The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 03 - May./Jun. (vol. 20)
ISSN: 1520-9202

Front Cover (PDF)

pp. c1

Babbage Award Ad (PDF)

pp. c2

Table of Contents (PDF)

pp. 1-2

Masthead (PDF)

pp. 3

Mills Award Ad (PDF)

pp. 4

CS Information (PDF)

pp. 5
From the Editors

IoT Metrology (HTML)

Rick Kuhn , NIST
Phillip A. Laplante , Penn State University
pp. 6-10
IT Trends

A Closer Look at IoT's Things (Abstract)

Jeffrey Voas , IEEE Fellow
Bill Agresti , IEEE Life Senior Member
Phillip A. Laplante , Penn State University
pp. 11-14
Internet of Things

Education Award Ad (PDF)

pp. 19
Cyberthreats and Security

Cyberthreats and Security (HTML)

Morris Chang , University of South Florida
Rick Kuhn , NIST
Tim Weil , Alcohol Monitoring Systems
pp. 20-22

Advancing Cybersecurity: The Growing Need for a Cyber-Resiliency Workforce (Abstract)

Logan O. Mailloux , Air Force Institute of Technology
Michael Grimaila , Air Force Institute of Technology
pp. 23-30

The New Threats of Information Hiding: The Road Ahead (Abstract)

Krzysztof Cabaj , Warsaw University of Technology, Poland
Luca Caviglione , National Research Council of Italy
Wojciech Mazurczyk , Warsaw University of Technology, Poland
Steffen Wendzel , Worms University of Applied Sciences, Germany
Alan Woodward , University of Surrey, UK
Sebastian Zander , Murdoch University, Australia
pp. 31-39

Internet of Things Forensics: The Need, Process Models, and Open Issues (Abstract)

Maxim Chernyshev , Edith Cowan University
Sherali Zeadally , University of Kentucky
Zubair Baig , CSIRO
Andrew Woodward , Edith Cowan University
pp. 40-49

Experiments with Ocular Biometric Datasets: A Practitioner’s Guideline (Abstract)

Zahid Akhtar , University of Quebec
Gautam Kumar , National Institute of Technology, Rourkela
Sambit Bakshi , National Institute of Technology, Rourkela
Hugo Proenca , University of Beira Interior
pp. 50-63

The Evolving Cyberthreat to Privacy (Abstract)

A.J. Burns , The University of Texas at Tyler
Eric Johnson , Vanderbilt University
pp. 64-72
PRIVACY VIOLATIONS IN BIG DATA SYSTEMS

Understanding Privacy Violations in Big Data Systems (Abstract)

Jawwad A. Shamsi , National University of Computer and Emerging Sciences
Muhammad Ali Khojaye , Independent researcher
pp. 73-81

Jobs, Social, Hibu Ads (PDF)

pp. 82
Life in the C-Suite

Governing and Piloting Emerging Technologies (Abstract)

Stephen J. Andriole , Villanova University School of Business
pp. 83-85
Student Forum

Recognizing Student Research through Symposia and Competitions (Abstract)

Luigi De Russis , Politecnico di Torino
Kenichi Yoshida , University of Tsukuba
pp. 86-89
Extreme Automation

Digital Health in the Era of Extreme Automation (Abstract)

Jinan Fiaidhi , Lakehead University
Sabah Mohammed , Lakehead University
pp. 90-95

Merwin Award Ad (PDF)

pp. 96

ePub Ad (PDF)

pp. c3

Membership Ad (PDF)

pp. c4
93 ms
(Ver 3.3 (11022016))