Abstract is missing.
- A Dynamic Multi-Threaded Queuing Mechanism for Reducing the Inter-Process Communication Latency on Multi-Core ChipsRohitshankar Mishra, Ishfaq Ahmad, Akshaya Sharma. 12-19 [doi]
- A Fast Implementation of the Rijndael Substitution Box for Cryptographic AESAaron Barrera, Chu-Wen Cheng, Sanjeev Kumar. 20-25 [doi]
- A Feature-Driven Approach for Identifying Pathogenic Social Media AccountsHamidreza Alvari, Ghazaleh Beigi, Soumajyoti Sarkar, Scott W. Ruston, Steven R. Corman, Hasan Davulcu, Paulo Shakarian. 26-33 [doi]
- A Human-Computer Interface For Smart Wheelchair Control Using Forearm EMG SignalsZainab Alibhai, Taylor Burreson, Matthew Stiller, Ishfaq Ahmad, Manfred Huber, Addison Clark. 34-39 [doi]
- An Analysis of Effectiveness of Black-Box Web Application Scanners in Detection of Stored SQL Injection and Stored XSS VulnerabilitiesKarthik Anagandula, Pavol Zavarsky. 40-48 [doi]
- Effect of Intermediate Network Systems on Remote Power Data Collection in Smart GridHarsh Kumar, Sanjeev Kumar. 49-55 [doi]
- Ensemble Learning for Detecting Attacks and Anomalies in IoT Smart HomeShivanjali Khare, Michael W. Totaro. 56-63 [doi]
- Evaluation of CentOS performance under IoT based DDoS Security AttacksWilliam Robert Rivas, Sanjeev Kumar. 64-70 [doi]
- Explainable Detection of Zero Day Web AttacksJonas Herskind Sejr, Arthur Zimek, Peter Schneider-Kamp. 71-78 [doi]
- Identifying Optimal Attacks for Infrastructure Networks with failure PropagationIshfaq Ahmad, Addison Clark, Muhammad Ali, David Ferris, Alex J. Aved. 79-86 [doi]
- Improving Sign Language Recognition by Combining Hardware and Software TechniquesCameron Dignan, Eliud Perez, Ishfaq Ahmad, Manfred Huber, Addison Clark. 87-92 [doi]
- Keep Private Networks Private: Secure Channel-PUFs, and Physical Layer Security by Linear Regression Enhanced Channel ProfilesChristoph Lipps, Sachinkumar Bavikatti Mallikarjun, Mathias Strufe, Christopher Heinz, Christoph Grimm 0001, Hans Dieter Schotten. 93-100 [doi]
- Load-balancing of computing resources in vehicular fog computingAhmad Raza Hameed, Kashif Munir, Saif ul Islam, Ishfaq Ahmad. 101-108 [doi]
- Lodestone: A Streaming Approach to Behavior Modeling and Load TestingChester Parrott, Doris Carver. 109-116 [doi]
- Maximizing Resilience under Defender Attacker Model in Heterogeneous Multi-NetworksIshfaq Ahmad, Addison Clark, Alex Sabol, David Ferris, Alex Aved. 117-126 [doi]
- Preparing Smart Cities for Ransomware AttacksPranshu Bajpai, Richard J. Enbody. 127-133 [doi]
- Solving Dynamic 3-SAT Formula: An Empirical StudyWenjian Luo, Junteng Wang, Yamin Hu, Peilan Xu. 134-140 [doi]
- SPAR-2: A SIMD Processor Array for Machine Learning in IoT DevicesSuhail Basalama, Atiyehsadat Panahi, Ange-Thierry Ishimwe, David Andrews. 141-147 [doi]
- Trial Risk Index Model and Assessment System Based on Extended TOPSIS MethodHaoran Mo, Qi Yong, Ning Liu. 148-155 [doi]