


default search action
24th CAMAD 2019: Limassol, Cyprus
- 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2019, Limassol, Cyprus, September 11-13, 2019. IEEE 2019, ISBN 978-1-7281-1016-5
- Nikolaos Astyrakakis
, Yannis Nikoloudakis
, Ioannis Kefaloukos
, Charalabos Skianis, Evangelos Pallis
, Evangelos K. Markakis:
Cloud-Native Application Validation & Stress Testing through a Framework for Auto-Cluster Deployment. 1-5 - George Hatzivasilis, Panos Chatziadam, Nikos Petroulakis
, Sotiris Ioannidis, Matteo Mangini, Christos Kloukinas
, Artsiom Yautsiukhin
, Michalis Antoniou, Dimitrios G. Katehakis
, Marios Panayiotou:
Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Helathcare Organizations. 1-6 - Ogerta Elezaj, Sule Yildirim Yayilgan
, Mohamed Abomhara, Prosper Kandabongee Yeng, Javed Ahmed
:
Data-Driven Intrusion Detection System for Small and Medium Enterprises. 1-7 - Panagiotis Georgakopoulos, Tafseer Akhtar, Stavros Kotsopoulos:
On Game Theory-Based Coordination Schemes for Mobile Small Cells. 1-5 - Othonas Soultatos, Manos Papoutsakis, Konstantinos Fysarakis
, George Hatzivasilis, Manos Michalodimitrakis, George Spanoudakis, Sotiris Ioannidis:
Pattern-Driven Security, Privacy, Dependability and Interoperability Management of IoT Environments. 1-6 - Dimitrios Pliatsios
, Panagiotis G. Sarigiannidis
, Thanasis Liatifis
, Konstantinos Rompolos, Ilias Siniosoglou
:
A Novel and Interactive Industrial Control System Honeypot for Critical Smart Grid Infrastructure. 1-6 - Dimitrios Amaxilatis, Christos Tselios, Orestis Akrivopoulos
, Ioannis Chatzigiannakis:
On the Design of a Fog Computing-Based, Driving Behaviour Monitoring Framework. 1-6 - Praveen Kumar Korrai, Eva Lagunas
, Shree Krishna Sharma, Symeon Chatzinotas
, Björn E. Ottersten:
Slicing Based Resource Allocation for Multiplexing of eMBB and URLLC Services in 5G Wireless Networks. 1-5 - George C. Hadjichristofi, George Varveris:
Visualizing and Aggregating Behavior for Trust Evaluation. 1-6 - Yusuf A. Sambo
, Gianluca C. Valastro, Giancarlo M. M. Patané, Metin Öztürk
, Sajjad Hussain, Muhammad Ali Imran
, Daniela Panno:
Motion Sensor-Based Small Cell Sleep Scheduling for 5G Networks. 1-5 - Brian McCarthy, Aisling O'Driscoll
:
OpenCV2X Mode 4: A Simulation Extension for Cellular Vehicular Communication Networks. 1-6 - Paolo Bellavista
, Luca Foschini
, Nicola Ghiselli
:
Analysis of Growth Strategies in Social Media: The Instagram Use Case. 1-7 - Samantha Gamboa
, Raghav Thanigaivel, Richard Rouil
:
System Level Evaluation of UE-to-Network Relays in D2D-Enabled LTE Networks. 1-7 - Madiha Shahzad, Josephina Antoniou
:
Quality of User Experience in 5G-VANET. 1-6 - David Guzman, Richard Schöffauer, Gerhard Wunder:
Predictive Network Control in Multi-Connectivity Mobility for URLLC Services. 1-7 - Hadi Saki, Nabeel Khan, Maria G. Martini
, Moustafa M. Nasralla
:
Machine Learning Based Frame Classification for Videos Transmitted over Mobile Networks. 1-6 - Zsolt Krämer, Sándor Molnár, Szilárd Solymos, Attila Mihály:
On the Benefits of Multi-Domain Congestion Control in LTE Networks. 1-6 - Hajer Ben Rekhissa, Cécile Belleudy, Philippe Bessaguet:
