


default search action
1st ACeS 2019: Penang, Malaysia
- Mohammed Anbar
, Nibras Abdullah
, Selvakumar Manickam
:
Advances in Cyber Security - First International Conference, ACeS 2019, Penang, Malaysia, July 30 - August 1, 2019, Revised Selected Papers. Communications in Computer and Information Science 1132, Springer 2020, ISBN 978-981-15-2692-3
Internet of Things, Industry and Blockchain, and Cryptology
- Hasventhran Baskaran, Salman Yussof, Fiza Abdul Rahim
:
A Survey on Privacy Concerns in Blockchain Applications and Current Blockchain Solutions to Preserve Data Privacy. 3-17 - Syeda Mariam Muzammal
, Raja Kumar Murugesan
:
A Study on Secured Authentication and Authorization in Internet of Things: Potential of Blockchain Technology. 18-32 - Abigail Achiamma Joshua, Samanza Kishwar Parvez, Weng Ken Lee, Ee Xion Tan
:
Patterns and Colors: A Simple yet Innovative Way to Solve Pattern Tracking. 33-45 - Zhen-Kai Wong, Swee-Huay Heng
:
Blockchain-Based Image Sharing Application. 46-59 - Wai Kok Chan, Ji-Jian Chin
, Vik Tor Goh:
Proof of Bid as Alternative to Proof of Work. 60-73 - Sérgio Luís Ribeiro, Emilio Tissato Nakamura:
Context-Based Blockchain Platform Definition and Analysis Methodology. 74-88 - Taha H. Rassem
, Nasrin M. Makbol
, Bee Ee Khoo
:
Performance Evaluation of Wavelet SVD-Based Watermarking Schemes for Color Images. 89-103 - Ahmed M. Elmisery
, Mirela Sertovic:
Privacy Preserving Threat Hunting in Smart Home Environments. 104-120
Digital Forensics and Surveillance, Botnet and Malware, and DDoS and Intrusion Detection/Prevention
- Parminder Singh
, Shafiq Ul Rehman
, Selvakumar Manickam
:
Performance Analysis of EMM an EDoS Mitigation Technique in Cloud Computing Environment. 123-137 - Mohammad Abdelkareem Alarqan, Zarul Fitri Zaaba, Ammar Almomani
:
Detection Mechanisms of DDoS Attack in Cloud Computing Environment: A Survey. 138-152 - Abdullah Ahmed Bahashwan
, Mohammed Anbar
, Sabri M. Hanshi:
Overview of IPv6 Based DDoS and DoS Attacks Detection Mechanisms. 153-167 - Alhamza Munther
, Imad J. Mohammed
, Mohammed Anbar
, Anwer Mustafa Hilal:
Performance Evaluation for Four Supervised Classifiers in Internet Traffic Classification. 168-181 - Vasaki Ponnusamy, Chan Mee Yee, Adnan Bin Amanat Ali:
Mobile Authentication Using Tapping Behavior. 182-194 - Siti-Farhana Lokman
, Abu Talib Othman, Muhamad-Husaini Abu-Bakar, Shahrulniza Musa
:
The Impact of Different Feature Scaling Methods on Intrusion Detection for in-Vehicle Controller Area Network (CAN). 195-205 - Maneesh Darisi, Janhavi Savla, Mahesh Shirole, Sunil Bhirud:
STEM: Secure Token Exchange Mechanisms. 206-219 - Philip Lebedev, Konstantin Kogos
, Egor Vasilenko:
On Way to Simplify the Reverse Engineering of UEFI Firmwares. 220-231
Ambient Cloud and Edge Computing, Wireless and Cellular Communication
- Yean Li Ho
, Siong-Hoe Lau
, Afizan Azman:
Comparison Between BlindLogin and Other Graphical Password Authentication Systems. 235-246 - Muhammad Rizwan Ghori
, Tat Chee Wan, Gian Chand Sodhy:
Bluetooth Low Energy 5 Mesh Based Hospital Communication Network (B5MBHCN). 247-261 - Wong G. Shun, Wan Mariam Wan Muda
, Wan Hafiza Wan Hassan
, A. Z. Annuar
:
Wireless Sensor Network for Temperature and Humidity Monitoring Systems Based on NodeMCU ESP8266. 262-273 - Yichiet Aun
, Ming-Lee Gan
, Yen-Min Jasmina Khaw
:
Automatic Attendance Taking: A Proof of Concept on Privacy Concerns in 802.11 MAC Address Probing. 274-288 - Abid Murtaza, Syed Jahanzeb Hussain Pirzada, Muhammad Noman Hasan
, Tongge Xu, Jianwei Liu
:
An Efficient Encryption Algorithm for Perfect Forward Secrecy in Satellite Communication. 289-302
Social Media, Mobile and Web, Data Policy, and Privacy and Fake News
- Hala A. Albaroodi, Mohammed Abomaali
, Selvakumar Manickam
:
Iraqi's Organizations Awareness to Prompt Open Source Cloud Computing (OSCC) in Their Service: A Study. 305-319 - Christine Lim Xin Yi, Zarul Fitri Zaaba, Mohamad Amar Irsyad Mohd Aminuddin
:
Appraisal on User's Comprehension in Security Warning Dialogs: Browsers Usability Perspective. 320-334 - Farah Nor Aliah Ahmad, Zarul Fitri Zaaba, Mohamad Amar Irsyad Mohd Aminuddin
, Nasuha Lee Abdullah:
Empirical Investigations on Usability of Security Warning Dialogs: End Users Experience. 335-349 - Ji-Jian Chin
, Yvonne Hwei-Syn Kam, Vik Tor Goh:
Vulnerabilities in Online Food Ordering Website. 350-357 - Ahmed Al-Charchafchi
, Selvakumar Manickam
, Zakaria N. M. Alqattan:
Threats Against Information Privacy and Security in Social Networks: A Review. 358-372

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.