Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 160, Issue C2019
Publisher:
  • Elsevier Science Publishers B. V.
  • PO Box 211 1000 AE Amsterdam
  • Netherlands
ISSN:1877-0509
EISSN:1877-0509
Bibliometrics
front-matter
Contents
editorial
Preface
editorial
Preface
editorial
editorial
editorial
research-article
Exploiting stack-based buffer overflow using modern day techniques
Abstract

One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow. The buffer overflow occurs when a program, while writing data to a buffer, overruns the buffer’s boundary and overwrites ...

research-article
Efficiently Predicting Frequent Patterns over Uncertain Data Streams
Abstract

In recent decades, frequent pattern mining has become popular in real time computing because it helps users extract meaningful business or technical trends over uncertain data streams. Generally, mainstream frequent pattern mining approaches can ...

research-article
Validation of SDN policies: a property-based testing perspective
Abstract

Software-defined networks are being widely adopted and used in large and complex networks supporting critical operations. Their increasing importance highlights the need for effective validation of SDN topologies and routing policies both prior ...

research-article
Ateb-Gabor Filtering Method in Fingerprint Recognition
Abstract

A new filtration method of Ateb-Gabor for biometric security systems has been developed. It is substantiated that the developed method possesses all the properties of the classic Gabor filter. This greatly extends the functionality of the Gabor ...

research-article
The Nonparametric Method for Differentiation of Phonostatistical Structures of Authorial Style
Abstract

For differentiation of phonostatistical structures of authorial styles, a mеthоd of cоmplex anаlysis of differentiation of phonostatistical structures of authorial style has been developed. The method is based on a combination of the three ...

research-article
Unmanned Aerial Vehicle in the Machine Learning Environment
Abstract

Unmanned Aerial Vehicles and machine learning have started gaining attentions of academic and industrial research. The Unmanned Aerial Vehicles have extended the freedom to operate and monitor the activities from remote locations. This study ...

research-article
Quantum Computers for Optimization the Performance
Abstract

Computers decrease human work and concentrate on enhancing the performance to advance the technology. Various methods have been developed to enhance the performance of computers. Performance of computer is based on computer architecture, while ...

research-article
User-oriented cache deletion algorithm in a delayed update-tolerant web cache server for supporting a non-formal education
Abstract

In developing countries, it is often difficult to use web content for e-learning because Internet accessing is unavailable or limited. To support education in such a situation, the authors previously proposed a system that uses a delayed update-...

research-article
JavaNeighbors: Improving ChuckyJava’s neighborhood discovery algorithm
Abstract

In this paper, a study to protect Java Card source codes against fuzzing attacks is presented. This work is based on the tool ChuckyJava. This tool aims at automatically detecting anomalies in Java source codes in a Machine Learning way, without ...

research-article
Optimal placement of Charging Stations for Electric Vehicles in large-scale Transportation Networks
Abstract

This paper presents a new practical approach to optimally allocate charging stations in large-scale transportation networks for electric vehicles (EVs). The problem is of particular importance to meet the charging demand of the growing fleet of ...

research-article
Comparative Study of Ontologies Based ISO 27000 Series Security Standards
Abstract

Security management standards as ISO/IEC 27000 series provide guidelines, which enable to evaluate the security in the company on a continuous basis. Security ontology technology is the most recommended to make links between security concepts and ...

research-article
Unique Message Authentication Security Approach based Controller Area Network (CAN) for Anti-lock Braking System (ABS) in Vehicle Network
Abstract

Controller Area Network (CAN) is one of the standard communication bus protocols used for intercommunication between electronics control units (ECUs) in vehicle network. However, due to its various security vulnerabilities, safety critical system ...

research-article
An Enhancement of Greedy Perimeter Stateless Routing Protocol in VANET
Abstract

The technological development in the world has increased rapidly and touched various areas, especially communication technology, which evolves with the evolution of wireless technology. This technology has invaded several areas, including the ...

research-article
Determinants of Pro-Environmental Activity-Travel Behavior Using GPS-Based Application and SEM Approach
Abstract

Technological advancement in automobile and infrastructure sector encourages more and longer distance travel and the way people travel to perform their daily tasks creates environmental problems. Activity-travel behavior of individual have a ...

research-article
Trackify: A Robust System For Preserving Money Transactions
Abstract

Money exchange is one of the most ordinary days to day activities done by humans in the daily market. This paper presents an approach for money tracking over a Blockchain. This approach consists of three core components: serial localization, ...

research-article
Data-driven prediction system for an environmental smartification approach to child fall accident prevention in a daily living space
Abstract

Ten thousand children are admitted to emergency rooms due to accidents every year in Tokyo. The most frequent accident is a fall accident. Fall accidents may occur when climbing to a high place in a daily living space. Since injury prevention by ...

research-article
Smart Home Is Not Smart Enough to Protect You - Protocols, Challenges and Open Issues
Abstract

The pervasiveness of the Internet of Things (IoT) has led to its usage in many aspects of our daily life. One significant usage of IoT is in its integration with smart home systems. Since the smart home systems consist of components that can be ...

research-article
IoT-Based Home and Community Energy Management System in Jordan
Abstract

Due to the increasing demands on energy, energy savings have witnessed a great research community attention over the last decades. Currently, home electric-energy bill causes a headache for habitants in modern cities. Many home appliances are ...

research-article
Characterizing Instructional Leader Interactions in a Social Learning Management System using Social Network Analysis
Abstract

Online learning environments are designed with specific users and respective roles in mind. However, for social systems that thrive on the interaction between and among users, important features are developed based on relationships that evolve ...

research-article
Context-aware Gossip in Ad hoc Vehicular Networks
Abstract

The purpose of this paper is to quantify and highlight the effects of how contextually guided gossip in ad hoc dynamic vehicular networks during emergency situations perform. Two traffic scenarios are simulated, each one of the scenarios was ...

research-article
NSGA-II based Joint Topology and Routing Optimization of Mesh Networks with Flying Access Points
Abstract

In this paper, we make use of MOEA to optimize the deployment of Unmanned Aerial Vehicles (UAVs) as access points in a target area taking into account two objectives: (1) minimize the number of UAVs, and (2) maximize the throughput at the ...

research-article
A Comparative Study of Predictive Approaches for Load Forecasting in Smart Buildings
Abstract

Predicting electricity consumption represents one of most important information for efficient energy management in smart buildings. It is mainly used for occupancy prediction and the development of optimized control approaches of building’s ...

research-article
A Conceptual Model for a Metric Based Framework for the Monitoring of Information Security Tasks’ Efficiency
Abstract

Information Security Governance Systems are not adequate to measure the effectiveness and efficiency of security tasks for the enterprises. Although some of the systems offer ways for measurement, they still need the definition of measurement ...

research-article
Smart Contracts and Internet of Things: A Qualitative Content Analysis using the Technology-Organization-Environment Framework to Identify Key-Determinants
Abstract

The spread and success of Internet of Things (IoT) is based on the rapidly growing number of applications, and smart contracts may play a pivotal role in IoT. In this paper, we (i) identify the key-determinants of smart contracts in IoT, and (ii) ...

Comments