• Probability Risk Identification Based Intrusion Detection System for SCADA Systems

  • Homomorphic Evaluation of Database Queries

  • Quantum Authentication Scheme Based on Fingerprint-Encoded Graph States

  • Anonymizing NN Classification on MapReduce

  • A Variant of BLS Signature Scheme with Tight Security Reduction

  • A Cancellable Ranking Based Hashing Method for Fingerprint Template Protection

  • Persistent vs Service IDs in Android: Session Fingerprinting from Apps

  • Performance Assessment of Cloud Migrations from Network and Application Point of View

  • A Robust Contactless Fingerprint Enhancement Algorithm

  • CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains

  • Malicious Bitcoin Transaction Tracing Using Incidence Relation Clustering

  • Factor Effects for Routing in a Delay-Tolerant Wireless Sensor Network for Lake Environment Monitoring

  • Performance Comparison of Distributed Pattern Matching Algorithms on Hadoop MapReduce Framework

  • Cooperative Information Security/Cybersecurity Curriculum Development

  • An Approach for Host-Based Intrusion Detection System Design Using Convolutional Neural Network

  • A Cloud Service Enhanced Method Supporting Context-Aware Applications

  • Offloading of Fog Data Networks with Network Coded Cooperative D2D Communications

  • The Public Verifiability of Public Key Encryption with Keyword Search

  • Fog Computing as a Critical Link Between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs

  • Estimating Public Opinion in Social Media Content Using Aspect-Based Opinion Mining

  • Cryptanalysis of Salsa and ChaCha: Revisited

  • An Energy Saving Mechanism Based on Vacation Queuing Theory in Data Center Networks

  • Application of Fuzzy Comprehensive Evaluation Method for Reservoir Well Logging Interpretation While Drilling

  • Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques

  • A Cache-Aware Congestion Control for Reliable Transport in Wireless Sensor Networks

  • A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources

  • Robust Fingerprint Matching Based on Convolutional Neural Networks

  • Application of 3D Delaunay Triangulation in Fingerprint Authentication System

  • Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning

  • A Personalized Multi-keyword Ranked Search Method Over Encrypted Cloud Data

  • Towards a cloud consumers credibility assessment and trust management of cloud services

  • NIS directive: The case of Greece

  • The performance analysis of public key cryptography-based authentication

  • An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks

  • VaultIME: Regaining User Control for Password Managers through Auto-correction

  • Human-centered strategies for cyber-physical systems security

  • An Energy-Efficient Localization-Based Geographic Routing Protocol for Underwater Wireless Sensor Networks

  • Application Scheme of PKI System in Wireless Medical Data Transmission Network

  • One Division-Multiplexed of Control Code Based on Quantum Secure Direct Communication

  • A Markov Decision Based Optimization on Bundle Size over Two-Hop Inter-satellite Links

  • Analysis of Crowdsourcing Based Multiple Cellular Network: A Game Theory Approach

  • A New Model for Cooperative Cognitive Radio Network Using Coalitional Game

  • Power Allocation for Full Duplex Decode-and-Forward Cooperative Relay System

  • Optimization of Density-Based K-means Algorithm in Trajectory Data Clustering

  • Research on Interference Energy Harvesting Based on SWIPT Relay System

  • Fuzzy Logic Load-Balancing Strategy Based on Software-Defined Networking

  • A Haze Prediction Algorithm Based on PCA-BP Neural Network

  • Cluster-Based Cooperative Data Service for VANETs

  • Improving Multiple-Instance Learning via Disambiguation by Considering Generalization

  • Stabilization Control Design for Network Switched System with Communication Constrains