Published: 2021-01-15

Articles

SDN based QoS Control Methods with the Classifications of IoT Data Transmissions for Disaster Information Systems

Noriki Uchida (, Japan)
Kanji Nakano (, Japan)
Tomoyuki Ishida (, Japan)
Yoshitaka Shibata (, Japan)
DOI https://doi.org/10.56801/rebicte.v7i.114
PDF

Page 9-19

Counterfeited Product Identification in a Supply Chain using Blockchain Technology

Shivam Singh (, India)
Gaurav Choudhary (, Denmark)
Shishir Kumar Shandilya (, India)
Vikas Sihag (, India)
Arjun Choudhary (, India)
DOI https://doi.org/10.56801/rebicte.v7i.115
PDF

Page 20-34

An Adaptive Auto Incident Response based Security Framework for Wireless Network Systems

Sindhu N Pujar (, India)
Gaurav Choudhary (, Denmark)
Shishir Kumar Shandilya (, India)
Vikas Sihag (, India)
Arjun Choudhary (, India)
DOI https://doi.org/10.56801/rebicte.v7i.116
PDF

Page 35-49

Performance Evaluation of Routing Protocols for Opportunistic Networks: An Energy Efficiency Perspective

Rodney S. Tholanah (, South Africa)
Zelalem S. Shibeshi (, South Africa)
Khuram Khalid (, Canada)
DOI https://doi.org/10.56801/rebicte.v7i.118
PDF

Page 57-74

Changes of Cyber Hacking Attack Aspect of North Korea Cyber-Attack Groups Applying MITRE ATT&CK

GwangHyun Ahn (, Korea, Republic of)
Seon-a Lee (, Korea, Republic of)
Won-hyung Park (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v7i.119
PDF

Page 75-88

Fast Crowd Evacuation Planning System for Disaster Management

C. Mala (, India)
Monica Joshi (, India)
Manipriya Sankaranarayanan (, India)
DOI https://doi.org/10.56801/rebicte.v7i.120
PDF

Page 89-102

Comparative analysis of anomaly recognition methods in real time

Nikita V. Gololobov (, Russian Federation)
Konstantin E. Izrailov (, Russian Federation)
Igor V. Kotenko (, Russian Federation)
DOI https://doi.org/10.56801/rebicte.v7i.122
PDF

Page 113-126

Focus on Multipath TCP: Introduction, Benefits and Future Research Trends

Lejun Ji (, China)
Ruiwen Ji (, China)
Junyi Wu (, China)
Keyang Gu (, China)
Fan Jiang (, China)
Yuanlong Cao (, China)
DOI https://doi.org/10.56801/rebicte.v7i.125
PDF

Page 151-163

Biometrics System Technology Trends Based on Bio-signal

Gyuho Choi (, Korea, Republic of)
Sungbum Pan (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v7i.126
PDF

Page 164-172

Multi-class DRDoS Attack Detection Method Based on Feature Selection

Tianqi Yang (, China)
Weilin Wang (, China)
Ying Liu (, China)
Huachun Zhou (, China)
DOI https://doi.org/10.56801/rebicte.v7i.127
PDF

Page 173-187

Vulnerability of Remote Control Apps based on Attack Scenario

YongJun Park (, Korea, Republic of)
Seon-a Lee (, Korea, Republic of)
Wonhyung Park (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v7i.128
PDF

Page 188-196

A formal security proof of generic construction of anonymous IBE from PEKS

Hyun Sook Rhee (, Korea, Republic of)
Taek-Young Youn (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v7i.130
PDF

Page 204-214

Hierarchical Sovereignty Management and Access Control based on Self-Sovereign Identity

Kang Woo Cho (, Korea, Republic of)
Mi Hyeon Jeon (, Korea, Republic of)
Sang Uk Shin (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v7i.131
PDF

Page 215-221