Information and Network Security 1 Hardware Assisted Protocol for Attacks Prevention in ad hoc Networks.- Android Malicious Software using Boosting Algorithms Deepon Nath.- Privacy and Security Factors of Government Websites versus Private Websites in Bangladesh and USA: A Comparative Study.- Protecting Web Applications from Web Scraping.- Cloud, IoT and Distributed Computing.- 5 Integrated CMOS Active Low-pass Filter for IoT RFID Transceiver.- LoRa IoT WSN for E-Agriculture.- Integrating the Meteorological Data into a Smart City Service using Cloud of Things (CoT) .- Data Handling and Transparency Enhancement in Central Sterile Service Department.- AI, Expert Systems and Big Data Analytics .- Data Mining Approach Improving Decision-Making Competency along the Business Digital Transformation Journey: A Literature Review.- An Event-level Clustering Framework for Process Mining Using Common Sequential Rules.- Fuzzy Logic enabled Stress Detection using Physiological Signals.- The Auxiliary Parametric Sensitivity Method as a Means of Improving Project Management Analysis and Synthesis of Executive Elements.- Predicting Diabetes Using Diabetes Datasets and Machine Learning Algorithms: Comparison and Analysis.