• Securing Websites Against Homograph Attacks

  • Privacy Threat Analysis of Mobile Social Network Data Publishing

  • Fast and Robust Biometric Authentication Scheme Using Human Ear

  • Identification of Forensic Artifacts in VMWare Virtualized Computing

  • Manipulating the Five V’s in the Next Generation Air Transportation System

  • Sensitive Data in Smartphone Applications: Where Does It Go? Can It Be Intercepted?

  • Fault-Tolerant and Scalable Key Management Protocol for IoT-Based Collaborative Groups

  • SAFEDroid: Using Structural Features for Detecting Android Malwares

  • Securing Healthcare Data Using Biometric Authentication

  • Privacy in Social Media

  • A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV)

  • A Framework for Acquiring and Analyzing Traces from Cryptographic Devices

  • A Classified Slot Re-allocation Algorithm for Synchronous Directional Ad Hoc Networks

  • A Pseudo Random Sequence Based Multichannel MAC Protocol for Directional Ad Hoc Networks

  • Collision Scattering Through Multichannel in Synchronous Directional Ad Hoc Networks

  • Lake-Level Prediction Leveraging Deep Neural Network

  • Coordinate-Free Boundary Nodes Identification by Angle Comparison in Wireless Sensor Networks

  • A Short Review on Sleep Scheduling Mechanism in Wireless Sensor Networks

  • Handoff Prediction for Femtocell Network in Indoor Environment Using Hidden Markov Model

  • Community Preserving Sign Prediction for Weak Ties of Complex Networks

  • Self-organized Resource Allocation Based on Traffic Prediction for Load Imbalance in HetNets with NOMA

  • PySNS3: A Real-Time Communication Interface and Protocol for Vehicular Ad-Hoc Networks

  • Key Technologies of MEC Towards 5G-Enabled Vehicular Networks

  • Reliable Mutual Node Evaluation for Trust-Based OLSR in Tactical MANETs

  • Performance Analysis for Content Distribution in Crowdsourced Content-Centric Mobile Networking

  • Contact Quality Aware Routing for Satellite-Terrestrial Delay Tolerant Network

  • Semi-fragile Watermarking Algorithm Based on Arnold Scrambling for Three-Layer Tamper Localization and Restoration

  • A Situation-Aware Road Emergency Navigation Mechanism Based on GPS and WSNs

  • HFA-MD: An Efficient Hybrid Features Analysis Based Android Malware Detection Method

  • TALENTED: An Advanced Guarantee Public Order Tool for Urban Inspectors

  • On the Use of Smart Wearable Technology for Gynecology and Obstetrics Care

  • Joint Optimization of Latency Monitoring and Traffic Scheduling in Software Defined Heterogeneous Networks

  • A Comprehensive Analysis of Video Service Quality on IQIYI from Large-Scale Data Sets

  • An Interference Management Strategy for Dynamic TDD in Ultra-dense Networks

  • An Edge Caching Strategy for Minimizing User Download Delay

  • You Can Write Numbers Accurately on Your Hand with Smart Acoustic Sensing

  • Classification-Based Reputation Mechanism for Master-Worker Computing System

  • Knowledge Extraction Using Web Usage Mining

  • Selective Jamming of LoRaWAN using Commodity Hardware

  • A Group-based Fault Tolerant Mechanism for Heterogeneous Mobile Clouds

  • Duck Attack on Accountable Distributed Systems

  • Drone Services for Augmenting Mobile User Devices On-Demand: Concept and Prototype

  • The Ubiquitous Device Transition Experience of the Mobile User

  • Vehicular Cooperation to Overcome the Car Park Challenge

  • Less is More: Learning More with Concurrent Transmissions for Energy-Efficient Flooding

  • WiPush: Opportunistic Notifications over WiFi without Association

  • Understanding Vulnerabilities of Location Privacy Mechanisms against Mobility Prediction Attacks

  • CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps

  • Follow The Best: Crowdsourced Automated Travel Advice

  • Markov Dynamic Subsequence Ensemble for Energy-Efficient Activity Recognition