Abstract is missing.
- Keynote speaker 1: Cyber-resilient ICS through diversified redundancy and intrusion detectionCharles Kim. 15 [doi]
- Keynote speaker 2: Participatory self-management systems for resilient smart citiesEvangelos Pournaras. 16 [doi]
- Keynote speaker 3: Looking after our IP in supply chainGary Wills. 17 [doi]
- Keynote speaker 4: Cloud forensicsAnne James. 18 [doi]
- Keynote speaker 5: Taming security technologySteven Furnell. 19 [doi]
- Keynote speaker 6: Steel made in Europe: The backbone of sustainabilityEnrico Malfa. 20 [doi]
- RARE: A robust algorithm for rapid encryptionTasnime Omrani, Rabei Becheikh, Olfa Mannai, Rhouma Rhouma, Safya Belghith. 23-28 [doi]
- LSB-hamming based chaotic steganography (LH-Steg)Marwa Saidi, Houcemeddine Hermassi, Rhouma Rhouma, Safya Belghith. 29-34 [doi]
- New keyed chaotic neural network hash function based on sponge constructionNabil Abdoun, Safwan El Assad, Khodor Hammoud, Rima Assaf, Mohamad Khalil, Olivier Déforges. 35-38 [doi]
- Reveal false names of accounts as a result of hackers attacks: Security systems with heightened safety of informationDesislav Andreev, Simona Petrakieva, Ina Taralova. 39-42 [doi]
- Lightweight signcryption scheme based on discrete Chebyshev mapsTa Thi Kim Hue, Thang Manh Hoang, An Braeken. 43-47 [doi]
- Forward secure searchable symmetric encryptionMuhammad Saqib Niaz, Gunter Saake. 49-54 [doi]
- CPU workload forecasting of machines in data centers using LSTM recurrent neural networks and ARIMA modelsDeepak Janardhanan, Enda Barrett. 55-60 [doi]
- An advanced reinforcement learning approach for energy-aware virtual machine consolidation in cloud data centersRachael Shaw, Enda Howley, Enda Barrett. 61-66 [doi]
- Predicting host CPU utilization in cloud computing using recurrent neural networksMartin Duggan, Karl Mason, Jim Duggan, Enda Howley, Enda Barrett. 67-72 [doi]
- Towards a security and privacy co-creation methodChristophe Feltus, Erik H. A. Proper. 75-80 [doi]
- Secured transactions technique based on smart contracts for situational awareness toolsRoman Graf, Ross King. 81-86 [doi]
- Speech encryption based on hybrid chaotic key generator for AMR-WB G.722.2 codecMessaouda Boumaraf, Fatiha Merazka. 87-91 [doi]
- A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protectionFerda Ernawan, Muhammad Nomani Kabir, Zuriani Mustaffa. 92-97 [doi]
- Data protection by design in systems development: From legal requirements to technical solutionsFredrik Blix, Salah Addin Elshekeil, Saran Laoyookhong. 98-103 [doi]
- A comparison between API call sequences and opcode sequences as reflectors of malware behaviorSaja Alqurashi, Omar Batarfi. 105-110 [doi]
- Android botnet detection: An integrated source code mining approachBasil Alothman, Prapa Rattadilok. 111-115 [doi]
- An analysis of home user security awareness & educationFayez Alotaibi, Nathan L. Clarke, Steven Furnell. 116-122 [doi]
- Monitoring darknet activities by using network telescopeShaikha AlShehyari, Chan Yeob Yeun, Ernesto Damiani. 123-128 [doi]
- Enhancing cyber security awareness with mobile gamesFaisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki. 129-134 [doi]
- On blockchain-based authorization architecture for beyond-5G mobile servicesShinsaku Kiyomoto, Anirban Basu, Mohammad Shahriar Rahman, Sushmita Ruj. 136-141 [doi]
- Hybrid public key authentication for wireless sensor networksDaehee Kim, Jaekeun Yun, Sungjun Kim. 142-143 [doi]
