| Design of a Secure Disaster Notification System Using the Smartphone Based Beacon |
| Jae Pil Lee, Jae Gwang Lee, Jun hyeon Lee, Ki-su Yoon and Jae Kwang Lee, Han Nam University, Korea |
| Volume : 6 volume number : 15 pdf |
| Security for Software-Defined (Cloud, SDN and NFV) Infrastructures - Issues and Challenges |
| Sara Farahmandian and Doan B Hoang, University of Technology Sydney, Australia |
| Volume : 6 volume number : 15 pdf |
| Return Oriented Obfuscation |
| Vivek Balachandran1, Sabu Emmanuel2 and Ng Wee Keong3, 1Singapore Institute of Technology, Singapore, 2Kuwait University, Kuwait and 3Nanyang Technological University, Singapore |
| Volume : 6 volume number : 15 pdf |
| RITA Secure Communication Protocol : Application to SCADA |
| Fadi Obeid and Philippe Dhaussy, Ensta Bretagne, France |
| Volume : 6 volume number : 15 pdf |
| Exploring Critical Success Factors for Cybersecurity in Bhutan's Government Organizations |
| Pema Choejey, David Murray and Chun Che Fung, Murdoch University, Australia |
| Volume : 6 volume number : 15 pdf |
| DMIA : A Malware Detection System on IOS Platform |
| Hongliang Liang, Yilun Xie and Yan Song, Beijing University of Posts and Telecommunications, China |
| Volume : 6 volume number : 15 pdf |
| Performance Comparison DCM versus QPSK for High Data Rates in the MBOFDM UWB System |
| Naziha NOURI, Asma MESSAOUDI and Ridha BOUALLEGUE, Higher School of Communications of Tunis, Tunisia |
| Volume : 6 volume number : 15 pdf |
| Waveform Comparison and Nonlinearity Sensitivities of FBMC, UFMC and W-OFDM Systems |
| Changyoung An, Byeongjae Kim and Heung-Gyoon Ryu, Chungbuk National University, Korea |
| Volume : 6 volume number : 15 pdf |
| Interference Suppressing Receiver Technique for Wireless Ad Hoc Networks |
| Sunho Park and Byonghyo Shim, Seoul National University, Korea |
| Volume : 6 volume number : 15 pdf |
| A Dynamic Route Discovery Scheme for Heterogeneous Wireless Sensor Networks Based on Polychromatic Sets Theory |
| Dong Wang1, Xinheng Wang1 and Hong-Hsu Yen2, 1University of the West of Scotland, UK and 2Shih Hsin University, Taiwan |
| Volume : 6 volume number : 15 pdf |
| An Efficient Deployment Approach for Improved Coverage in Wireless Sensor Networks Based on Flower Pollination Algorithm |
| Faten Hajjej, Ridha Ejbali and Mourad Zaied, Research Group on Intelligent Machines (REGIM-Lab) Sfax, Tunisia |
| Volume : 6 volume number : 15 pdf |
| Sharp or Blur : A Fast No-Reference Quality Metric for Realistic Photos |
| Fan Zhang, Lenovo Research, China |
| Volume : 6 volume number : 15 pdf |
| A Binary to Residue Conversion Using New Proposed Non-Coprime Moduli Set |
| Mansour Bader1, Andraws Swidan1, Mazin Al-hadidi2 and Baha Rababah3, 1Jordan University, Jordan, 2Al-Balqa'a Applied University, Jordan and 3University of Portsmouth, UK |
| Volume : 6 volume number : 15 pdf |
| Albay Emergency Response and Report Tool (Alerrt) |
| Elmer Figuracion, Thelma Palaoag, Dennis Ignacio and Mary Jane Doblon, University of the Cordilleras, Philippines |
| Volume : 6 volume number : 15 pdf |
| An Efficient Recovery Scheme for Buffer-Based B-Tree Indexes on Flash Memory |
| VanPhi Ho, Seung-Joo Jeong, Dong-Joo Park, Soongsil University, Korea |
| Volume : 6 volume number : 15 pdf |
| An Empirical Study of Using Cloud-Based Services in Capstone Project Development |
| Zhiguang Xu, Valdosta State University, USA |
| Volume : 6 volume number : 15 pdf |
| Wi-Fi Fingerprint Based Approach to Securing the Connected Vehicle Against Wireless Attack |
| Hyeokchan Kwon, Sokjoon Lee and Byung-ho Chung, Electronics and Telecommunications Research Institute, Republic of Korea |
| Volume : 6 volume number : 15 pdf |