All Stories

  1. Smartphone User Identity Verification Using Gait Characteristics
  2. A Model-Driven Framework to Develop Personalized Health Monitoring
  3. Modelling of Internet of Things units for estimating security-energy-performance relationships for quality of service and environment awareness
  4. Stage-Based Generative Learning Object Model to Support Automatic Content Generation and Adaptation
  5. A Methodology and Tool for Investigation of Artifacts Left by the BitTorrent Client
  6. Model-Driven Approach for Body Area Network Application Development
  7. Extending Rule Set for Static Code Analysis in .NET Platform
  8. Methodology to investigate BitTorrent sync protocol
  9. Investigation of Artifacts Left by BitTorrent Client on the Local Computer Operating under Windows 8.1
  10. Suitability of the digital forensic tools for investigation of cyber crime in the Internet of Things and Services
  11. An Energy Efficient Protocol For The Internet Of Things
  12. Problems of Authorship Identification of the National Language Electronic Discourse
  13. Emotion Recognition in Human Computer Interaction Systems
  14. Identification of Dependency among Energy Consumption and Wi-Fi Protocol Security Levels within the Prototype Module for the IoT
  15. Energy Consumption of Cryptographic Algorithms in Mobile Devices
  16. Security Level versus Energy Consumption in Wireless Protocols for Internet of Things
  17. New Asymmetric Cipher Based On Matrix Power Function and Its Implementation in Microprocessors Efficiency Investigation
  18. Covert Channel for Cluster-based File Systems Using Multiple Cover Files
  19. Evaluation of Open Source Server-Side XSS Protection Solutions
  20. Generation of the Secret Encryption Key Using the Signature of the Embedded System
  21. Dynamic Extension of Starling Resistor Model
  22. Study of Finger Vein Authentication Algorithms for Physical Access Control
  23. SECURITY METHOD OF EMBEDDED SOFTWARE FOR MECHATRONIC SYSTEMS
  24. Securing Web Application by Embedded Firewall
  25. Implementation Analysis of Matrix Power Cipher in Embedded Systems
  26. Influence of Blended Learning on Outcomes of Postgraduate Studies