Tailoring Scrum Methodology for Game Development (Towsif Zahin Khan, Shairil Hossain Tusher, Mahady Hasan, M. Path Planning of Multiple Mobile Robots in a Dynamic 3D Environment (Jai Raj, Krishna Raghuwaiya, Jito Vanualailai, Bibhya Sharma).Pages 209-219Īutonomous Quadrotor Maneuvers in a 3D Complex Environment (Jito Vanualailai, Jai Raj, Krishna Raghuwaiya).Pages 221-231 Lukodono).Pages 189-197ģD Cylindrical Obstacle Avoidance Using the Minimum Distance Technique (Krishna Raghuwaiya, Jito Vanualailai, Jai Raj).Pages 199-208 Investigating the Noise Barrier Impact on Aerodynamics Noise: Case Study at Jakarta MRT (Sugiono Sugiono, Siti Nurlaela, Andyka Kusuma, Achmad Wicaksono, Rio P. Managerial Computer Communication: Implementation of Applied Linguistics Approaches in Managing Electronic Communication (Marcel Pikhart, Blanka Klímová).Pages 153-160Īdvance Persistent Threat-A Systematic Review of Literature and Meta-Analysis of Threat Vectors (Safdar Hussain, Maaz Bin Ahmad, Shariq Siraj Uddin Ghouri).Pages 161-178Ĭonstruction of a Teaching Support System Based on 5G Communication Technology (Hanhui Lin, Shaoqun Xie, Yongxia Luo).Pages 179-186 Lattice CP-ABE Scheme Supporting Reduced-OBDD Structure (Eric Affum, Xiasong Zhang, Xiaofen Wang).Pages 131-142Ĭrypto-SAP Protocol for Sybil Attack Prevention in VANETs (Mohamed Khalil, Marianne A.
Networking Analysis and Performance Comparison of Kubernetes CNI Plugins (Ritik Kumar, Munesh Chandra Trivedi).Pages 99-109Ĭlassifying Time-Bound Hierarchical Key Assignment Schemes (Vikas Rao Vadi, Naveen Kumar, Shafiqul Abidin).Pages 111-119Ī Survey on Cloud Workflow Collaborative Adaptive Scheduling (Delong Cui, Zhiping Peng, Qirui Li, Jieguang He, Lizi Zheng, Yiheng Yuan).Pages 121-129 On Confidentiality, Integrity, Authenticity, and Freshness (CIAF) in WSN (Shafiqul Abidin, Vikas Rao Vadi, Ankur Rana).Pages 87-97
Khan).Pages 35-44įuture Identity Card Using Lattice-Based Cryptography and Steganography (Febrian Kurniawan, Gandeva Bayu Satrya).Pages 45-56Ĭryptanalysis on Attribute-Based Encryption from Ring-Learning with Error (R-LWE) (Tan Soo Fun, Azman Samsudin).Pages 57-64Įnhanced Password-Based Authentication Mechanism in Cloud Computing with Extended Honey Encryption (XHE): A Case Study on Diabetes Dataset (Tan Soo Fun, Fatimah Ahmedy, Zhi Ming Foo, Suraya Alias, Rayner Alfred).Pages 65-74Īn Enhanced Wireless Presentation System for Large-Scale Content Distribution (Khong-Neng Choong, Vethanayagam Chrishanton, Shahnim Khalid Putri).Pages 75-85 A Novel Crypto-Ransomware Family Classification Based on Horizontal Feature Simplification (Mohsen Kakavand, Lingges Arulsamy, Aida Mustapha, Mohammad Dabbagh).Pages 3-14Ĭharacteristic Analysis and Experimental Simulation of Diffuse Link Channel for Indoor Wireless Optical Communication (Peinan He, Mingyou He).Pages 15-33Ī Comparative Analysis of Malware Anomaly Detection (Priynka Sharma, Kaylash Chaudhary, Michael Wagner, M.