Abstract is missing.
- Framework for Autonomous Delivery DronesMark O. Milhouse. 1-4 [doi]
- Information Technology Research in the Academy: Insights from Theses and DissertationsSung Kim, Derek Hansen, C. Richard G. Helps. 5-10 [doi]
- Evolution of Cybersecurity Issues In Small BusinessesDebasis Bhattacharya. 11 [doi]
- Certification with Multiple SignaturesXinli Wang, Yan Bai, Lihui Hu. 13-18 [doi]
- An Open-Source Honeynet System to Study System Banner Message Effects on HackersMark Stockman, Robert Heile, Anthony Rein. 19-22 [doi]
- A Study on Botnets Utilizing DNSNicole M. Hands, Baijian Yang, Raymond A. Hansen. 23-28 [doi]
- Defending Your Android AppFelipe Sierra, Anthony Ramirez. 29-34 [doi]
- Secure and Smart Media Sharing Based on a Novel Mobile Device-to-Device Communication Framework with Security and ProceduresSambasivam Ramasubramanian, Sam Chung, Seungwan Ryu, Ling Ding. 35-40 [doi]
- Validating the Assessment Metrics for Mobile Health Apps: Preliminary Outcomes from a Pilot StudyChi Zhang, Xihui Zhang, Richard Halstead-Nussloch. 41 [doi]
- Developing Automated Input Generator for Android Mobile Device to Evaluate Malware BehaviorShobhit N. Dutia, Tae H. Oh, Young H. Oh. 43 [doi]
- A Man-in-the-Middle attack against OpenDayLight SDN controllerMichael Brooks, Baijian Yang. 45-49 [doi]
- MP3 Steganography TechniquesYalinne Castelan, Ben Khodja. 51-54 [doi]
- Studying the Effect of Multi-Query Functionality on a Correlation-Aware SQL-To-MapReduce TranslatorThivviyan Amirthalingam, John Springer. 55-60 [doi]