Volume 8, Number 18, December 2018
5th International Conference on Computer Science, Engineering and Information Technology (CSEIT-2018), December 22-23, 2018, Dubai, UAE
Volume Editors : Dhinaharan Nagamalai, Jan Zizka
ISBN: 978-1-921987-96-0 Download full Proceedings
Android Untrusted Detection with Permission Based Scoring Analysis
Jackelou Sulapas Mapa, Saint Joseph Institute of Technology, Philippines
An Ontology Based Hierarchical Bayesian Network Classification Model to Predict The Effect of DNA
Repairs Genes in Human Ageing Process
Hasanein Alharbi, Al-Mustaqbal University College, Iraq
Fuzzy Boolean Reasoning for Diagnosis of Diabetes
Mohamed Benamina, Baghdad Atmani and Sofia Benbelkacem, University of Oran 1 Ahmed Ben Bella,
Algeria
Virtual AIS Generation Management System for Waterway Risk Assessment
Jun Sik Kim1, Seung Wook Hong2 and Suhyun Park1, 1Dongseo University, Korea and 2ONE Data
Technology, Korea
Data Management Platform Supporting Volunteer Occupation Services
Damien Nicolas, Adnan Emeri, Marie Laure Watrinet and Djamel Khadraoui, LIST: Luxembourg Institute
of Science and Technology, Luxembourg
Camouflaged with Size: A Case Study of Espionage Using Acquirable Single Board Computers
Kiavash Satvat1, Mahshid Hosseini1 and Maliheh Shirvanian2, 1University of Illinois at Chicago, USA and
2University of Alabama at Birmingham, USA
Predicting Security Critical Conditions of Cyber Physical Systems with Unobservables and Observation Times
Alessio Coletta1,2, 1Bruno Kessler Foundation, Italy and 2University of Trento, Italy
Secure Strategy for Optical Image Encryption System Based on Amplitude Modulation, Phase Modulation
and Modified Logistic Map
Ahmed M. Elshamy1, Aziza I. Hussein2,3, Hesham F. A. Hamed2, M. A.Abdelghany2 and Hamdy M. Kelash4,
1Fujairah University, UAE, 2Minia University, Egypt, 3Effat University, KSA and 4Menoufia University, Egypt
An Elastic Hybrid Honeynet for Cloud Environment
Nguyen Khac Bao, Sung Won Ahn and Minho Park, Soongsil University, Korea
A Machine Learning Approach to Detect and Classify 3D Two-Photon Polymerization Microstructures
Using Optical Microscopy Images
Israel Goytom and Gu Yinwei, Ningbo University, China
Video Sequencing Based Facial Expression Detection with 3D Local Binary Pattern Variants
Kennedy Chengeta1 and Serestina Viriri2, 1University of KwaZulu Natal, South Africa and 2Westville
Campus, South Africa
Near-Drowning Early Prediction Technique Using Novel Equations (NEPTUNE) for Swimming Pools
B David Prakash, IAG Firemark, Singapore
A Preferment Platform for Implementing Security Mechanism for Automotive Can Bus
Mabrouka Gmiden, Mohamed Hedi Gmiden and Hafedh Gmiden, National Engineers School of Sfax-Tunisia
Randomized Dynamic Trickle Timer Algorithm for Internet of Things
Muneer Bani Yassein, Ansam Alnadi and Asmaa Bataineh, Jordan University of Science and Technology,
Jordan
Black Hole Attack Security Issues, Challenges & Solution in MANET
Muneer Bani Yassein, Ismail Hmeidi, Yaser Khamayseh Mohammad Al-Rousan and Danah Arrabi,
University of Science and Technology, Jordan
Security Protocol for Pollution Attack Using Network Coding
Kiattikul Sooksomsatarn, University of Phayao, Thailand