Abstract is missing.
- NETA: Evaluating the Effects of NETwork Attacks. MANETs as a Case StudyLeovigildo Sánchez-Casado, Rafael Alejandro Rodríguez-Gómez, Roberto Magán-Carrión, Gabriel Maciá-Fernández. 1-10 [doi]
- Clustering Based Group Key Management for MANETAyman El-Sayed. 11-26 [doi]
- Chord-Enabled Key Storage and Lookup Scheme for Mobile Agent-Based Hierarchical WSNAlyaa Amer, Ayman Abdel-Hamid, Mohamad Abou El-Nasr. 27-43 [doi]
- Hardware Advancements Effects on MANET Development, Application and ResearchAmr ElBanna, Ehab ElShafei, Khaled ElSabrouty, Marianne A. Azer. 44-53 [doi]
- A Virtualized Network Testbed for Zero-Day Worm Analysis and Countermeasure TestingKhurram Shahzad, Steve Woodhead, Panos Bakalis. 54-64 [doi]
- A Categorized Trust-Based Message Reporting Scheme for VANETsMerrihan Monir, Ayman Abdel-Hamid, Mohammed Abd El Aziz. 65-83 [doi]
- Blind Watermark Approach for Map Authentication Using Support Vector MachineMourad Raafat Mouhamed, Hossam M. Zawbaa, Eiman Tamah Al-Shammari, Aboul Ella Hassanien, Václav Snásel. 84-97 [doi]
- High Payload Audio Watermarking Using Sparse Coding with Robustness to MP3 CompressionMohamed Waleed Fakhr. 98-110 [doi]
- An HMM-Based Reputation ModelEhab ElSalamouny, Vladimiro Sassone. 111-121 [doi]
- Towards IT-Legal Framework for Cloud ComputingSameh Hussein, Nashwa Abdelbaki. 122-130 [doi]
- A Blind Robust 3D-Watermarking Scheme Based on Progressive Mesh and Self Organization MapsMona M. Soliman, Aboul Ella Hassanien, Hoda M. Onsi. 131-142 [doi]
- A Cattle Identification Approach Using Live Captured Muzzle Print ImagesAli Ismail Awad, Aboul Ella Hassanien, Hossam M. Zawbaa. 143-152 [doi]
- Algebraic Replay Attacks on Authentication in RFID ProtocolsNoureddine Chikouche, Cherif Foudil, Mohamed Benmohammed. 153-163 [doi]
- A Privacy Preserving Approach to Smart MeteringMerwais Shinwari, Amr M. Youssef, Walaa Hamouda. 164-176 [doi]
- Developing an Intelligent Intrusion Detection and Prevention System against Web Application MalwareAmmar Alazab, Michael Hobbs, Jemal H. Abawajy, Ansam Khraisat. 177-184 [doi]
- Vulnerability Scanners Capabilities for Detecting Windows Missed Patches: Comparative StudyMohamed Alfateh Badawy, Nawal A. El-Fishawy, Osama A. Elshakankiry. 185-195 [doi]
- Elderly Healthcare Data Protection Application for Ambient Assisted LivingQing Tan, Nashwa El-Bendary, Frédérique C. Pivot, Anthony Lam. 196-203 [doi]
- A Secure Framework for OTA Smart Device Ecosystems Using ECC Encryption and BiometricsMiguel Salas. 204-218 [doi]
- Machine Learning Techniques for Anomalies Detection and ClassificationAmira Sayed Abdel-Aziz, Aboul Ella Hassanien, Ahmad Taher Azar, Sanaa El-Ola Hanafi. 219-229 [doi]
- Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration TestingNor Fatimah Bt. Awang, Azizah Abd Manaf. 230-239 [doi]
- Linear Correlation-Based Feature Selection for Network Intrusion Detection ModelF. Eid Heba, Aboul Ella Hassanien, Tai-Hoon Kim, Soumya Banerjee 0002. 240-248 [doi]