- Intelligent safety management system for crowds using sensorsNorah Farooqi. 144-147 [doi]
- A hybrid approach for femtocell co-tier interference mitigationAbdullah Alhumaidi Alotaibi, Marios C. Angelides. 148-153 [doi]
- Entity identity, performance, and storageAspen Olmsted. 155-160 [doi]
- Automated course management systemAshik Mostafa Alvi, Md. Faqrul Islam Shaon, Prithvi Ranjan Das, Manazir Mustafa, Mohammad Rezaul Bari. 161-166 [doi]
- Change management and the integration of information technology: Research notes from selected African universitiesOmotayo Kayode Abatan, Manoj Maharaj. 167-172 [doi]
- Web service injection attack detectionVictor Clincy, Hossain Shahriar. 173-178 [doi]
- Mobile business performance metrics: Framework and case studyAhyoung Kim, Junwoo Lee. 179-184 [doi]
- Evaluate action primitives for human activity recognition using unsupervised learning approachLuis F. Mejia-Ricart, Paul Helling, Aspen Olmsted. 186-188 [doi]
- Classification of music by composer using fuzzy min-max neural networksPasha Sadeghian, Casey Wilson, Stephen Goeddel, Aspen Olmsted. 189-192 [doi]
- Assessment of fuzzy min-max neural networks for classification tasksPasha Sadeghian, Aspen Olmsted. 193-196 [doi]
- Low-cost detection of backdoor malwareHuicong Loi, Aspen Olmsted. 197-198 [doi]
- Docker vs. KVM: Apache spark application performance and ease of useWalter Blair, Aspen Olmsted, Paul Anderson. 199-201 [doi]
- Meaningful sandbox dataRyan Lile, Aspen Olmsted. 203-204 [doi]
- Classifying influenza outbreaks by analyzing and filtering Twitter dataElizabeth Healy, Husna Siddiqui, Aspen Olmsted. 205-207 [doi]
- Handling an organization's communication needs with a single web serviceCasey Wilson, Aspen Olmsted. 208-209 [doi]
- Mobile multi-factor authenticationAndrew Bissada, Aspen Olmsted. 210-211 [doi]
- Three factor authenticationWilliam Kennedy, Aspen Olmsted. 212-213 [doi]
- A secure enterprise architecture focused on security and technology-transformation (SEAST)Md. Tomig Uddin Ahmed, Nazrul Islam Bhuiya, Md. Mahbubur Rahman. 215-220 [doi]
- Distributed query processing and data sharingAhana Roy, Aspen Olmsted. 221-224 [doi]
- Factors affecting the implementation of information assurance for eGovernment in IndonesiaRio Guntur Utomo, Robert John Walters, Gary B. Wills. 225-230 [doi]
- The study of public organization's intention to use an open government data assessment application: Testing with an applicable TAMChatipot Srimuang, Nagul Cooharojananone, Uthai Tanlamai, Achara Chandrachai, Kanokwan Atchariyachanvanich. 231-236 [doi]
- Propagation modelling and performance assessment of aerial platforms deployed during emergenciesFaris A. Almalki, Marios C. Angelides. 238-243 [doi]
- A comparative analysis of MANET routing protocols through simulationCallum Brill, Thomas Nash. 244-247 [doi]
- A multi-channel steganographic protocol for secure SMS mobile bankingOmego Obinna, Eckhard Pfluegel, Charles A. Clarke, Martin J. Tunnicliffe. 248-253 [doi]
- On the cost of cyber security in smart businessIgor Ivkic, Stephan Wolfauer, Thomas Oberhofer, Markus Gerhard Tauber. 255-260 [doi]
- Evaluation of ensemble machine learning methods in mobile threat detectionSanjay Kumar, Ari Viinikainen, Timo Hämäläinen 0002. 261-268 [doi]
- Evaluation of AV systems against modern malwareAbidullah Zarghoon, Irfan Awan, Jules Pagna Disso, Richard Dennis. 269-273 [doi]
