You are currently viewing a new version of our website. To view the old version click .

Computers, Volume 8, Issue 3

September 2019 - 19 articles

Cover Story: In this paper, an intrusion detection system (IDS) and Blockchain-based delivery framework, entitled DeliveryCoin, is introduced. The proposed Blockchain-based delivery framework facilitates package delivery among self-driving nodes. In order to achieve privacy preservation, the proposed scheme employs hash functions and short signatures without random oracles and the strong Diffie–Hellman (SDH) assumption in bilinear groups. The article also introduces a novel UAV-aided forwarding mechanism, named pBFTF, that UAVs use in order to achieve consensus inside the Blockchain-based delivery platform. Finally, the article proposes an IDS system in each macro-eNB (5G) for detecting self-driving network attacks as well as false transactions between self-driving nodes. This is the first study that combines Blockchain technology with an IDS system into one architecturally-secure framework for a UAV-based delivery system. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (19)

  • Article
  • Open Access
6 Citations
8,055 Views
15 Pages

Value Modeling for Ecosystem Analysis

  • Alejandro Arreola González,
  • Matthias Pfaff and
  • Helmut Krcmar

13 September 2019

Scholars have proposed many approaches to represent and analyze value creation. Value creation in ecosystems such as platform ecosystems often relies on a specific structure of partner alignment. Value modeling techniques can improve the understandin...

  • Article
  • Open Access
3 Citations
7,390 Views
21 Pages

Towards a Framework for Assessing IT Strategy Execution

  • José-Ramón Rodríguez,
  • Robert Clarisó and
  • Josep Maria Marco-Simó

13 September 2019

In this paper, we explore a framework for assessing the implementation of IT Strategic planning, grounded in the combination and iteration of different methods. It is a part of an Action Design Research exercise being made up at a leading online Euro...

  • Article
  • Open Access
6 Citations
7,215 Views
24 Pages

Process-Aware Enactment of Clinical Guidelines through Multimodal Interfaces

  • Tiziana Catarci,
  • Francesco Leotta,
  • Andrea Marrella,
  • Massimo Mecella and
  • Mahmoud Sharf

11 September 2019

Healthcare is one of the largest business segments in the world and is a critical area for future growth. In order to ensure efficient access to medical and patient-related information, hospitals have invested heavily in improving clinical mobile tec...

  • Article
  • Open Access
21 Citations
8,433 Views
17 Pages

8 September 2019

Security and privacy concerns represent a significant hindrance to the widespread adoption of cloud computing services. While cloud adoption mitigates some of the existing information technology (IT) risks, research shows that it introduces a new set...

  • Article
  • Open Access
7 Citations
7,550 Views
18 Pages

Parliamentary Open Data in Scandinavia

  • Lasse Berntzen,
  • Marius Rohde Johannessen,
  • Kim Normann Andersen and
  • Jonathan Crusoe

6 September 2019

This article presents a case study on the use of open data in the Scandinavian parliaments (Norway, Sweden, and Denmark). While the three countries have all opened the gates and provided access to data—for example, on the voting in parliament, debate...

  • Article
  • Open Access
1 Citations
6,738 Views
22 Pages

4 September 2019

This paper presents an online calculator for bank charges, motivated by information asymmetry in the market for payment accounts. The calculator provides users with a personalized list of the most suitable bank accounts based on required services and...

  • Article
  • Open Access
6 Citations
5,354 Views
18 Pages

2 September 2019

Localization has been regarded as one of the most fundamental problems to enable a mobile robot with autonomous capabilities. Probabilistic techniques such as Kalman or Particle filtering have long been used to solve robotic localization and mapping...

  • Article
  • Open Access
49 Citations
7,605 Views
12 Pages

An Intelligent Computer-Aided Scheme for Classifying Multiple Skin Lesions

  • Nazia Hameed,
  • Fozia Hameed,
  • Antesar Shabut,
  • Sehresh Khan,
  • Silvia Cirstea and
  • Alamgir Hossain

Skin diseases cases are increasing on a daily basis and are difficult to handle due to the global imbalance between skin disease patients and dermatologists. Skin diseases are among the top 5 leading cause of the worldwide disease burden. To reduce t...

  • Article
  • Open Access
5 Citations
7,309 Views
14 Pages

Once a botnet is constructed over the network, a bot master and bots start communicating by periodically exchanging messages, which is known as botnet C&C communication, in order to send botnet commands to bots, collect critical information store...

  • Article
  • Open Access
48 Citations
7,796 Views
16 Pages

RNN-ABC: A New Swarm Optimization Based Technique for Anomaly Detection

  • Ayyaz-Ul-Haq Qureshi,
  • Hadi Larijani,
  • Nhamoinesu Mtetwa,
  • Abbas Javed and
  • Jawad Ahmad

The exponential growth of internet communications and increasing dependency of users upon software-based systems for most essential, everyday applications has raised the importance of network security. As attacks are on the rise, cybersecurity should...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X