Research Briefs on
Information & Communication Technology Evolution
(ReBICTE)
ISSN: 2383-9201 (Online)
Volume 3 (2017)
Article No. 1 (DOI:10.22667/ReBiCTE.2017.03.15.001)
Wireless Protocols Comparison to Improve the Performance of Intelligent Traffic Light Junctions
Giovanni Pau, Alessandro Severino, and Antonino Canale
Article No. 2 (DOI:10.22667/ReBiCTE.2017.05.15.002)
SmartApp Salemo: an Adaptive Context-Aware App for supporting e-tourists
Francesco Colace, Massimo De Santo, Saverio Lemma, Marco Lombardi, and Francesco Pascale
Article No. 3 (DOI:10.22667/ReBiCTE.2017.08.15.003)
Current State of Chemical Laboratory Equipment Using Virtual Machines
Steven Zobrist and Tanveer Zia
Article No. 4 (DOI:10.22667/ReBiCTE.2017.10.15.004)
OpenNSP: Open Network Service Provision for Mobile Networks
Qi Xu, Deyun Gao, Huachun Zhou, Bohao Feng, and Taixin Li
Article No. 5 (DOI:10.22667/ReBiCTE.2017.10.15.005)
Unsupervised real-time anomaly detection system for vehicular network security
Chundong Wang, Zhentang Zhao, Likun Zhu, Zheli Liu, and Xiaochun Cheng
Article No. 6 (DOI:10.22667/ReBiCTE.2017.10.15.006)
A Privacy-preserving Distributed Multi-attribute Reverse Auction Scheme with Public verification using Threshold Paillier cryptosystem
Jiaqi Wang, Wenbo Shi, and Xin Su
Article No. 7 (DOI:10.22667/ReBiCTE.2017.10.15.007)
Anonymous Communication Scheme for Wireless Mesh Network Based on Network Coding
Nan Guo, Shuang Yu, and Tianhan Gao
Article No. 8 (DOI:10.22667/ReBiCTE.2017.10.15.008)
Novel privacy vulnerabilities and challenges of OpenFlow-based SDN in network security
Yujie Xie and Pankoo Kim
Article No. 9 (DOI:10.22667/ReBiCTE.2017.10.15.009)
Twitter Sentiment Analysis using Machine Learning
Won Park, Youngin You, and Kyungho Lee
Article No. 10 (DOI:10.22667/ReBiCTE.2017.11.15.010)
A Location Privacy-Preserving Scheme for VANETs Based on Virtual Mix Zone
Nan Guo, Linya Ma, and Tianhan Gao
Article No. 11 (DOI:10.22667/ReBiCTE.2017.11.15.011)
Secure sensor data transmission in 5G networks using pseudorandom number generators
Borja Bordel and Ramon Alcarria
Article No. 12 (DOI:10.22667/ReBiCTE.2017.11.15.012)
Cryptanalysis of the IoT notion-based Authentication and Key Agreement Scheme for Wireless Sensor Networks
Sooyeon Shin and Taekyoung Kwon
Article No. 13 (DOI:10.22667/ReBiCTE.2017.11.15.013)
A Central-Controllable and Secure Multicast System for Universal Identifier Network
Xuan Liu, Jianfeng Guan, and Zhijun Wei
Article No. 14 (DOI:10.22667/ReBiCTE.2017.11.15.014)
Public Audit and Secure Deduplication in Cloud Storage using BLS signature
Taek-Young Youn, Ku-Young Chang, Kyung Hyune Rhee, and Sang Uk Shin
Article No. 15 (DOI:10.22667/ReBiCTE.2017.11.15.015)
Attack Classification Analysis of IoT Network via Deep Learning Approach
Bayu Adhi Tama and Kyung-Hyune Rhee
Article No. 16 (DOI:10.22667/ReBiCTE.2017.11.15.016)
Detection of Malware using the DHP Algorithm and Logistic Regression Analysis
Yeongji Ju and Juhyun Shin
Article No. 17 (DOI:10.22667/ReBiCTE.2017.11.15.017)
A Study on ECG-based Biometrics using Open Source Hardware
Jin Su Kim, Gyu Ho Choi, and Sung Bum Pan
Article No. 18 (DOI:10.22667/ReBiCTE.2017.11.15.018)
SVM-based Android Application Classification using API Calls
Myeonggeon Lee, Masoud Reyhani Hamedani, Gyoosik Kim, Tae Kyung Kim, and Seong-je Cho
Article No. 19 (DOI:10.22667/ReBiCTE.2017.11.15.019)
Combining SDN and ICN for Network Survivability Improvement
Zheng-Yang Ai, Fei Song, and Xi Wang
Article No. 20 (DOI:10.22667/ReBiCTE.2017.11.15.020)
Spillover Effect of Ransomware: Economic Analysis of Web Vulnerability Market
Jaehee Lee and Kyungho Lee
Article No. 21 (DOI:10.22667/ReBiCTE.2017.12.15.021)
Event Recommendation in Impromptu Event-based Social Networks
Nan Guo and Shuang Lu