Abstract is missing.
- Offloading of Fog Data Networks with Network Coded Cooperative D2D CommunicationsBen Quinton, Neda Aboutorab. 1-13 [doi]
- Persistent vs Service IDs in Android: Session Fingerprinting from AppsEfthimios Alepis, Constantinos Patsakis. 14-29 [doi]
- Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning TechniquesNickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Jill Slay. 30-44 [doi]
- Performance Comparison of Distributed Pattern Matching Algorithms on Hadoop MapReduce FrameworkC. P. Sona, Jaison Paul Mulerikkal. 45-55 [doi]
- Robust Fingerprint Matching Based on Convolutional Neural NetworksYanming Zhu, Xuefei Yin, Jiankun Hu. 56-65 [doi]
- A Personalized Multi-keyword Ranked Search Method Over Encrypted Cloud DataXue Tian, Peisong Shen, Tengfei Yang, Chi Chen, Jiankun Hu. 66-78 [doi]
- Application of Fuzzy Comprehensive Evaluation Method for Reservoir Well Logging Interpretation While DrillingZhaohua Zhou, Shi Shi, Shunan Ma, Jing Fu. 79-86 [doi]
- Factor Effects for Routing in a Delay-Tolerant Wireless Sensor Network for Lake Environment MonitoringRizza T. Loquias, Nestor Michael C. Tiglao, Jhoanna Rhodette I. Pedrasa, Joel Joseph S. Marciano. 87-100 [doi]
- Estimating Public Opinion in Social Media Content Using Aspect-Based Opinion MiningYen Hong Tran, Quang Nhat Tran. 101-115 [doi]
- An Approach for Host-Based Intrusion Detection System Design Using Convolutional Neural NetworkNam Nhat Tran, Ruhul A. Sarker, Jiankun Hu. 116-126 [doi]
- A Robust Contactless Fingerprint Enhancement AlgorithmXuefei Yin, Yanming Zhu, Jiankun Hu. 127-136 [doi]
- Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine LearningWaqas Haider, Jiankun Hu, Nour Moustafa. 137-149 [doi]
- A Variant of BLS Signature Scheme with Tight Security ReductionTiong-Sik Ng, Syh-Yuan Tan, Ji-Jian Chin. 150-163 [doi]
- Quantum Authentication Scheme Based on Fingerprint-Encoded Graph StatesFei Li, Ying Guo, Jiankun Hu. 164-177 [doi]
- Cooperative Information Security/Cybersecurity Curriculum DevelopmentAbdelaziz Bouras, Houssem Gasmi, Fadi Ghemri. 178-187 [doi]
- An Energy Saving Mechanism Based on Vacation Queuing Theory in Data Center NetworksEmna Baccour, Ala Gouissem, Sebti Foufou, Ridha Hamila, Zahir Tari, Albert Y. Zomaya. 188-202 [doi]
- Homomorphic Evaluation of Database QueriesHamid Usefi, Sudharaka Palamakumbura. 203-216 [doi]
- A Cache-Aware Congestion Control for Reliable Transport in Wireless Sensor NetworksMelchizedek I. Alipio, Nestor Michael C. Tiglao. 217-230 [doi]
- A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive SourcesMouza Ahmed Bani Shemaili, Chan Yeob Yeun, Mohamed Jamal Zemerly, Khalid Mubarak, Hyun Ku Yeun, Yoon Seok Chang, Basim Zafar, Mohammed Simsim, Yasir Salih, Gaemyoung Lee. 231-246 [doi]
- Fog Computing as a Critical Link Between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon ReservoirsAndrzej M. Goscinski, Zahir Tari, Izzatdin A. Aziz, Eidah J. Alzahrani. 247-261 [doi]
- Performance Assessment of Cloud Migrations from Network and Application Point of ViewLukas Iffländer, Christopher Metter, Florian Wamser, Phuoc Tran-Gia, Samuel Kounev. 262-276 [doi]
- A Cloud Service Enhanced Method Supporting Context-Aware ApplicationsZifan Liu, Qing Cai, Song Wang, Xiaolong Xu, Wanchun Dou, Shui Yu. 277-290 [doi]
- Application of 3D Delaunay Triangulation in Fingerprint Authentication SystemWenCheng Yang, Guanglou Zheng, Ahmed Ibrahim, Junaid Ahsenali Chaudhry, Song Wang 0003, Jiankun Hu, Craig Valli. 291-298 [doi]
- The Public Verifiability of Public Key Encryption with Keyword SearchBinrui Zhu, Jiameng Sun, Jing Qin, Jixin Ma. 299-312 [doi]
- Malicious Bitcoin Transaction Tracing Using Incidence Relation ClusteringBaokun Zheng, Liehuang Zhu, Meng Shen, Xiaojiang Du, Jing Yang, Feng Gao, Yandong Li, Chuan Zhang, Sheng Liu, Shu Yin. 313-323 [doi]
- Cryptanalysis of Salsa and ChaCha: RevisitedKakumani K. C. Deepthi, Kunwar Singh. 324-338 [doi]
- CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned BlockchainsYandong Li, Liehuang Zhu, Meng Shen, Feng Gao, Baokun Zheng, Xiaojiang Du, Sheng Liu, Shu Yin. 339-352 [doi]
- Probability Risk Identification Based Intrusion Detection System for SCADA SystemsThomas Marsden, Nour Moustafa, Elena Sitnikova, Gideon Creech. 353-363 [doi]
- Anonymizing k-NN Classification on MapReduceSibghat Ullah Bazai, Julian Jang-Jaccard, Ruili Wang. 364-377 [doi]
- A Cancellable Ranking Based Hashing Method for Fingerprint Template ProtectionZhe Jin, Jung Yeon Hwang, Soohyung Kim, Sangrae Cho, Yen-Lung Lai, Andrew Beng Jin Teoh. 378-389 [doi]