Abstract is missing.
- Distributed Privacy Preserving Platform for Ridesharing ServicesYevhenii Semenko, Damien Saucez. 1-14 [doi]
- Ransomware Attack Protection: A Cryptographic ApproachAnjali Kumari, Md. Zakirul Alam Bhuiyan, Jigyasa Namdeo, Shipra Kanaujia, Ruhul Amin, Satyanarayana Vollala. 15-25 [doi]
- A Lightweight Secure Communication Protocol for IoT Devices Using Physically Unclonable FunctionPriyanka Mall, Md. Zakirul Alam Bhuiyan, Ruhul Amin. 26-35 [doi]
- Blockchain-Based Mobility Management for LTE and BeyondHan Lee, Maode Ma. 36-49 [doi]
- EPT: EDNS Privacy Tunnel for DNSLanlan Pan, Jie Chen, Anlei Hu, Xuebiao Yuchi. 50-62 [doi]
- Ensuring Data Integrity in Fog Computing Based Health-Care SystemsAbdulwahab Alazeb, Brajendra Panda. 63-77 [doi]
- Modelling Security Requirements for Software Development with Common CriteriaNaseer Amara, Zhiqui Huang, Awais Ali. 78-88 [doi]
- Visualization of DNS Tunneling Attacks Using Parallel Coordinates TechniqueYasir F. Mohammed, Dale R. Thompson. 89-101 [doi]
- A Data-Driven Network Intrusion Detection Model Based on Host Clustering and Integrated Learning: A Case Study on Botnet DetectionLena Ara, Xiao Luo. 102-116 [doi]
- Towards H-SDN Traffic Analytic Through Visual Analytics and Machine LearningTze Chiang Tin, Saw Chin Tan, Ching Kwang Lee, Y. Zulfadzli, K. Rizaludin. 117-132 [doi]
- End-to-End Encryption Schemes for Online Social NetworksFabian Schillinger, Christian Schindelhauer. 133-146 [doi]
- Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch DataMelodee Montgomery, Prosenjit Chatterjee, John Jenkins, Kaushik Roy. 147-156 [doi]
- Paper Document Authentication Using Print-Scan Resistant Image Hashing and Public-Key CryptographyFawad Ahmad, Lee-Ming Cheng. 157-165 [doi]
- TLShps: SDN-Based TLS Handshake Protocol Simplification for IoTLei Yan, Maode Ma, Yan Ma. 166-182 [doi]
- Data Protection Labware for Mobile SecurityHossain Shahriar, Md Arabin Islam Talukder, Hongmei Chi, Mohammad Ashiqur Rahman, Sheikh Iqbal Ahamed, Atef Shalan, Khaled Tarmissi. 183-195 [doi]
- Multi-round Bidding Strategy Based on Game Theory for Crowdsensing TaskEn Wang, Yongjian Yang, Jie Wu, Hengzhi Wang. 196-210 [doi]
- Information Leakage in Wearable ApplicationsBabatunde Olabenjo, Dwight J. Makaroff. 211-224 [doi]
- An Encryption-Based Approach to Protect Fog Federations from Rogue NodesMohammed Alshehri, Brajendra Panda. 225-243 [doi]
- Python Scrapers for Scraping Cryptomarkets on TorYubao Wu, Fengpan Zhao, Xucan Chen, Pavel Skums, Eric L. Sevigny, David Maimon, Marie Ouellet, Monica Haavisto Swahn, Sheryl M. Strasser, Mohammad Javad Feizollahi, Youfang Zhang, Gunjan Sekhon. 244-260 [doi]
- Characteristics of Bitcoin Transactions on CryptomarketsXucan Chen, Mohammad Al Hasan, Xintao Wu, Pavel Skums, Mohammad Javad Feizollahi, Marie Ouellet, Eric L. Sevigny, David Maimon, Yubao Wu. 261-276 [doi]
- Effectiveness of Machine Learning Based Intrusion Detection SystemsMohammed Alrowaily, Freeh Alenezi, Zhuo Lu. 277-288 [doi]
- DNS Flood Attack Mitigation Utilizing Hot-Lists and Stale Content UpdatesTasnuva Mahjabin, Yang Xiao. 289-296 [doi]
- Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined NetworkingCheng Chi Qin, Saw Chin Tan, Ching Kwang Lee, Zulfadzli Yusoff, Rizaluddin Kaspin. 297-308 [doi]
- Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation IndustryNg Kean Haur, Tan Saw Chin. 309-324 [doi]
- Method of Deep Web Collection for Mobile Application Store Based on Category Keyword SearchingGuosheng Xu, Zhimin Wu, Chengze Li, Jinghua Yan, Jing Yuan, Zhiyong Wang, Lu Wang. 325-335 [doi]
- Using Machine Learning to Find Anomalies in Field Bus Network TrafficMartin Peters, Johannes Goltz, Simeon Wiedenmann, Thomas Mundt. 336-353 [doi]
- Cyber Weapons Storage MechanismsMuhammad Mudassar Yamin, Basel Katt, Mazaher Kianpour. 354-367 [doi]
- A New Intrusion Detection System Based on Gated Recurrent Unit (GRU) and Genetic AlgorithmMahdi Manavi, Yunpeng Zhang. 368-383 [doi]
- Topic Model Based Android Malware DetectionYucai Song, Yang Chen, Bo Lang, Hongyu Liu, Shaojie Chen. 384-396 [doi]
- A Verifiable Encryption Scheme Supporting Fuzzy SearchRuwei Huang, Zhikun Li, Guang Wu. 397-411 [doi]
- A Verifiable Fully Homomorphic Encryption SchemeRuwei Huang, Zhikun Li, Jianan Zhao. 412-426 [doi]
- Secure Communication in UAV Assisted HetNets: A Proposed ModelAabid Rashid, Diwankshi Sharma, Tufail A. Lone, Sumeet Gupta, Sachin Kumar Gupta. 427-440 [doi]
- Detection of Application-Layer Tunnels with Rules and Machine LearningHuaqing Lin, Gao Liu, Zheng Yan 0002. 441-455 [doi]
- An Anonymous Protocol for Member Privacy in a Consortium BlockchainGyeong-Jin Ra, Dae-Hee Seo, Md. Zakirul Alam Bhuiyan, Im-Yeong Lee. 456-464 [doi]
- Automated Construction of Malware FamiliesKrishnendu Ghosh, Jeffery Mills. 465-474 [doi]
- A Closer Look at Anonymous Proxy Re-Encryption SchemesS. Sharmila Deva Selvi, S. Harish, Swethashree Dhanabal, C. Pandu Rangan. 475-489 [doi]
- Approximate String Matching for DNS Anomaly DetectionRoni Mateless, Michael Segal 0001. 490-504 [doi]