Power Efficient Packet Scheduling for M2M Devices over LTE/LTE-A Technologies. 1-4 - Hugo Marques
, Paulo Marques, Jorge Ribeiro, Tiago Alves, Luis Pereira:
Experimental Evaluation of Cellular Networks for UAV Operation and Services. 1-6 - Konstantinos Karampidis, Spyros Panagiotakis
, Manos Vasilakis, Evangelos K. Markakis, Giorgos Papadourakis
:
Industrial CyberSecurity 4.0: Preparing the Operational Technicians for Industry 4.0. 1-6 - Hasna Uddin, Marcia Gibson, Ghazanfar Ali Safdar, Tahera Kalsoom, Naeem Ramzan
, Masood Ur Rehman
, Muhammad Ali Imran
:
IoT for 5G/B5G Applications in Smart Homes, Smart Cities, Wearables and Connected Cars. 1-5 - Vipindev Adat
, Ilias Politis
, Christos Tselios, Stavros Kotsopoulos:
Blockchain Enhanced SECRET Small Cells for the 5G Environment. 1-6 - Souvik Sengupta
, Sarang Kahvazadeh
, Xavi Masip-Bruin
, Jordi Garcia
:
SFDDM: A Secure Distributed Database Management in Combined Fog-to-Cloud Systems. 1-7 - Gerhard Hasslinger, Konstantinos Ntougias, Frank Hasslinger, Oliver Hohlfeld:
Fast and Efficient Web Caching Methods Regarding the Size and Performance Measures per Data Object. 1-7 - Kyriakos Kritikos
, Manos Papoutsakis, Sotiris Ioannidis, Kostas Magoutis:
Towards Configurable Vulnerability Assessment in the Cloud. 1-6 - Hassan Malik, Jeffrey Leonel Redondo Sarmiento, Muhammad Mahtab Alam, Muhammad Ali Imran
:
Narrowband-Internet of Things (NB-IoT): Performance Evaluation in 5G Heterogeneous Wireless Networks. 1-6 - Hussein Chour, Youssef Nasser, Faouzi Bader, Oussama Bazzi:
Game-Theoretic Based Power Allocation for a Full Duplex D2D Network. 1-7 - Konstantinos Lampropoulos
, Giorgos Georgakakos, Sotiris Ioannidis:
Using Blockchains to Enable Big Data Analysis of Private Information. 1-6 - Liviu-Adrian Hirtan, Piotr Krawiec
, Ciprian Dobre
, Jordi Mongay Batalla
:
Blockchain-Based Approach for e-Health Data Access Management with Privacy Protection. 1-7 - Rozeta Draghici
, Alexandra Rusu, Gabriel Ioan Prada, Anna Marie Herghelegiu
, Lidia Bajenaru
, Ciprian Dobre
, Constandinos X. Mavromoustakis, Susanna Spinsante, Jordi Mongay Batalla
, Horacio González-Vélez
:
Acceptability of Digital Quality of Life Questionnaire Corroborated with Data from Tracking Devices. 1-6 - Nikolaos Vakakis, Odysseas Nikolis, Dimosthenis Ioannidis
, Konstantinos Votis
, Dimitrios Tzovaras
:
Cybersecurity in SMEs: The Smart-Home/Office Use Case. 1-7 - Habib Mohammed Hussien
, Konstantinos Katzis, Luzango Pangani Mfupe, Ephrem T. Bekele:
Coexistence of TV White Space Devices and DTV Services in Ethiopian Geolocation White Space Spectrum Database. 1-5 - Attai Ibrahim Abubakar, Metin Öztürk
, Sajjad Hussain, Muhammad Ali Imran
:
Q-Learning Assisted Energy-Aware Traffic Offloading and Cell Switching in Heterogeneous Networks. 1-6 - Dimitra Chamou, Petros Toupas
, Eleni Ketzaki
, Stavros Papadopoulos, Konstantinos M. Giannoutakis
, Anastasios Drosou, Dimitrios Tzovaras
:
Intrusion Detection System Based on Network Traffic Using Deep Neural Networks. 1-6 - Chao Liu, Emmanuel Kieffer, Pascal Bouvry
:
On Fairness Optimization for Cloud Radio Access Networks. 1-5 - Grace Khayat, Constandinos X. Mavromoustakis, Jordi Mongay Batalla
