Published: 2020-12-26

A Methodology for Assuring Privacy by Design in Information Systems

Siham Arfaoui, Abdellatif MEZRIOUI, Abdelhamid BELMEKKI

Energy and Processing Time Efficiency for an Optimal Offloading in a Mobile Edge Computing Node

Mohamed EL GHMARY, Youssef Hmimz, Tarik Chanyour, Mohammed Ouçamah CHERKAOUI MALKI

Design a secure IoT Architecture using Smart Wireless Networks

Nourah Almrezeq, Lama Almadhoor, Thowg Alrasheed, A. A. Abd El-Aziz, Shadi Nashwan

Fuzzy Adaptive Hysteresis of RSS for Handover Decision in V2V VANET

Sahirul Alam, Selo Sulistyo, I Wayan Mustika, Ronald Adrian

Cost Effective Cloud Storage Interoperability Between Public Cloud Platforms

Yassine Serhane, Abderrahim Sekkaki, Karim Benzidane, Mehdi Abid

ANONYMOUS AUTHENTICATION PROTOCOLS FOR IOT BASED HEALTHCARE: A SURVEY

Mahmoud Rajallah Asassfeh, Nadim Obeid, Wesam Almobaideen

Evolution of Malware Threats and Techniques: a Review

Mohammad Nasser Alenezi, Haneen Khalid Alabdulrazzaq, Abdullah Abdulhai Alshaher, Mubarak Mohammad Alkharang

Mobile Malware Behaviour through Opcode Analysis

Noor Azleen Anuar, Mohd Zaki Mas’ud, Nazrulazhar Bahamanan, Nor Azman Mat Ariff

Analysis of Cybersecurity Standard and Framework Components

Melwin Syafrizal, Siti Rahayu Selamat, Nurul Azma Zakaria