- Security enhancements to TLS for improved national controlLamya Alqaydi, Chan Yeob Yeun, Ernesto Damiani. 274-279 [doi]
- Towards using transfer learning for Botnet DetectionBasil Alothman, Prapa Rattadilok. 281-282 [doi]
- Transparent authentication: Utilising heart rate for user authenticationTimibloudi S. Enamamu, Nathan L. Clarke, Paul S. Haskell-Dowland, Fudong Li. 283-289 [doi]
- Performance vs. security: Implementing an immutable database in MySQLThomas Nash, Aspen Olmsted. 290-291 [doi]
- rd party analysis servicesFabio Giubilo, Ali Sajjad, Mark Shackleton, David W. Chadwick, Wenjun Fan, Rogério de Lemos. 293-297 [doi]
- From e-govemment to cloud-government: Challenges of Jordanian citizens' acceptance for public servicesAbeer Alkhwaldi, Mumtaz Kamala, Rami Qahwaji. 298-304 [doi]
- Data subject rights in the cloud: A grounded study on data protection assurance in the light of GDPRAlaa Altorbaq, Fredrik Blix, Stina Sorman. 305-310 [doi]
- Distributed computing framework in security: Case study of encryption methodShuaiyi Bu, Shuxin Yang, Haoming Ji. 311-318 [doi]
- Seeking academic information on the Internet: Doctoral students' Internet self-efficacy and emotionsYen-Mei Lee. 320-324 [doi]
- Customer churn analysis : A case study on the telecommunication industry of ThailandPaweena Wanchai. 325-331 [doi]
- The influence of advanced and secure e-commerce environments on customers behaviour: The case of Saudis in the UKHaya Alshehri, Farid Meziane. 332-337 [doi]
- Effects of lexicon size on solving bananagramsPaul Helling, Ahana Roy, Aspen Olmsted. 339-341 [doi]
- Work in Progress: Nobody knows who you really are online/on the world wide web - Amazon-recognition-service based 'Virtualnet' supported authentication: How certain are you it is indeed you in front of a screen?Anderson Holguin Avila, Brigitte Rodriguez Mendoza, Maria Bohorquez Sotelo, Delgadillo Loaiza Juan Sebastian. 342-345 [doi]
- V over Linux-based virtual machinesWayne Chen, Aspen Olmsted. 346-348 [doi]
- Using analysis of temporal variances within a honeypot dataset to better predict attack type probabilitySeamus Dowling, Michael Schukat, Hugh Melvin. 349-354 [doi]
- Client side calculation of 'bacon number'Thomas Briggs, Aspen Olmsted. 356-358 [doi]
- intel-LEACH: An optimal framework for node selection using dynamic clustering for wireless sensor networksPrathap Siddavaatam, Reza Sedaghat, Aakriti Tarun Sharma. 359-364 [doi]
- Enhancing security in the cloud: When traceability meets access controlClara Bertolissi, Omar Boucelma, Worachet Uttha. 365-366 [doi]
- Database multi-factor authentication via pluggable authentication modulesCameron Hamilton, Aspen Olmstead. 367-368 [doi]
- Improve CRUD performance on hierarchical data: Nested interval model vs. nested set modelBlake Badders, Aspen Olmsted. 370-371 [doi]
- Efficient hardware implementation of ITUbee for lightweight applicationJuhua Liu, Wei Li, Guoqiang Bai 0001. 372-376 [doi]
- Weighing the shopping benefits of a smarter refrigeratorStephen Goeddel, Pasha Sadeghian, Aspen Olmsted. 377-378 [doi]
- Optimizing synchronization of cloud storage services: Combining benchmark monitoring and learning-based frameworkPreston T. Owens, Aspen Olmsted. 379-380 [doi]
- Preventing vendor lock-ins via an interoperable multi-cloud deployment approachRoland Pellegrini, Patrick Rottmann, Georg Strieder. 382-387 [doi]
