The Community for Technology Leaders
Green Image
Issue No. 04 - April (vol. 46)
ISSN: 0018-9162
Elsewhere in the CS
Computing Conversations

Larry Smarr: Building Mosaic (HTML)

Charles Severance , University of Michigan
pp. 6-8
Computing and the Law

Patent Monetization (HTML)

Brian M. Gaff , Edwards Wildman Palmer LLP
Ralph A. Loren , Edwards Wildman Palmer LLP
pp. 9-11
32 & 16 Years Ago
Technology News
News Briefs

News Briefs (HTML)

pp. 18-20
Guest Editors' Introduction

Securing Cyberspace in the 21st Century (HTML)

Sherali Zeadally , Microsoft Research Cambridge, UK
Gregorio Martinez , University of Murcia, Spain
Han-Chieh Chao , National Ilan University, Taiwan
pp. 22-23
Cover Feature

Detecting Influential Spreaders in Complex, Dynamic Networks (Abstract)

Pavlos Basaras , University of Thessaly, Greece
Dimitrios Katsaros , University of Thessaly, Greece
Leandros Tassiulas , University of Thessaly, Greece
pp. 24-29

Wide-Area Situational Awareness for Critical Infrastructure Protection (Abstract)

Cristina Alcaraz , University of Malaga, Spain
Javier Lopez , University of Malaga, Spain
pp. 30-37

Scan detection under sampling: a new perspective (Abstract)

Ignasi Paredes-Oliva , Universitat Politecnica de Catalunya BarcelonaTech
Pere Barlet-Ros , Universitat Politecnica de Catalunya BarcelonaTech
Josep Sole-Pareta , Universitat Politecnica de Catalunya BarcelonaTech
pp. 38-44
Cover Feature

Cyberentity Security in the Internet of Things (Abstract)

Huansheng Ning , Beihang University, China
Hong Liu , Beihang University, China
Laurence T. Yang , Huazhong University of Science and Technology, China, and St. Francis Xavier University, Canada
pp. 46-53

Who Am I? Analyzing Digital Personas in Cybercrime Investigations (Abstract)

Awais Rashid , Lancaster University, UK
Alistair Baron , Lancaster University, UK
Paul Rayson , Lancaster University, UK
Corinne May-Chahal , Lancaster University, UK
Phil Greenwood , Isis Forensics, Lancaster, UK
James Walkerdine , Isis Forensics, Lancaster, UK
pp. 54-61

A Next-Generation Approach to Combating Botnets (Abstract)

Adeeb Alhomoud , University of Bradford, UK
Irfan Awan , University of Bradford, UK
Jules Ferdinand Pagna Disso , EADS Innovation Works, Newport, UK
Muhammad Younas , Oxford Brookes University, UK
pp. 62-66

Global Manhunt Pushes the Limits of Social Mobilization (Abstract)

Iyad Rahwan , Masdar Institute of Science & Technology, UAE
Sohan Dsouza , Masdar Institute of Science & Technology, UAE
Alex Rutherford , Masdar Institute of Science & Technology, UAE
Victor Naroditskiy , University of Southampton, UK
James McInerney , University of Southampton, UK
Matteo Venanzi , University of Southampton, UK
Nicholas R. Jennings , University of Southampton, UK
Manuel Cebrian , National ICT Australia and Massachusetts Institute of Technology
pp. 68-75
Research Feature

Characterizing the Performance and Power Consumption of 3D Mobile Games (Abstract)

Xiaohan Ma , University of Houston
Zhigang Deng , University of Houston
Mian Dong , Rice University
Lin Zhong , Rice University
pp. 76-82
Computing Education

Why Learn a Foreign Language? (Abstract)

Ruth H. Sanders , Miami University of Ohio
pp. 83-85
Discovery Analytics

Ubiquitous Analytics: Interacting with Big Data Anywhere, Anytime (Abstract)

Niklas Elmqvist , Purdue University
Pourang Irani , University of Manitoba
pp. 86-89
Invisible Computing

Enabling an Enterprise-Wide, Data-Centric Operating Environment (Abstract)

David Ferraiolo , National Institute of Standards and Technology
Serban Gavrila , National Institute of Standards and Technology
Wayne Jansen , Booz Allen Hamilton
pp. 94-96
Entertainment Computing

The Ways We Play, Part 2: Mobile Game Changers (Abstract)

Jason Pace , University of Washington Bothell
pp. 97-99

HCI Practices for Building Usable Software (Abstract)

Ana M. Moreno , Technical University of Madrid, Spain
Ahmed Seffah , Concordia University, Canada
Rafael Capilla , Rey Juan Carlos University, Spain
Maria-Isabel Sanchez-Segura , Carlos III University, Spain
pp. 100-102
Computer Society Connection

Computer Society Connection (HTML)

pp. 110-113
Call and Calendar

Call and Calendar (HTML)

pp. 114-115
The Errant Hashtag

Equal before the Bar (HTML)

David Alan Grier , George Washington University
pp. 116
143 ms
(Ver 3.3 (11022016))