Abstract is missing.
- Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative StudyAli Raya, K. Mariyappn. 1-8 [doi]
- TL-NID: Deep Neural Network with Transfer Learning for Network Intrusion DetectionMohammad Masum, Hossain Shahriar. 1-7 [doi]
- Energy Consumption of a LoRaWAN Network using Jarvis AlgorithmEsau Bermudez, Djamel Fawzi Hadj Sadok. 1-6 [doi]
- Partitioned Private User Storages in End-to-End Encrypted Online Social NetworksFabian Schillinger, Christian Schindelhauer. 1-8 [doi]
- Network Security Evaluation Using Deep Neural NetworkLoreen Mahmoud, Raja Praveen. 1-4 [doi]
- Real-Time supports on Tablet PC PlatformsJong Jin Kim, Sang Gil Lee, Cheol-Hoon Lee. 1-7 [doi]
- Easy Simple Factoring-based Digital Signature SchemeSook-Yan Hue, Nor Haniza Sarmin, Eddie Shahril Ismail, Ji-Jian Chin. 1-4 [doi]
- Performance Evaluation of RPL and DODAG Formations for IoTs ApplicationsKhalid Mohamed, Suleiman Ali, Soilahoudini Ali, Ilyas Kassim. 1-7 [doi]
- Implement a Model for Describing and Maximising Security Knowledge SharingSaad Al-Ahmari, Karen Renaud, Inah Omoronyia. 1-4 [doi]
- Design and Implementation on FPGA Board of a Chaos-based Stream CipherFethi Dridi, Safwan El Assad, Carinelle Atamech, Wajih El Hadj Youssef, Mohsen Machhout. 1-5 [doi]
- A Pedagogic Analysis of Information Systems Security Measures in Online ServicesEzekiel Uzor Okike, Gofaone Mogapi. 1-6 [doi]
- Japan's Act on Wiretapping for Criminal Investigation: How the system is implemented and how it should beSatoshi Kosakatani, Tetsutaro Uehara, Songpon Teerakanok. 1-6 [doi]
- Malware Detection by Eating a Whole APKMohammad Al-Fawa'reh, Amal Saif, Mousa Tayseer Jafar, Ammar Elhassan. 1-7 [doi]
- A Stream Cipher Based on Fractional Pseudo Chaotic Random Number GeneratorChunxiao Yang, Ina Taralova, Jean Jacques Loiseau, Safwan El Assad. 1-6 [doi]
- Evolution of Bitcoin Addresses from Security PerspectivesWai Kok Chan, Ji-Jian Chin, Vik Tor Goh. 1-6 [doi]
- Monitoring IoT Encrypted Traffic with Deep Packet Inspection and Statistical AnalysisLuca Deri, Daniele Sartiano. 1-6 [doi]
- A Review of the Current Cyber Hygiene in Small and Medium-sized BusinessesTabisa Ncubukezi, Laban Mwansa, François Rocaries. 1-6 [doi]
- Measuring Psychosocial and Behavioural Factors Improves Attack Potential EstimatesKitty Kioskli, Nineta Polemi. 1-4 [doi]
- A Reliable Encryption Oriented Pseudo-chaotic Number Generator Using a Key Space Expandable StrategyZongchao Qiao, Ina Taralova, Safwan El Assad. 1-5 [doi]
- Adversarial Evasion Noise Attacks Against TensorFlow Object Detection APIRaadhesh Kannan, Chin Ji Jian, Xiaoning Guo. 1-4 [doi]
- Toward Compact Data from Big DataSong-Kyoo Amang Kim. 1-5 [doi]
- A Shoulder-Surfing Resistant Colour Image-based Authentication Method Using Human Vision Perception with Spatial FrequencyHarris Anthonio, Yvonne Hwei-Syn Kam. 1-5 [doi]
- A Multi-layer Stack Ensemble Approach to Improve Intrusion Detection System's Prediction AccuracyFelix Larbi Aryeh, Boniface Kayode Alese. 1-6 [doi]
- Smart Parking With Automated Billing SystemDhruva Hunusekattte. 1-5 [doi]
- YARAMON: A Memory-based Detection Framework for Ransomware FamiliesMay Medhat, Menna Essa, Hend Faisal, Samir G. Sayed. 1-6 [doi]
- Towards robust classification detection for adversarial examplesHuangxiaolie Liu, Dong Zhang, Huijun Chen. 1-7 [doi]
- Fast and Reliable DDoS Detection using Dimensionality Reduction and Machine LearningZein Ashi, Laila Aburashed, Mohammad Al-Fawa'reh, Malek Qasaimeh. 1-10 [doi]