


default search action
1st ACeS 2019: Penang, Malaysia
- Mohammed Anbar

, Nibras Abdullah
, Selvakumar Manickam
:
Advances in Cyber Security - First International Conference, ACeS 2019, Penang, Malaysia, July 30 - August 1, 2019, Revised Selected Papers. Communications in Computer and Information Science 1132, Springer 2020, ISBN 978-981-15-2692-3
Internet of Things, Industry and Blockchain, and Cryptology
- Hasventhran Baskaran, Salman Yussof, Fiza Abdul Rahim

:
A Survey on Privacy Concerns in Blockchain Applications and Current Blockchain Solutions to Preserve Data Privacy. 3-17 - Syeda Mariam Muzammal

, Raja Kumar Murugesan
:
A Study on Secured Authentication and Authorization in Internet of Things: Potential of Blockchain Technology. 18-32 - Abigail Achiamma Joshua, Samanza Kishwar Parvez, Weng Ken Lee, Ee Xion Tan

:
Patterns and Colors: A Simple yet Innovative Way to Solve Pattern Tracking. 33-45 - Zhen-Kai Wong, Swee-Huay Heng

:
Blockchain-Based Image Sharing Application. 46-59 - Wai Kok Chan, Ji-Jian Chin

, Vik Tor Goh
:
Proof of Bid as Alternative to Proof of Work. 60-73 - Sérgio Luís Ribeiro, Emilio Tissato Nakamura:

Context-Based Blockchain Platform Definition and Analysis Methodology. 74-88 - Taha H. Rassem

, Nasrin M. Makbol
, Bee Ee Khoo
:
Performance Evaluation of Wavelet SVD-Based Watermarking Schemes for Color Images. 89-103 - Ahmed M. Elmisery

, Mirela Sertovic:
Privacy Preserving Threat Hunting in Smart Home Environments. 104-120
Digital Forensics and Surveillance, Botnet and Malware, and DDoS and Intrusion Detection/Prevention
- Parminder Singh

, Shafiq Ul Rehman
, Selvakumar Manickam
:
Performance Analysis of EMM an EDoS Mitigation Technique in Cloud Computing Environment. 123-137 - Mohammad Abdelkareem Alarqan, Zarul Fitri Zaaba, Ammar Almomani

:
Detection Mechanisms of DDoS Attack in Cloud Computing Environment: A Survey. 138-152 - Abdullah Ahmed Bahashwan

, Mohammed Anbar
, Sabri M. Hanshi:
Overview of IPv6 Based DDoS and DoS Attacks Detection Mechanisms. 153-167 - Alhamza Munther

, Imad J. Mohammed
, Mohammed Anbar
, Anwer Mustafa Hilal:
Performance Evaluation for Four Supervised Classifiers in Internet Traffic Classification. 168-181 - Vasaki Ponnusamy, Chan Mee Yee, Adnan Bin Amanat Ali:

Mobile Authentication Using Tapping Behavior. 182-194 - Siti-Farhana Lokman

, Abu Talib Othman, Muhamad-Husaini Abu-Bakar, Shahrulniza Musa
:
The Impact of Different Feature Scaling Methods on Intrusion Detection for in-Vehicle Controller Area Network (CAN). 195-205 - Maneesh Darisi, Janhavi Savla, Mahesh Shirole

, Sunil Bhirud:
STEM: Secure Token Exchange Mechanisms. 206-219 - Philip Lebedev, Konstantin Kogos

, Egor Vasilenko:
On Way to Simplify the Reverse Engineering of UEFI Firmwares. 220-231
Ambient Cloud and Edge Computing, Wireless and Cellular Communication
- Yean Li Ho

, Siong-Hoe Lau
, Afizan Azman:
Comparison Between BlindLogin and Other Graphical Password Authentication Systems. 235-246 - Muhammad Rizwan Ghori

, Tat Chee Wan, Gian Chand Sodhy:
Bluetooth Low Energy 5 Mesh Based Hospital Communication Network (B5MBHCN). 247-261 - Wong G. Shun, Wan Mariam Wan Muda

, Wan Hafiza Wan Hassan
, A. Z. Annuar
:
Wireless Sensor Network for Temperature and Humidity Monitoring Systems Based on NodeMCU ESP8266. 262-273 - Yichiet Aun

, Ming-Lee Gan
, Yen-Min Jasmina Khaw
:
Automatic Attendance Taking: A Proof of Concept on Privacy Concerns in 802.11 MAC Address Probing. 274-288 - Abid Murtaza, Syed Jahanzeb Hussain Pirzada, Muhammad Noman Hasan

, Tongge Xu, Jianwei Liu
:
An Efficient Encryption Algorithm for Perfect Forward Secrecy in Satellite Communication. 289-302
Social Media, Mobile and Web, Data Policy, and Privacy and Fake News
- Hala A. Albaroodi, Mohammed Abomaali

, Selvakumar Manickam
:
Iraqi's Organizations Awareness to Prompt Open Source Cloud Computing (OSCC) in Their Service: A Study. 305-319 - Christine Lim Xin Yi, Zarul Fitri Zaaba, Mohamad Amar Irsyad Mohd Aminuddin

:
Appraisal on User's Comprehension in Security Warning Dialogs: Browsers Usability Perspective. 320-334 - Farah Nor Aliah Ahmad, Zarul Fitri Zaaba, Mohamad Amar Irsyad Mohd Aminuddin

, Nasuha Lee Abdullah:
Empirical Investigations on Usability of Security Warning Dialogs: End Users Experience. 335-349 - Ji-Jian Chin

, Yvonne Hwei-Syn Kam, Vik Tor Goh
:
Vulnerabilities in Online Food Ordering Website. 350-357 - Ahmed Al-Charchafchi

, Selvakumar Manickam
, Zakaria N. M. Alqattan:
Threats Against Information Privacy and Security in Social Networks: A Review. 358-372

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














