All Stories

  1. On the efficiency of software implementations of lightweight block ciphers from the perspective of programming languages
  2. A name disambiguation module for intelligent robotic consultant in industrial internet of things
  3. MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems
  4. Enriching Non-negative Matrix Factorization with Contextual Embeddings for Recommender Systems
  5. Special issue: Cognitive Internet of Things assisted by cloud computing and big data
  6. AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis
  7. CATSWoTS: Context Aware Trustworthy Social Web of Things System
  8. Accelerated Dynamic MRI Using Kernel-Based Low Rank Constraint
  9. Trust models of internet of smart things: A survey, open issues, and future directions
  10. A Deep Learning Framework to Predict Rating for Cold Start Item Using Item Metadata
  11. Security Safety and Trust Management (SSTM' 19)
  12. iBike: Intelligent public bicycle services assisted by data analytics
  13. Smart e-commerce integration with recommender systems
  14. Auto-MeDiSine: an auto-tunable medical decision support engine using an automated class outlier detection method and AutoMLP
  15. Interaction and damage of nucleobases of DNA and RNA caused by silicon nanoparticle and crystalline silica: First principles study
  16. Fog computing in internet of things: Practical applications and future directions
  17. A complex event processing framework for an adaptive language learning system
  18. Framework for calculating Return On Security Investment (ROSI) for security-Oriented organizations
  19. Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices—A Review
  20. A Framework to Estimate the Nutritional Value of Food in Real Time Using Deep Learning Techniques
  21. A Framework to Determine Applications’ Authenticity
  22. Absorption spectra of iodine substituted coumarin 120
  23. Blockchain's adoption in IoT: The challenges, and a way forward
  24. DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks
  25. Delay Reduction Through Optimal Controller Placement to Boost Scalability in an SDDC
  26. Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations
  27. Incast Mitigation in a Data Center Storage Cluster Through a Dynamic Fair-Share Buffer Policy
  28. Mobile Intelligence Assisted by Data Analytics and Cognitive Computing
  29. A unified framework for automated inspection of handheld safety critical devices in production assemblies
  30. AndroKit: A toolkit for forensics analysis of web browsers on android platform
  31. Edge Computing in IoT-Based Manufacturing
  32. CrossRec: Cross-Domain Recommendations Based on Social Big Data and Cognitive Computing
  33. Quantum chemical investigation on molecular structure, vibrational, photophysical and nonlinear optical properties of l-threoninium picrate: an admirable contender for nonlinear applications
  34. Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art
  35. A hybrid-adaptive neuro-fuzzy inference system for multi-objective regression test suites optimization
  36. Correlation power analysis of modes of encryption in AES and its countermeasures
  37. Ease or Privacy? A Comprehensive Analysis of Android Embedded Adware
  38. Enhancing E-Healthcare Privacy Preservation Framework through L-Diversity
  39. Defence against PUE attacks in ad hoc cognitive radio networks: a mean field game approach
  40. Forensic investigation to detect forgeries in ASF files of contemporary IP cameras
  41. Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis
  42. Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review
  43. Information Diffusion Model Based on Social Big Data
  44. Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions
  45. Antenna and Propagation Considerations for Amateur UAV Monitoring
  46. Key functions analysis of a novel nonlinear optical D-π-A bridge type (2 E )-3-(4-Methylphenyl)-1-(3-nitrophenyl) prop-2-en-1-one chalcone: An experimental and theoretical approach
  47. Feasibility analysis for deploying national healthcare information system (NHIS) for Pakistan
  48. A first principles study of key electronic, optical, second and third order nonlinear optical properties of 3-(4-chlorophenyl)-1-(pyridin-3-yl) prop-2-en-1-one: a novel D- $$\pi $$ ...
