Skip Content
You are currently on the new version of our website. Access the old version .

Computers, Volume 10, Issue 12

2021 December - 16 articles

Cover Story: Web browsers are one of the most used applications on every computational device. Hence, they play a pivotal role in any forensic investigation and help to determine if nefarious or suspicious activity has occurred on that device. Our study investigates the use of private mode and browsing artefacts within four web browsers and focuses on analyzing both hard disk and random-access memory. Forensic analysis on the browsing activity, search history, cookies, and temporary files of the target device showed that using the private mode artefacts are not saved in the device’s hard disks and matched each web browser vendors’ claims; however, in volatile memory analysis, most artefacts were retrieved. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (16)

  • Article
  • Open Access
14 Citations
5,317 Views
17 Pages

A Lightweight BPMN Extension for Business Process-Oriented Requirements Engineering

  • Benedetto Intrigila,
  • Giuseppe Della Penna and
  • Andrea D’Ambrogio

16 December 2021

Process-oriented requirements engineering approaches are often required to deal with the effective adaptation of existing processes in order to easily introduce new or updated requirements. Such approaches are based on the adoption of widely used not...

  • Article
  • Open Access
12 Citations
5,066 Views
22 Pages

13 December 2021

Currently, most chatbots are unable to detect the emotional state of the interlocutor and respond according to the interlocutor’s emotional state. Over the last few years, there has been growing interest in empathic chatbots. In other disciplin...

  • Article
  • Open Access
1 Citations
4,110 Views
21 Pages

An Applying Colored Petri Net for Computerized Accounting System and Ledger Accounts Instruction

  • Chanon Dechsupa,
  • Wiwat Vatanawood,
  • Worawit Poolsawasdi and
  • Arthit Thongtak

12 December 2021

Many learners who are not familiar with the accounting terms find blended learning very complex to understand with respect to the computerized accounting system, the journal entries process, and tracing the accounting transaction flows of accounting...

  • Review
  • Open Access
55 Citations
15,705 Views
17 Pages

The Use of Blockchain Technology in e-Government Services

  • Ioannis Lykidis,
  • George Drosatos and
  • Konstantinos Rantos

10 December 2021

e-Government services have evolved significantly over the last decade, from a paper-based bureaucratic procedure to digital services. Electronically processed transactions require limited physical interaction with the public administration, and provi...

  • Article
  • Open Access
12 Citations
4,887 Views
16 Pages

Automated Paraphrase Quality Assessment Using Language Models and Transfer Learning

  • Bogdan Nicula,
  • Mihai Dascalu,
  • Natalie N. Newton,
  • Ellen Orcutt and
  • Danielle S. McNamara

6 December 2021

Learning to paraphrase supports both writing ability and reading comprehension, particularly for less skilled learners. As such, educational tools that integrate automated evaluations of paraphrases can be used to provide timely feedback to enhance l...

  • Article
  • Open Access
6 Citations
4,036 Views
18 Pages

6 December 2021

Advances in information and communication technologies and, more specifically, in artificial intelligence resulted in more intelligent systems, which, in the business world, particularly in collaborative business ecosystems, can lead to a more stream...

  • Article
  • Open Access
11 Citations
9,704 Views
20 Pages

Browsers’ Private Mode: Is It What We Were Promised?

  • Kris Hughes,
  • Pavlos Papadopoulos,
  • Nikolaos Pitropakis,
  • Adrian Smales,
  • Jawad Ahmad and
  • William J. Buchanan

2 December 2021

Web browsers are one of the most used applications on every computational device in our days. Hence, they play a pivotal role in any forensic investigation and help determine if nefarious or suspicious activity has occurred on that device. Our study...

  • Article
  • Open Access
19 Citations
18,743 Views
33 Pages

1 December 2021

Recent research has revealed an alarming prevalence of click fraud in online advertising systems. In this article, we present a comprehensive study on the usage and impact of bots in performing click fraud in the realm of digital advertising. Specifi...

  • Article
  • Open Access
7 Citations
5,379 Views
9 Pages

IoT Security Mechanisms in the Example of BLE

  • Evgeny Kalinin,
  • Danila Belyakov,
  • Dmitry Bragin and
  • Anton Konev

29 November 2021

In recent years, a lot of IoT devices, wireless sensors, and smart things contain information that must be transmitted to the server for further processing. Due to the distance between devices, battery power, and the possibility of sudden device fail...

  • Article
  • Open Access
20 Citations
7,228 Views
15 Pages

29 November 2021

Global industry is at the heart of its fourth industrial revolution, being driven by the emergence of new digital solutions: Augmented reality allows us to consider the evolution towards the “the augmented operator”. This technology is cu...

  • Article
  • Open Access
4 Citations
3,797 Views
20 Pages

A Systematic Modelling Procedure to Design Agent-Oriented Control to Coalition of Capabilities—In the Context of I4.0 as Virtual Assets (AAS)

  • Jackson T. Veiga,
  • Marcosiris A. O. Pessoa,
  • Fabrício Junqueira,
  • Paulo E. Miyagi and
  • Diolino J. dos Santos Filho

28 November 2021

Manufacturing systems need to meet Industry 4.0 (I4.0) guidelines to deal with uncertainty in scenarios of turbulent demand for products. The engineering concepts to define the service’s resources to manufacture the products will be more flexib...

  • Feature Paper
  • Article
  • Open Access
7 Citations
3,989 Views
12 Pages

Reinforcing SLA Consensus on Blockchain

  • Nikolaos Kapsoulis,
  • Alexandros Psychas,
  • Antonios Litke and
  • Theodora Varvarigou

26 November 2021

Cloud Infrastructure as a Service (IaaS) Service Level Agreements (SLAs) assessment constitutes the de facto area of interest and applications in the public cloud infrastructure. However, the domination of colossal corporations tends to monopolize th...

  • Review
  • Open Access
10 Citations
8,095 Views
28 Pages

Cloud-Based Business Process Security Risk Management: A Systematic Review, Taxonomy, and Future Directions

  • Temitope Elizabeth Abioye,
  • Oluwasefunmi Tale Arogundade,
  • Sanjay Misra,
  • Kayode Adesemowo and
  • Robertas Damaševičius

26 November 2021

Despite the attractive benefits of cloud-based business processes, security issues, cloud attacks, and privacy are some of the challenges that prevent many organizations from using this technology. This review seeks to know the level of integration o...

  • Article
  • Open Access
39 Citations
13,069 Views
15 Pages

The Application of Deep Learning Algorithms for PPG Signal Processing and Classification

  • Filipa Esgalhado,
  • Beatriz Fernandes,
  • Valentina Vassilenko,
  • Arnaldo Batista and
  • Sara Russo

25 November 2021

Photoplethysmography (PPG) is widely used in wearable devices due to its conveniency and cost-effective nature. From this signal, several biomarkers can be collected, such as heart and respiration rate. For the usual acquisition scenarios, PPG is an...

  • Article
  • Open Access
95 Citations
18,954 Views
15 Pages

Machine Learning Approaches to Traffic Accident Analysis and Hotspot Prediction

  • Daniel Santos,
  • José Saias,
  • Paulo Quaresma and
  • Vítor Beires Nogueira

24 November 2021

Traffic accidents are one of the most important concerns of the world, since they result in numerous casualties, injuries, and fatalities each year, as well as significant economic losses. There are many factors that are responsible for causing road...

  • Article
  • Open Access
33 Citations
9,918 Views
24 Pages

23 November 2021

Risks arising from the effect of disruptions and unsustainable practices constantly push the supply chain to uncompetitive positions. A smart production planning and control process must successfully address both risks by reducing them, thereby stren...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X