• Malicious Bitcoin Transaction Tracing Using Incidence Relation Clustering

  • Factor Effects for Routing in a Delay-Tolerant Wireless Sensor Network for Lake Environment Monitoring

  • Performance Comparison of Distributed Pattern Matching Algorithms on Hadoop MapReduce Framework

  • Cooperative Information Security/Cybersecurity Curriculum Development

  • An Approach for Host-Based Intrusion Detection System Design Using Convolutional Neural Network

  • A Cloud Service Enhanced Method Supporting Context-Aware Applications

  • Offloading of Fog Data Networks with Network Coded Cooperative D2D Communications

  • The Public Verifiability of Public Key Encryption with Keyword Search

  • Fog Computing as a Critical Link Between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs

  • Estimating Public Opinion in Social Media Content Using Aspect-Based Opinion Mining

  • Cryptanalysis of Salsa and ChaCha: Revisited

  • An Energy Saving Mechanism Based on Vacation Queuing Theory in Data Center Networks

  • Application of Fuzzy Comprehensive Evaluation Method for Reservoir Well Logging Interpretation While Drilling

  • Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques

  • A Cache-Aware Congestion Control for Reliable Transport in Wireless Sensor Networks

  • A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources

  • Robust Fingerprint Matching Based on Convolutional Neural Networks

  • Application of 3D Delaunay Triangulation in Fingerprint Authentication System

  • Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning

  • A Personalized Multi-keyword Ranked Search Method Over Encrypted Cloud Data

  • Towards a cloud consumers credibility assessment and trust management of cloud services

  • NIS directive: The case of Greece

  • The performance analysis of public key cryptography-based authentication

  • An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks

  • VaultIME: Regaining User Control for Password Managers through Auto-correction