, George Mastorakis, Hoda W. Maalouf, Mithun Mukherjee:
Tuning the Uplink Success Probability in Damaged Critical Infrastructure for VANETs. 1-6 - Péter Hegyi, József Varga:
Telco Cloud Simulator. 1-7 - Zohaib Ahmed, Syed Muhammad Danish, Hassaan Khaliq Qureshi, Marios Lestas:
Protecting IoTs from Mirai Botnet Attacks Using Blockchains. 1-6 - Daniel Gaetano Riviello
, Francesco Di Stasio:
Analysis of Circular and Cylindrical Array Arrangements for mmWave 5G Beamforming Techniques. 1-4 - Nabajeet Barman
, Nabeel Khan, Maria G. Martini
:
Analysis of Spatial and Temporal Information Variation for 10-Bit and 8-Bit Video Sequences. 1-6 - Konstantinos Loupos
, Bora Caglayan, Alexandros Papageorgiou, Basile Starynkevitch, Franck Védrine, Christos Skoufis, Stelios Christofi, Bill Karakostas, Antonis Mygiakis
, George Theofilis, Andrea Chiappetta, Harris Avgoustidis, George Boulougouris:
Cognition Enabled IoT Platform for Industrial IoT Safety, Security and Privacy - The CHARIOT Project. 1-4 - Tamara K. Al-Shayea, Jordi Mongay Batalla
, Constandinos X. Mavromoustakis, George Mastorakis:
Embedded Dynamic Modification for Efficient Watermarking Using Different Medical Inputs in IoT. 1-6 - Georgios Spanos
, Konstantinos M. Giannoutakis, Konstantinos Votis, Dimitrios Tzovaras:
Combining Statistical and Machine Learning Techniques in IoT Anomaly Detection for Smart Homes. 1-6 - Giuseppe Portaluri, Mike Oluwatayo Ojo
, Stefano Giordano
, Marialaura Tamburello, Giuseppe Caruso:
Open CLORO: An Open Testbed for Cloud Robotics. 1-5 - Javier Augusto-Gonzalez, Anastasija Collen
, Spyridon C. Evangelatos
, Marios Anagnostopoulos, Georgios P. Spathoulas, Konstantinos M. Giannoutakis, Konstantinos Votis, Dimitrios Tzovaras, Béla Genge, Erol Gelenbe, Niels A. Nijdam:
From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes. 1-6 - Jung-In Kim, Seung-Jae Lee
, Sang-Hyun Lee, Jong-Han Kim, Woon-Haing Hur:
Test Framework for Communication Protocol Stack Software. 1-4 - Kiraseya Preusser
, Michael Reyer, Anke Schmeink:
Network Planning for Indoor Joint LTE and WLAN Networks. 1-6 - Intidhar Bedhief
, Luca Foschini
, Paolo Bellavista
, Meriem Kassar, Taoufik Aguili:
Toward Self-Adaptive Software Defined Fog Networking Architecture for IIoT and Industry 4.0. 1-5 - Tafseer Akhtar, Ilias Politis
, Panagiotis Georgakopoulos, Stavros Kotsopoulos:
Efficient Radio Resource Management Scheme in Cooperative Network using Coalition Game. 1-6 - Eftychia Lakka, Nikolaos E. Petroulakis
, George Hatzivasilis, Othonas Soultatos, Manolis Michalodimitrakis, Urszula Rak, Karolina Waledzik, Darko Anicic, Vivek Kulkarni:
End-to-End Semantic Interoperability Mechanisms for IoT. 1-6 - Ahmed Elbery, Hossam S. Hassanein, Nizar Zorba, Hesham A. Rakha
:
VANET-Based Smart Navigation for Emergency Evacuation and Special Events. 1-6 - Georgios Efstathopoulos, Panagiotis I. Radoglou-Grammatikis
, Panagiotis G. Sarigiannidis
, Vasilis Argyriou, Antonios Sarigiannidis, Konstantinos Stamatakis, Michail K. Angelopoulos, Solon K. Athanasopoulos:
Operational Data Based Intrusion Detection System for Smart Grid. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.