All Stories

  1. Multimodal Religiously Hateful Social Media Memes Classification based on Textual and Image Data
  2. Transfer Learning-based Forensic Analysis and Classification of E-Mail Content
  3. Data Augmentation-based Novel Deep Learning Method for Deepfaked Images Detection
  4. Differentially Private Release of Heterogeneous Network for Managing Healthcare Data
  5. Augmenting CCAM Infrastructure for Creating Smart Roads and Enabling Autonomous Driving
  6. CARLA+: An Evolution of the CARLA Simulator for Complex Environment Using a Probabilistic Graphical Model
  7. A Comparative Assessment of Human Factors in Cybersecurity: Implications for Cyber Governance
  8. Of Stances, Themes, and Anomalies in COVID-19 Mask-Wearing Tweets
  9. Multicriteria Decision Making for Carbon Dioxide (CO2) Emission Reduction
  10. Exploring the human factors in moral dilemmas of autonomous vehicles
  11. Distinguishing between fake news and satire with transformers
  12. Deepfake Audio Detection via MFCC Features Using Machine Learning
  13. Enabling Secure Trustworthiness Assessment and Privacy Protection in Integrating Data for Trading Person-Specific Information
  14. Automatic Fall Risk Detection Based on Imbalanced Data
  15. Blockchain-based chain of custody
  16. On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild
  17. A Deep Learning Framework for Malware Classification
  18. The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics
  19. Towards a Better Understanding of Drone Forensics
  20. Efficient scheduling of video camera sensor networks for IoT systems in smart cities
  21. A Privacy-Preserving Context Ontology (PPCO) for Smart Connected Toys
  22. Solving MAX-SAT Problem by Binary Biogeograph-based Optimization Algorithm
  23. Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild
  24. A Hybrid Soft Switching Full Bridge Converter Suitable for the Electric Vehicle Charge Applications
  25. A Predictive Model for Predicting Students Academic Performance
  26. ZigBee Security Vulnerabilities: Exploration and Evaluating
  27. Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches
  28. Memory Forensics: Recovering Chat Messages and Encryption Master Key
  29. Arabic Authorship Attribution
  30. A secure fog-based platform for SCADA-based IoT critical infrastructure
  31. Learning Stylometric Representations for Authorship Analysis
  32. A Hybrid Framework for Sentiment Analysis Using Genetic Algorithm Based Feature Reduction
  33. Wordnet-Based Criminal Networks Mining for Cybercrime Investigation
  34. Drone forensics: examination and analysis
  35. Robot Computing for Music Visualization
  36. Towards a Music Visualization on Robot (MVR) Prototype
  37. SafePath: Differentially-private publishing of passenger trajectories in transportation systems
  38. Intelligent Multi-Agent Collaboration Model for Smart Home IoT Security
  39. Smart Home Systems Security
  40. Opportunistic mining of top-n high utility patterns
  41. Security and privacy challenges in smart cities
  42. Drone Forensics: Challenges and New Insights
  43. Malware Classification with Deep Convolutional Neural Networks
  44. Remote Data Acquisition Using Raspberry Pi3
  45. A glance at research-driven university's technology transfer office in the UAE
  46. Differentially private multidimensional data publishing
  47. Charging infrastructure placement for electric vehicles: An optimization prospective
  48. SONAR
  49. Revealing determinant factors for early breast cancer recurrence by decision tree
  50. Fuzzy searching and routing in unstructured mobile peer-to-peer networks
  51. A Study of Children Facial Recognition for Privacy in Smart TV
  52. Forensic analysis of xbox one and playstation 4 gaming consoles
  53. Privacy Requirements for mobile e-Service in the Health Authority - Abu Dhabi (HAAD)
  54. Magec: An Image Searching Tool for Detecting Forged Images in Forensic Investigation
  55. White-Hat Hacking Framework for Promoting Security Awareness
  56. Multimedia File Signature Analysis for Smartphone Forensics
  57. Privacy-preserving data mashup model for trading person-specific information
  58. Towards A Self Adaptive System for Social Wellness
  59. Bounded message delay with threshold time constraint in delay tolerant networks (DTNs)
  60. Fuzzy Query Routing in Unstructured Mobile Peer-to-Peer Networks
  61. A Glance of Child’s Play Privacy in Smart Toys
  62. Fusion: Privacy-Preserving Distributed Protocol for High-Dimensional Data Mashup
  63. Fuzzy Logic-Based Guaranteed Lifetime Protocol for Real-Time Wireless Sensor Networks
  64. E-mail authorship attribution using customized associative classification
  65. Graph-theoretic characterization of cyber-threat infrastructures
  66. Identification and analysis of free games' permissions in Google Play
  67. Distributed Computing and Artificial Intelligence, 12th International Conference
  68. Testing the forensic soundness of forensic examination environments on bootable media
  69. A forensic analysis framework for recovering encryption keys and BB10 backup decryption
  70. Privacy-Preserving Medical Reports Publishing for Cluster Analysis
  71. An Approach for the Validation of File Recovery Functions in Digital Forensics' Software Tools
  72. Security Welcome Message
  73. Computer Profiling for Preliminary Forensic Examination
  74. CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection
  75. Towards a unified agent-based approach for real time computer forensic evidence collection
  76. A unified data mining solution for authorship analysis in anonymous textual communications
  77. Mining Criminal Networks from Chat Log
  78. Investigating the dark cyberspace: Profiling, threat-based analysis and correlation
  79. Mining writeprints from anonymous e-mails for forensic investigation
  80. Speaker verification from partially encrypted compressed speech for forensic investigation
  81. e-mail authorship verification for forensic investigation
  82. Towards an integrated e-mail forensic analysis framework
  83. A novel approach of mining write-prints for authorship attribution in e-mail forensics