicesSreejith Gopinath, Aspen Olmsted. 354-371 [doi]
- BYOD Security: Using Dual Process Theory to Adapt Effective Security Habits in BYODRoger Zhang, Abubakar Bello, Jeffrey L. Foster. 372-386 [doi]
- State of Security and Privacy Practices of Top Websites in the East African Community (EAC)Abdirahman Mohamed, Ayobami Esther Olanrewaju, Christopher Dare, Mercyleen Tanui, Fonyuy Boris Lami. 387-398 [doi]
- Analyzing Secure Protocol for Majority Based Pairing in Attribute Chameleon Hash ConsensusArij Alfaidi, Sudhanshu Semwal. 399-414 [doi]
- Decoding Visual Imagery Using EEG/EOG Glasses: A Pilot StudyNataliya Kosmyna, Arnav Balyan, Eugene Hauptmann. 415-432 [doi]
- Target Speaker Detection with EEG/EOG Glasses: A Pilot StudyNataliya Kosmyna, Arnav Balyan, Eugene Hauptmann. 433-446 [doi]
- e-Voting: I Changed My Mind, Now What?Daniel Peters, Florian Thiel. 447-466 [doi]
- StegYou: Model for Hiding, Retrieving and Detecting Digital Data in ImagesIvo Tasevski, Viktorija Nikolovska, Anastasija Petrova, Jovana Dobreva, Aleksandra Popovska-Mitrovikj, Vesna Dimitrova. 467-485 [doi]
- Upgrade SecSLA Using Security as a Service Based on Knowledge GraphAbdelfateh Rahmouni, Saliha Oukid, Yasmina Ghebghoub. 486-498 [doi]
- Identifying Shared Security Vulnerabilities and Mitigation Strategies at the Intersection of Application Programming Interfaces (APIs), Application-Level and Operating System (OS) of Mobile DevicesAnteneh Girma, Michelle A. Guo, John Irungu. 499-513 [doi]
- On Optimal Configuration of IDS for RPL Resource-Constrained Networks Using Evolutionary AlgorithmAbdulmonem Alshahrani, John A. Clark. 514-535 [doi]
- Cybercrime and Intellectual Property Theft: An Analysis of Modern Digital ForensicsAndrew K. Blaskovic, John-David Rusk, Victor C. Parker, Bryson R. Payne. 536-542 [doi]
- Resource Oriented Programming: Design Pattern for Describing Restful Service CompositionHenoc Soude, Bill Padonou, Charly Agboton. 543-560 [doi]
- Designing the Metaverse: A Study of Design Research and Creative Practice from Speculative Fictions to Functioning PrototypesIan Gonsher, Daniel Rapoport, Alice Marbach, Dana Kurniawan, Seth Eiseman, Emily Zhang, Amy Qu, Mikey Abela, Xinru Li, Aanchal M. Sheth, Annie Chen, Rohan Upadhyayula, Sunny Li, Sahil Bansal, Ivan Zhao, Grace Chen, Charles Tan, Zhenhong Lei. 561-573 [doi]
- Look at, Look into and Look Around: A New Approach to Visualizing Network Data and Increasing the Quality of DecisionsFernando Beltrán, Jing Geng. 574-591 [doi]
- Factors Affecting Trust in Selected Gerontechnologies: The Case of PolandJoanna Ejdys. 592-601 [doi]
- School Canteen Food Ordering Application with Food Allergy Alert Feature: Malaysia PerspectiveCheck Yee Law, Yong-Wee Sek, Choo-Chuan Tay, Tze Hui Liew. 602-618 [doi]
- Database Query Execution Through Virtual RealityLogan T. Bateman, Marc A. Butler, Germán H. Alférez. 619-633 [doi]
- NaPP: Notification and Push Performance in Wearable DevicesTaniza Sultana, Kristen R. Walcott. 634-648 [doi]
- Quality Coin for Software Quality ImprovementNing Luo, Yue Xiong. 649-660 [doi]
- Bridging the Divide Between Design and Reality in Student Design Builds in Increasing Accessibility to Emerging TechnologiesVincent Hui, Alvin Huang, Ariel Weiss, Justin Lieberman, Kelvin Hoang. 661-678 [doi]
- Difficulties Affecting the Success of the ERP Implementation in the Context of Moroccan SMEsYassine Zouhair, Mustapha Belaissaoui, Younous El Mrini. 679-688 [doi]
- A Holistic and Universal Approach for Managing Technology and Organizational ChangeGrant Royd Howard. 689-707 [doi]
- Design and Development of a Correspondence Management System (CMS)Mahmoud Abdulaziz Elsayed Yousef, Vishal Dattana. 708-728 [doi]
- Reverse Gutenberg Galaxy: Digital Transformation of Economy and LaborKenji Saito. 729-748 [doi]
- Factors Militating Against the Use of Digital Technology by Sub-contractors in South AfricaKenneth Otasowie, Matthew Ikuabe, Clinton Aigbavboa, Ayodeji Oke. 749-757 [doi]
- Conducting Semantic Segmentation on Landcover Satellite Imagery Through U-Net ArchitecturesAryan Saha. 758-764 [doi]
- A Qualitative Investigation of Optical Flow Algorithms for Video DenoisingHannes Fassold. 765-775 [doi]
- Non-intrusive Drowsiness Detection Techniques and Their Application in Detecting Early Dementia in Older DriversMuhammad Tanveer Jan, Ali Hashemi, Jinwoo Jang, KwangSoo Yang, Jiannan Zhai, David Newman, Ruth Tappen, Borko Furht. 776-796 [doi]
- SHE-Based Video Retargeting with Multiple Ground Control PointsHsi-Chin Hsin, Chien-Kun Su. 797-805 [doi]
- A Process Innovation: Introducing a Technology Tool into CurriculumDiane Guevara. 806-817 [doi]
- An Efficient Deep Learning Technique for Detecting and Classifying the Growth of Weeds on FieldsAbeer M. Almalky, Khaled R. Ahmed, Mustafa Guzel, Bülent Turan. 818-835 [doi]
- Learner Attention Quantification Using Eye Tracking and EEG SignalsMd Shakil Hossain, Dhruv Pandya, Andrew A. Allen, Felix G. Hamza-Lup. 836-847 [doi]
- A Hybrid Learning-Driven Computer Vision Framework for Reverse Engineering via Enhanced 3D Shape ReconstructionMahmoud Salem, Ahmed Elkaseer, Andrew Rees, Steffen G. Scholz. 848-861 [doi]