top of page

Volume 3 (2017)

Article No. 1 (DOI:10.22667/ReBiCTE.2017.03.15.001)
Wireless Protocols Comparison to Improve the Performance of Intelligent Traffic Light Junctions
Giovanni Pau, Alessandro Severino, and Antonino Canale

Article No. 2 (DOI:10.22667/ReBiCTE.2017.05.15.002)
SmartApp Salemo: an Adaptive Context-Aware App for supporting e-tourists
Francesco Colace, Massimo De Santo, Saverio Lemma, Marco Lombardi, and Francesco Pascale

Article No. 3 (DOI:10.22667/ReBiCTE.2017.08.15.003)
Current State of Chemical Laboratory Equipment Using Virtual Machines
Steven Zobrist and Tanveer Zia

 

Article No. 4 (DOI:10.22667/ReBiCTE.2017.10.15.004)

OpenNSP: Open Network Service Provision for Mobile Networks

Qi Xu, Deyun Gao, Huachun Zhou, Bohao Feng, and Taixin Li

Article No. 5 (DOI:10.22667/ReBiCTE.2017.10.15.005)

Unsupervised real-time anomaly detection system for vehicular network security

Chundong Wang, Zhentang Zhao, Likun Zhu, Zheli Liu, and Xiaochun Cheng

Article No. 6 (DOI:10.22667/ReBiCTE.2017.10.15.006)

A Privacy-preserving Distributed Multi-attribute Reverse Auction Scheme with Public verification using Threshold Paillier cryptosystem

Jiaqi Wang, Wenbo Shi, and Xin Su

Article No. 7 (DOI:10.22667/ReBiCTE.2017.10.15.007)

Anonymous Communication Scheme for Wireless Mesh Network Based on Network Coding

Nan Guo, Shuang Yu, and Tianhan Gao

Article No. 8 (DOI:10.22667/ReBiCTE.2017.10.15.008)

Novel privacy vulnerabilities and challenges of OpenFlow-based SDN in network security

Yujie Xie and Pankoo Kim

Article No. 9 (DOI:10.22667/ReBiCTE.2017.10.15.009)

Twitter Sentiment Analysis using Machine Learning

Won Park, Youngin You, and Kyungho Lee

Article No. 10 (DOI:10.22667/ReBiCTE.2017.11.15.010)

A Location Privacy-Preserving Scheme for VANETs Based on Virtual Mix Zone

Nan Guo, Linya Ma, and Tianhan Gao

Article No. 11 (DOI:10.22667/ReBiCTE.2017.11.15.011)

Secure sensor data transmission in 5G networks using pseudorandom number generators

Borja Bordel and Ramon Alcarria

Article No. 12 (DOI:10.22667/ReBiCTE.2017.11.15.012)

Cryptanalysis of the IoT notion-based Authentication and Key Agreement Scheme for Wireless Sensor Networks

Sooyeon Shin and Taekyoung Kwon

 

Article No. 13 (DOI:10.22667/ReBiCTE.2017.11.15.013)

A Central-Controllable and Secure Multicast System for Universal Identifier Network

Xuan Liu, Jianfeng Guan, and Zhijun Wei

Article No. 14 (DOI:10.22667/ReBiCTE.2017.11.15.014)

Public Audit and Secure Deduplication in Cloud Storage using BLS signature

Taek-Young Youn, Ku-Young Chang, Kyung Hyune Rhee, and Sang Uk Shin

Article No. 15 (DOI:10.22667/ReBiCTE.2017.11.15.015)

Attack Classification Analysis of IoT Network via Deep Learning Approach

Bayu Adhi Tama and Kyung-Hyune Rhee

 

Article No. 16 (DOI:10.22667/ReBiCTE.2017.11.15.016)

Detection of Malware using the DHP Algorithm and Logistic Regression Analysis

Yeongji Ju and Juhyun Shin

Article No. 17 (DOI:10.22667/ReBiCTE.2017.11.15.017)

A Study on ECG-based Biometrics using Open Source Hardware

Jin Su Kim, Gyu Ho Choi, and Sung Bum Pan

Article No. 18 (DOI:10.22667/ReBiCTE.2017.11.15.018)

SVM-based Android Application Classification using API Calls

Myeonggeon Lee, Masoud Reyhani Hamedani, Gyoosik Kim, Tae Kyung Kim, and Seong-je Cho

Article No. 19 (DOI:10.22667/ReBiCTE.2017.11.15.019)

Combining SDN and ICN for Network Survivability Improvement

Zheng-Yang Ai, Fei Song, and Xi Wang

Article No. 20 (DOI:10.22667/ReBiCTE.2017.11.15.020)

Spillover Effect of Ransomware: Economic Analysis of Web Vulnerability Market

Jaehee Lee and Kyungho Lee

Article No. 21 (DOI:10.22667/ReBiCTE.2017.12.15.021)

Event Recommendation in Impromptu Event-based Social Networks

Nan Guo and Shuang Lu

bottom of page