


default search action
CITS 2022: Piraeus, Greece
- George A. Tsihrintzis, Maria Virvou, Kuei-Fang Hsiao, Petros Nicopolitidis, Yu Guo:
International Conference on Computer, Information and Telecommunication Systems, CITS 2022, Piraeus, Greece, July 13-15, 2022. IEEE 2022, ISBN 978-1-6654-8615-6 - Sanjeev Kumar Dwivedi
, Ruhul Amin, Satyanarayana Vollala:
Design of Blockchain-based Secure Electric Vehicle Charging System Using ECC. 1-5 - Yachao Yuan, Christian Gehrmann, Jakob Sternby, Luis Barriga:
Insight of Anomaly Detection with NWDAF in 5G. 1-6 - Sara Shakeri, Lourens E. Veen, Paola Grosso
:
Tracking container network connections in a Digital Data Marketplace with P4. 1-8 - Said Bakhshad, Vasaki Ponnusamy, Robithoh Annur, Muhammad Waqas, Hisham Alasmary, Shanshan Tu:
Deep Reinforcement Learning based Intrusion Detection System with Feature Selections Method and Optimal Hyper-parameter in IoT Environment. 1-7 - Pronaya Bhattacharya, Mohammad S. Obaidat, Darshan Savaliya, Sakshi Sanghavi, Sudeep Tanwar, Balqies Sadoun:
Metaverse assisted Telesurgery in Healthcare 5.0: An interplay of Blockchain and Explainable AI. 1-5 - Ori Glikstein, Sapir Hanina, Nezah Balal
, Gad A. Pinhasi, Yosef Pinhasi:
Indoor-Outdoor of Wireless Link Propagation from tunnels and long corridors. 1-4 - Chaima Zouine, Amina Hentati, Jean-François Frigon:
Energy Harvesting WSNs with Adaptive Modulation: Inter-delivery-aware Scheduling Algorithms. 1-8 - Theofanis P. Raptis, Andrea Passarella:
On Efficiently Partitioning a Topic in Apache Kafka. 1-8 - K. Arivarasan
, Mohammad S. Obaidat:
Intrusion Detection System using Aggregation of Machine Learning Algorithms. 1-8 - Wei Sun, Jun Yan:
A CNN based localization and activity recognition algorithm using multi-receiver CSI measurements and decision fusion. 1-7 - Dekang Zhu, Jun Yan:
A Deep Learning Based Bluetooth Indoor Localization Algorithm by RSSI and AOA Feature Fusion. 1-6 - Georgios L. Stavrinides, Helen D. Karatza
:
Security-Aware Orchestration of Linear Workflows on Distributed Resources. 1-5 - Konstantina Spathi, Anastasios Valkanis, Georgia A. Beletsioti, Konstantinos F. Kantelis, Petros Nicopolitidis, Georgios Papadimitriou:
Learning-Automata-Based Energy Efficient Model for Device Lifetime Enhancement in LoRaWAN Networks. 1-6 - Heba Saadeh, Maha Saadeh, Wesam Almobaideen, Marwan Al-Tawil:
Evaluating the Optimal Number of Clusters to Identify Similar Gene Expression Patterns During Erythropoiesis. 1-5 - Geonho Song, Mingyu Jang, Dongweon Yoon:
CNN-Based Automatic Modulation Classification in OFDM Systems. 1-4 - Efstratios Karypiadis, Anastasios Nikolakopoulos
, Achilleas Marinakis
, Vrettos Moulos, Theodora A. Varvarigou:
SCAL-E: An Auto Scaling Agent for Optimum Big Data Load Balancing in Kubernetes Environments. 1-5 - Hongxiang Zhu, Jun Yan:
A Deep Learning Based Sound Event Location and Detection Algorithm Using Convolutional Recurrent Neural Network. 1-6 - Abhijit Guha, Mohammad S. Obaidat, Debabrata Samanta, SK Hafizul Islam:
Clustering-based Optimal Resource Allocation Strategy in Title Insurance Underwriting. 1-5 - Pronaya Bhattacharya, Ashwin Verma, Mohammad S. Obaidat, Sudeep Tanwar, Balqies Sadoun:
SaFaR: Solana Blockchain-based Optimal Route Selection Scheme for Cab Aggregators. 1-5 - Shanshan Tu, Fengming Huang, Shengju Zhang, Akhtar Badshah
, Hisham Alasmary, Muhammad Waqas
:
Ciphertext-Policy Attribute-based Encryption for Securing IoT Devices in Fog Computing. 1-7 - Nitin Gupta, Mohammad S. Obaidat, Deborsi Basu, Uttam Ghosh, Kuei-Fang Hsiao:
A Comprehensive Study on Artificial Intelligence and Blockchain Driven Beyond 5G Networks. 1-6 - Segundo Moisés Toapanta Toapanta
, Rodrigo Humberto Del Pozo Durango, Luis Enrique Mafla Gallegos, Ma. Roció Maciel Arellano, Jose Antonio Orizaga Trejo
, María Mercedes Baño Hifóng:
Suitable Professional Identity Analysis to Improve Information Security Governance. 1-4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.