|
Distributed Privacy Preserving Platform for Ridesharing Services |
|
|
1 | (14) |
|
|
|
Ransom ware Attack Protection: A Cryptographic Approach |
|
|
15 | (11) |
|
|
|
|
|
|
|
A Lightweight Secure Communication Protocol for IoT Devices Using Physically Unclonable Function |
|
|
26 | (10) |
|
|
|
|
Blockchain-Based Mobility Management for LTE and Beyond |
|
|
36 | (14) |
|
|
|
EPT: EDNS Privacy Tunnel for DNS |
|
|
50 | (13) |
|
|
|
|
|
Ensuring Data Integrity in Fog Computing Based Health-Care Systems |
|
|
63 | (15) |
|
|
|
Modelling Security Requirements for Software Development with Common Criteria |
|
|
78 | (11) |
|
|
|
|
Visualization of DNS Tunneling Attacks Using Parallel Coordinates Technique |
|
|
89 | (13) |
|
|
|
A Data-Driven Network Intrusion Detection Model Based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection |
|
|
102 | (15) |
|
|
|
Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning |
|
|
117 | (16) |
|
|
|
|
|
|
End-to-End Encryption Schemes for Online Social Networks |
|
|
133 | (14) |
|
|
|
Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data |
|
|
147 | (10) |
|
|
|
|
|
Paper Document Authentication Using Print-Scan Resistant Image Hashing and Public-Key Cryptography |
|
|
157 | (9) |
|
|
|
TLShps: SDN-Based TLS Handshake Protocol Simplification for IoT |
|
|
166 | (17) |
|
|
|
|
Data Protection Labware for Mobile Security |
|
|
183 | (13) |
|
|
|
|
|
|
|
|
Multi-round Bidding Strategy Based on Game Theory for Crowdsensing Task |
|
|
196 | (15) |
|
|
|
|
|
Information Leakage in Wearable Applications |
|
|
211 | (14) |
|
|
|
An Encryption-Based Approach to Protect Fog Federations from Rogue Nodes |
|
|
225 | (19) |
|
|
|
Python Scrapers for Scraping Cryptomarkets on Tor |
|
|
244 | (17) |
|
|
|
|
|
|
|
|
|
|
Mohammad Javad Feizollahi |
|
|
|
|
Characteristics of Bitcoin Transactions on Cryptomarkets |
|
|
261 | (16) |
|
|
|
|
|
Mohammad Javad Feizollahi |
|
|
|
|
|
|
Effectiveness of Machine Learning Based Intrusion Detection Systems |
|
|
277 | (12) |
|
|
|
|
DNS Flood Attack Mitigation Utilizing Hot-Lists and Stale Content Updates |
|
|
289 | (8) |
|
|
|
Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking |
|
|
297 | (12) |
|
|
|
|
|
|
Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation Industry |
|
|
309 | (16) |
|
|
|
Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching |
|
|
325 | (11) |
|
|
|
|
|
|
|
|
Using Machine Learning to Find Anomalies in Field Bus Network Traffic |
|
|
336 | (18) |
|
|
|
|
|
Cyber Weapons Storage Mechanisms |
|
|
354 | (14) |
|
|
|
|
A New Intrusion Detection System Based on Gated Recurrent Unit (GRU) and Genetic Algorithm |
|
|
368 | (16) |
|
|
|
Topic Model Based Android Malware Detection |
|
|
384 | (13) |
|
|
|
|
|
|
A Verifiable Encryption Scheme Supporting Fuzzy Search |
|
|
397 | (15) |
|
|
|
|
A Verifiable Fully Homomorphic Encryption Scheme |
|
|
412 | (15) |
|
|
|
|
Secure Communication in UAV Assisted HetNets: A Proposed Model |
|
|
427 | (14) |
|
|
|
|
|
|
Detection of Application-Layer Tunnels with Rules and Machine Learning |
|
|
441 | (15) |
|
|
|
|
An Anonymous Protocol for Member Privacy in a Consortium Blockchain |
|
|
456 | (9) |
|
|
|
|
|
Automated Construction of Malware Families |
|
|
465 | (10) |
|
|
|
A Closer Look at Anonymous Proxy Re-Encryption Schemes |
|
|
475 | (15) |
|
|
|
|
|
Approximate String Matching for DNS Anomaly Detection |
|
|
490 | (15) |
|
|
Author Index |
|
505 | |