All Stories

  1. Human-AI Co-Creation in Engineering Education: Leveraging ChatGPT-4 to Develop Authentic Case Studies
  2. Data Augmentation-based Novel Deep Learning Method for Deepfaked Images Detection
  3. Multimodal Religiously Hateful Social Media Memes Classification Based on Textual and Image Data
  4. Forensic Investigation of Humanoid Social Robot: A Case Study on Zenbo Robot
  5. Transfer Learning-based Forensic Analysis and Classification of E-Mail Content
  6. Differentially Private Release of Heterogeneous Network for Managing Healthcare Data
  7. Augmenting CCAM Infrastructure for Creating Smart Roads and Enabling Autonomous Driving
  8. CARLA+: An Evolution of the CARLA Simulator for Complex Environment Using a Probabilistic Graphical Model
  9. A Comparative Assessment of Human Factors in Cybersecurity: Implications for Cyber Governance
  10. Of Stances, Themes, and Anomalies in COVID-19 Mask-Wearing Tweets
  11. Multicriteria Decision Making for Carbon Dioxide (CO2) Emission Reduction
  12. Exploring the human factors in moral dilemmas of autonomous vehicles
  13. Distinguishing between fake news and satire with transformers
  14. Deepfake Audio Detection via MFCC Features Using Machine Learning
  15. Enabling Secure Trustworthiness Assessment and Privacy Protection in Integrating Data for Trading Person-Specific Information
  16. Automatic Fall Risk Detection Based on Imbalanced Data
  17. Blockchain-based chain of custody
  18. On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild
  19. A Deep Learning Framework for Malware Classification
  20. The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics
  21. Towards a Better Understanding of Drone Forensics
  22. Efficient scheduling of video camera sensor networks for IoT systems in smart cities
  23. A Privacy-Preserving Context Ontology (PPCO) for Smart Connected Toys
  24. Solving MAX-SAT Problem by Binary Biogeograph-based Optimization Algorithm
  25. Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild
  26. A Hybrid Soft Switching Full Bridge Converter Suitable for the Electric Vehicle Charge Applications
  27. A Predictive Model for Predicting Students Academic Performance
  28. ZigBee Security Vulnerabilities: Exploration and Evaluating
  29. Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches
  30. Memory Forensics: Recovering Chat Messages and Encryption Master Key
  31. Arabic Authorship Attribution
  32. A secure fog-based platform for SCADA-based IoT critical infrastructure
  33. Learning Stylometric Representations for Authorship Analysis
  34. A Hybrid Framework for Sentiment Analysis Using Genetic Algorithm Based Feature Reduction
  35. Wordnet-Based Criminal Networks Mining for Cybercrime Investigation
  36. Drone forensics: examination and analysis
  37. Robot Computing for Music Visualization
  38. Towards a Music Visualization on Robot (MVR) Prototype
  39. SafePath: Differentially-private publishing of passenger trajectories in transportation systems
  40. Intelligent Multi-Agent Collaboration Model for Smart Home IoT Security
  41. Smart Home Systems Security
  42. Opportunistic mining of top-n high utility patterns
  43. Security and privacy challenges in smart cities
  44. Drone Forensics: Challenges and New Insights
  45. Malware Classification with Deep Convolutional Neural Networks
  46. Remote Data Acquisition Using Raspberry Pi3
  47. A glance at research-driven university's technology transfer office in the UAE
  48. Differentially private multidimensional data publishing
  49. Charging infrastructure placement for electric vehicles: An optimization prospective
  50. SONAR
  51. Revealing determinant factors for early breast cancer recurrence by decision tree
  52. Fuzzy searching and routing in unstructured mobile peer-to-peer networks
  53. A Study of Children Facial Recognition for Privacy in Smart TV
  54. Forensic analysis of xbox one and playstation 4 gaming consoles
  55. Privacy Requirements for mobile e-Service in the Health Authority - Abu Dhabi (HAAD)
  56. Magec: An Image Searching Tool for Detecting Forged Images in Forensic Investigation
  57. White-Hat Hacking Framework for Promoting Security Awareness
  58. Multimedia File Signature Analysis for Smartphone Forensics
  59. Privacy-preserving data mashup model for trading person-specific information
  60. Towards A Self Adaptive System for Social Wellness
  61. Bounded message delay with threshold time constraint in delay tolerant networks (DTNs)
  62. Fuzzy Query Routing in Unstructured Mobile Peer-to-Peer Networks
  63. A Glance of Child’s Play Privacy in Smart Toys
  64. Fusion: Privacy-Preserving Distributed Protocol for High-Dimensional Data Mashup
  65. Fuzzy Logic-Based Guaranteed Lifetime Protocol for Real-Time Wireless Sensor Networks
  66. E-mail authorship attribution using customized associative classification
  67. Graph-theoretic characterization of cyber-threat infrastructures
  68. Identification and analysis of free games' permissions in Google Play
  69. Distributed Computing and Artificial Intelligence, 12th International Conference
  70. Testing the forensic soundness of forensic examination environments on bootable media
  71. A forensic analysis framework for recovering encryption keys and BB10 backup decryption
  72. Privacy-Preserving Medical Reports Publishing for Cluster Analysis
  73. An Approach for the Validation of File Recovery Functions in Digital Forensics' Software Tools
  74. Security Welcome Message
  75. Computer Profiling for Preliminary Forensic Examination
  76. CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection
  77. Towards a unified agent-based approach for real time computer forensic evidence collection
  78. A unified data mining solution for authorship analysis in anonymous textual communications
  79. Mining Criminal Networks from Chat Log
  80. Investigating the dark cyberspace: Profiling, threat-based analysis and correlation
  81. Mining writeprints from anonymous e-mails for forensic investigation
  82. Speaker verification from partially encrypted compressed speech for forensic investigation
  83. e-mail authorship verification for forensic investigation
  84. Towards an integrated e-mail forensic analysis framework
  85. A novel approach of mining write-prints for authorship attribution in e-mail forensics