Abstract is missing.
- Welcome messageSteven Furnell, Charles A. Shoniregun. 3 [doi]
- Keynote speaker 1: Critical Infrastructures SMART ready?Martin Visser. 15 [doi]
- Keynote speaker 2: Cyber ranges: The (r)evolution in cybersecurity trainingJorge Lopez Hernandez-Ardieta. 16-17 [doi]
- Keynote speaker 3: Open Data city portals: Working towards their homogeneisationÓscar Corcho. 18 [doi]
- Keynote speaker 4: Data silos of the IoT kindSandra Stincic Clarke. 19 [doi]
- Invited speaker (IEEE Spain section professional activities): Scientific resumes and job interviews - how to make (a positive) impactCarles Antón-Haro. 20 [doi]
- Robust chaos-based stream-cipher for secure public communication channelsOns Jallouli, Safwan El Assad, Maryline Chetto. 23-26 [doi]
- A low-distortion QR Code watermarking scheme for digital color images robust to gamma correction attackCynthia Lizbeth Guzman-Candelario, Jose Juan Garcia Hernandez, Loreto Gonzalez-Hernandez. 27-32 [doi]
- Key requirements for the design of robust chaotic PRNGOleg Garasym, Ina Taralova, René Lozi. 33-38 [doi]
- A commercial application of a chaos-based-stream cipher: Performance and Security analysisGerard Vidal, Rabei Bechikh, Rhouma Rhouma, Safya Belghith. 39-44 [doi]
- Anonymous authentication scheme in e-Health Cloud environmentAmina Djellalbia, Nadjib Badache, Souad Benmeziane, Sihem Bensimessaoud. 47-52 [doi]
- Data privacy concerns involving cloudS. Srinivasan. 53-56 [doi]
- Employing miniaturized computers for distributed vulnerability assessmentYi Hu, Dustin Sulek, Anthony Carella, Joshua Cox, Allyson Frame, Karen Cipriano. 57-61 [doi]
- Efficient parallel Stochastic Gradient Descent for matrix factorization using GPUMohamed A. Nassar, Layla A. A. El-Sayed, Yousry Taha. 63-68 [doi]
- Face-deidentification in images using Restricted Boltzmann MachinesAasim Rafique, Shoaib Azam, Moongu Jeon, Sangwook Lee. 69-73 [doi]
- Which metrics for vertex-cut partitioning?Hlib Mykhailenko, Giovanni Neglia, Fabrice Huet. 74-79 [doi]
- An enhanced approach to preserving privacy in social network data publishingSihem Bensimessaoud, Nadjib Badache, Souad Benmeziane, Amina Djellalbia. 80-85 [doi]
- Towards secure communications: Review of side channel attacks and countermeasures on ECCLo'ai Ali Tawalbeh, Turki F. Al-Somani, Hilal Houssain. 87-91 [doi]
- Using the Panama Papers to explore the financial networks of the Middle EastAbdullateef Rabab'ah, Mahmoud Al-Ayyoub, Mohammed A. Shehab, Yaser Jararweh, Bernard J. Jansen. 92-97 [doi]
- An enhanced framework for aspect-based sentiment analysis of Hotels' reviews: Arabic reviews case studyMohammad Al-Smadi, Omar Qawasmeh, Bashar Talafha, Mahmoud Al-Ayyoub, Yaser Jararweh, Elhadj Benkhelifa. 98-103 [doi]
- Interactive querying and data visualization for abuse detection in social network sitesLeandro Ordoñez-Ante, Thomas Vanhove, Gregory van Seghbroeck, Tim Wauters, Filip De Turck. 104-109 [doi]
- Compressive Sensing encryption modes and their securityRobin Fay, Christoph Ruland. 119-126 [doi]
- Efficient biometric-based Encryption for fingerprintsNeyire Deniz Sarier. 127-132 [doi]
- An adaptive security framework with extensible computational complexity for cipher systemsPrathap Siddavaatam, Reza Sedaghat, Min Hsuan Cheng. 133-140 [doi]
- Formal security assessment of Modbus protocolRoberto Nardone, Ricardo J. Rodríguez, Stefano Marrone. 142-147 [doi]
- Security analysis of forwarding strategies in network time measurements using OpenflowAlex M. S. Orozco, Charles V. Neu, Regio A. Michelin, Avelino F. Zorzo. 148-153 [doi]
- A survey of cyber-security awareness in Saudi ArabiaFaisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki. 154-158 [doi]
- Facing lateral movements using widespread behavioral probesAlessandro Greco, Alberto Caponi, Giuseppe Bianchi. 159-160 [doi]
- Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditingLouis Tajan, Dirk Westhoff, Christian A. Reuter, Frederik Armknecht. 162-169 [doi]
- Range query integrity in the cloud: the case of video surveillanceFrancesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera. 170-175 [doi]
- Secure cloud distributed file systemKheng Kok Mar, Zhengqing Hu, Chee Yong Law, Meifen Wang. 176-181 [doi]
- Sharing in the rain: Secure and efficient data sharing for the CloudAntonis Michalas. 182-187 [doi]
- Activity Recognition using wearable computingNeamah Al-Naffakh, Nathan L. Clarke, Paul Dowland, Fudong Li. 189-195 [doi]
- An approach for evaluating trust in X.509 certificatesZakia El Uahhabi, Hanan El Bakkali. 196-203 [doi]
- Privacy Requirements for mobile e-Service in the Health Authority - Abu Dhabi (HAAD)Asad Masood Khattak, Farkhund Iqbal, Patrick C. K. Hung, Jwo-Shiun Sun, Guan-Pu Pan, Jing-Jie Lin. 204-209 [doi]
- An approach for detecting encrypted insider attacks on OpenFlow SDN NetworksCharles V. Neu, Avelino F. Zorzo, Alex M. S. Orozco, Regio A. Michelin. 210-215 [doi]
- Adaptive Policing Algorithms on inbound internet traffic using Generalized Pareto modelMurizah Kassim, Nor Azura Ayop. 217-222 [doi]
- KiCM: A knowledge-intensive context modelDennis Lupiana, Fredrick Mtenzi. 223-229 [doi]
- Modeling cloud applications for partition contingencyAspen Olmsted. 230-234 [doi]
- Applying different classification techniques in reciprocal job recommender system for considering job candidate preferencesGozde Ozcan, Sule Gündüz Ögüdücü. 235-240 [doi]
- Machine learning classification model for Network based Intrusion Detection SystemSanjay Kumar, Ari Viinikainen, Timo Hämäläinen 0002. 242-249 [doi]
- South African small and medium-sized enterprises' reluctance to adopt and use cloud-based business intelligence systems: A literature reviewMoses Moyo, Marianne Loock. 250-254 [doi]
- Web security in the finance sectorTiago Vieira, Carlos Serrão. 255-259 [doi]
- Mitigating IoT security threats with a trusted Network elementJarkko Kuusijärvi, Reijo Savola, Pekka Savolainen, Antti Evesti. 260-265 [doi]
- Identification and recovery of video fragments for forensics file carvingKhawla Alghafli, Thomas Martin. 267-272 [doi]
- PRS signal in acquiring evidence of Digital Chain of CustodyTomas Marques-Arpa, Jordi Serra-Ruiz. 273-278 [doi]
- User profiling from network traffic via novel application-level interactionsGaseb Alotibi, Nathan L. Clarke, Fudong Li, Steven Furnell. 279-285 [doi]
- Comparison of color profile gamut coverage for computer monitorsRadu Velea, Noel Gordon. 287-290 [doi]
- A generic, personalized electronic program guide system for accessing multiple online TV providersEmad Al-Mohammed, Nigel Linge. 291-296 [doi]
- Temporal resource scheduling equityMadeline Little, Aspen Olmsted. 297-299 [doi]
- Developing Domain-Specific Language for Wireless Sensor Network application developmentAymen J. Salman, Adil Al-Yasiri. 301-308 [doi]
- Maximizing the wireless sensor networks lifetimeNouredine Seddiki, Amel Douli. 309-312 [doi]
- A secure and QoS aware routing protocol for Wireless Sensor NetworkAdnan Ahmed, Pardeep Kumar, Ali Raza Bhangwar, Muhammad Ibrahim Channa. 313-317 [doi]
- The evolution of distributed systems towards microservices architectureTasneem Salah, M. Jamal Zemerly, Chan Yeob Yeun, Mahmoud Al-Qutayri, Yousof Al-Hammadi. 318-325 [doi]
- Experience-based learning for identifying sub-regions in Wireless Sensor NetworksAiman Ghannami, Chenxi Shao. 326-327 [doi]
- Secure Javascript Object Notation (SecJSON) Enabling granular confidentiality and integrity of JSON documentsTiago Santos, Carlos Serrão. 329-334 [doi]
- Evaluating the development and implementation of a profile-aware microtasking platform for crowdsourcing servicesSophia Moganedi, Njabulo Mkhonto, Jabu Mtsweni. 335-339 [doi]
- EEVi - framework for evaluating the effectiveness of visualization in cyber-securityAneesha Sethi, Federica Paci, Gary B. Wills. 340-345 [doi]
- A trust structure for detection of sybil attacks in opportunistic networksSamaneh Rashidibajgan. 347-351 [doi]
- Information security policies: A review of challenges and influencing factorsMutlaq Alotaibi, Steven Furnell, Nathan L. Clarke. 352-358 [doi]
- The role of machine learning in botnet detectionSean Miller, Curtis Busby-Earle. 359-364 [doi]
- Improving the accuracy of Search Engine based anti-phishing solutions using lightweight featuresGaurav Varshney, Manoj Misra, Pradeep K. Atrey. 365-370 [doi]
- Telecommunication traffic through submarine cables: Security and vulnerabilitiesAisha Suliaman Alazri. 372-375 [doi]
- Virtualization technologies in web conferencing systems: A performance overviewPedro Roger Magalhães Vasconcelos, Gisele Azevedo de Araújo Freitas, Thales Guimaraes Marques. 376-383 [doi]
- A framework for personal data protection in the IoTIlaria Torre, Frosina Koceva, Odnan Ref Sanchez, Giovanni Adorni. 384-391 [doi]
- Privacy-sensitive data in connected carsT. Nawrath, Daniel Fischer, Bernd Markscheffel. 392-393 [doi]
- Cost to serve of large scale online systemsAndres Paz Sampedro, Shantanu Srivastava. 395-398 [doi]
- System and Protocols for secure Intercloud CommunicationsChung Kwan Law, Wen Xie, Zheng Xu, Yi Dou, Chin Ting Yu, Henry C. B. Chan, Daniel Wai Kei Kwong. 399-404 [doi]
- Smartphone as a biometric service for web authenticationRegio A. Michelin, Avelino F. Zorzo, Marcia B. Campos, Charles V. Neu, Alex M. S. Orozco. 405-408 [doi]
- Digital divide impact on e-voting adoption in middle eastern countryMohammad Kamel Alomari. 409-412 [doi]
- Automated penetration testing based on a threat modelNorah Ahmed Almubairik, Gary Wills. 413-414 [doi]
- Intelligent dynamic Connectivity Control Algorithm for cluster-based wireless sensor networksSeyed Mahdi Jameii, Mohsen Maadani. 416-420 [doi]
- An MMAS-GA for resource allocation in multi-cloud systemsLotfi Hajjem, Salah Benabdallah. 421-426 [doi]
- Heuristic evaluation of mobile government portal services: An experts' reviewIbrahim Almarashdeh, Mutasem Alsmadi. 427-431 [doi]
- Efficient fast recovery mechanism in Software-Defined Networks: Multipath routing approachAiman Ghannami, Chenxi Shao. 432-435 [doi]
- Adaptive image compression in wireless sensor networksBenfilali Mostefa, boukli hacene sofiane. 437-441 [doi]
- A cryptographic approach for secure client - server chat application using public key infrastructure (PKI)Isil Karabey, Gamze Akman. 442-446 [doi]
- Linear and differential cryptanalysis of small-sized random (n, m)-S-boxesY. Alsalami, C. Y. Yeun, T. Martin, M. Khonji. 447-454 [doi]
- Experimental evaluation of RPL protocolBelghachi Mohamed, Feham Mohamed. 455-458 [doi]
- Performance study of the index structures in audited environmentMichal Kvet, Monika Vajsová. 459-464 [doi]
- Structural improvements of chaotic PRNG implementationsGabriele Spenger, Jörg Keller 0001. 465-470 [doi]
- Gaze network extraction from bookmarks in accordance with search intentionsTakashi Amano, Ryo Onuma, Hiroki Nakayama, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura. 472-473 [doi]
- Dynamically visualizing the relationships between Web pages depending on user's search viewpointsDaisuke Arakawa, Hiroki Nakayama, Ryo Onuma, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura. 474-475 [doi]
- Learning History Transition Graphs for understanding the programming learning situationsHiroki Nakayama, Shoichi Nakamura, Kaname Nozaki, Yasuhiko Morimoto, Hiroaki Kaminaga, Youzou Miyadera. 476-477 [doi]
- Risk management in payment system architecturesSivakumar Niranjan, Crepel Maxime, Boullier Dominique. 478 [doi]