- A novel multimedia-forensic analysis tool (M-FAT)Shahlaa Mashhadani, Hiba Al-kawaz, Nathan Clarke, Steven Furnell, Fudong Li. 388-395 [doi]
- Best of two worlds: Secure cloud federations meet eIDASThomas Zefferer, Dominik Ziegler, Andreas Reiter. 396-401 [doi]
- Venmo: Exposing a user's lifestyleHusna Siddiqui, Aspen Olmsted, Brendan Keane. 403-404 [doi]
- Challenge based visual speech recognition using deep learningPhilip McShane, Darryl Stewart. 405-410 [doi]
- The study of the local community products (OTOP) website characteristics toward buyer decision using eye trackingNagul Cooharojananone, Krittika Akasarakul, Thipsuda Wongkhamdi, Phonkornkrit Pruetthiwongwanich, Kanokwan Atchariyachanvanich. 411-416 [doi]
- Data visibility and trust enhancement of enterprise customers in cloud computing servicesW. P. Yuen, K. B. Chuah. 417-422 [doi]
- Automation of cyber-reconnaissance: A Java-based open source tool for information gatheringAhana Roy, Louis Mejia, Paul Helling, Aspen Olmsted. 424-426 [doi]
- Towards a security baseline for IaaS-cloud back-ends in Industry 4.0Elisabeth Bauer, Oliver Schluga, Silia Maksuti, Ani Bicaku, David Hofbauer, Igor Ivkic, Markus Gerhard Tauber, Alexander Wöhrer. 427-432 [doi]
- Secure e-mail communication - Comparison and selection of encryption solutions using an utility value analysis approachDaniel Fischer, Bernd Markscheffel, K. Scherr. 433-435 [doi]
- Towards comparing programming paradigmsIgor Ivkic, Markus Gerhard Tauber, Alexander Wöhrer. 436-437 [doi]
- Applying dynamic verification tagging to the k-anonymity modelAhmad Bennakhi, Mohamed A. Jeragh. 439-443 [doi]
- A study of factors effecting Thailand talent mobility programme: Case of university and food technology industryKritika Kongsoontornkijkul, Rath Pichyangkura, Pakpachong Vadhanasindhu, Kanlaya Vanichbuncha. 444-449 [doi]
- shinySDM: Point and click species distribution modelingThomas Nash, Aspen Olmsted. 450-451 [doi]
- Efficient retrieval of information from hierarchical REST requestsSeth Stoudenmier, Aspen Olmsted. 452-454 [doi]
- Multiple assignment secret sharing scheme using hierarchical threshold schemeKouya Tochikubo. 456-461 [doi]
- Bot or notHusna Siddiqui, Elizabeth Healy, Aspen Olmsted. 462-463 [doi]
- Intelligent laboratory management system based on Internet of ThingsYichen Ma, Fuyao Wang, Zhuozheng Wang. 464-467 [doi]
- Spark framework for transcriptomic trimming algorithm reduces cost of reading multiple input filesWalter Blair, Aspen Olmsted, Paul Anderson. 469-471 [doi]
- Avoiding unnecessary deaths: Drag-Back, a deadlock avoidance modelLuis Mejia-Ricart, Aspen Olmsted. 472-474 [doi]
- Role of transformational leadership on e-govemment switching: Multi-channel and digital divideKhurram Mahmood, Zainab Nayyar, Hafiz Mushtaq. 475-478 [doi]
- Shared situational awareness in information security incident managementKeshnee Padayachee, Elias Worku. 479-483 [doi]
- A collaborative system for corporate performance evaluation using gamification and the learning vectors modelMichelle G. Cacais, Gilvandenys L. Sales. 484-489 [doi]
- Designing an assembly language using MIT App inventorCasey Wilson, Anna Sandifer, Aspen Olmsted. 491-493 [doi]
- Undecidable problems in malware analysisAli Aydin Selçuk, Fatih Orhan, Berker Batur. 494-497 [doi]
- Ethereum transaction graph analysisWren Chan, Aspen Olmsted. 498-500 [doi]
- Detection of fake online hotel reviewsAnna V. Sandifer, Casey Wilson, Aspen Olmsted. 501-502 [doi]