Design of a Secure Disaster Notification System Using the Smartphone Based Beacon |
Jae Pil Lee, Jae Gwang Lee, Jun hyeon Lee, Ki-su Yoon and Jae Kwang Lee, Han Nam University, Korea |
Volume : 6 volume number : 15 pdf |
Security for Software-Defined (Cloud, SDN and NFV) Infrastructures - Issues and Challenges |
Sara Farahmandian and Doan B Hoang, University of Technology Sydney, Australia |
Volume : 6 volume number : 15 pdf |
Return Oriented Obfuscation |
Vivek Balachandran1, Sabu Emmanuel2 and Ng Wee Keong3, 1Singapore Institute of Technology, Singapore, 2Kuwait University, Kuwait and 3Nanyang Technological University, Singapore |
Volume : 6 volume number : 15 pdf |
RITA Secure Communication Protocol : Application to SCADA |
Fadi Obeid and Philippe Dhaussy, Ensta Bretagne, France |
Volume : 6 volume number : 15 pdf |
Exploring Critical Success Factors for Cybersecurity in Bhutan's Government Organizations |
Pema Choejey, David Murray and Chun Che Fung, Murdoch University, Australia |
Volume : 6 volume number : 15 pdf |
DMIA : A Malware Detection System on IOS Platform |
Hongliang Liang, Yilun Xie and Yan Song, Beijing University of Posts and Telecommunications, China |
Volume : 6 volume number : 15 pdf |
Performance Comparison DCM versus QPSK for High Data Rates in the MBOFDM UWB System |
Naziha NOURI, Asma MESSAOUDI and Ridha BOUALLEGUE, Higher School of Communications of Tunis, Tunisia |
Volume : 6 volume number : 15 pdf |
Waveform Comparison and Nonlinearity Sensitivities of FBMC, UFMC and W-OFDM Systems |
Changyoung An, Byeongjae Kim and Heung-Gyoon Ryu, Chungbuk National University, Korea |
Volume : 6 volume number : 15 pdf |
Interference Suppressing Receiver Technique for Wireless Ad Hoc Networks |
Sunho Park and Byonghyo Shim, Seoul National University, Korea |
Volume : 6 volume number : 15 pdf |
A Dynamic Route Discovery Scheme for Heterogeneous Wireless Sensor Networks Based on Polychromatic Sets Theory |
Dong Wang1, Xinheng Wang1 and Hong-Hsu Yen2, 1University of the West of Scotland, UK and 2Shih Hsin University, Taiwan |
Volume : 6 volume number : 15 pdf |
An Efficient Deployment Approach for Improved Coverage in Wireless Sensor Networks Based on Flower Pollination Algorithm |
Faten Hajjej, Ridha Ejbali and Mourad Zaied, Research Group on Intelligent Machines (REGIM-Lab) Sfax, Tunisia |
Volume : 6 volume number : 15 pdf |
Sharp or Blur : A Fast No-Reference Quality Metric for Realistic Photos |
Fan Zhang, Lenovo Research, China |
Volume : 6 volume number : 15 pdf |
A Binary to Residue Conversion Using New Proposed Non-Coprime Moduli Set |
Mansour Bader1, Andraws Swidan1, Mazin Al-hadidi2 and Baha Rababah3, 1Jordan University, Jordan, 2Al-Balqa'a Applied University, Jordan and 3University of Portsmouth, UK |
Volume : 6 volume number : 15 pdf |
Albay Emergency Response and Report Tool (Alerrt) |
Elmer Figuracion, Thelma Palaoag, Dennis Ignacio and Mary Jane Doblon, University of the Cordilleras, Philippines |
Volume : 6 volume number : 15 pdf |
An Efficient Recovery Scheme for Buffer-Based B-Tree Indexes on Flash Memory |
VanPhi Ho, Seung-Joo Jeong, Dong-Joo Park, Soongsil University, Korea |
Volume : 6 volume number : 15 pdf |
An Empirical Study of Using Cloud-Based Services in Capstone Project Development |
Zhiguang Xu, Valdosta State University, USA |
Volume : 6 volume number : 15 pdf |
Wi-Fi Fingerprint Based Approach to Securing the Connected Vehicle Against Wireless Attack |
Hyeokchan Kwon, Sokjoon Lee and Byung-ho Chung, Electronics and Telecommunications Research Institute, Republic of Korea |
Volume : 6 volume number : 15 pdf |