|
||||
The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. The authors of these papers are also receiving invitations to submit an extended article version to one of the IARIA Journals. Awarded Papers Secure Scrum: Development of Secure Software with Scrum New Directions in Applying Physical Unclonable Functions Enterprise Security Metrics with the ADVISE Meta Model Formalism A Detection and Prevention Algorithm for Single and Cooperative Black hole Attacks in AODV MANETs Implementation of a Generic ICT Risk Model using Graph Databases You Are Who You Know - Leveraging Webs-of-trust for Authentication in Identity Federations Automatic Human Tracking using Localization of Neighbor Node Calculation
The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals. Papers Invited for IARIA Journals Traffic Management and Access Control in Space Experiment “Kontur-2” The Random Gate Principle A Review and Analysis on Heartbleed on Italian Websites, a Year Later Cloud Card Compliance Checklist: An Efficient Tool for Securing Deployment Card Solutions on the Cloud
The following papers have been selected on the basis of their contents and topic fitness to sensor networks. Authors of these papers are receiving invitationd tosubmit extended article versions to IFSA. Papers Invited to IFSA Automatic Human Tracking using Localization of Neighbor Node Calculation Reduction of Neighbor Node Calculations for Automatic Human Tracking System |
||||
Copyright (c) 2006-2014, IARIA