All Stories

  1. Forensic Investigation of Humanoid Social Robot: A Case Study on Zenbo Robot
  2. Multimodal Religiously Hateful Social Media Memes Classification based on Textual and Image Data
  3. Transfer Learning-based Forensic Analysis and Classification of E-Mail Content
  4. Data Augmentation-based Novel Deep Learning Method for Deepfaked Images Detection
  5. Differentially Private Release of Heterogeneous Network for Managing Healthcare Data
  6. Augmenting CCAM Infrastructure for Creating Smart Roads and Enabling Autonomous Driving
  7. CARLA+: An Evolution of the CARLA Simulator for Complex Environment Using a Probabilistic Graphical Model
  8. A Comparative Assessment of Human Factors in Cybersecurity: Implications for Cyber Governance
  9. Of Stances, Themes, and Anomalies in COVID-19 Mask-Wearing Tweets
  10. Multicriteria Decision Making for Carbon Dioxide (CO2) Emission Reduction
  11. Exploring the human factors in moral dilemmas of autonomous vehicles
  12. Distinguishing between fake news and satire with transformers
  13. Deepfake Audio Detection via MFCC Features Using Machine Learning
  14. Enabling Secure Trustworthiness Assessment and Privacy Protection in Integrating Data for Trading Person-Specific Information
  15. Automatic Fall Risk Detection Based on Imbalanced Data
  16. Blockchain-based chain of custody
  17. On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild
  18. A Deep Learning Framework for Malware Classification
  19. The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics
  20. Towards a Better Understanding of Drone Forensics
  21. Efficient scheduling of video camera sensor networks for IoT systems in smart cities
  22. A Privacy-Preserving Context Ontology (PPCO) for Smart Connected Toys
  23. Solving MAX-SAT Problem by Binary Biogeograph-based Optimization Algorithm
  24. Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild
  25. A Hybrid Soft Switching Full Bridge Converter Suitable for the Electric Vehicle Charge Applications
  26. A Predictive Model for Predicting Students Academic Performance
  27. ZigBee Security Vulnerabilities: Exploration and Evaluating
  28. Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches
  29. Memory Forensics: Recovering Chat Messages and Encryption Master Key
  30. Arabic Authorship Attribution
  31. A secure fog-based platform for SCADA-based IoT critical infrastructure
  32. Learning Stylometric Representations for Authorship Analysis
  33. A Hybrid Framework for Sentiment Analysis Using Genetic Algorithm Based Feature Reduction
  34. Wordnet-Based Criminal Networks Mining for Cybercrime Investigation
  35. Drone forensics: examination and analysis
  36. Robot Computing for Music Visualization
  37. Towards a Music Visualization on Robot (MVR) Prototype
  38. SafePath: Differentially-private publishing of passenger trajectories in transportation systems
  39. Intelligent Multi-Agent Collaboration Model for Smart Home IoT Security
  40. Smart Home Systems Security
  41. Opportunistic mining of top-n high utility patterns
  42. Security and privacy challenges in smart cities
  43. Drone Forensics: Challenges and New Insights
  44. Malware Classification with Deep Convolutional Neural Networks
  45. Remote Data Acquisition Using Raspberry Pi3
  46. A glance at research-driven university's technology transfer office in the UAE
  47. Differentially private multidimensional data publishing
  48. Charging infrastructure placement for electric vehicles: An optimization prospective
  49. SONAR
  50. Revealing determinant factors for early breast cancer recurrence by decision tree
  51. Fuzzy searching and routing in unstructured mobile peer-to-peer networks
  52. A Study of Children Facial Recognition for Privacy in Smart TV
  53. Forensic analysis of xbox one and playstation 4 gaming consoles
  54. Privacy Requirements for mobile e-Service in the Health Authority - Abu Dhabi (HAAD)
  55. Magec: An Image Searching Tool for Detecting Forged Images in Forensic Investigation
  56. White-Hat Hacking Framework for Promoting Security Awareness
  57. Multimedia File Signature Analysis for Smartphone Forensics
  58. Privacy-preserving data mashup model for trading person-specific information
  59. Towards A Self Adaptive System for Social Wellness
  60. Bounded message delay with threshold time constraint in delay tolerant networks (DTNs)
  61. Fuzzy Query Routing in Unstructured Mobile Peer-to-Peer Networks
  62. A Glance of Child’s Play Privacy in Smart Toys
  63. Fusion: Privacy-Preserving Distributed Protocol for High-Dimensional Data Mashup
  64. Fuzzy Logic-Based Guaranteed Lifetime Protocol for Real-Time Wireless Sensor Networks
  65. E-mail authorship attribution using customized associative classification
  66. Graph-theoretic characterization of cyber-threat infrastructures
  67. Identification and analysis of free games' permissions in Google Play
  68. Distributed Computing and Artificial Intelligence, 12th International Conference
  69. Testing the forensic soundness of forensic examination environments on bootable media
  70. A forensic analysis framework for recovering encryption keys and BB10 backup decryption
  71. Privacy-Preserving Medical Reports Publishing for Cluster Analysis
  72. An Approach for the Validation of File Recovery Functions in Digital Forensics' Software Tools
  73. Security Welcome Message
  74. Computer Profiling for Preliminary Forensic Examination
  75. CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection
  76. Towards a unified agent-based approach for real time computer forensic evidence collection
  77. A unified data mining solution for authorship analysis in anonymous textual communications
  78. Mining Criminal Networks from Chat Log
  79. Investigating the dark cyberspace: Profiling, threat-based analysis and correlation
  80. Mining writeprints from anonymous e-mails for forensic investigation
  81. Speaker verification from partially encrypted compressed speech for forensic investigation
  82. e-mail authorship verification for forensic investigation
  83. Towards an integrated e-mail forensic analysis framework
  84. A novel approach of mining write-prints for authorship attribution in e-mail forensics