Synopses & Reviews
Synopsis
Part I Cybersecurity1. Safeguarding Personal Health Information: Case Study2. Cybersecurity as People Powered Perpetual Innovation3. Performance Study of the Impact of Security on 802.11ac Networks4. Training Neural Tensor Networks with the Never Ending Language Learner5. PERIA-Framework: A Prediction Extension Revision Image Annotation Framework6. The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan7. Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network8. A Virtual Animated Commentator Architecture for Cybersecurity Competitions9. Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features10. Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach)11. A Self Proxy Signature Scheme over NTRU Lattices12. Towards an Ontology of Security Assessment: a core model proposal13. Integration of Mobile Forensic Tool Capabilities14. Deep Packet Inspection: A Key Issue for Network Security15. What Petya/NotPetya Ransomware is and What its Remidiations are16. Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform17. New Techniques for Public Key Encryption with Sender Recovery18. Cloud Intrusion Detection and Prevention system for M-voting application in South Africa19. Protecting Personal Data with Blockchain Technology20. The Role of CAE-CDE in Cybersecurity Education for Workforce Development21. Software Optimizations for DES Part II Networking and Wireless Communications22. Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment23. End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks24. Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges25. A Dual canister medicine IoT Dispenser26. Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks27. Denial of service attacks in wireless sensor networks with proposed countermeasuresPart III Education and Technology28. Internet-Based Education: A New Milestone for Formal Language and Automata Courses29. Teaching Communication Management in Software Projects through Serious Educational Games30. Gamification applied in the teaching of agile Scrum methodology31. An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework Part IV Agile Software Testing and Development32. Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects33. Alignment of Requirements and Testing in Agile: an Industrial Experience34. Health Care Information Systems: A Crisis Approach35. Using Correct-by-Construction Software Agile Development36. Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services 37. Improving Agile Software Development with Domain Ontologies38. A Stratified Sampling Algorithm for Artificial Neural NetworksPart V Data Mining/Machine Learning 39. Mining ENADE Data from the Ulbra Network Institution40. Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA)41. Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise42. Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets