Follow

Submissions from 2021

PDF

A blockchain-based authentication protocol for cooperative vehicular ad hoc network, A. F. M. S. Akhter, Mohiuddin Ahmed, A. F. M. S. Shah, Adnan Anwar, A. S. M. Kayes, and Ahmet Zengin

PDF

A secured privacy-preserving multi-level blockchain framework for cluster based VANET, A. F.M.Suaib Akhter, Mohiuddin Ahmed, A. F.M.Shahen Shah, Adnan Anwar, and Ahmet Zengin

Link

Advanced cowrie configuration to increase honeypot deceptiveness, Warren Z. Cabral, Craig Valli, Leslie F. Sikos, and Samuel G. Wakeling

PDF

An energy-efficient and secure data inference framework for internet of health things: A pilot study, James Jin Kang, Mahdi Dibaei, Gang Luo, Wencheng Yang, Paul Haskell-Dowland, and Xi Zheng

Link

Reducing attack surface of edge computing IoT networks via hybrid routing using dedicated nodes, James Jin Kang, Leslie F. Sikos, and Wencheng Yang

PDF

Digital forensic readiness intelligence crime repository, Victor R. Kebande, Nickson M. Karie, Kim-Kwang R. Choo, and Sadi Alawadi

PDF

Digital forensic readiness in operational cloud leveraging ISO/IEC 27043 guidelines on security monitoring, Sheunesu Makura, H. S. Venter, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, and Sadi Alawadi

Submissions from 2020

PDF

No soldiers left behind: An IoT-based low-power military mobile health system design, James Jin Kang, Wencheng Yang, Gordana Dermody, Mohammadreza Ghasemian, Sasan Adibi, and Paul Haskell-Dowland

PDF

Ontology‐driven perspective of CFRaaS, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, and Hein S. Venter

PDF

A network perspective of knowledge transfer in tourism, Hossein Raisi, Rodolfo Baggio, Llandis Barratt-Pugh, and Gregory Willson

Link

Security and forensics in the Internet of Things: Research advances and challenges, Wencheng Yang, Michael N. Johnstone, Leslie F. Sikos, and Song Wang

Link

Secure fingerprint authentication with homomorphic encryption, Wencheng Yang, Song Wang, Kan Yu, James Jin Kang, and Michael N. Johnstone