  49. A Manufacturing Big Data Solution for Active Preventive Maintenance
  50. USB Storage Device Forensics for Windows 10
  51. Security, Safety and Trust Management (SSTM ‘17)
  52. Internet of things (IoT) design considerations for developers and manufacturers
  53. Adaptive Interference Cancellation of ECG Signals
  54. Security and privacy issues in cloud computing
  55. Fuzziness based semi-supervised learning approach for intrusion detection system
  56. First-principles study of interaction of serine with nucleobases of DNA and RNA
  57. Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems
  58. Algebraic Side Channel Attack on Trivium and Grain Ciphers
  59. A Survey of Authentication Schemes in Telecare Medicine Information Systems
  60. Electronic crime investigations in a virtualised environment: a forensic process and prototype for evidence collection and analysis
  61. Empirical Studies of ECG Multiple Fiducial-Points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform
  62. Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms
  63. A Detection and Prevention System against collaborative attacks in Mobile Ad hoc Networks
  64. Survey on cybersecurity issues in wireless mesh networks based eHealthcare
  65. A framework for cloud forensics evidence collection and analysis using security information and event management
  66. Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment
  67. Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges
  68. Guest editorial: Secure cloud computing for mobile health services
  69. Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems
  70. Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges
  71. Distributed denial of service (DDoS) attack detection using data mining approach in cloud-assisted wireless body area networks
  72. Analyzing Packet Forwarding Schemes for Selfish Behavior in MANETs
  73. Fluorescence quenching of rhodamine 6G by 1,3,5-Trinitroperhydro-1,3,5- triazine entrapped in porous sol–gel silica
  74. First principal studies of spectroscopic (IR and Raman, UV–visible), molecular structure, linear and nonlinear optical properties of l-arginine p-nitrobenzoate monohydrate (LANB): A new non-centrosymmetric material
  75. Feasibility analysis for incorporating/deploying SIEM for forensics evidence collection in cloud environment
  76. Data Warehousing Based Computer Forensics Investigation Framework
  77. A physico-chemical approach to study the experimental and theoretical properties of l-ornithine monohydrochloride: An organic nonlinear optical material
  78. Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks
  79. Anomaly Detection in Wireless Sensor Networks Using Immune-Based Bioinspired Mechanism
  80. Survey on Mobile User's Data Privacy Threats and Defense Mechanisms
  81. EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network
  82. A framework to address inconstant user requirements in cloud SLAs management
  83. Distributed Denial of Service (DDoS) Attack in Cloud- Assisted Wireless Body Area Networks: A Systematic Literature Review
  84. Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms
  85. Experimental and theoretical studies on bis(glycine) lithium nitrate (BGLiN): A physico-chemical approach
  86. A Survey on Network Layer Attacks and AODV Defense in Mobile Ad Hoc Networks
  87. Identifying an OpenID anti-phishing scheme for cyberspace
  88. On the ground and excited state of glycine–glutaric acid: A new organic material
  89. Neutral-neutral reactions for the formation of C3O and C3S
  90. Analyzing Feasibility for Deploying Very Fast Decision Tree for DDoS Attack Detection in Cloud-Assisted WBAN
  91. Security Requirements Specification Framework for Cloud Users
  92. Dynamically Changing Service Level Agreements (SLAs) Management in Cloud Computing
  93. Load Balanced Routing for Lifetime Maximization in Mobile Wireless Sensor Networks
  94. Cloud Computing Risk Assessment: A Systematic Literature Review
  95. A Cloud-based Healthcare Framework for Security and Patients’ Data Privacy Using Wireless Body Area Networks
  96. Physico chemical properties of l-asparagine l-tartaric acid single crystals: A new nonlinear optical material
  97. Anticipating Dormant Functionality in Malware: A Semantics Based Approach
  98. A Multi-agent Model for Fire Detection in Coal Mines Using Wireless Sensor Networks
  99. WLAN Location Privacy: A Client Server Based Architecture
  100. A framework for preservation of cloud users’ data privacy using dynamic reconstruction of metadata
  101. Secure SMS Based Automatic Device Pairing Approach for Mobile Phones
  102. A Hybrid Security Mechanism for Intra-WBAN and Inter-WBAN Communications
  103. Effect of thickness on the structural, optical and electrical properties of thermally evaporated PbI2 thin films
  104. First principle calculation of the photophysical properties of silylated coumarins 120 and 151
  105. User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment
  106. Theoretical investigation of the ground and excited state of silylated coumarin
  107. Addressing dynamic issues in information security management
  108. Thermally assisted ECR etching of CdTe in CCl2F2/Ar discharge under different gas flow ratio
  109. A Structured Approach for Internalizing Externalities Caused by IT Security Mechanisms
  110. Option Based Evaluation: Security Evaluation of IT Products Based on Options Theory
  111. Security characterization for evaluation of software architectures using ATAM
  112. Adaptability infrastructure for bridging IT security evaluation and options theory
  113. Increasing the Performance of Crab Linux Router Simulation Package Using XEN
  114. Spectroscopic study of sulforhodamine 640-doped sol–gel silica