Abstract is missing.
- Security Interoperability for Cooperative ITS: Architecture and ValidationMounira Msahli, Houda Labiod, Gilles Ampt. 1-6 [doi]
- Introducing Innovative Bare Metal Crypto Terminal for Blockchains and BigBang ParadigmPascal Urien. 1-4 [doi]
- Post-Quantum Signature Schemes for Efficient Hardware ImplementationDmitriy N. Moldovyan, Alexander A. Moldovyan, Nicolas Sklavos. 1-5 [doi]
- Survey of Formal Verification Methods for Smart Contracts on BlockchainYvonne Murray, David A. Anisi. 1-6 [doi]
- An IoT-Blockchain Architecture Based on Hyperledger Framework for Healthcare Monitoring ApplicationOumaima Attia, Ines Khoufi, Anis Laouiti, Cédric Adjih. 1-5 [doi]
- A Detection and Defense Approach for Content Privacy in Named Data NetworkErtugrul Dogruluk, António Costa, Joaquim Macedo. 1-5 [doi]
- Events and Objects Interaction Recognition using Aerial VideosFatimah Alshomrani. 1-4 [doi]
- Authentication Layer for IEC 61113-3 ApplicationsAydin E. Homay, Christos Chrysoulas, Mário de Sousa. 1-5 [doi]
- IoT in Effective Distance Learning ProcessRodion Yakoubovsky, Viliam Sarian. 1-4 [doi]
- A Permissioned Blockchain-Based System for Verification of Academic RecordsAhmed Badr, Laura Rafferty, Qusay H. Mahmoud, Khalid Elgazzar, Patrick C. K. Hung. 1-5 [doi]
- Analysis of Network Threats Based on Data from Server-TrapsEvgeny S. Sagatov, D. A. Shkirdov, Andrei M. Sukhov. 1-5 [doi]
- An Asynchronous Dual Radio Opportunistic Beacon Network Protocol for Wildlife Monitoring SystemEyuel D. Ayele, Nirvana Meratnia, Paul J. M. Havinga. 1-7 [doi]
- Design and Verification Methodology for Secure and Distributed Cyber-Physical SystemsDmitry Levshun, Andrey Chechulin, Igor V. Kotenko, Yannick Chevalier. 1-5 [doi]
- An Xception Convolutional Neural Network for Malware Classification with Transfer LearningWai Weng Lo, Xu Yang, Yapeng Wang. 1-5 [doi]
- Taxonomy and Adversarial Strategies of Random Subdomain AttacksHarm Griffioen, Christian Doerr. 1-5 [doi]
- A New Network Model for Cyber Threat Intelligence Sharing using Blockchain TechnologyDaire Homan, Ian Shiel, Christina Thorpe. 1-6 [doi]
- Evaluating Spread of 'Gasless Send' in Ethereum Smart ContractsDavid Prechtel, Tobias Groß, Tilo Müller. 1-6 [doi]
- Horizontal Attacks using K-Means: Comparison with Traditional Analysis MethodsIevgen Kabin, Marcin Aftowicz, Yauhen Varabei, Dan Klann, Zoya Dyka, Peter Langendörfer. 1-7 [doi]
- FPGA Implementation of pAsynch Design ParadigmYehuda Rudin, Itamar Levi, Alexander Fish, Osnat Keren. 1-5 [doi]
- Evaluating CoAP End to End Security for Constrained Wireless Sensor NetworksApostolos P. Fournaris, Spilios Giannoulis, Christos Koulamas. 1-5 [doi]
- Competitive Market for Joint Access and Backhaul Resource Allocation in Satellite-Drone NetworksYe Hu, Mingzhe Chen, Walid Saad. 1-5 [doi]
- A Fistful of Votes: Understanding the Voting System in Social Question and Answer WebsitesJun Zhang 0019, Houda Labiod, Weizhi Meng. 1-5 [doi]
- Risk Analysis on C-ITS Pseudonymity AspectsFarah Haidar, Arnaud Kaiser, Brigitte Lonc, Pascal Urien. 1-5 [doi]
- Assessment Technologies of Communication Quality in MANET NetworksEvgeny S. Sagatov, Andrei M. Sukhov. 1-5 [doi]
- An Attribute-Based Access Control using Chaincode in RFID SystemsSantiago Figueroa, Javier Añorga, Saioa Arrizabalaga, Iñigo Irigoyen, Mario Monterde. 1-5 [doi]
- Compact Sub-Vt Optical Sensor for the Detection of Fault Injection in Hardware Security ApplicationsDavid Zooker Zabib, Alexander Fish, Osnat Keren, Yoav Weizman. 1-5 [doi]
- Cyber Threat Investigation of SCADA Modbus ActivitiesClaude Fachkha. 1-7 [doi]
- Mobility Management as a Radio Access Network ServiceEvelina Pencheva, Ivaylo Atanasov, Ivaylo Asenov, Ventsislav Trifonov. 1-5 [doi]
- PriDe: A Quantitative Measure of Privacy-Loss in Interactive Querying SettingsMuhammad Imran Khan 0001, Simon N. Foley, Barry O'Sullivan. 1-5 [doi]
- Evaluation of FTTx Access Network Migration for IPTV ServicesYekta Turk, Engin Zeydan. 1-5 [doi]
- Hybrid Energy-Efficient Protocol in Delay Tolerant Networks for IoT SystemsAmr Elsaadany, Mohamed Aboulhassan. 1-6 [doi]
- Trajectory Anonymization: Balancing Usefulness about Position Information and TimestampTomoki Chiba, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga. 1-6 [doi]
