Abstract is missing.
- Attack Detection in Mobile Internet and Networks Using the Graph-Based Schemes for Combining the Support Vector MachinesAlexander Branitskiy, Igor V. Kotenko. 1-16 [doi]
- Generating Dynamic Box by Using an Input StringJia-Jia Liu, Yi-Li Huang, Fang-Yie Leu, Xing-You Pan, Li-Ren Chen. 17-29 [doi]
- SAAS: A Secure Anonymous Authentication Scheme for PMIPv6Tianhan Gao, Xinyang Deng, Fanghua Geng. 30-50 [doi]
- FAIR-Based Cyber Influence Damage Assessment for Exploit in Mobile DeviceMookyu Park, Jaehyeok Han, Junwoo Seo, Haengrok Oh, Kyungho Lee. 51-64 [doi]
- Method for Predicting Pixel Values in Background Areas in the Problem of Weighted Steganalysis in the Spatial Domain of Natural Images Under Small PayloadsDaniil A. Bashmakov, Anatoliy G. Korobeynikov, Alexey V. Sivachev, Didier El Baz, Dmitry Levshun. 65-82 [doi]
- Steganalysis Method for Detecting Embedded Coefficients of Discrete-Wavelet Image Transformation into High-Frequency DomainsAlexey V. Sivachev, Daniil A. Bashmakov, Olga V. Mikhailishenko, Anatoliy G. Korobeynikov, Roland Rieke. 83-95 [doi]
- Voronoi Maps for Planar Sensor Networks VisualizationMaxim Kolomeets, Andrey Chechulin, Igor V. Kotenko, Martin Strecker. 96-109 [doi]
- Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain TechnologiesMarek R. Ogiela, Lidia Ogiela. 110-119 [doi]
- Using iBeacon Technology with Nearest Neighbor Algorithm to Area Positioning SystemsChia-Hsin Cheng, Chia-Yao Hu. 120-130 [doi]
- An Efficient Facebook Place Information Extraction StrategyJong-Shin Chen, Chuan-Bi Lin, Cheng-Ying Yang, Yung-Fa Huang. 131-139 [doi]
- Performance of Sub-optimal Searching Algorithms on PTS Phase Selections for PAPR ReductionJyh-Horng Wen, Fang-Yu Chang, Yung-Fa Huang, Hsing-Chung Chen, Zon-Yin Shae. 140-150 [doi]
- A Frame-Based Approach to Generating Insider Threat Test Suite on Cloud File-SharingTsung-Ju Lee, Shian-Shyong Tseng, Hsing-Chung Chen, Sung-Chiang Lin, Chiun-How Kao. 151-156 [doi]
- User Keystroke Authentication Based on Convolutional Neural NetworkMengxin Liu, Jianfeng Guan. 157-168 [doi]
- An SDN-Based Secure Mobility Model for UAV-Ground CommunicationsRajesh Kumar, Mohd. Abuzar Sayeed, Vishal Sharma, Ilsun You. 169-179 [doi]