- Performance Analysis of LoRa Technology in Wireless Sensor NetworksDragos Ioan Sacaleanu, Irina Petra Manciu, Lucian Andrei Perisoara. 1-5 [doi]
- Porthos: Macroprogramming Blockchain SystemsAdrian Mizzi, Joshua Ellul, Gordon J. Pace. 1-5 [doi]
- Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP WatchesÁine MacDermott, Stephen Lea, Farkhund Iqbal, Ibrahim Idowu, Babar Shah. 1-6 [doi]
- Monitoring Leaked Confidential DataSlim Trabelsi. 1-5 [doi]
- Urban Sensing: Towards Security Efficient Sensing Network SchemeSalam Ismail Rasheed Khanji, Mohamad Badra, Omar Alfandi, Rouba Borghol. 1-7 [doi]
- On the Reliability of Wireless Virtual Reality at Terahertz (THz) FrequenciesChristina Chaccour, Ramy Amer, Bo Zhou, Walid Saad. 1-5 [doi]
- Wave Performance Analysis and Enhancement for Safety Applications in Vehicular NetworksFadlallah Chbib, Lyes Khoukhi, Walid Fahs, Rida Khatoun, Jamal Haydar. 1-7 [doi]
- Cybersecurity in Protection of Soft TargetsDora Lapkova, David Malaník, Lukas Kralik, Lukas Kotek. 1-6 [doi]
- Color Medical Image Encryption using 3D Chaotic Cat Map and NCAUn-Sook Choi, Sung Jin Cho, Sung Won Kang. 1-5 [doi]
- Towards Principled Compilation of Ethereum Smart Contracts (SoK)Emilio Jesús Gallego Arias. 1-5 [doi]
- Real-Time Detection of Cyberbullying in Arabic Twitter StreamsDjedjiga Mouheb, Masa Hilal Abushamleh, Maya Hilal Abushamleh, Zaher Al Aghbari, Ibrahim Kamel. 1-5 [doi]
- An Intrusion Detection and Response Scheme for CP-ABE-Encrypted IoT NetworksYounes Laaboudi, Alexis Olivereau, Nouha Oualha. 1-5 [doi]
- An Internet of Things (IoT)-Based Coverage Monitoring for Mission Critical RegionsShagufta Henna, Alan Davy, Hasan Ali Khattak, Abid Ali Minhas. 1-5 [doi]
- Kriptosare.gen, a Dockerized Bitcoin Testbed: Analysis of Server PerformanceFrancesco Zola, Cristina Pérez-Solà, Jon Egaña Zubia, Maria Eguimendia, Jordi Herrera-Joancomartí. 1-5 [doi]
- Managing the Secure Software DevelopmentRadek Fujdiak, Petr Mlynek, Pavel Mrnustik, Maros Barabas, Petr Blazek, Filip Borcik, Jiri Misurec. 1-4 [doi]
- Big Data Technology in Healthcare: A SurveyVatsal J. Saglani, Bharat S. Rawal, V. Vijayakumar, Longzhi Yang. 1-5 [doi]
- On the Complexity of Attacking Commercial Authentication ProductsIevgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer. 1-6 [doi]
- Balancing Security Guarantees vs QoS Provisioning in Combined Fog-to-Cloud SystemsSarang Kahvazadeh, Xavi Masip-Bruin, Rodrigo Diaz, Eva Marín-Tordera, Alejandro Jurnet, Jordi Garcia, Ana Juan Ferrer, Ester Simó. 1-6 [doi]
- Developing Battery of Vulnerability Tests for Industrial Control SystemsRadek Fujdiak, Petr Blazek, Petr Mlynek, Jiri Misurec. 1-5 [doi]
- A Novel Online Incremental Learning Intrusion Prevention SystemChristos Constantinides, Stavros Shiaeles, Bogdan V. Ghita, Nicholas Kolokotronis. 1-6 [doi]
- Secure Data Sharing with Fast Access Revocation through Untrusted CloudsKatarzyna Kapusta, Han Qiu, Gérard Memmi. 1-5 [doi]
- Automated Revealing of Organizational Assets Based on Event CorrelationElena Doynikova, Andrey Fedorchenko, Igor V. Kotenko. 1-5 [doi]
- Improving Strong Mobile Authentication with Structural Diversity and User-FriendlinessSamy Kambou, Ahmed Bouabdallah. 1-5 [doi]
- Influence of Internet Protocols and CDN on Web BrowsingAntoine Saverimoutou, Bertrand Mathieu, Sandrine Vaton. 1-5 [doi]
- SSH Key Management Challenges and RequirementsTatu Ylönen. 1-5 [doi]
- Privacy-Preserving Social Media Forensic Analysis for Preventive Policing of Online ActivitiesSyed Naqvi, Sean Enderby, Ian Williams, Waqar Asif, Muttukrishnan Rajarajan, Cristi Potlog, Monica Florea. 1-6 [doi]
- Mobile Edge Assistance Information for Radio Access Network OptimizationIvaylo Atanasov, Evelina Pencheva, Ivaylo Asenov. 1-5 [doi]
- Detecting Intrusive Behaviour of People in a Building through Data Analysis and Anomaly Detection in Home Automation SystemsThomas Mundt, Simeon Wiedenmann, Johannes Goltz, Johann Bauer, Maximilian Jung. 1-7 [doi]
- Combating Ransomware using Content Analysis and Complex File EventsMichael J. May, Etamar Laron. 1-5 [doi]
- A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined NetworkingHeena Rathore, Abhay Samant, Mohsen Guizani. 1-5 [doi]
- Collateral Use of Deployment Code for Smart Contracts in EthereumMonika Di Angelo, Gernot Salzer. 1-5 [doi]